CN113410971B - Self-generating switch and processing method and control system thereof - Google Patents
Self-generating switch and processing method and control system thereof Download PDFInfo
- Publication number
- CN113410971B CN113410971B CN202110531083.7A CN202110531083A CN113410971B CN 113410971 B CN113410971 B CN 113410971B CN 202110531083 A CN202110531083 A CN 202110531083A CN 113410971 B CN113410971 B CN 113410971B
- Authority
- CN
- China
- Prior art keywords
- current
- key
- processor
- memory
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G05—CONTROLLING; REGULATING
- G05B—CONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
- G05B19/00—Programme-control systems
- G05B19/02—Programme-control systems electric
- G05B19/04—Programme control other than numerical control, i.e. in sequence controllers or logic controllers
-
- G—PHYSICS
- G08—SIGNALLING
- G08C—TRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
- G08C17/00—Arrangements for transmitting signals characterised by the use of a wireless electrical link
- G08C17/02—Arrangements for transmitting signals characterised by the use of a wireless electrical link using a radio link
-
- H—ELECTRICITY
- H01—ELECTRIC ELEMENTS
- H01H—ELECTRIC SWITCHES; RELAYS; SELECTORS; EMERGENCY PROTECTIVE DEVICES
- H01H13/00—Switches having rectilinearly-movable operating part or parts adapted for pushing or pulling in one direction only, e.g. push-button switch
- H01H13/02—Details
- H01H13/12—Movable parts; Contacts mounted thereon
- H01H13/14—Operating parts, e.g. push-button
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/12—Detection or prevention of fraud
- H04W12/121—Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
- H04W12/122—Counter-measures against attacks; Protection against rogue devices
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y04—INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
- Y04S—SYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
- Y04S40/00—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them
- Y04S40/12—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment
- Y04S40/126—Systems for electrical power generation, transmission, distribution or end-user application management characterised by the use of communication or information technologies, or communication or information technology specific aspects supporting them characterised by data transport means between the monitoring, controlling or managing units and monitored, controlled or operated electrical equipment using wireless data transmission
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Automation & Control Theory (AREA)
- Input From Keyboards Or The Like (AREA)
- Telephone Function (AREA)
Abstract
The invention provides a self-generating switch, a processing method and a control system thereof, wherein the processing method comprises the following steps: in the continuously-generated one-press control action and one-rebound control action, aiming at least one control action, before, after or at the same time of generating and sending a corresponding current control message to a receiving end through the wireless communication module, the processor also reads a current verification identifier from the memory, updates the current verification identifier, and writes the updated current verification identifier back to the memory before the electric energy stored in the energy storage module is exhausted, wherein the verification identifiers before and after updating are different.
Description
Technical Field
The invention relates to the field of self-generating switches, in particular to a self-generating switch and a processing method and a control system thereof.
Background
A wireless switch is understood to be a switch configured with a wireless communication module, wherein one of the wireless switches is a self-generating switch, and in a conventional self-generating switch, the wireless switch is usually communicated with the outside through a radio frequency communication module, for example, the self-generating switch can communicate with various receiving terminals (such as a lamp, a wall switch, etc.) through radio frequency signals.
In the prior art, when the self-generating switch is controlled, a control message is sent out in response to the control of the self-generating switch, however, the content in the control message is relatively simple, and generally only information describing a key and a switch is contained, so that the requirement on safety cannot be met.
Disclosure of Invention
The invention provides a self-generating switch, a processing method and a control system thereof, and aims to solve the problem that the safety requirement cannot be met.
According to a first aspect of the present invention, a processing method of a self-generating switch is provided, where the self-generating switch includes a processor, a memory, a button, a generator, a reset component, a rectification module, an energy storage module, a voltage output module, and a wireless communication module, the wireless communication module is electrically connected to the memory, an induction portion of the generator is electrically connected to the energy storage module through the rectification module, the energy storage module is electrically connected to the wireless communication module, the processor, and the memory through the voltage output module, the reset component can be in transmission with a moving portion of the generator, and the button can be in transmission with the moving portion of the generator directly or indirectly;
the processing method comprises the following steps:
if the button is pressed down, then: the elastic component deforms and generates a reset acting force for overcoming the deformation, the moving part of the generator is directly or indirectly driven by the key, so that the generator generates a first induction voltage, and if the key generates a rebounding control action, the generator is characterized in that: the elastic component drives a moving part of the generator under the action of the reset action force, so that the generator generates a second induction voltage;
the rectifying module stores first electric energy corresponding to the first induction voltage and/or second electric energy corresponding to the second induction voltage in the energy storage module; the energy storage module transmits the stored electric energy to the voltage output module, and the voltage output module provides required voltage for the processor, the memory and the wireless communication module by using the received electric energy to electrify the processor, the memory and the wireless communication module;
after the processor, the memory and the wireless communication module are powered on, the processor generates and sends a corresponding current control message to a receiving end through the wireless communication module; the current control message records a current verification identifier and current control information; the current steering information characterizes at least one of: the self-generating switch, a key which is currently received by the self-generating switch for operation and control, and the operation and control actions which are currently generated by the self-generating switch; the current control information corresponds to at least one control event which needs to be executed by the receiving end;
in the continuously generated one-press control action and one-rebound control action, aiming at least one control action, before, after or at the same time of generating and sending a corresponding current control message to a receiving end through the wireless communication module, the processor also reads a current verification identifier from the memory, updates the current verification identifier, and writes the updated current verification identifier back to the memory before the electric energy stored in the energy storage module is exhausted, wherein the verification identifiers before and after updating are different.
According to a second aspect of the invention, a self-generating switch is provided, which comprises a processor, a memory, a key, a generator, a reset component, a rectifying module, an energy storage module, a voltage output module and a wireless communication module, wherein the wireless communication module is electrically connected with the memory and the processor, an induction part of the generator is electrically connected with the energy storage module through the rectifying module, the energy storage module is electrically connected with the wireless communication module and the processor through the voltage output module, the reset component can be in transmission with a motion part of the generator, and the key can also be in transmission with the motion part of the generator directly or indirectly;
the elastic component is used for: if the button is pressed down, then: deformation occurs and a reset acting force overcoming the deformation is generated; if the button generates a rebounding operation, the method comprises the following steps: a moving part for driving the generator under the action of the reset force;
the generator is used for: if the button is pressed down, then: the moving part of the generator is directly or indirectly driven by the key to enable the induction part of the generator to generate a first induction voltage, if the key performs a rebounding operation, the moving part of the generator is driven by the elastic component to enable the generator to generate a second induction voltage,
the rectification module is used for: storing first electric energy corresponding to the first induction voltage and/or second electric energy corresponding to the second induction voltage in the energy storage module;
the energy storage module is used for: transmitting the stored electrical energy to the voltage output module;
the voltage output module is used for: the voltage output module provides required voltage for the processor, the memory and the wireless communication module by using the received electric energy, so that the processor, the memory and the wireless communication module are powered on;
the processor is configured to:
after the processor, the memory and the wireless communication module are powered on, generating and sending a corresponding current control message to a receiving end through the wireless communication module; the current control message is recorded with a current verification identifier and current control information; the current steering information characterizes at least one of: the self-generating switch, the key currently received by the self-generating switch and the current control action of the self-generating switch; the current control information corresponds to at least one control event which needs to be executed by the receiving end;
in the continuously-generated one-press control action and one-rebound control action, aiming at least one control action, before, after or simultaneously generating and sending a current control message to a receiving end through the wireless communication module, reading a current verification identifier from the memory, updating the current verification identifier, and writing the updated current verification identifier back to the memory before the electric energy stored in the energy storage module is exhausted, wherein the verification identifiers before and after updating are different.
According to a third aspect of the present invention, there is provided a control system comprising the self-generating switch of the second aspect, and the receiving terminal.
In the self-generating switch, the processing method thereof and the control system thereof provided by the invention, the current verification identifier is introduced into the control message reported by the self-generating switch, and the current verification identifier (for example, verification based on the current verification identifier and the historical verification identifier) can be used as a verification basis for executing the control event, so that the control event of copying the message is avoided being executed, and the effect of preventing copying attack is realized. Meanwhile, the basis can be provided for filtering the repeated messages through the current verification identification.
The duplicate message can be understood as: an attacker first captures a legal switch message and then sends the message out without moving. Aiming at the problem, the invention realizes the updating of the verification identification, and the verification identifications before and after the updating are different, at the moment, the verification identification in the real message is updated, and the verification identification in the copy message is usually repeated and unchanged, so that the copy message can be effectively verified through the verification based on the current verification identification, the control event of executing the copy message is avoided, and the safety is ensured.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a schematic diagram of the construction of a control system in accordance with an embodiment of the present invention;
fig. 2 is a schematic diagram showing a first configuration of a self-generating switch according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a self-generating switch according to an embodiment of the invention;
fig. 4 is a schematic diagram of a third configuration of a self-generating switch according to an embodiment of the present invention;
FIG. 5 is a circuit diagram of a rectifier module according to an embodiment of the invention;
FIG. 6 is a circuit diagram of a polarity identification module according to an embodiment of the invention;
FIG. 7 is a schematic waveform diagram of a pulse signal output by the sensing portion according to an embodiment of the present invention;
FIG. 8 is a schematic diagram of the connection of the first memory according to one embodiment of the present invention;
FIG. 9 is a first schematic circuit diagram of a voltage output module according to an embodiment of the present invention;
FIG. 10 is a second schematic circuit diagram of the voltage output module according to an embodiment of the present invention;
FIG. 11 is a first flowchart illustrating a method for handling an auto-power-generating switch according to an embodiment of the present invention;
FIG. 12 is a second schematic flow chart illustrating a method for handling an autonomous switch in accordance with an embodiment of the present invention;
fig. 13 is a schematic flow chart of the operation process of the self-generating switch according to an embodiment of the present invention;
FIG. 14 is a schematic diagram of a packet transceiving operation according to an embodiment of the present invention;
FIG. 15 is a diagram illustrating a data structure of a packet according to an embodiment of the present invention;
fig. 16 is a diagram illustrating a data structure of a packet according to an embodiment of the present invention;
fig. 17 is a first flowchart illustrating a working process of a receiving end according to an embodiment of the present invention;
FIG. 18 is a second flowchart illustrating a working process of the receiving end according to an embodiment of the present invention;
figure 19 is a schematic structural view of a self-generating switch in accordance with an embodiment of the present invention;
FIG. 20 is a schematic view of a portion of an embodiment of a self-generating switch in accordance with the present invention;
FIG. 21 is a schematic structural diagram of a bottom case according to an embodiment of the present invention;
FIG. 22 is a schematic view of the structure of a transmission member according to an embodiment of the present invention;
FIG. 23 is a schematic diagram of a second partial structure of the self-generating switch in accordance with an embodiment of the present invention;
FIG. 24 is a schematic structural view of a center housing in an embodiment of the present invention;
FIG. 25 is a schematic view of a water barrier according to an embodiment of the present invention;
FIG. 26 is a schematic structural diagram of a key in an embodiment of the present invention;
fig. 27a and 27b are schematic views illustrating the operation principle of key pressing according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Moreover, the terms "comprises," "comprising," and any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical solution of the present invention will be described in detail below with specific examples. These particular embodiments may be combined with each other below, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Referring to fig. 1, a control system according to an embodiment of the present invention may include a self-generating switch 1 and a receiving terminal 2, where a self-generating switch and a receiving terminal are illustrated in the figure, in an actual control system, the number of the self-generating switches and the number of the receiving terminals may be multiple, and meanwhile, transmission of a wireless signal may be implemented between the self-generating switch 1 and the receiving terminal 2, where the wireless signal may be, for example, bluetooth, radio frequency, Wifi, or the like.
The self-generating switch 1 is used for implementing a processing method referred to hereinafter, and further, a description about the processing method may be understood as a description about a working process, a function, and a specific implementation manner of software and/or hardware in the self-generating switch.
The receiving end 2 may be any controlled device that can be controlled by a self-generating switch, or a device connected to the controlled device, and in a specific example, the receiving end 2 may be, for example, a wall switch, an electronic doorbell, a lamp, an automatic curtain, a fan, and the like. The controls it accepts may be, for example but not limited to:
controlling the receiving end or a device connected with the receiving end to enter a certain state; such as turning a wall switch on or off, turning a light on or off, ringing a doorbell, controlling a fan to start or stop rotating, automatic window shades to open or close, turning on or off a designated function at a receiving end, etc.;
controlling the receiving end or a device connected with the receiving end to switch between two states; for example, the on-off state of a wall-turning (switching) switch, the on-off state of a lamp, the on-off state of a fan, the on-off state of an automatic curtain, the on-off state of a function designated at a receiving end, and the like;
controlling the receiving end or a device connected with the receiving end to change working parameters; for example, adjusting the brightness of the lamp, adjusting the air volume of the fan, adjusting the opening degree of the curtain, etc.
According to the application field change of the self-generating switch 1, the specific content of control and control can be changed at will without departing from the scope of the embodiment of the invention.
Meanwhile, the following description of the control event may also be understood with reference to the above.
In the embodiment of the present invention, referring to fig. 2, the self-generating switch 1 includes a processor 108, a memory 107, a key 101, a generator 103, a reset component 102, a rectifying module 111, an energy storage module 105, a voltage output module 106, and a wireless communication module 109.
The electrical connection referred to hereinafter may include a direct electrical connection and also include an indirect electrical connection.
The power generator 103 is capable of generating power when the button 101 is manipulated (e.g., pressed and/or rebounded), and generating power, which can be used to directly or indirectly power the processor 108, the wireless communication module 109, the memory 107, and the like, wherein the processor 108, the wireless communication module 109, and the memory 107 can be separate or integrated, and further, if integrated, the power generator: the power supply to the processor 108, the wireless communication module 109 and the memory 107 can be realized based on the same power supply terminal.
The generator 103 may include a moving part 1031 and a sensing part 1032.
The moving part 1031 may be understood as a component or a combination of components that can be driven by at least one of a button and a reset component to move, and the sensing part 1032 may be understood as a component or a combination of components that can act on the moving part 1031 to sense and generate electric energy when the moving part moves, and any structure that can generate electric energy based on the movement in the art may be used as an alternative to the embodiment of the present invention.
In a specific example, the generator 103 may include a permanent magnet portion, a magnetic conductive portion, and a coil portion, the coil portion may be disposed on the magnetic conductive portion, and the coil portion may generate an induced voltage when the permanent magnet portion and the magnetic conductive portion move relative to each other. The coil part can be regarded as the above mentioned induction part 1032, and the permanent magnet part or the magnetic conducting part can be regarded as the above mentioned movement part 1031, that is: in some examples, the permanent magnet part moves to directly and indirectly transmit with the key and the reset component, and in other examples, the magnetic conduction part moves to directly and indirectly transmit with the key and the reset component. It can be seen that the sensing part 1032 may or may not move with the moving part 1031.
The wireless communication module 109 and the memory 107 are electrically connected to the processor 108, the sensing portion 1032 of the generator 103 is electrically connected to the energy storage module 105 through the rectifying module 111, the energy storage module 105 is electrically connected to the wireless communication module 109, the processor 108 and the memory 107 (for example, connected to the wireless communication module 109, the processor 108 and a power supply terminal of the memory 107) through the voltage output module 106, the reset component 102 (for example, a torsion spring, a tension spring, etc.) can be in transmission with the movement portion 1031 of the generator 103, and the key 101 can also be in transmission with the movement portion 1031 of the generator directly or indirectly.
In some embodiments, the reset component 102 can be directly driven to the moving portion 1031, or in other embodiments, the reset component 102 can also be driven to a button or other component, so as to be indirectly driven to the moving portion 1031.
Referring to fig. 11, the switch control method includes:
s301: whether the key is pressed down or not;
if so, step S302 may be performed: the reset component deforms and generates a reset acting force for overcoming the deformation, and a moving part of the generator is directly or indirectly driven by the key, so that the generator generates a first induction voltage;
if not, the process returns to step S301 to continue to determine whether the pressing operation has occurred.
In some embodiments, step S302 may be followed by: s303: the rectifying module stores first electric energy corresponding to the first induction voltage in the energy storage module.
Referring to fig. 11, the switch control method may also include:
s304: whether the key has rebounded control action or not;
if so, step S305 may be performed: the reset component drives a moving part of the generator under the action of the reset action force, so that the generator generates a second induction voltage;
in some embodiments, step S305 may be followed by: s306: and the rectifying module stores second electric energy corresponding to the second induction voltage in the energy storage module.
In a specific example, only the first electrical energy may be stored and/or used, and only the second electrical energy may be stored and/or used.
After step S303 and/or step S306, it may include:
s307: the energy storage module transmits the stored electric energy to the voltage output module, and the voltage output module provides required voltage for the processor, the memory and the wireless communication module by using the received electric energy to electrify the processor, the memory and the wireless communication module;
s308: after the processor, the memory and the wireless communication module are powered on, the processor generates and sends a corresponding current control message to a receiving end through the wireless communication module;
wherein the current control packet records current control information and the current verification identifier, so that: and the receiving terminal verifies whether the relationship between the current verification identification in the current control message and the stored historical verification identification is matched with a preset transformation rule of the current verification identification, and executes a control event corresponding to the current control information when the relationship is matched with the transformation rule, wherein the historical verification identification is determined according to the verification identification recorded in a control message or a pairing message sent to the receiving terminal before the self-generating switch.
The current steering information characterizes at least one of: the self-generating switch; the self-generating switch receives a key operated currently; and the self-generating switch performs the currently received control action on the key.
Before, after, or simultaneously with generating and sending the corresponding current control message to the receiving end through the wireless communication module (i.e. before, after, or simultaneously with implementing step S308), the processor may further include:
s309: in the continuously generated control actions of one press and one rebound, reading a current verification identifier from the memory and updating the current verification identifier for at least one control action;
wherein, updating the current verification identifier may specifically include: converting and updating the current verification identifier from the first numerical value to a second numerical value by using a preset conversion rule; the first value is different from the second value.
It can be seen that, since the pressing operation and the rebounding operation are in a pair and continuous manner, rebounding usually occurs after pressing. Furthermore, in the above solution, the current verification identifier may be updated only after the pressing manipulation action occurs, or the current verification identifier may be updated only after the rebounding manipulation action occurs, or both the current verification identifier and the current verification identifier may be updated after the pressing manipulation action and the rebounding manipulation action occur.
Referring to fig. 11, the processing method may further include:
s310: and writing the updated current verification identifier back to the memory before the electric energy stored by the energy storage module is exhausted.
Corresponding to the above steps S301 to S310, the functions of the respective components in the self-generating switch can be understood with reference to the following.
The reset device 102 is configured to: if the button 101 is pressed down, then: deformation occurs and a reset acting force overcoming the deformation is generated; if the button 101 generates a rebounding operation, then: the moving part 1031 of the generator 103 is driven by the restoring force.
The generator 103 is configured to: if the button 101 is pressed, then: the moving part 1031 of the generator 103 is directly or indirectly driven by the key 101 to generate a first induced voltage in the induction part 1032 of the generator 103, and when the key 101 performs a rebounding operation, the moving part 1031 of the generator 103 is driven by the reset member 102 to generate a second induced voltage in the generator,
the rectification module 111 is configured to: storing first electric energy corresponding to the first induction voltage and/or second electric energy corresponding to the second induction voltage in the energy storage module;
the energy storage module 105 is configured to: transmitting the stored electrical energy to the voltage output module 106;
the voltage output module 106 is configured to: the received power (first power and/or second power) is used for providing required voltage for the processor 108, the memory 107 and the wireless communication module 109 to power up;
the processor 108 is configured to:
after the processor 108, the memory 107 and the wireless communication module 109 are powered on, generating and sending a corresponding current control message to the receiving end 2 through the wireless communication module 109;
in the continuously generated one-press operation and one-rebound operation, for at least one operation, before, after, or at the same time of generating and sending a current control message to a receiving end through the wireless communication module, a current verification identifier is read from the memory, the current verification identifier is updated (for example, the current verification identifier is updated from a first numerical value to a second numerical value by a preset conversion rule), and the updated current verification identifier is written back to the memory before the electric energy stored in the energy storage module is exhausted.
Wherein, if from the power generation switch be equipped with reset unit, then: the pressing operation can be the operation of pressing a key, and the rebounding operation can be the operation of removing the pressing action force so as to rebound the key.
In some examples, in a message (e.g., a current control message or a pairing message), at least two of information characterizing a self-generating switch, information characterizing a key, and information characterizing a manipulation action may be configured as one piece of information integrated together, for example, a predefined character string may be configured corresponding to each manipulation action of each key, so that the character string is used as (or represents) the current manipulation information, and further, by reading the character string, a receiving end may learn what manipulation action occurs on which key.
In other examples, corresponding characters or character strings may be respectively configured for the information characterizing the self-generating switch, the information characterizing the key, and the information characterizing the manipulation action as the current manipulation information.
The information characterizing the spontaneous electric switch may be information characterizing which spontaneous electric switch it is, or may be information characterizing which type of spontaneous electric switch it is (for example, at least one of the model, lot, brand, and the like of the spontaneous electric switch).
In a specific example, the current control information may include a switch identifier, and then the switch identifier may be used to represent the self-generating switch, and the current control information may further include a key value, and then the key value is used to represent a key currently received by the self-generating switch and a control action currently received by the key in the self-generating switch.
In addition, the current operation information can be understood as information that the receiving end can determine the control event according to the current operation information, and further, if the information (or information representing the key and the operation action) representing the self-generating switch is not used for determining the control event, then: even if the message is written in the information, the information may not be regarded as the current manipulation information.
The verification mark can be any character or combination of characters which can be suitable for realizing verification, the current verification mark can be understood as being currently sent by the self-generating switch, and the historical verification mark can be understood as being stored by a receiving end before the self-generating switch sends the current verification mark.
In some examples, the historical verification identifier may be a current verification identifier that is sent to the receiving end (sent with the control message or the pairing message) and stored by the receiving end when the self-power switch has performed the last operation, or determined according to the current verification identifier, and in other examples, the historical verification identifier may also be a current verification identifier that is sent to the receiving end (sent with the control message or the pairing message) and stored by the receiving end when the self-power switch has performed the last specific operation (for example, a pressed operation or a rebounded operation) or determined according to the current verification identifier.
Since the verification identifier is a specific numerical value, it may also be described as a serial number, and further, in the example of the embodiment of the present invention, the description of the serial number may be regarded as the description of the verification identifier.
The wireless communication module 109 may be any circuit module capable of implementing wireless communication, and for example, may include at least one of the following: radio frequency module, bluetooth module, Wifi module etc..
Corresponding to the above steps S301 to S310, and the corresponding functions of the components of the self-generating switch, the receiving end may be configured to:
receiving a current control message;
the current control message is sent by the self-generating switch through the switch control method or the self-generating switch;
verifying whether the relationship between the current verification identification and the stored historical verification identification matches the transformation rule;
and executing the control event corresponding to the current control information when the relation is matched with the transformation rule.
If the relationship does not match the transformation rule, the corresponding packet (e.g., the current control packet) may be discarded; the discarding of the current control packet may be understood as not processing based on the current control packet, for example: and the control event corresponding to the current control message is not executed, and the information such as the historical verification identifier is not updated and changed based on the current control message.
In the scheme, the current verification identifier is introduced in the interaction process of the self-generating switch and the receiving end, the matching verification of the current verification identifier and the historical verification identifier can be used as the basis for executing the control event, the control event for copying the message is avoided, and the effect of preventing copying attack is realized. Meanwhile, through the matching verification that whether the current verification identification and the historical verification identification are matched with the transformation rule or not, a basis can be provided for filtering repeated messages.
The verification identification in the real message is changed, and the verification identification in the copied message is usually repeated, so that the copied message can be effectively verified through verification based on the historical verification identification and the transformation rule (wherein the relation between the verification identification and the historical verification identification is usually not matched with the transformation rule), further, the control action of the copied message is avoided, and the safety is guaranteed.
In addition, when the historical verification identifier is the past current verification identifier, it can be ensured that: the identification verification sources are all derived from the self-generating switch, so that the verification accuracy and safety can be effectively guaranteed.
In one embodiment, referring to fig. 3 and 4, the self-generating switch 1 further includes a polarity identification module 110; the polarity identification module 110 electrically connects the generator 103 (e.g., the sensing portion 1032 thereof) and the processor 108.
Before the processor reads the current verification identifier from the memory and updates the current verification identifier, the method further includes:
after the processor, the memory and the wireless communication module are powered on, the processor identifies the currently occurring control action of the key through the polarity identification module and determines that the currently occurring control action is a target control action (that is, the processor 108 is further configured to identify the currently occurring control action of the key through the polarity identification module 110 and determine that the currently occurring control action is a target control action), and the target control action is a designated control action selected from a pressing control action and a rebounding control action.
It can be seen that in the above scheme, a scheme of "the transformation of the authentication identity occurs only after one complete press and rebound" is implemented.
Because there is a possibility of packet loss in wireless communication, if the data packet sent by pressing (i.e., the data packet of the control message sent after pressing) is lost, the data packet sent by rebounding (i.e., the data packet of the control message sent after rebounding) can be used as a remedy, and the receiving end can still perform a response action after receiving the rebounded data packet.
For this, the receiving end may determine whether to execute the control event by combining the verification identifier and the control action represented by the control packet, for example: the receiving end can judge according to the serial number (namely, the verification identification), and if the data packet is pressed (namely, the current control information is the pressing control information), certain response is carried out, so that a corresponding control event is executed; if the data packet is a rebound data packet (namely, the current control information is the rebound control information), the corresponding control event is executed only in response to the condition that the pressed data packet with the same sequence number (namely, the verification identifier) is not received before.
As can be seen, if the control events corresponding to the press and the rebound are the same, then: the scheme of 'the conversion of the verification identification only occurs after one complete press and rebound' can help to avoid the data packet loss from influencing the execution of the control event, and ensure that the corresponding control event can be executed effectively.
Meanwhile, after the receiving end is configured reasonably, it is also helpful to avoid the control message pointing to the same control event from being executed repeatedly, for example: when a lamp is controlled by a self-generating switch (i.e. the receiver is a lamp or a connected lamp), if the control event is: the lamp state is reversed, then: if both the press and the rebound will respond, the light is turned on when the press is made and then turned off after the rebound. The reasonable configuration can be, for example: if the self-generating switch changes the current verification identifier on time, then: the receiving end can update and write the current verification identification in the control message as a new historical verification identification when receiving the control message.
When the effects can be realized, even if the control events corresponding to press and rebound in some receiving ends are different, the realization of different control events can be ensured after the receiving ends are reasonably configured. The reasonable configuration can be, for example: if the self-generating switch changes the current verification identifier on time, then: the receiving end can write the verification identifier in the control message when receiving the rebounded control message as a new historical verification identifier.
Therefore, the same set of updating conditions of the verification identifier (namely, the current verification identifier is changed when the currently generated operation is the target operation and control action) is adopted, so that the requirements of pressing and rebounding the receiving end corresponding to the same control event can be met, and the requirements of pressing and rebounding the receiving end corresponding to different control events can also be met. Furthermore, the compatibility of the self-generating switch to various possible control requirements is effectively guaranteed, and the control diversity of the control system is improved.
In addition, the scheme of 'the change of the verification identifier only occurs after one complete press and rebound' can also play a role in saving electric energy. For example: if the sequence number is updated only at the time of the rebound (i.e. the current authentication identity), then: when the serial number is pressed down, the serial number (namely the current verification identifier) does not need to be updated, and particularly, the energy consumption for writing the updated serial number into a memory can be saved.
Moreover, when the sequence numbers (namely the current verification identifiers) corresponding to the pressed control actions and the rebounded control actions are the same, the receiving end can be simpler when the message is deduplicated according to the sequence numbers.
In a further example, the target manipulation motion is a rebound manipulation motion, and in other examples, the target manipulation motion may also be a press manipulation motion.
When a user presses a key of the self-generating switch, feedback of a control effect is generally expected to be immediately obtained. Furthermore, if the sequence number is updated only in the case of a rebound (i.e. the target actuation is a rebound actuation), all the power during the depression can be used for other tasks, in particular for transmitting signals, without the expenditure of power for updating the sequence number.
In one embodiment, please refer to fig. 3, the self-generating switch 1 further includes a key identification module 110, and the key identification module 110 is electrically connected to the processor;
referring to fig. 12, before the processor generates the current control packet, the method further includes:
s311: the processor reads a switch identification characterizing the self-generating switch from the memory;
s312: whether the current control action is a pressing control action or not;
if the determination result in step S312 is yes, step S313 may be implemented: the processor acquires current key information through the key identification module and updates the current key information in the memory;
if the determination result in the step S312 is negative, the step S314 may be implemented: whether the current control action is a rebounding control action or not;
if the determination result in step S314 is yes, step S315 may be implemented: the processor acquires the stored current key information from the memory;
if the determination result in step S314 is no, the process may return to step S312.
And based on the switch identification and the control action information, the current control information is determined based on the switch identification, the control action information and the acquired current key information.
Correspondingly, before generating the current control message, the processor 108 may be further configured to:
reading a switch identification characterizing the self-generating switch from the memory;
if the current operation is the operation of pressing down: acquiring current key information through the key identification module, and updating the current key information in the memory;
if the current operation is the springback operation, then: obtaining the stored current key information from the memory;
the current control information is determined based on the switch identifier, the currently generated control action, and the obtained current key information, for example, the switch identifier may be written into the current control packet, or a key value may be determined based on the control action and the current key information, and the key value may be written into the current control packet.
In a further example, referring to fig. 4, the key identification module 110 may include microswitches 1101, the number of the microswitches 1101 and the keys 101 may be one as shown in fig. 2, or may be multiple as shown in fig. 3 and 4, each of the microswitches 1101 and each of the keys 101 are in one-to-one correspondence, the microswitches 1101 may be activated when the corresponding key is pressed, and further feed back a signal to the processor 108, at this time, the processor 108 may read the fed back signal to determine key information representing the key, so as to learn which key the key currently pressed is.
In one embodiment, referring to fig. 4 and 6, the polarity identification module 112 includes a press identification portion 1121 and a rebound identification portion 1122; the press recognition unit 1121 electrically connects the sensing unit 1032 of the generator 103 and the processor 108, respectively, and the springback recognition unit 1122 electrically connects the sensing unit 1032 of the generator 103 and the processor 108, respectively.
The processor identifies the current operation action of the key through the polarity identification module, and the operation action comprises the following steps:
if the processor receives the designated signal sent by the press identification part, determining the currently generated control action as a press control action; wherein the press-down recognizing section transmits the designation signal to the processor only when the generator generates the first induced voltage;
and if the processor receives the designated signal sent by the springback recognition part, determining the current generated control action as a pressing control action, wherein the springback recognition part sends the designated signal to the processor only when the generator generates the second induced voltage.
Correspondingly, when the processor 108 identifies the current operation control action of the key through the polarity identification module, it is specifically configured to:
if receiving the designated signal sent by the pressing identification part 1121, determining the currently generated control action as the pressing control action; wherein the pressing identification portion 1121 transmits the designation signal to the processor 108 only when the generator 103 generates the first induced voltage;
if the specified signal sent by the springback recognition unit 1122 is received, the currently generated manipulation action is determined as a pressing manipulation action, wherein the springback recognition unit 1122 sends the specified signal to the processor 108 only when the generator 103 generates the second induced voltage.
The specific signal may be, for example, any one of the following: high level signal, high pulse signal, low level signal, low pulse signal.
The pulse signal generated by the sensing portion at the time of the next pressing and the pulse signal generated by the sensing portion at the time of the rebounding can be understood by referring to the waveforms shown in fig. 7. In fig. 7, the abscissa represents time, and the ordinate represents voltage.
For further example, referring to fig. 6, the pressing identification portion 1121 may include: pressing the identification first diode D21, pressing the identification second diode D22, pressing the identification first resistor R21, pressing the identification second resistor R22, and pressing the identification capacitor C21;
the positive electrode of the pressed identification first diode D21 is electrically connected to the first output terminal of the sensing portion, the negative electrode of the pressed identification first diode D21 is electrically connected to the first terminal of the pressed identification capacitor C21 and the first terminal of the pressed identification first resistor R21, the second terminal of the pressed identification capacitor C21 is grounded, the first terminal of the pressed identification second resistor R22 and the negative electrode of the pressed identification second diode D22 are electrically connected to the first receiving terminal (e.g., I/O port) of the processor 108, and the positive electrode of the pressed identification second diode D22 and the second terminal of the pressed identification second resistor R22 are grounded.
For further example, referring to fig. 6, the springback recognition unit 1122 may include: a rebound identification first diode D23, a rebound identification second diode D24, a rebound identification first resistor R23, a rebound identification second resistor R24, and a rebound identification capacitor C22;
the positive electrode of the springback identification first diode D23 is electrically connected with the second output end of the sensing part, the negative electrode of the springback identification first diode D23 is electrically connected with the first end of the springback identification capacitor C22 and the first end of the springback identification first resistor R23, the second end of the springback identification capacitor C22 is grounded, the first end of the springback identification second resistor R24 and the negative electrode of the springback identification second diode D24 are electrically connected with the second receiving end (for example, an I/O port) of the processor 108, the positive electrode of the springback identification second diode D24 and the second end of the springback identification second resistor R24 are grounded.
When the generator is pressed down or rebounded, the output end can respectively generate a positive pulse. The energy storage capacitor corresponding to the positive pulse (i.e. pressing the identification capacitor C21 or the rebound identification capacitor C22) is charged, and a positive pulse is output to the receiving end of the processor. And the capacitor of the negative pulse of the generator cannot be charged, and simultaneously, because of the existence of the diode, the electricity of the capacitor corresponding to the positive pulse cannot flow to the capacitor corresponding to the negative pulse, so that the capacitor corresponding to the negative pulse cannot output a pulse signal or a high-level signal to the processor. The processor can detect the level generated by the voltage division of the resistors so as to perform corresponding actions.
The press-down recognition diode D21 and the rebound recognition diode D23 may be isolated diodes, for example, a diode of type RB 551V. The press-down recognition second diode D22 and the rebound recognition second diode D24 may be implemented as a zener diode, for example, a zener diode of 3.3V, and specifically, a zener diode of MMSZ5226BS may be used, with a maximum power consumption of 200mW and a reverse leakage current of 25 uA.
According to the selection of the resistance value of the divided voltage, the maximum voltage of the generator needs to reach 3.5 × 5/2 × 8.75V to reach the maximum withstand voltage of the IO port of 3.5V, and the generator can usually meet the requirement.
In the embodiment of the present invention, only the pressing identification portion may be adopted, or only the rebounding identification portion may be adopted, for example, if the time for transmitting the message from the power switch is short, and the message is sent out and the power is consumed soon after each pressing, the switch may only need one identification portion (for example, the pressing identification portion or the rebounding identification portion). Such as: when only one pressing identification part is pressed, the switch generates a high level when being pressed, and the processor identifies that the pressing is performed. When the switch rebounds, the processor does not detect the high level, which may also be referred to as a rebound.
However, for a part of the self-generating switches (for example, the self-generating switch of the bluetooth module is used as the wireless communication module), because each transmission duration is long, when the user releases the switch, the pressed message is not yet transmitted, and at this time, the processor is still in a working state, and if no rebound recognition part outputs a high level, the processor cannot know that the switch rebounds. Therefore, two independent identification parts are required to identify the press-down and the rebound, so that when the processor detects that the corresponding IO port has a high level or a positive pulse, the corresponding press-down or rebound is considered to have occurred. Therefore, in the scheme, the IO port with the polarity identification can be detected not only at the power-on moment to judge whether the IO port is pressed down or rebounded.
In one embodiment, referring to fig. 4, the memory 107 includes a first memory 1071 and a second memory 1072, the current authentication identifier update is stored in the first memory 1071; the first memory 1071 and the second memory 1072 storing programs are different memories, and the first memory 1071 is a memory which does not lose data after power failure.
The current verification identifier updated and stored in the first memory 1071 is the same as the current verification identifier recorded in the current manipulation message.
In a further embodiment, the first memory 1071 is a memory capable of erasing, writing, and reading data in units of one or more bytes, wherein the writing and reading time of a single byte does not exceed 10ms, and the consumed energy does not exceed 300 uJ. The first memory 1071 includes, for example, a Flash memory and/or a ferroelectric memory.
In addition, the first memory also stores current key information, and the current key information represents the key which is pressed by the self-generating switch for the last time; and the key represented by the current key information is the same as the key represented by the current control information.
The first memory 1071 may not select the conventional FLASH, because the conventional false sh must be erased (written) in units of sectors, which causes too much power to be written and the generator may not be able to support it. On the contrary, when the memories such as the EEPROM, the ferroelectric memory and the like are selected, the situation that the electric quantity of the generator is difficult to support can be effectively avoided.
In a specific example, the first memory 1071 may be coupled to the processor through an IIC bus using 24C 02. Taking fig. 8 as an example, the power supply (VDD-EE) of the first memory 1071 is isolated from the processor's power supply VDD by diode D71 so that the processor 108 is in an unpowered state when necessary, such as when burning data into an EEPROM during a production phase, so that the IIC communication between the EEPROM and the burning tool is not affected by the IIC pin of the processing unit.
Wherein, for storing in particular: (1) a current authentication identity; (2) current key press information.
When the switch is pressed down during working, the verification identifier can be read from the first memory, then updating (such as self-increasing operation) is carried out, the updated current verification identifier is filled in a message to be sent, then the self-updated current verification identifier is written back to the first memory again, then the electric quantity is exhausted, and the processor and the memory are powered off and halted.
The switch sends current key information (representing which key is pressed and released) when being pressed and/or rebounded, but due to the structural limitation of the self-generating switch, although the generator generates electricity when the switch is released, the micro switch for detecting key positions is already released, and which key is pressed to act cannot be identified, so that a first memory (namely two memories are adopted) is arranged, and the current key information at the moment is written into the first memory when the switch is pressed; during rebound, although the current key information cannot be read from the state of the microswitch, the previous key information can be read from the first memory as the current key information, so that the message during rebound also carries a key value, thereby doubling the probability that a receiving end can receive the message and improving the reliability.
In addition, the SCL terminal of the first memory 1071 may be connected to the VDD-EE of the processor via a resistor R72, and the SDA terminal of the first memory 1071 may be connected to the VDD-EE of the processor via a resistor R71.
In one embodiment, referring to fig. 4 and fig. 5, the rectifying module 111 includes a first rectifying portion 1111 and a second rectifying portion 1112; the first rectifying part 1111 is electrically connected to the induction part 1032 of the generator 103 and the energy storage module 105, and the second rectifying part 1112 is electrically connected to the induction part 1032 of the generator 103 and the energy storage module 105.
The rectifier module stores first electric energy corresponding to the first induction voltage and second electric energy corresponding to the second induction voltage in the energy storage module, and the rectifier module comprises:
the first rectifying part rectifies the first induction voltage and stores corresponding first electric energy in the energy storage module;
the second rectifying part rectifies the second induction voltage and stores corresponding second electric energy in the energy storage module.
Correspondingly, the rectifying module 111 is used for storing the first electric energy corresponding to the first induced voltage and the second electric energy corresponding to the second induced voltage in the energy storage module, and is specifically configured to:
the first rectifying part 1111 rectifies the first induced voltage and stores corresponding first electric energy in the energy storage module;
the second rectifying unit 1112 rectifies the second induced voltage and stores corresponding second electric energy in the energy storage module.
For further example, referring to fig. 5, the first rectifying portion 1111 includes a first rectifying diode D11, a second rectifying diode D12 and a first rectifying resistor R11, and the second rectifying portion 1112 includes a third rectifying diode D13, a fourth rectifying diode D14 and a first rectifying resistor R12.
The cathode of the first rectifying diode D11 and the cathode of the second rectifying diode D12 can be respectively and electrically connected with the first output end and the second output end of the induction part, the anode of the first rectifying diode D11 and the anode of the second rectifying diode D12 can be grounded, and can be connected with the first end of a first rectifying resistor R11, and the second end of the first rectifying resistor R11 is connected with the second output end;
the anode of the third rectifying diode D13 and the anode of the fourth rectifying diode D14 can be respectively electrically connected to the first output end and the second output end of the sensing portion, the cathode of the third rectifying diode D13 and the cathode of the fourth rectifying diode D14 can be grounded, and can be connected to the first end of the second rectifying resistor R12, and the second end of the second rectifying resistor R12 is connected to the first output end.
In the above scheme, the third rectifier diode D13 and the fourth rectifier diode D14 constitute a positive pulse rectifier, and the first rectifier diode D11 and the second rectifier diode D12 constitute a negative pulse rectifier. Therefore, when the generator is pressed down and reset, the electric energy can be transmitted to the energy storage module 105 through the rectifying device, and signals can be sent when the wireless switch is pressed down and reset.
In one embodiment, the voltage output module 106 may include: the controller 1061, the energy storage capacitor C61 and the freewheeling unit (for example, including the freewheeling inductor L61);
the input side of the controller 1061 is electrically connected to the energy storage module, and meanwhile, the enable end of the controller 1061 may be connected to the energy storage module and a first end of a capacitor C62, a second end of the capacitor C62 may be grounded, the output side of the controller 1061 is electrically connected to a first end of the freewheeling unit (e.g., a freewheeling inductor L61), a second end of the freewheeling unit (e.g., a freewheeling inductor L61) is electrically connected to at least one of the processor and the wireless communication module memory directly or indirectly, and the energy storage capacitor C61 is electrically connected between the second end of the freewheeling unit (e.g., a freewheeling inductor L61) and ground; the controller 1061 is configured to control on and off between an input side and an output side thereof, and adjust a voltage output through the freewheel unit and the energy storage capacitor by adjusting a switching frequency of the on and off and a time period of the on or off.
The voltage output module 106 may further include a first feedback resistor R61 and a second feedback resistor R62 for detecting the output voltage and feeding the output voltage back to the controller 1061.
The controller 1061 may be integrated with a PWM generating unit, which adjusts the width or frequency of the output pulse according to the feedback voltage, controls an internal or external switching tube, and intermittently charges the output inductor to achieve the purpose of voltage stabilization.
In some examples, a resistor R63 may be disposed between the output terminal of the energy storage module and the output terminal of the voltage output module (i.e., the VDD terminal and the VIN terminal), and a capacitor C63 and a zener diode D61 may be disposed between the VIN terminal and ground in parallel.
In one embodiment, the transformation rule includes at least one of:
accumulating a first reference value on the basis of said first value to obtain said second value;
subtracting a second reference value from the first value to obtain a second value;
multiplying a third reference value by the first value to obtain the second value;
dividing the first value by a fourth reference value to obtain the second value.
The accumulation, subtraction, multiplication, division and the like can be calculated by adopting decimal calculation and can also be calculated by adopting binary system or other binary systems. The first, second, third and fourth reference values may be fixed values or variable values, and their signs are usually the same and are not zero, e.g. positive numbers.
Taking the accumulated first reference value as an example, the first reference value used for accumulation may be a positive number that varies within a certain range, and further for example, the accumulated value may vary regularly, for example: if the cycle changes from accumulation 1, accumulation 2, and accumulation 3, then: the k-th transformation is realized by accumulating 1, the k + 1-th transformation is realized by accumulating 2, the k + 2-th transformation is realized by accumulating 3, and the k + 3-th transformation is realized by accumulating 1 again.
Corresponding to the above various cases, there are:
if the transformation rule is: accumulating a first reference value on the basis of said first value to obtain said second value, then: when the receiving end verifies whether the current verification identification is matched with the historical verification identification, the receiving end can verify whether the current verification identification is larger than the historical verification identification, or: verifying whether the current verification identifier is larger than the historical verification identifier or not, wherein the difference value of the current verification identifier and the historical verification identifier is matched with the first reference value;
if the transformation rule is: subtracting a second reference value from the first value to obtain a second value; then: when the receiving end verifies whether the current verification identification is matched with the historical verification identification, the receiving end can verify whether the current verification identification is smaller than the historical verification identification, or: verifying whether the current verification identification is smaller than the historical verification identification or not, wherein the difference value of the current verification identification and the historical verification identification is matched with the second reference value;
if the transformation rule is: multiplying a third reference value by the first value to obtain the second value; then: when the receiving end verifies whether the current verification identification is matched with the historical verification identification, the receiving end can verify whether the current verification identification is larger than the historical verification identification, or: verifying whether the current verification identifier is larger than the historical verification identifier, wherein the ratio of the current verification identifier to the historical verification identifier is matched with the third reference value;
if the transformation rule is: dividing said first value by a fourth reference value to obtain said second value; then: when the receiving end verifies whether the current verification identification is matched with the historical verification identification, the receiving end can verify whether the current verification identification is smaller than the historical verification identification, or: and verifying whether the current verification identification is smaller than the historical verification identification or not, wherein the ratio of the current verification identification to the historical verification identification is matched with the fourth reference value.
In the above scheme, by comparing the difference value with the first numerical value and the second numerical value, and comparing the ratio value with the third numerical value and the fourth numerical value, it can be verified whether the current verification identifier is larger or smaller than the historical verification identifier, and the change amplitude can also be verified, so that an attacker can perform exhaustive attack by using the numerical value larger (or smaller) than the current numerical value, and the security is further improved.
The difference value is matched with the first reference value and the second reference value, which can be understood as the same value, or the difference value is smaller than a certain threshold value, and the ratio value is matched with the third reference value and the fourth reference value, which can be understood as the same value, or the difference value is smaller than a certain threshold value.
Referring to fig. 13, in an example, the self-generating switch carries a serial number (i.e., a verification flag), the serial number increases (or decreases) by itself each time the switch is pressed, and the serial number increases by itself only once after a complete press + rebound operation; the representation carried in the message is information of pressing/bouncing (it can be understood that the control information can represent the control action).
Specifically, the self-generating switch rebounds after being pressed down each time, and the generator operates to generate electricity when being pressed down and rebounded, so that power is supplied to a back-end circuit (such as a processor, a wireless communication module, a memory and the like). The back-end circuit can identify whether the control action is pressing or rebounding through the polarity identification module.
If it is a push manipulation, the serial number (i.e. the stored authentication identifier) is read from the memory, then the serial number is incremented (which may be understood as the transformation), then the key information is read, and a control message is generated (which may correspond to step S308). Then, the serial number and the key information are written back to the memory, and can be used for reading during the rebound, and then the message is sent (which may correspond to steps S310 and S313). The order of writing back the memory and sending the message can be interchanged.
If the control is the rebound control, the serial number is directly read from the memory without self-increment (namely, the conversion is not needed to be implemented), and the key information is also directly read from the memory (rather than reading the feedback signal of the microswitch).
In one embodiment, the current control packet further includes signature information, where the signature information is calculated based on a first key and changes with a change of the current verification identifier;
the signature information can be verified by the receiving end through a second key, and the first key is matched with the second key.
The key can be fixed and unchangeable, and can also be refreshed and changed by a certain method, and the self-generating switch and the receiving terminal are resynchronized after the refreshing and changing. For example: the key may vary based on a function value with time as an argument, the functional relationship corresponding to the first key being adapted to the functional relationship corresponding to the second key.
In a specific example, the key may be a secret string of data, wherein the signature information may be calculated by a predetermined algorithm (e.g., AES algorithm) after combining the plaintext and the key. The plaintext may, for example, control at least part of the content of the message, which may contain the authentication identifier but no signature.
For example: in the self-generating switch, the processor can encrypt the contents of the fields except the signature field in the payload part of the current control message to be sent by using the first secret key to obtain signature information, the receiving end can encrypt the contents of the fields except the signature field in the payload part of the received current control message by using the second secret key to obtain the signature information, and the receiving end can verify the signature information recorded in the current control message by using the calculated signature information.
In addition, the first key and the second key may be the same, and in other examples, the two keys may also be different.
The anti-counterfeiting function can be realized through the signature information, and the safety is guaranteed.
To facilitate the description of the role of signature information and authentication indicia (e.g., serial number), several concepts are first cleared as follows:
copy attack:
it can be understood that: an attacker first captures a legal switch message and then sends the message without change. By verifying the use of the identification, it is possible to effectively protect against copying attacks, such as: the receiving end stores the serial number (i.e. the verification identifier) of the last received message, and after receiving a new message, the receiving end continues to check the serial number even if the verification signature information is legal: the disallowed sequence number is the sequence number that has been received before the press or bounce, but is a sequence number that is larger than before and falls within a window (all, or a sliding window that is large enough).
Forgery attack:
it can be understood that: the attacker can operate a real device (e.g., an autonomous switch) that can issue a control message and then actively add 1 to the serial number (if the serial number is plaintext) to reconstruct the message.
Through the signature information, forgery attacks can be effectively prevented, and the signature information is calculated by the key according to the previous message content (if the serial number is plaintext). The self-generating switch is encrypted by a key, the receiving end calculates once by the key, and if the key is obtained, the message of the transmitting end is considered to be legal.
When using the authentication identification (e.g., serial number) and signature information, it may be possible, for example:
in the pairing process, the receiving end and the self-generating switch synchronize serial numbers; the sequence number is not verified in the pairing process, and the signature information can be selected to be verified still, namely the pairing process only considers forgery prevention and does not consider copy prevention. Of course, the signature information may also be checked;
during normal operation, on one hand, signature information is verified, and on the other hand, the serial number is verified, and only the verification result is allowed to be larger (or smaller) than the previous serial number. If the sequence number is to be verified more strictly, it is required that the sequence number is larger than the previous sequence number and falls within a window (which may be embodied as, for example, the aforementioned first reference value, second reference value, third reference value, fourth reference value). Window-based verification may have an effect on exhaustive attacks, such as: an attacker can perform an exhaustive attack with a sequence number that is larger than the current sequence number if no window is required.
In one embodiment, the authentication identifier (e.g., sequence number) itself is also converted before transmission, and an attacker cannot obtain the current sequence number. And further: the current verification identifier recorded in the current control message is a converted current verification identifier, wherein the conversion mode is a first data conversion mode, namely: the current verification identifier recorded in the current control message is the current verification identifier converted by the first data conversion mode;
the current verification identifier verified by the receiving end is obtained by reversely converting the converted current verification identifier, wherein the reverse conversion mode is a second data conversion mode, and the first data conversion mode and the second data conversion mode are opposite data conversion modes, that is: the current verification mark verified by the receiving end is obtained by carrying out reverse conversion on the converted current verification mark in a second data conversion mode.
The first data conversion method and the second data conversion method are opposite conversion methods, and no matter which conversion method is adopted, the scope of the embodiment of the invention is not deviated.
In a specific example, referring to fig. 17, the receiving end may check the duplicate according to the "ID-serial number"; where the ID is understood to be the device-manufacturer ID (corresponding to the device-manufacturer ID in fig. 15 and 16), the serial number of the message is stored after the message is received for the specific ID. After receiving the message with the same ID next time, comparing the serial number (namely the current verification identifier) with the previous one, and if the serial number is the same as the historical value (namely the historical verification identifier), considering that the message is a repeated message and discarding the repeated message; if the message is newer than the historical value, the message is considered as a new message, and subsequent processing is carried out.
Specifically, after receiving the message, the basic message validity judgment is firstly made according to the message format. Then, extracting the serial number; comparing the serial number with the historical value (i.e. comparing the current verification identifier with the past verification identifier for verification); if the sequence number is larger than the historical value, executing a corresponding control action (namely a control event) and writing a new sequence number into the historical value for standby; if not, then the duplicate sequence number is considered and discarded.
In one embodiment, the current control packet is sent from the power generation switch through bluetooth, and the wireless communication module is a bluetooth module, and a packet sending and data packet scanning and receiving manner in bluetooth communication will be described below.
Specifically, for example, the receiving end itself may be awakened and dormant according to the wakeup sleep cycle, and the wakeup sleep cycle includes an alternate wakeup time period and a sleep time period, that is: and the receiving end enters the dormancy period after the wakeup period, the dormancy period enters the wakeup period after the dormancy period, the cycle is repeated, and the receiving end receives the data packet only in the wakeup period.
In fig. 14, the waveform of the receiving scan is a schematic waveform of the receiving scan data packet at the receiving end, wherein the wakeup period can be characterized as Ton, the sleep period can be characterized as Toff, and the waveform of the sending packet is a schematic waveform of the sending data packet from the power switch, wherein the convex waveform is a sending period that can be regarded as one data packet.
In step S308, sending the corresponding current control packet to the receiving end through the wireless communication module specifically includes:
broadcast N group data packet outwards in proper order through the bluetooth to make: the receiving end captures at least one data packet in an awakening time period, wherein each group of data packets comprises a plurality of data packets, and each data packet comprises the current control message; and the broadcast interval of the adjacent data packets in the N groups of data packets is matched with the awakening sleep period of the receiving end, wherein N is more than or equal to 2.
Correspondingly, when the processor sends the corresponding current control message to the receiving end through the wireless communication module, the processor is specifically configured to:
broadcast N group data packet outwards in proper order through the bluetooth to make: the receiving end captures at least one data packet in an awakening time period, wherein each group of data packets comprises a plurality of data packets, and each data packet comprises the current control message; and the broadcast interval of the adjacent data packets in the N groups of data packets is matched with the awakening sleep period of the receiving end, wherein N is more than or equal to 2.
Correspondingly, the receiving end may specifically be configured to:
capturing at least one data packet in N groups of data packets sent by the self-generating switch in the awakening period through Bluetooth, wherein the N groups of data packets are broadcast to the outside sequentially through the Bluetooth by the self-generating switch, and each data packet contains the current control message; the total broadcast duration of the N groups of data packets and the broadcast interval of two adjacent data packets are matched with the awakening sleep period of the receiving end, wherein N is more than or equal to 2.
Wherein a broadcast interval is understood to be: the interval between the broadcast start times of two adjacent groups of data packets can also be regarded as the broadcast period of each group of data packets, and each broadcast period only sends one group of data packets.
The duration of the awakening time interval is greater than or equal to the broadcasting interval of two adjacent data packets;
the duration of the sleep period is less than or equal to N-1 times the broadcast interval.
Through the scheme, the data packet can be received by the receiving end in the awakening time period no matter when the data packet is sent out by the self-generating switch in the data packet receiving and sending process.
In the case that the wake-up period Ton is within the large transmission period, there should be at least 1 packet in the window of the wake-up period Ton, i.e. the wake-up periods Ton cannot all fall within the broadcast interval (e.g. 20mS), and the wake-up period Ton is greater than or equal to the broadcast interval (e.g. 20 mS).
At the same time, it is also ensured that at least one packet falls outside the window of the rest period Toff, which is, in turn, less than or equal to the broadcast interval (N-1), for example less than or equal to 20mS (N-1), taking into account the time duration (for example 1mS) for which the packet itself is to be sent.
In a specific example, the specified packet sending interval duration (i.e. the formed broadcast interval) may be selected to be 20 mS;
the wake-up sleep cycle of the receiving end can be 100 mS;
the duty cycle may be 20%,
correspondingly, the wake-up period Ton is 20mS and the sleep period Toff is 80 mS.
Under the above parameters, if the autonomous switch can send 5 groups of data packets, the receiving end can scan at least 1 group of data packets. If the transmitting end can send 10 groups of data packets, the receiving end can scan at least 2 groups of data packets.
In another specific example, if N is 5, the awake period Ton may be specifically 25mS, the sleep period Toff may be specifically 75mS, and further, the corresponding duty ratio is 25%, and the receiving end may scan at least 1 group of data packets and leave a certain margin.
In another specific example, the awake sleep cycle may be 125mS, the awake period Ton may be 25mS, and the sleep period may be 100mS, correspondingly, if the packet sending interval is 20mS, then: 20mS (N-1) is greater than or equal to 100mS, and N is greater than or equal to 6 (namely, at least 6 groups of data packets need to be sent), wherein when N is 6, at least one group of data packets is scanned in the awakening period.
In a further example, the plurality of data packets in the same group are transmitted via at least two of the following channels:
2.402GHz;2.428GHz;2.480GHz。
wherein, the treater passes through bluetooth module is external broadcast N group data packet in proper order specifically includes:
the processor counts the time of the broadcast interval after starting to send a group of data packets, and sends out another group of corresponding data packets when the counted time reaches the specified packet sending interval time length;
correspondingly, when the processor 108 sequentially broadcasts the N groups of packets to the outside through the bluetooth module, the processor is specifically configured to:
after a group of data packets are started to be sent, the time of the broadcast interval is timed, and when the time reaches the specified time length of the packet sending interval, another group of corresponding data packets are sent out.
The above timing function can be realized by a timing module integrated in the processor.
In a specific example, the signal transmitted by the wireless communication module is a bluetooth signal, for example, the signal may be a carrier frequency of 2.4GHZ, and the data packets are transmitted through a designated bluetooth channel. Specifically, the self-generating bluetooth switch transmits data in 40 2-MHz channels using bluetooth low energy technology. Preferably, the data is transmitted in a broadcast channel. The frequency points of the three broadcast frequency channels are respectively: the 37 channel is 2.402 GHz; the 38 channel is 2.428 GHz; the 39 channel is 2.480 GHz.
Wherein more than one packet of signal will be sent at each press, e.g. 3-10 packets of data may be sent. The processor may be integrated with the above mentioned timing module, and the timing module is used for delaying in the transmission interval.
In one example, the packet interval duration may be 20mS, and may specifically fluctuate randomly within a range of 20mS ± 5mS (i.e., the specified packet interval duration may be in an interval range of 15 mS to 25 mS), so as to reduce the probability that transmitted packets of different switches collide over the air.
In one embodiment, taking fig. 15 and fig. 16 as an example, the data structure of the current control packet (the control packet in the embodiment of the present invention may satisfy the data structure) includes:
a header portion (corresponding to "header information" shown in the figure), a PayLoad portion (corresponding to "PayLoad" shown in the figure, which is one AD Structure), and a CRC check portion (corresponding to "CRC" shown in the figure);
the payload section includes:
a key value field (corresponding to "key value" shown in the figure) for recording a key value; the key value is information for representing a key and/or an operation action in the current operation and control information;
a verification identification field (corresponding to "serial number" shown in the figure) for recording the current verification identification.
In a further aspect, the data structure of the current control packet further includes: a physical address part (corresponding to "MAC" shown in the figure);
the physical address part includes:
a switch identification field (corresponding to "MAC L" shown in the figure) for loading a switch identification with 4 bytes; the switch identifier can also be expressed as Source ID, furthermore, in the message, 4 bytes in the physical address part are used for expressing the Source ID of the self-generating switch, the inside of the payload part can also contain the switch identifier, or the switch identifier can not be additionally contained, and if the switch identifier is not contained, the length of the message is reduced as much as possible, and the electric quantity is saved;
the payload part further includes a Frame Header control field (corresponding to "Frame Header" shown in the figure) including:
a switch identification indication field (corresponding to "ID type" shown in the figure) for recording with 1 bit whether or not the payload section records the switch; for example: taking fig. 15 as an example, if the field is 0, it indicates that the payload portion does not additionally include Source ID (i.e., switch ID); taking fig. 16 as an example, if the field is 1, it indicates that the payload portion additionally includes a Source ID (i.e., a switch identifier) of 4 bytes, and the above design can be used to solve the problem that the upper layer application of the iOS device cannot obtain the MAC of the packet.
The payload section further includes:
a signature field (corresponding to "signature" shown in the figure) for recording signature information with 4 bytes; furthermore, the message length is reduced as much as possible under the condition of ensuring the encryption strength.
The frame header control field further includes:
an encryption indication field (corresponding to "encryption type" shown in the figure) for recording whether or not the signature information is contained in the payload portion with 1 bit, for example: if 0, it means that the information is contained, and if 1, it reserves another encryption method.
In addition, the head includes:
a preamble field (corresponding to "preamble" shown in the figure), an Access address field (corresponding to "Access address" shown in the figure), a protocol data unit data Header field (corresponding to "PDU Header" shown in the figure);
the payload section includes:
a length field (corresponding to "length" shown in the figure), a broadcast type field (corresponding to "AD type" shown in the figure), a device manufacturer identification field (corresponding to "device manufacturer ID" shown in the figure), a switch type field (corresponding to "switch type" shown in the figure);
the frame header control field further includes: a version number field (corresponding to "version number" shown in the figure), a number of times of forwarding field (corresponding to "forwarding count" shown in the figure);
the CRC check portion includes a CRC calculation value field.
The following will specifically exemplify a procedure for executing a control event by the receiving end.
In one embodiment, the receiving end may be a wall switch, and the control event includes at least one of the following:
the wall switch is turned off;
the wall switch is turned on;
turning off a designated function of the wall switch;
turning on a designated function of the wall switch;
and sending out a specified signal to the outside.
For other receivers that function similarly to wall switches, the control event can be understood with reference to the above example.
Regardless of the receiving end, the control event may include at least one of the following:
switching the on-off state of the receiving end, wherein the on-off state refers to that the receiving end is opened or closed;
and changing the working parameters of the receiving end.
In one embodiment, the process of executing the control event may be, for example:
detecting whether predefined state switching operation and parameter change operation occur or not according to the current operation information, or: detecting whether the state switching operation and the parameter change operation occur or not according to the current operation information and the previously received operation information;
if the state switching operation occurs, switching the on-off state of the receiving end;
if the parameter change operation occurs, changing the working parameters of the receiving end;
the state switching manipulation is distinct from the parameter change manipulation.
In a further example, the state switching operation is: the pressing time of the corresponding key is longer than the specified time, and the parameter change control is as follows: the pressing duration of the corresponding key is longer than the designated duration. In other examples, the state switching operation may also be: the pressing duration of the corresponding key is longer than the specified duration, and the parameter change control is as follows: the pressing time length of the corresponding key is shorter than the designated time length.
In the above scheme, if the receiver is a lamp, then: in one example, for a key press, a short press (released immediately after pressing) may implement a basic ON/OFF toggle command, such as turning the light ON and OFF, and a long press may implement dimming (e.g., adjusting the brightness of the light).
In one embodiment, the process of executing the control event may be, for example:
if the current control information is the control information starting to change, starting to change the working parameters of the receiving end;
if the current control information is control information which stops changing, the working parameters of the receiving end are stopped changing;
the start change control information and the stop change control information represent different keys and/or different control actions.
In a further example, the start change manipulation information represents a manipulation action of a corresponding key being pressed; the stop change control information represents the control action corresponding to the rebounding of the key. In other examples, the start change manipulation information and the stop change manipulation information may represent manipulation actions of different keys, or may represent manipulation actions of pressing different times.
In one embodiment, for the same key of the same switch, if the corresponding pressing control information and the corresponding rebounding control information correspond to different control events, then:
the historical verification identification stored in the receiving end is determined according to the verification identification recorded in the control message generated by the appointed control action; the appointed control action is used as the control action of pressing down the key or the control action of rebounding the key. For example: the receiving end may only store the current verification identifier therein as the historical verification identifier when receiving the control packet generated by the pressing operation, for example: the receiving end can only store the current verification identifier as the historical verification identifier when receiving the control message generated by the rebounded control action.
The receiving end of the above adjustable operating parameter may be, for example, any one of the following: lamps, fans, automatic curtains. But not limited to this, any receiving end having the requirement of adjusting the working parameters can be used as an optional scheme.
Referring to fig. 18, if the receiving end is a lamp, an example of a scheme for dimming the lamp is as follows: wherein mainly realized starting to adjust luminance when pressing the button, stopped adjusting luminance when kick-backing. At this time, the sequence number can be used for duplication checking of multi-packet data transmitted at the time of pressing and rebounding.
Specifically, after receiving the control message, first making a basic message validity judgment according to the message format, and then extracting the serial number therein; comparing the serial number with the historical value (i.e. comparing the current verification identifier with the historical verification identifier for verification); if not, the repeated sequence number is considered and discarded. If the current value is greater than the historical value and the message is a message for pressing the control, dimming is started; if the current value is greater than the historical value and is a message for rebounding control, dimming is stopped; and a new serial number is written into the history value for standby. This process may correspond to the processing procedure described above for the start change handling information, the stop change handling information.
In another example, a short press (immediately after pressing) implements a basic ON/OFF toggle command and a long press implements dimming for the same key. This process may correspond to the process described above for the state switching manipulation information and the parameter change manipulation information.
An embodiment of the present invention further provides a control system (which can be understood with reference to fig. 1), including a self-generating switch and a receiving terminal.
In some embodiments, the control system may further include a gateway (or a router), and the gateway may be respectively connected to the self-generating switch and the receiving end in a communication manner, for example, the communication manner may be bluetooth, and may not be limited to bluetooth. The gateway may be a device dedicated to network communication, or may be a device with other specific functions (for example, a voice speaker with gateway function).
In order to facilitate understanding of the structure of the self-generating switch 1, an alternative self-generating switch will be described below with reference to fig. 19 to 26, 27a, and 27 b.
Referring to fig. 19 to 26, 27a and 27b, the self-generating switch further includes a bottom case 113 and a middle case 119, the middle case 119 covers the bottom case 113 to form an internal space, the circuit board 114, the switch circuit and the transmission member 117 are all located in the internal space, and the key 101 is located on a side of the middle case 119 that is away from the internal space. In other embodiments, only the bottom case 113 may be provided without the middle case 119.
Referring to fig. 19 to 26, the moving part 1031 of the generator 103 may be a power generating pick, which may be any structure that can be touched to generate electric energy by using mechanical energy, and may be in the form of a sheet, a rod, a ring, or any other shape.
The moving portion 1031 of the generator 103 is located on one side (for example, the left side shown in fig. 20) of the generator 103 close to the non-pressed end of the key 101, that is: the moving part 1031 is located on one end side of the generator 103, and the micro switch 1101 (i.e., the detection unit) is located on the other end side of the generator 103.
The first end of the transmission member 117 is adapted to be directly or indirectly pressed by the key 5, for example, it can be controlled to be pressed by a switch pressing portion 1172, wherein the switch pressing portion 1172 can protrude from the surface of the transmission member 117.
The second end of the transmission member 117 is used for activating the moving part 1031 when the first end is pressed and/or reset under the driving of the reset acting force, so as to enable the generator 103 to generate electricity.
The moving directions of the first end and the second end of the transmission component 117 may be the same or different, and in any way, as long as the above controlled pressing and the triggering of the power generation shifting piece are realized, the description of the embodiment does not depart.
Wherein, the transmission member 117 may be provided with an insertion hole 1175 for inserting the power generating pick (i.e., the moving portion 1031).
In one embodiment, a supporting portion 1131 is disposed on the bottom casing 113, the supporting portion 1131 penetrates through the circuit board 114 and extends to a side of the circuit board 114, which is away from the bottom surface of the bottom casing 113, correspondingly, the circuit board 114 may be disposed with a through hole for the circuit board to pass through, and the supporting portion 1131 is supported on the transmission member 117. The transmission member 117 is swingable about the support portion 1131 as a fulcrum, and is changeable between the first position state and the second position state by the swing. The number of the supporting portions 1131 may be two or more, and they may be uniformly distributed on the lower side of the transmission member 117.
Taking fig. 22 as an example, the support portion 1131 may abut against a fulcrum position of the transmission member 117, the fulcrum position may be provided with or without a structure for realizing abutment, and the fulcrum position may be a single position or a variable position, and further, a contact position between the support portion 1131 and the transmission member 117 may or may not be changed with the generation of the swing. The circuit board 114 can be assembled in the inner space formed by the bottom case 113, the generator 103 is connected with the circuit board 114, wherein the generator 103 can be mounted on the bottom case 113 by using the generator mounting buckle 1137; the transmission member 117 is connected to the bottom case 113 through two fulcrum points at two sides, and a structure formed by connecting two fulcrum points forms a tilting plate structure, one side end of the transmission member 117 is connected to a power generation poking piece extending from the power generator 103, the reset member 102 is mounted on the bottom case 113 and connected to the other end of the transmission member 117 or a position close to the other end, so that the power generator 103 can be reset through the transmission member 117, and the other side end of the transmission member 117 can be provided with a switch pressing portion 1172.
Comparing fig. 27a and 27b, and with fig. 19 to 26, when the key 101 is pressed, the key 101 triggers the transmission member 117 to perform seesaw rotation, i.e. the pressing end moves downwards, the other end moves upwards, so as to drive the power generation paddle of the generator 103 to move, the kinetic energy of the generator 103 is converted into electric energy to supply power to the circuit board 114, and the pressed key triggers the micro switch during the pressing process, meanwhile, the circuit board 114 is provided with light emitting modules (such as LEDs) with the same number as the keys, and the LEDs flash once when the emitting signals are pressed each time.
After pressing, the transmission member 117 may return to the initial position under the action of the return member 102, such as a torsion spring, thereby bringing the power generation paddle of the generator 103 back to the initial position as well. The push button 101 is also returned to the initial position by the actuating member 117.
Referring to fig. 21 and 22, the bottom case 1 is further provided with a movement limiting rib 1132, and the transmission member 117 is provided with a movement limiting boss 1174.
The movement limiting rib 1132 penetrates through the circuit board 114 and extends to one side, away from the bottom surface of the bottom shell 113, of the circuit board 114, correspondingly, the circuit board 114 can be provided with a through hole for the circuit board to pass through, the movement limiting rib 1132 can limit the movement limiting boss 1174 and the transmission part 117 to move along the first reference direction and/or the second reference direction, for example, when moving, the movement limiting rib 1132 can block the movement of the movement limiting boss 1174.
The first reference direction is a direction from a pressing end to a non-pressing end of the key, and the second reference direction is a direction from the non-pressing end to the pressing end of the key.
Through the cooperation of spacing boss and spacing muscle, can less processing degree of difficulty realize spacingly.
Referring to fig. 21, the bottom case 113 is further provided with an upper limiting buckle 1133, the upper limiting buckle 1133 passes through the circuit board 114 and extends to a side of the circuit board 114, which is away from the bottom surface of the bottom case 1, and the upper limiting buckle 1133 is used for limiting the transmission member 117 to move in a direction away from the circuit board 114. Correspondingly, the edge of the transmission component can be provided with a limit snap-fit part 1171, and the upper limit snap 1133 can block the limit snap-fit part 1171 when the transmission component swings, so as to play a limit role.
Since the power generating pick is close to the non-pressing end, the upper limiting buckle 1133 can limit the movement of the end of the transmission member 117 close to the non-pressing end away from the circuit board 114.
It can be seen that the limiting buckle and the moving limiting rib 1132 can facilitate the limitation of the movement position of the transmission component 117.
The above-mentioned transmission member 117 can be regarded as a rocker, and the solution of swinging by the support portion can have the advantages of easy processing, easy control of the size of the part, and the like.
In a specific implementation process, if the number of the keys 101 is at least two, for example, three as shown in the figure, then: the transmission member 117 interfaces all the keys 101 so that: when any at least one key 101 is pressed, the transmission part 117 can be pushed to change the position state.
In one embodiment, the reset device 102 may be at least one of: torsion spring, shell fragment, spring.
If the reset member 102 is a torsion spring, then: be equipped with torsional spring base 1134 on drain pan 113, torsional spring base 1134 passes circuit board 114 extends to circuit board 114 with the one side that the bottom surface of drain pan 113 deviates from mutually, torsional spring base 1134 is equipped with the torsional spring installation axle, the torsional spring install in the torsional spring installation axle, the torsional spring still is located through the connecting rod contact the torsional spring connecting portion 1173 of transmission part 117, in order to pass through the connecting rod with torsional spring connecting portion 1173 will the effort of reseing acts on transmission part 117. In a specific implementation process, the torsion spring base 1134 may further include a torsion spring limiting portion for limiting a rotation position of the torsion spring.
In one embodiment, referring to fig. 19 and 25 in combination with fig. 27a and 27b, the self-generating switch further includes a waterproof layer 118, and the waterproof layer 118 is disposed between the middle shell 119 and the circuit board 114. A side surface of the waterproof layer 118 opposite to the middle shell 119 may be attached to the middle shell 119.
Specifically, the waterproof layer 118 may be provided with a switch key fitting portion 1181, the switch key fitting portion 1181 protrudes from a side of the waterproof layer 118 away from the circuit board 114, the middle shell 119 is provided with a key hole 1194, the switch key fitting portion 1181 penetrates through the key hole 1194, the micro switch 1101 extends into the switch key fitting portion 1181, and the switch key fitting portion 1181 is respectively abutted to the key 101 and the micro switch 1101 along a direction in which the key 101 is pressed. Further, when the key 101 is pressed, the microswitch 1101 is clicked by the switch key fitting portion 1181, and the microswitch 1101 is triggered.
In addition, the waterproof layer 118 may further include a paired key matching portion 1183, where the position of the paired key matching portion 1183 may be matched with the position of the paired key, and meanwhile, may be matched with a paired switch device of a paired circuit on the circuit board 114, and by pressing the paired key, the paired switch device passing through the paired key hole 1193 may be triggered by the paired key matching portion 1183, where the structural relationship among the paired switch device, the paired key hole, the paired key matching portion, and the paired key may be understood by referring to the structural relationship among the micro switch 1101, the key hole 1194, the switch key matching portion 1181, and the key 101.
The waterproof layer 118 may further include a press-fitting portion 1184, which is located to match the press-fitting portion receiving structure 1195 of the middle shell 119. The pressing portion accommodating structure 1195 can be understood to be a structure for accommodating the switch pressing portion 1172 when the switch pressing portion 1172 is lifted up.
In a specific implementation process, the waterproof layer 118 may be waterproof silica gel.
In one embodiment, the middle shell 119 is provided with a middle shell light hole 1192, the waterproof layer 118 is provided with a waterproof layer light-transmitting portion 1182, the key 101 is provided with the light-emitting portion, the light guide column penetrates through the middle shell light hole 1192, two ends of the light guide column respectively extend to the light-emitting portion and the waterproof layer light-transmitting portion 1182, and the light guide column, the middle shell light hole 1192, the waterproof layer light-transmitting portion 1182 and the light-emitting portion are matched in position with the light-emitting module, which can be any matching mode with the adjacent finger positions.
The above structure capable of realizing light transmission and light guiding is not deviated from the description of the embodiment.
In one embodiment, referring to fig. 23, fig. 24 and fig. 26, the middle shell or the bottom shell is provided with a first rotating shaft 1191, the non-pressing end of the key 101 is provided with a second rotating shaft 1011, the first rotating shaft 1191 is connected with the second rotating shaft 1011 in a matching manner, the key 101 can pivot towards or away from the middle shell 119 through the matching of the first rotating shaft 1191 and the second rotating shaft 1011, one side of the pressing end of the middle shell 119 or the bottom shell 113 is provided with a first buckle 1196, and the pressing end of the key is provided with a second buckle 1013.
The first buckle 1196 is abutted against the second buckle 1013 so as to limit the pressing end of the key 101 to move away from the middle shell 119;
in the illustrated example, the first rotation shaft portion 1191 is a rotation shaft, the second rotation shaft portion 1011 is a shaft hole through which the corresponding rotation shaft passes, and in other examples, not illustrated, the first rotation shaft portion is a shaft hole, and the second rotation shaft portion is a rotation shaft passing through the corresponding shaft hole.
The side of the key 101 facing the middle case is further provided with a pressing part 1012, and further, the pressing part 1012 can directly or indirectly press the switch pressing part 1172 of the transmission component 117. One side of the key 101 facing the middle shell may further be provided with a switch pressing part 1014, and the switch pressing part 1014 is used for pressing corresponding to the micro switch.
In a specific example, the waterproof layer 118 of the silicone rubber is connected to the bottom case 113, and the middle case 119 is connected between the outer side of the waterproof layer 118 and the bottom case 113, so as to compress the waterproof layer 118 (wherein, the waterproof layer 118 of the silicone rubber and the waterproof wall on the bottom case 1 may structurally adopt interference fit), realize that the internal structure is completely sealed and waterproof, and finally assemble the key 101, and the key 101 may be assembled on the bottom case 1 or on the middle case 119. The button 101 has one end as a pivot, which is a fixed end, and the other end can pivotally reciprocate (press and reset), i.e., a pressing end of the switch.
In addition, the related spontaneous electrical switch of this embodiment both can directly adopt the double faced adhesive tape to paste in wall or other places, also can adopt the screw installation in traditional switch bottom box.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.
Claims (46)
1. The processing method of the self-generating switch is characterized in that the self-generating switch comprises a processor, a memory, a key, a generator, a reset component, a rectifying module, an energy storage module, a voltage output module and a wireless communication module, wherein the wireless communication module is electrically connected with the memory and the processor, an induction part of the generator is electrically connected with the energy storage module through the rectifying module, the energy storage module is electrically connected with the wireless communication module, the processor and the memory through the voltage output module, the reset component can be in transmission with a motion part of the generator, and the key can also be in direct or indirect transmission with the motion part of the generator;
the processing method comprises the following steps:
if the button is pressed down, then: the reset component deforms and generates a reset acting force for overcoming the deformation, the moving part of the generator is directly or indirectly driven by the key, so that the generator generates a first induction voltage, and if the key generates a rebounding control action, the generator is characterized in that: the reset component drives a moving part of the generator under the action of the reset action force, so that the generator generates a second induction voltage;
the rectifying module stores first electric energy corresponding to the first induction voltage and/or second electric energy corresponding to the second induction voltage in the energy storage module; the energy storage module transmits the stored electric energy to the voltage output module, and the voltage output module provides required voltage for the processor, the memory and the wireless communication module by using the received electric energy to electrify the processor, the memory and the wireless communication module;
after the processor, the memory and the wireless communication module are powered on, the processor generates and sends a corresponding current control message to a receiving end through the wireless communication module; the current control message records a current verification identifier and current control information; the current steering information characterizes at least one of: the self-generating switch, the key currently received by the self-generating switch and the current control action of the self-generating switch; the current control information corresponds to at least one control event which needs to be executed by the receiving end;
in the continuously-generated one-press control action and one-rebound control action, aiming at least one control action, before, after or at the same time of generating and sending a corresponding current control message to a receiving end through the wireless communication module, the processor also reads a current verification identifier from the memory, updates the current verification identifier, and writes the updated current verification identifier back to the memory before the electric energy stored in the energy storage module is exhausted, wherein the verification identifiers before and after updating are different.
2. The processing method according to claim 1,
the self-generating switch also comprises a polarity identification module; the polarity identification module is electrically connected with the generator and the processor;
before the processor reads the current verification identifier from the memory and updates the current verification identifier, the method further includes:
after the processor, the memory and the wireless communication module are powered on, the processor identifies the current control action of the key through the polarity identification module to obtain control action information, and determines that the current control action is a target control action, wherein the target control action is a designated control action selected from a pressed control action and a rebounded control action.
3. A process according to claim 2, characterized in that the target steering action is a rebound steering action.
4. The process of claim 2, wherein the self-generating switch further comprises a key identification module, the key identification module being electrically connected to the processor;
before the processor generates the current control packet, the method further includes:
the processor reads a switch identification characterizing the self-generating switch from the memory;
if the current operation is the operation of pressing down: the processor acquires current key information through the key identification module and updates the current key information in the memory;
if the current operation is the springback operation, then: the processor acquires the stored current key information from the memory;
the current manipulation information is determined based on the switch identifier, the current manipulation action, and the acquired current key information.
5. The processing method according to claim 2, wherein the polarity recognition module includes a press-down recognition portion and a rebound recognition portion; the press identification part is electrically connected with the induction part of the generator and the processor respectively, and the rebound identification part is electrically connected with the induction part of the generator and the processor respectively;
the processor identifies the current operation action of the key through the polarity identification module, and the operation action comprises the following steps:
if the processor receives the designated signal sent by the pressing identification part, determining the current control action as the pressing control action; wherein the press-down recognizing portion transmits the designation signal to the processor only when the generator generates the first induced voltage;
and if the processor receives the designated signal sent by the springback recognition part, determining the current control action as a pressing control action, wherein the springback recognition part sends the designated signal to the processor only when the generator generates the second induction voltage.
6. The processing method according to claim 1,
the processor updates the current authentication identification, including:
and the processor transforms the current verification identifier from a first numerical value to a second numerical value according to a preset transformation rule to form a new current verification identifier.
7. The process of claim 6, wherein the transformation rules comprise at least one of:
accumulating a first reference value on the basis of said first value to obtain said second value;
subtracting a second reference value from the first value to obtain a second value;
multiplying a third reference value by the first value to obtain the second value;
dividing the first value by a fourth reference value to obtain the second value.
8. The processing method according to any of claims 1 to 7, wherein the current control packet further includes signature information, the signature information is calculated based on the first key, and the signature information changes with the change of the current authentication identifier;
the signature information can be verified by the receiving end through a second key, and the first key is matched with the second key.
9. The processing method according to any one of claims 1 to 7, wherein the current authentication identifier recorded in the current control message is a current authentication identifier converted by a preset data conversion method.
10. The processing method according to any one of claims 1 to 7, wherein the wireless communication module is a Bluetooth module;
the processor sends a corresponding current control message to a receiving end through the wireless communication module, and the method specifically comprises the following steps:
the processor broadcasts N groups of data packets in sequence through the Bluetooth module, the broadcasting intervals of two adjacent groups of data packets in the N groups of data packets are matched with the awakening sleep period of the receiving end, wherein the receiving end receives the data packets according to the awakening sleep period, the awakening sleep period comprises awakening time intervals and sleep time intervals which are alternated, the receiving end receives the data packets only in the awakening time intervals, N is larger than or equal to 2, and each data packet comprises the current control message.
11. The processing method according to claim 10,
the duration of the wakeup time interval is greater than or equal to the broadcast interval of two adjacent groups of data packets;
the duration of the wakeup period is greater than or equal to N-1 times the broadcast interval.
12. The process of claim 10, wherein the plurality of data packets in the same group are transmitted over at least two of the following channels:
2.402GHz;2.428GHz; 2.480GHz。
13. the processing method of claim 10, wherein the processor sequentially broadcasts N groups of packets to the outside through the bluetooth module, comprising:
the processor counts the time of the broadcast interval after starting to send a group of data packets, and sends out another group of corresponding data packets when the counted time reaches the specified packet sending interval time length;
the specified transmission interval duration is in the range of 15 milliseconds to 25 milliseconds.
14. The processing method according to claim 1, wherein the data structure of the current control packet comprises:
a header section, a payload section, and a CRC check section;
the payload section includes:
a key value field for recording key values; the key value is information for representing a key and/or an operation and control action in the current operation and control information;
a validation identity field for documenting the current validation identity.
15. The processing method according to claim 14, wherein the data structure of the current control packet further comprises: a physical address section;
the physical address part includes:
a switch identification field for recording a switch identification by using 4 bytes; the switch identification is information which characterizes a self-generating switch in the current control information;
the payload section further includes a frame header control field, the frame header control field including:
a switch identification indication field for recording whether the payload part records the switch identification by using 1 bit.
16. The processing method of claim 15, wherein the payload section further comprises:
a signature field for recording signature information using 4 bytes;
the frame header control field further includes:
an encryption indication field for recording whether the signature information is contained in the payload section by 1 bit.
17. The processing method according to claim 15,
the head includes:
a preamble field, an access address field, a protocol data unit data header field;
the payload section includes:
length field, broadcast type field, equipment manufacturer identification field and switch type field;
the frame header control field further includes: version number field, forwarding number field;
the CRC check portion includes a CRC calculation value field.
18. The processing method according to any one of claims 1 to 7, wherein the memory includes a first memory and a second memory, and the current authentication identification update is stored in the first memory; the first memory and the second memory for storing programs are different memories, and the first memory is a memory which does not lose data after power failure;
the current verification identifier updated and stored in the first memory is the same as the current verification identifier recorded in the current control message.
19. The processing method according to claim 18, wherein the first memory is a memory capable of erasing, writing, and reading data in units of one or more bytes, wherein the writing and reading time of a single byte does not exceed 10ms, and the consumed energy does not exceed 300 uJ.
20. The processing method according to claim 18, characterized in that the first memory comprises a Flash memory and/or a ferroelectric memory.
21. The process of claim 18, wherein the first memory further stores current key information, the current key information representing a key that was last depressed from the power generation switch;
and the key represented by the current key information is the same as the key represented by the current control information.
22. The process of any one of claims 1 to 7, wherein the rectification module comprises a first rectification part and a second rectification part; the first rectifying part is electrically connected with the induction part of the generator and the energy storage module, and the second rectifying part is electrically connected with the induction part of the generator and the energy storage module;
the rectifier module stores first electric energy corresponding to the first induction voltage and second electric energy corresponding to the second induction voltage in the energy storage module, and the rectifier module comprises:
the first rectifying part is used for rectifying the first induction voltage and storing corresponding first electric energy in the energy storage module;
the second rectifying portion rectifies the second induction voltage and stores corresponding second electric energy in the energy storage module.
23. A self-generating switch is characterized by comprising a processor, a memory, a key, a generator, a reset component, a rectifying module, an energy storage module, a voltage output module and a wireless communication module, wherein the wireless communication module is electrically connected with the memory and the processor, an induction part of the generator is electrically connected with the energy storage module through the rectifying module, the energy storage module is electrically connected with the wireless communication module and the processor through the voltage output module, the reset component can be in transmission with a motion part of the generator, and the key can also be in direct or indirect transmission with the motion part of the generator;
the reset component is used for: if the button is pressed down, then: deformation occurs and a reset acting force overcoming the deformation is generated; if the button generates a rebounding operation, the method comprises the following steps: a moving part for driving the generator under the action of the reset force;
the generator is used for: if the button is pressed down, then: the moving part of the generator is directly or indirectly driven by the key to enable the induction part of the generator to generate a first induction voltage, if the key performs a rebounding operation, the moving part of the generator is driven by the reset component to enable the generator to generate a second induction voltage,
the rectification module is used for: storing first electric energy corresponding to the first induction voltage and/or second electric energy corresponding to the second induction voltage in the energy storage module;
the energy storage module is used for: transmitting the stored electrical energy to the voltage output module;
the voltage output module is used for: the voltage output module provides required voltage for the processor, the memory and the wireless communication module by using the received electric energy, so that the processor, the memory and the wireless communication module are powered on;
the processor is configured to:
after the processor, the memory and the wireless communication module are powered on, generating and sending a corresponding current control message to a receiving end through the wireless communication module; the current control message records a current verification identifier and current control information; the current steering information characterizes at least one of: the self-generating switch, the key currently received by the self-generating switch and the current control action of the self-generating switch; the current control information corresponds to at least one control event which needs to be executed by the receiving end;
in the continuously-generated one-press control action and one-rebound control action, aiming at least one control action, before, after or simultaneously generating and sending a current control message to a receiving end through the wireless communication module, reading a current verification identifier from the memory, updating the current verification identifier, and writing the updated current verification identifier back to the memory before the electric energy stored in the energy storage module is exhausted, wherein the verification identifiers before and after updating are different.
24. The self-generating switch according to claim 23,
the self-generating switch also comprises a polarity identification module; the polarity identification module is electrically connected with the generator and the processor;
before the processor reads the current verification identifier from the memory and updates the current verification identifier, the processor is further configured to:
after the processor, the memory and the wireless communication module are powered on, the current control action of the key is identified through the polarity identification module to obtain control action information, and the current control action is determined to be a target control action, wherein the target control action is a designated one of a pressed control action and a rebounded control action.
25. The self-generating switch according to claim 24, wherein said target actuation motion is a rebound actuation motion.
26. The self-generating switch according to claim 24, further comprising a key identification module electrically connected to said processor;
the processor, prior to generating the current control message, is further configured to:
reading a switch identification characterizing the self-generating switch from the memory;
if the current operation is the operation of pressing down: acquiring current key information through the key identification module, and updating the current key information in the memory;
if the current operation is the springback operation, then: obtaining the stored current key information from the memory;
the current manipulation information is determined based on the switch identification, the currently occurring manipulation, and the acquired current key information.
27. The self-generating switch according to claim 24, wherein said polarity identification module comprises a press identification and a rebound identification; the press identification part is electrically connected with the induction part of the generator and the processor respectively, and the rebound identification part is electrically connected with the induction part of the generator and the processor respectively;
when the processor identifies the current operation action of the key through the polarity identification module, the processor is specifically configured to:
if the processor receives the designated signal sent by the pressing identification part, determining the current control action as the pressing control action; wherein the press-down recognizing portion transmits the designation signal to the processor only when the generator generates the first induced voltage;
and if the processor receives the designated signal sent by the springback recognition part, determining the current control action as a pressing control action, wherein the springback recognition part sends the designated signal to the processor only when the generator generates the second induction voltage.
28. The self-generating switch according to claim 23,
when updating the current verification identifier, the processor is specifically configured to:
and converting the current verification identifier from the first numerical value to a second numerical value by a preset conversion rule to form a new current verification identifier.
29. The self-generating switch according to claim 28, wherein the transformation rules include at least one of:
accumulating a first reference value on the basis of said first value to obtain said second value;
subtracting a second reference value from the first value to obtain a second value;
multiplying a third reference value by the first value to obtain the second value;
dividing the first value by a fourth reference value to obtain the second value.
30. The autonomous switch of any of claims 23 to 29 wherein said current control message further comprises signature information, said signature information being calculated based on a first key and said signature information varying with said current authentication identity;
the signature information can be verified by the receiving end through a second key, and the first key is matched with the second key.
31. The self-generating switch according to any one of claims 23 to 29, wherein the current authentication identifier recorded in the current control message is a current authentication identifier converted by a preset data conversion mode.
32. The self-generating switch according to any one of claims 23 to 29, wherein said wireless communication module is a bluetooth module;
when the processor sends the corresponding current control message to the receiving end through the wireless communication module, the processor is specifically configured to:
the processor broadcasts N groups of data packets, the total broadcast duration of the N groups of data packets and the broadcast interval of two adjacent groups of data packets to the outside in sequence through the Bluetooth module, and is matched with the awakening sleep cycle of the receiving end, wherein the receiving end is awakened and sleeped according to the awakening sleep cycle, the awakening sleep cycle comprises the awakening time interval and the sleep time interval of the receiving end, N is more than or equal to 2, and each data packet contains the current control message.
33. The spontaneous electrical switch of claim 32, wherein the broadcasting interval between two adjacent groups of data packets is less than or equal to the duration of the wake-up period in the wake-up sleep cycle;
the total broadcast time length of the N groups of data packets is greater than or equal to the time length of the awakening sleep cycle.
34. The self-generating switch in claim 32, wherein the plurality of data packets in the same group are transmitted over at least two of the following channels:
2.402GHz;2.428GHz; 2.480GHz。
35. the spontaneous electrical switch of claim 32, wherein the processor, when sequentially broadcasting the N groups of packets to the outside via the bluetooth module, is specifically configured to:
after a group of data packets are sent, timing the time of a broadcast interval, and sending out another group of corresponding data packets when the timing reaches the specified packet sending interval;
the specified transmission interval duration is in the range of 15 milliseconds to 25 milliseconds.
36. The autonomous switch of any of claims 23 to 29 wherein said current control message data structure comprises:
a header section, a payload section, and a CRC check section;
the payload section includes:
a key value field for recording key values; the key value is information for representing a key and/or an operation action in the current operation and control information;
a validation identity field for documenting the current validation identity.
37. The self-generating switch according to claim 36, wherein the data structure of the current control packet further comprises: a physical address section;
the physical address part includes:
a switch identification field for recording a switch identification by using 4 bytes; the switch identification is information which characterizes a self-generating switch in the current control information;
the payload section further includes a frame header control field, the frame header control field including:
a switch identification indication field for recording whether the payload part records the switch identification by using 1 bit.
38. The self-generating switch according to claim 37, wherein the payload section further comprises:
a signature field for recording signature information using 4 bytes;
the frame header control field further includes:
an encryption indication field for recording whether the signature information is contained in the payload section by 1 bit.
39. The self-generating switch according to claim 37,
the head includes:
a preamble field, an access address field, a protocol data unit field;
the payload section includes:
length field, broadcast type field, equipment manufacturer identification field and switch type field;
the frame header control field further includes: version number field, forwarding number field;
the CRC check portion includes a CRC calculation value field.
40. The self-generating switch according to claim 23, wherein said memory comprises a first memory and a second memory, said current authentication identification update being stored in said first memory; the first memory and the second memory for storing programs are different memories, and the first memory is a memory which does not lose data after power failure;
the current verification identifier updated and stored in the first memory is the same as the current verification identifier recorded in the current control message.
41. The self-generating switch according to claim 40, wherein the first memory is a memory capable of erasing, writing and reading data in units of one or more bytes, wherein the writing and reading time of a single byte is not more than 10ms, and the consumed energy is not more than 300 uJ.
42. The self-generating switch according to claim 40, wherein the first memory comprises a Flash memory and/or a ferroelectric memory.
43. The self-generating switch according to claim 40, wherein the first memory further stores current key information, the current key information representing a key that was last depressed by the self-generating switch;
and the key represented by the current key information is the same as the key represented by the current control information.
44. The self-generating switch according to any one of claims 23 to 29, wherein said rectifying module comprises a first rectifying portion and a second rectifying portion; the first rectifying part is electrically connected with the induction part of the generator and the energy storage module, and the second rectifying part is electrically connected with the induction part of the generator and the energy storage module;
the first rectifying part is used for rectifying the first induction voltage and storing corresponding first electric energy in the energy storage module;
the second rectifying portion is used for rectifying the second induction voltage and storing corresponding second electric energy in the energy storage module.
45. A control system characterized by comprising the self-generating switch of any one of claims 23 to 44, and the receiving terminal.
46. The control system of claim 45, wherein the receiving end is any one of: lamp, fan, automatic curtain, wall switch, doorbell.
Priority Applications (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210558559.0A CN115421402A (en) | 2021-05-16 | 2021-05-16 | Processing method of self-generating switch and control system thereof |
CN202110531083.7A CN113410971B (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and processing method and control system thereof |
CN202210558557.1A CN115421401A (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and control system thereof |
PCT/CN2022/092176 WO2022242519A1 (en) | 2021-05-16 | 2022-05-11 | Self-power-generating switch and processing method therefor, and control system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110531083.7A CN113410971B (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and processing method and control system thereof |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210558559.0A Division CN115421402A (en) | 2021-05-16 | 2021-05-16 | Processing method of self-generating switch and control system thereof |
CN202210558557.1A Division CN115421401A (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and control system thereof |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113410971A CN113410971A (en) | 2021-09-17 |
CN113410971B true CN113410971B (en) | 2022-06-03 |
Family
ID=77678628
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210558557.1A Pending CN115421401A (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and control system thereof |
CN202110531083.7A Active CN113410971B (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and processing method and control system thereof |
CN202210558559.0A Pending CN115421402A (en) | 2021-05-16 | 2021-05-16 | Processing method of self-generating switch and control system thereof |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210558557.1A Pending CN115421401A (en) | 2021-05-16 | 2021-05-16 | Self-generating switch and control system thereof |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210558559.0A Pending CN115421402A (en) | 2021-05-16 | 2021-05-16 | Processing method of self-generating switch and control system thereof |
Country Status (2)
Country | Link |
---|---|
CN (3) | CN115421401A (en) |
WO (1) | WO2022242519A1 (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113517152B (en) * | 2021-05-16 | 2022-08-16 | 武汉领普科技有限公司 | Switch control method, receiving end control method, self-generating switch and receiving end |
CN113433841B (en) * | 2021-05-16 | 2022-05-31 | 武汉领普科技有限公司 | Self-generating wireless switch, controlled equipment and control system |
CN115421401A (en) * | 2021-05-16 | 2022-12-02 | 武汉领普科技有限公司 | Self-generating switch and control system thereof |
CN114033261B (en) * | 2021-11-22 | 2022-08-02 | 中国铁塔股份有限公司 | Anti-theft method, device and equipment for rectifier and storage medium |
CN115276196A (en) * | 2022-01-10 | 2022-11-01 | 武汉领普科技有限公司 | Self-generating switch and processing method and processing system thereof |
CN117994960A (en) * | 2022-06-02 | 2024-05-07 | 武汉领普科技有限公司 | Wireless switch, processing method and control system of wireless switch |
Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060114197A (en) * | 2005-04-29 | 2006-11-06 | 조성구 | Wireless switch system based on the local area wireless communication network |
CN103532854A (en) * | 2013-10-22 | 2014-01-22 | 迈普通信技术股份有限公司 | Storage and forwarding method and device of message |
CN107181973A (en) * | 2016-03-10 | 2017-09-19 | 三星电子株式会社 | Remote controllers |
CN207009333U (en) * | 2017-05-27 | 2018-02-13 | 红塔烟草(集团)有限责任公司 | A kind of fingerprint recognition button switch |
CN207133615U (en) * | 2017-09-15 | 2018-03-23 | 西安奇妙电子科技有限公司 | A kind of intelligent switch |
CN208767198U (en) * | 2018-08-13 | 2019-04-19 | 武汉领普科技有限公司 | A kind of spontaneous electric switch of more keys |
CN110262324A (en) * | 2019-06-06 | 2019-09-20 | 深圳市易百珑科技有限公司 | Self-powered module, wireless control switch and wireless control system and matching method |
CN111180241A (en) * | 2020-01-18 | 2020-05-19 | 武汉领普科技有限公司 | Self-generating switch with light emitting module and processing method thereof |
CN111273579A (en) * | 2020-01-18 | 2020-06-12 | 武汉领普科技有限公司 | Receiver, processing method and system thereof and control assembly based on self-generating switch |
CN212229465U (en) * | 2020-07-23 | 2020-12-25 | 武汉领普科技有限公司 | Wireless switch receiver and equipment control assembly |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5530155B2 (en) * | 2009-11-11 | 2014-06-25 | ルネサスエレクトロニクス株式会社 | Manual operation equipment with power generation function, remote control device with power generation function |
CN112187096A (en) * | 2017-04-01 | 2021-01-05 | 广东易百珑智能科技有限公司 | Passive rebound switch capable of changing number of keys |
CN108776442B (en) * | 2018-04-28 | 2021-12-10 | 武汉领普科技有限公司 | Self-generating passive switch and working method thereof |
CN115421401A (en) * | 2021-05-16 | 2022-12-02 | 武汉领普科技有限公司 | Self-generating switch and control system thereof |
-
2021
- 2021-05-16 CN CN202210558557.1A patent/CN115421401A/en active Pending
- 2021-05-16 CN CN202110531083.7A patent/CN113410971B/en active Active
- 2021-05-16 CN CN202210558559.0A patent/CN115421402A/en active Pending
-
2022
- 2022-05-11 WO PCT/CN2022/092176 patent/WO2022242519A1/en active Application Filing
Patent Citations (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20060114197A (en) * | 2005-04-29 | 2006-11-06 | 조성구 | Wireless switch system based on the local area wireless communication network |
CN103532854A (en) * | 2013-10-22 | 2014-01-22 | 迈普通信技术股份有限公司 | Storage and forwarding method and device of message |
CN107181973A (en) * | 2016-03-10 | 2017-09-19 | 三星电子株式会社 | Remote controllers |
CN207009333U (en) * | 2017-05-27 | 2018-02-13 | 红塔烟草(集团)有限责任公司 | A kind of fingerprint recognition button switch |
CN207133615U (en) * | 2017-09-15 | 2018-03-23 | 西安奇妙电子科技有限公司 | A kind of intelligent switch |
CN208767198U (en) * | 2018-08-13 | 2019-04-19 | 武汉领普科技有限公司 | A kind of spontaneous electric switch of more keys |
CN110262324A (en) * | 2019-06-06 | 2019-09-20 | 深圳市易百珑科技有限公司 | Self-powered module, wireless control switch and wireless control system and matching method |
CN111180241A (en) * | 2020-01-18 | 2020-05-19 | 武汉领普科技有限公司 | Self-generating switch with light emitting module and processing method thereof |
CN111273579A (en) * | 2020-01-18 | 2020-06-12 | 武汉领普科技有限公司 | Receiver, processing method and system thereof and control assembly based on self-generating switch |
CN212229465U (en) * | 2020-07-23 | 2020-12-25 | 武汉领普科技有限公司 | Wireless switch receiver and equipment control assembly |
Also Published As
Publication number | Publication date |
---|---|
CN115421401A (en) | 2022-12-02 |
CN115421402A (en) | 2022-12-02 |
CN113410971A (en) | 2021-09-17 |
WO2022242519A1 (en) | 2022-11-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN113410971B (en) | Self-generating switch and processing method and control system thereof | |
CN113517152B (en) | Switch control method, receiving end control method, self-generating switch and receiving end | |
CN113433841B (en) | Self-generating wireless switch, controlled equipment and control system | |
CN216649662U (en) | Self-generating wireless switch | |
CN113438564B (en) | Control system, terminal processing method, wireless switch and processing method thereof | |
CN111273579B (en) | Receiver, processing method and system thereof and control assembly based on self-generating switch | |
WO2017133211A1 (en) | Self-powered remote control and application thereof | |
CN113517951B (en) | Self-generating switch and processing method thereof, receiver and processing method thereof | |
CN105700396A (en) | Intelligent switch module and control method therefor | |
CN111682732B (en) | Self-powered method and device | |
CN108397795A (en) | Gas-cooker, range hood, cigarette stove inter-linked controlling method and system | |
CN113423026B (en) | Wireless switch, processing method thereof and control system | |
CN206116227U (en) | Spontaneous electric remote controller | |
CN111599622A (en) | Key control method, device, keyboard and readable storage medium | |
CN216016509U (en) | Control system | |
CN112188693A (en) | Control method and device of remote controller of electrical equipment and remote controller | |
CN1185867C (en) | Remote controller | |
CN111654943B (en) | Intelligent LED lamp with passive kinetic energy switch control function and implementation method thereof | |
CN107422874B (en) | Multifunctional key communication method | |
CN210091366U (en) | Wireless control system and self-powered transmitting device thereof | |
CN115118586B (en) | Self-generating switch, processing method thereof, electronic equipment and control system | |
CN218939073U (en) | Wireless switch and control system | |
CN202929838U (en) | Learning type remote controller | |
CN118590082A (en) | Self-generating wireless transmitter, system and control method thereof | |
CN101546371B (en) | Encoding identification device controlled by force sense |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |