CN113709534A - Key multiplexing method and device, intelligent terminal and computer readable storage medium - Google Patents

Key multiplexing method and device, intelligent terminal and computer readable storage medium Download PDF

Info

Publication number
CN113709534A
CN113709534A CN202110987397.8A CN202110987397A CN113709534A CN 113709534 A CN113709534 A CN 113709534A CN 202110987397 A CN202110987397 A CN 202110987397A CN 113709534 A CN113709534 A CN 113709534A
Authority
CN
China
Prior art keywords
key value
key
target
source
mapping table
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110987397.8A
Other languages
Chinese (zh)
Inventor
梁军明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Konka Electronic Technology Co Ltd
Original Assignee
Shenzhen Konka Electronic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Konka Electronic Technology Co Ltd filed Critical Shenzhen Konka Electronic Technology Co Ltd
Priority to CN202110987397.8A priority Critical patent/CN113709534A/en
Publication of CN113709534A publication Critical patent/CN113709534A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
    • H04N21/42226Reprogrammable remote control devices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/41Structure of client; Structure of client peripherals
    • H04N21/422Input-only peripherals, i.e. input devices connected to specially adapted client devices, e.g. global positioning system [GPS]
    • H04N21/42204User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor
    • H04N21/42206User interfaces specially adapted for controlling a client device through a remote control device; Remote control devices therefor characterized by hardware details
    • H04N21/42212Specific keyboard arrangements

Abstract

The invention discloses a key multiplexing method, a key multiplexing device, an intelligent terminal and a computer readable storage medium, wherein the key multiplexing method comprises the following steps: obtaining a source key value corresponding to a currently pressed key on key equipment; judging the matching relation between the key value mapping table and the target program to obtain a matching result; updating the key value mapping table based on the matching result; converting the source key value into a target key value according to the key value mapping table; and sending the target key value to the target program. Compared with the prior art, the scheme of the invention can obtain the source key value corresponding to the currently pressed key on the key equipment, and automatically updates the key value mapping table when the key value mapping table is not matched with the target program by judging whether the key value mapping table is matched with the target program, so that the corresponding key value mapping table can be dynamically loaded according to the target program during use, and the key reuse can be simultaneously used for different UIs or APPs.

Description

Key multiplexing method and device, intelligent terminal and computer readable storage medium
Technical Field
The invention relates to the technical field of key remote control, in particular to a key multiplexing method, a key multiplexing device, an intelligent terminal and a computer readable storage medium.
Background
At present, most of large-screen televisions, set top boxes and other electronic devices using key interaction do not support screen touch, so that application programs adapted to touch terminal devices can normally run in the terminal devices, but the application programs are not designed and developed for devices with touch sensors, so that users cannot operate and use the application programs by using keys of the devices.
The existing key multiplexing needs to determine the mapping relation of key multiplexing at the beginning of UI interface design, and can not be changed or modified; and the existing UI or APP and the third party APP cannot be compatible; when the interface design is modified, the key mapping needs to be modified, so that the workload of UI or APP development is greatly increased.
Thus, there is still a need for improvement and development of the prior art.
Disclosure of Invention
The invention mainly aims to provide a key reuse method, a key reuse device, an intelligent terminal and a computer readable storage medium, and aims to solve the problem that key reuse cannot be modified and changed in the prior art, so that key reuse can be simultaneously suitable for different UIs or APPs.
In order to achieve the above object, a first aspect of the present invention provides a key multiplexing method, where the method includes:
obtaining a source key value corresponding to a currently pressed key on key equipment;
judging the matching relation between the key value mapping table and the target program to obtain a matching result;
updating the key value mapping table based on the matching result;
converting the source key value into a target key value according to the key value mapping table;
and sending the target key value to the target program.
Optionally, the updating the key-value mapping table includes:
obtaining a target key value list corresponding to the target program;
sequentially obtaining a source key value corresponding to each target key value in the target key value list;
and updating each item of the target key value and the corresponding source key value into the key value mapping table.
Optionally, the sequentially obtaining the source key values corresponding to each target key value in the target key value list includes:
obtaining an unused source key value list;
sorting the unused source key value list from high to low according to the set source key value use frequency;
and the first unused source key value in the unused source key value list is the source key value.
Optionally, the sequentially obtaining the source key values corresponding to each target key value in the target key value list includes:
obtaining a first source key value corresponding to the target key value in a set priority list;
when the first source key value is obtained, the first source key value is the source key value;
when the first source key value is not obtained, obtaining an unused source key value list, randomly extracting an item from the unused source key value list, and obtaining a second source key value, wherein the second source key value is the source key value.
Optionally, the obtaining a first source key value corresponding to the target key value in a set priority list includes:
obtaining a source key value list corresponding to the target key value in a set priority list;
sequentially searching each item of third source key values in the source key value list in the key value mapping table;
when the third source key value is not found in the key value mapping table, the third source key value is the first source key value;
when the third source key value is found in the key value mapping table, searching for a next third source key value in the source key value list until all third source key values in the source key value list are searched.
Optionally, the determining a matching relationship between the key value mapping table and the target program to obtain a matching result includes:
obtaining a first target key value list in the key value mapping table;
obtaining a second target key value list corresponding to the target program;
judging the inclusion relationship between the first target key value list and the second target key value list;
and when the first target key value list comprises the second target key value list, the matching result is matching, otherwise, the matching result is mismatching.
Optionally, after sending the second logical key value to the target program, further includes,
monitoring an input focus;
and when the running program corresponding to the input focus is different from the target program, updating the key value mapping table, and setting the target program as the running program corresponding to the input focus.
A second aspect of the present invention provides a key multiplexing apparatus, wherein the apparatus includes:
the source key value acquisition module is used for acquiring a source key value corresponding to a currently pressed key on the key equipment;
the key value mapping table matching module is used for judging the matching relation between the key value mapping table and the target program and obtaining a matching result;
the key value mapping table updating module is used for updating the key value mapping table;
the key value conversion module is used for converting the source key value into a target key value according to the key value mapping table;
and the key value sending module is used for sending the target key value to the target program.
A third aspect of the present invention provides an intelligent terminal, where the intelligent terminal includes a memory, a processor, and a key multiplexing program stored in the memory and operable on the processor, and the key multiplexing program implements any one of the steps of the key multiplexing method when executed by the processor.
A fourth aspect of the present invention provides a computer-readable storage medium, wherein a key multiplexing program is stored on the computer-readable storage medium, and when being executed by a processor, the key multiplexing program implements any one of the steps of the key multiplexing method.
As can be seen from the above, in the scheme of the present invention, a source key value corresponding to a currently pressed key on a key device is obtained, a matching relationship between a key value mapping table and a target program is determined, a matching result is obtained, the key value mapping table is updated according to the matching result, the source key value is converted into a target key value according to the key value mapping table, and the target key value is sent to the target program. Compared with the prior art, the scheme of the invention can obtain the source key value corresponding to the currently pressed key on the key equipment, and update the key value mapping table based on the matching result by judging the matching relationship between the key value mapping table and the target program, so that the corresponding key value mapping table can be dynamically loaded according to the target program during use, and the key reuse can be simultaneously used for different UIs or APPs.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
Fig. 1 is a schematic flow chart of a key multiplexing method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart illustrating the implementation of step S300 in FIG. 1;
FIG. 3 is a flowchart illustrating the implementation of step S320 in FIG. 1;
fig. 4 is a schematic structural diagram of a key multiplexing device according to an embodiment of the present invention;
fig. 5 is a schematic block diagram of an internal structure of an intelligent terminal according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when …" or "upon" or "in response to a determination" or "in response to a detection". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted depending on the context to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
The technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings of the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, but the present invention may be practiced in other ways than those specifically described and will be readily apparent to those of ordinary skill in the art without departing from the spirit of the present invention, and therefore the present invention is not limited to the specific embodiments disclosed below.
At present, most of large-screen televisions, set top boxes and other electronic devices using key interaction do not support screen touch, so that application programs adapted to touch terminal devices can normally run in the terminal devices, but the application programs are not designed and developed for devices with touch sensors, so that users cannot operate and use the application programs by using keys of the devices.
The existing key multiplexing needs to determine the mapping relation of key multiplexing at the beginning of UI interface design, and can not be changed or modified; and the existing UI or APP and the third party APP cannot be compatible; when the interface design is modified, the key mapping needs to be modified, so that the workload of UI or APP development is greatly increased.
In order to solve the problems in the prior art, in the scheme of the invention, a source key value corresponding to a currently pressed key on key equipment is obtained, whether a key value mapping table is matched with a target program or not is judged, a matching result is obtained, if the matching result is not matched, the key value mapping table is updated, the source key value is converted into the target key value according to the key value mapping table, and the target key value is sent to the target program. Compared with the prior art, the scheme of the invention can obtain the source key value corresponding to the currently pressed key on the key equipment, and automatically updates the key value mapping table when the key value mapping table is not matched with the target program by judging whether the key value mapping table is matched with the target program, so that the corresponding key value mapping table can be dynamically loaded according to the target program during use, and the key reuse can be simultaneously used for different UIs or APPs
Exemplary method
As shown in fig. 1, an embodiment of the present invention provides a key multiplexing method, specifically, the method includes the following steps:
step S100, obtaining a source key value corresponding to a currently pressed key on the key device.
Specifically, when a key on the key device is pressed, the key driver on the key device automatically captures a physical key value of the key, and sends the physical key value to the corresponding terminal device, and the system on the terminal device receives the physical key value and converts the physical key value into a source key value according to a conversion protocol with the key device sending the physical key value. The key device may be: the terminal equipment is equipment capable of running programs, such as a television and the like. In this embodiment, when a key on the remote controller is pressed, the remote controller transmits the physical key value to the television terminal through infrared transmission, and a system running on the television terminal receives the physical key value and converts the physical key value into a source key value.
The physical key value is a key code captured by a key driver, is a hexadecimal number, and is difficult to identify and recognize, so that the physical key value needs to be converted into a source key value represented by numbers, characters or functional letters, so as to facilitate the recognition and the setting of a key value mapping related to the source key value. In this embodiment, the physical key value of the number "2" button on the television remote controller is "0X 32", and the converted source key value is "2".
And S200, judging the matching relation between the key value mapping table and the target program to obtain a matching result.
Step S300, based on the matching result, updating the key value mapping table.
The target program is a program which is in an activated state and is located at the current input focus in the terminal equipment system. Whether the key value mapping table is matched with the target program or not is judged, and the key value mapping table is automatically updated when the key value mapping table is not matched, so that the corresponding key value mapping table is dynamically loaded according to the target program when the key value mapping table is used, the key value multiplexing can be simultaneously used for different UIs or APPs, and the key value mapping table is prevented from being not updated to cause failure or disorder of key value mapping when a system focus or an interface is changed. For example: when all target key values registered in the system of the target program can find corresponding mapping relations in the key value mapping table, the fact that the key value mapping table stores the key value mapping relations of the target program means that the target program can normally run, namely the key value mapping table is matched with the target program. Otherwise, it means that when the target program runs, there may be a case where the registered target key value cannot respond or responds incorrectly, i.e. the key-value mapping table does not match the target program.
Step S400, converting the source key value into a target key value according to the key value mapping table.
Step S500, sending the target key value to the target program.
The target key value is thrown to a target program, namely a target: the key value of the key event response of the UI or APP is represented by a number, a character, or a functional string. After the key value mapping table is matched with the target program, the target key value corresponding to the source key value is found by searching the key value mapping table, and the target key value is sent to the target program, so that the target program executes key operation corresponding to the target key value.
For example, in the present embodiment, in the key value mapping table, the source key Enter (Enter key) on the remote controller is mapped with the target key Play (Play key) on the video player interface on the tv. When an Enter key on a remote controller is pressed down, a background system on a television acquires that a source key value corresponding to a physical key is '3', searches in a key value mapping table to acquire a target key value corresponding to the source key value '3' as '10', then throws out a key event with the key value of '10', a video player interface receives the key event to acquire a corresponding key value as '10', and the target key corresponding to the target key value on the video player interface is: play, therefore, it is determined that Play is pressed, and playback is started. Therefore, the effect that pressing the Enter key on the remote controller is equal to clicking the Play key on the interface of the video player is realized.
In an application scenario, the key multiplexing method provided by the invention is operated in a key response system, after a key driver captures a pressed physical key, the corresponding physical key value is thrown to the key response system, the key response system converts the physical key value into a source key value, then the source key value is converted into a target key value according to a key value mapping table, and finally, a key event corresponding to the target key value is thrown to a current UI or APP.
Specifically, the step S200 of determining a matching relationship between the key value mapping table and the target program to obtain a matching result includes:
step S210, a first target key value list in the key value mapping table is obtained.
Step S220, a second target key value list corresponding to the target program is obtained.
Step S230, determining an inclusion relationship between the first target key value list and the second target key value list.
Step S240, when the first target key value list includes the second target key value list, the matching result is matching, otherwise, the matching result is mismatching.
Specifically, each entry in the key value mapping table stores a one-to-one correspondence relationship of "source key value-target key", for example: the expression "1-8-Exit" represents that the source key value "1" is mapped with the target key value "8" and the target key Exit.
And extracting the target key values of all items in the key value mapping table to form a first target key value list, obtaining all target key values registered by the target program in the system, and forming a second target key value list. If each item key in the second target key list is present in the first target key list, it means that the first target key list contains the second target key list, i.e. the target key mappings of the target program are present in the key mapping table, which is matched with the target program.
By judging whether the key value mapping table is matched with the target program or not, the key value mapping table can be prevented from being disordered and wrong due to the fact that the current key value mapping table is not changed correspondingly with the change of the target program.
Specifically, as shown in fig. 2, step S300 is: based on the matching result, updating a key-value mapping table, including:
step S310, a target key value list corresponding to the target program is obtained.
Step S320, sequentially obtaining the source key value corresponding to each target key value in the target key value list.
Step S330, updating each item of the target key and the corresponding source key into the key mapping table.
Specifically, when the matching result is not matched, all target key values registered in the system by the target program are obtained, a target key value list is formed, for each target key value in the target key value list, a source key value corresponding to each target key value is obtained, and each item of target key values and the corresponding source key values are updated into the key value mapping table. Namely: when the target key value is found in the key value mapping table and the two source key values are different, covering the source key value corresponding to the target key value in the key value mapping table with the source key value corresponding to the target key value.
In this embodiment, as shown in fig. 3, the step S320 is: sequentially obtaining a source key value corresponding to each target key value in the target key value list, including:
step S321, obtaining a first source key value corresponding to the target key value in the set priority list,
step S322, when a first source key value is obtained, the first source key value is the source key value;
step S323, when the first source key value is not obtained, obtaining an unused source key value list, and randomly extracting an item from the unused source key value list to obtain a second source key value, where the second source key value is the source key value.
Specifically, in this embodiment, each format stored in the priority list is: "Previous-4, 6" represents that the target key Previous is mapped with the source key value "4" preferentially, and if the source key value "4" is used, the target key is mapped with the source key value "6". Therefore, the source key values stored in the priority list are multiple, that is, one target key corresponds to multiple source key values, and a source key value list corresponding to the item key value is formed. After the target key value is converted into the target key, searching in a priority list to obtain a source key value list, wherein the source key value list comprises a plurality of source key values, and the source key values in the source key value list are arranged from high to low according to the set priority. Searching a first item of source key assignment in a source key assignment list in a key assignment mapping table, and if the item of source key assignment is not found in the key assignment mapping table, taking the source key assignment as the source key assignment corresponding to the target key assignment; if the source key value is found in the key value mapping table, searching the next source key value in the source key value list according to the sequence until all the source key values in the source key value list are searched.
Since all the target keys may not be set in the priority list, there may be some target keys that do not establish a mapping relationship after the priority list is searched. At this time, all the source key values are combined to form a source key value list, and the source key values which are in the mapping relation with the target program in the source key value list are removed, so that an unused source key value list is obtained. And for the rest target keys which are not established with the mapping relation, randomly extracting a source key value from the unused source key value list, wherein the source key value is the source key value corresponding to the target key value, and removing the source key value from the unused source key value list. Until all the target key mapping relations are established.
By setting the priority list, the target key values with high use frequency can be arranged in front of the priority list, so that the target key values with high use frequency can be mapped preferentially, and key reuse is more humanized. In addition, each source key value list in the priority list can also sort the source keys corresponding to the source key values according to the using convenience degree of the source keys, and the keys convenient to operate are arranged in front of the source key value list, so that the target keys frequently operated can be mapped by the source keys convenient to operate, the operation time is saved, the operation is convenient, and the use habit is met.
In an application scenario, there is one source key value corresponding to each item in the priority list, that is, one source key value is included in an item corresponding to a target key. The source key value corresponding to the target key can be directly obtained from the priority list.
The scheme can also enable the target key values with high use frequency to be mapped preferentially, so that the key reuse is more humanized. The difference from the above scheme is that the scheme is simple in setting, but the source key value corresponding to the destination key value has no alternative value, and the polling mapping of the source key value cannot be performed.
Of course, the priority list item may also use the format of "destination key value-source key value, source key value".
In an application scenario, when a priority list is not set, all source key values are combined to form a source key value list, and the source key values in the source key value list, which have established a mapping relation with a target program, are removed, so that an unused source key value list is obtained. Sorting the unused source key value list from high to low according to the preset source key value use frequency; and then, taking the first unused source key value in the unused source key value list as the source key value corresponding to the target key value. Of course, an item may also be randomly extracted from the unused source key value list as the source key value corresponding to the target key value.
It is to be understood that the number of source key values in the source key value list in the priority list item is not limited.
Furthermore, the current input focus can be monitored in real time, and when the running program corresponding to the current input focus is different from the last target program, the key value mapping table is updated, and the target program is set as the running program corresponding to the current input focus.
Specifically, if the current focus or the display interface on the terminal device changes, it means that the currently running program changes. Of course, different programs have different target key events registered in the system, so the current key mapping table needs to be updated, and the target program is set as the running program corresponding to the current input focus.
Furthermore, the content of the current key value mapping table can be displayed on a display interface of the terminal equipment in real time. For example: and displaying a semi-transparent floating window on a display interface of the terminal equipment, and displaying the content of the current key value mapping table in real time in the window. The user can obtain the specific information of the key value mapping from the window at a glance, and the user experience is better.
In summary, the present invention can automatically modify the response of the key according to different target programs, i.e. modify the key value mapping, and send the correct target key value to the target UI or APP.
The following describes the generation and update method of the key-value mapping table in detail by taking a video player as an example:
the following seven target keys are on the interface of the video player: exit, Stop, Play, Previous, Next, Fast-backward, Fast-forward. And respectively establishing mapping relations between the seven target keys and the physical keys of the corresponding equipment through key multiplexing. Suppose that the following seven keys are provided on the corresponding remote controller device: power, Home, Enter, Up, Down, Left, Right.
For convenience of description, it is assumed that a source key value corresponding to a physical key of a device and a target key value list corresponding to a target key are as follows:
Figure BDA0003231176740000121
reasonable priority lists are preset with reference to the frequency of use of the target key and the location of the physical keys, such as: the upper, lower, left and right keys are used frequently in the UI, and the upper, lower, left and right keys may be added to the priority list and preferentially mapped to the location of the physical key most conveniently pressed by the user's finger. Thus, the priority list may be set as follows:
target key Source key value Source key value
Previous 4 6
Next 5 7
Fast-backward 6 4
Fast-forward 7 5
After the priority list is set, the key response system firstly carries out polling mapping on the target keys in the priority list. The mapping process is as follows:
firstly, key value mapping corresponding to Previous is searched in a key value mapping table, and if the key value mapping is found, the key value mapping is used. If not, searching a source key value list corresponding to Previous in the priority list to obtain a plurality of source key values. And then searching whether the first source key value is used or not in the key value mapping table, if not, establishing mapping between the target key value and the source key value, and adding the mapping into the key value mapping table. If the source key value is used, whether the next source key value is used or not is searched until all the source key values are searched.
And after the target key values in the priority list are mapped, mapping the target key values which are not in the priority list.
For example: and searching whether the Exit target key value is registered in the key value mapping table, if not, randomly selecting one of unused source key values, establishing mapping between the source key value and the target key value, and adding the mapping into the key value mapping table.
And repeating the steps until all the target key values are mapped successfully, and finishing updating the complete key value mapping table.
Each entry in the key-value mapping table stores a one-to-one correspondence relationship of "source key value-target key", for example: the expression "1-8-Exit" represents that the Power key Power and the target key Exit are mapped.
The key value mapping table is automatically updated through the system, so that the user experience is better, and the learning cost is lower.
Exemplary device
As shown in fig. 4, corresponding to the key multiplexing method, an embodiment of the present invention further provides a key multiplexing apparatus, where the key multiplexing apparatus includes:
the source key value obtaining module 600 is configured to obtain a source key value corresponding to a currently pressed key on the key device.
Specifically, when a key on the key device is pressed, the key driver on the key device automatically captures a physical key value of the key, and sends the physical key value to the corresponding terminal device, and the system on the terminal device receives the physical key value and converts the physical key value into a source key value according to a conversion protocol with the key device sending the physical key value. The key device may be: the terminal equipment is equipment capable of running programs, such as a television and the like.
The physical key value is a key code captured by a key driver, is a hexadecimal number, and is difficult to identify and recognize, so that the physical key value needs to be converted into a source key value represented by numbers, characters or functional letters, so as to facilitate the recognition and the setting of a key value mapping related to the source key value.
The key value mapping table matching module 610 is configured to determine a matching relationship between the key value mapping table and the target program, and obtain a matching result;
a key mapping table updating module 620, configured to update the key mapping table;
whether the key value mapping table is matched with the target program or not is judged, and the key value mapping table is automatically updated when the key value mapping table is not matched, so that the corresponding key value mapping table is dynamically loaded according to the target program when the key value mapping table is used, the key value multiplexing can be simultaneously used for different UIs or APPs, and the key value mapping table is prevented from being not updated to cause failure or disorder of key value mapping when a system focus or an interface is changed.
A key-value conversion module 630, configured to convert the source key value into a target key value according to the key-value mapping table;
a key value sending module 640, configured to send the target key value to the target program.
After the key value mapping table is matched with the target program, the target key value corresponding to the source key value is found by searching the key value mapping table, and the target key value is sent to the target program, so that the target program executes key operation corresponding to the target key value.
Further, a key value display module may be further configured to display the content of the current key value mapping table in real time on a display interface of the terminal device.
For example: and displaying a semi-transparent floating window on the display interface, and displaying the content of the current key value mapping table in real time in the window. The user can obtain the specific information of the key value mapping from the window at a glance, and the user experience is better.
Specifically, in this embodiment, the specific functions of each module of the key multiplexing device may refer to the corresponding descriptions in the key multiplexing method, and are not described herein again.
Based on the above embodiment, the present invention further provides an intelligent terminal, and a schematic block diagram thereof may be as shown in fig. 5. The intelligent terminal comprises a processor, a memory, a network interface and a display screen which are connected through a system bus. Wherein, the processor of the intelligent terminal is used for providing calculation and control capability. The memory of the intelligent terminal comprises a nonvolatile storage medium and an internal memory. The nonvolatile storage medium stores an operating system and a key multiplexing program. The internal memory provides an environment for the operation of the operating system and the key reuse program in the nonvolatile storage medium. The network interface of the intelligent terminal is used for being connected and communicated with an external terminal through a network. The key multiplexing program realizes the steps of any one of the key multiplexing methods when being executed by a processor. The display screen of the intelligent terminal can be a liquid crystal display screen or an electronic ink display screen.
It will be understood by those skilled in the art that the block diagram shown in fig. 5 is only a block diagram of a part of the structure related to the solution of the present invention, and does not constitute a limitation to the intelligent terminal to which the solution of the present invention is applied, and a specific intelligent terminal may include more or less components than those shown in the figure, or combine some components, or have a different arrangement of components.
In one embodiment, an intelligent terminal is provided, where the intelligent terminal includes a memory, a processor, and a key multiplexing program stored in the memory and executable on the processor, and the key multiplexing program performs the following operation instructions when executed by the processor: obtaining a source key value corresponding to a currently pressed key on key equipment; judging whether the key value mapping table is matched with the target program or not, and obtaining a matching result; if the matching result is not matched, updating the key value mapping table; converting the source key value into a target key value according to the key value mapping table; and sending the target key value to the target program.
The embodiment of the present invention further provides a computer-readable storage medium, where a key multiplexing program is stored on the computer-readable storage medium, and when the key multiplexing program is executed by a processor, the steps of any one of the key multiplexing methods provided in the embodiments of the present invention are implemented.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-mentioned division of the functional units and modules is illustrated, and in practical applications, the above-mentioned functions may be distributed as different functional units and modules according to needs, that is, the internal structure of the apparatus may be divided into different functional units or modules to implement all or part of the above-mentioned functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present invention. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art would appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus/terminal device and method may be implemented in other ways. For example, the above-described embodiments of the apparatus/terminal device are merely illustrative, and for example, the division of the above modules or units is only one logical division, and the actual implementation may be implemented by another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed.
The integrated modules/units described above, if implemented in the form of software functional units and sold or used as separate products, may be stored in a computer readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium and can implement the steps of the embodiments of the method when the computer program is executed by a processor. The computer program includes computer program code, and the computer program code may be in a source code form, an object code form, an executable file or some intermediate form. The computer readable medium may include: any entity or device capable of carrying the above-mentioned computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signal, telecommunication signal, software distribution medium, etc. It should be noted that the contents contained in the computer-readable storage medium can be increased or decreased as required by legislation and patent practice in the jurisdiction.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art; the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not depart from the spirit and scope of the embodiments of the present invention, and they should be construed as being included therein.

Claims (10)

1. A key reuse method, the method comprising:
obtaining a source key value corresponding to a currently pressed key on key equipment;
judging the matching relation between the key value mapping table and the target program to obtain a matching result;
updating the key value mapping table based on the matching result;
converting the source key value into a target key value according to the key value mapping table;
and sending the target key value to the target program.
2. The key reuse method according to claim 1, wherein the updating the key mapping table comprises:
obtaining a target key value list corresponding to the target program;
sequentially obtaining a source key value corresponding to each target key value in the target key value list;
and updating each item of the target key value and the corresponding source key value into the key value mapping table.
3. The key multiplexing method according to claim 2, wherein the sequentially obtaining the source key values corresponding to each target key value in the target key value list comprises:
obtaining an unused source key value list;
sorting the unused source key value list from high to low according to the set source key value use frequency;
and the first unused source key value in the unused source key value list is the source key value.
4. The key multiplexing method according to claim 2, wherein the sequentially obtaining the source key values corresponding to each target key value in the target key value list comprises:
obtaining a first source key value corresponding to the target key value in a set priority list;
when the first source key value is obtained, the first source key value is the source key value;
when the first source key value is not obtained, obtaining an unused source key value list, randomly extracting an item from the unused source key value list, and obtaining a second source key value, wherein the second source key value is the source key value.
5. The key multiplexing method of claim 4, wherein the obtaining a first source key value corresponding to the destination key value in a set priority list comprises:
obtaining a source key value list corresponding to the target key value in a set priority list;
sequentially searching each item of third source key values in the source key value list in the key value mapping table;
when the third source key value is not found in the key value mapping table, the third source key value is the first source key value;
when the third source key value is found in the key value mapping table, searching for a next third source key value in the source key value list until all third source key values in the source key value list are searched.
6. The key multiplexing method of claim 1, wherein the determining a matching relationship between a key mapping table and a target program to obtain a matching result comprises:
obtaining a first target key value list in the key value mapping table;
obtaining a second target key value list corresponding to the target program;
judging the inclusion relationship between the first target key value list and the second target key value list;
and when the first target key value list comprises the second target key value list, the matching result is matching, otherwise, the matching result is mismatching.
7. The key reuse method according to claim 1, wherein said sending the second logical key value to the target program further comprises,
monitoring an input focus;
and when the running program corresponding to the input focus is different from the target program, updating the key value mapping table, and setting the target program as the running program corresponding to the input focus.
8. A key multiplexing device, the device comprising:
the source key value acquisition module is used for acquiring a source key value corresponding to a currently pressed key on the key equipment;
the key value mapping table matching module is used for judging the matching relation between the key value mapping table and the target program and obtaining a matching result;
the key value mapping table updating module is used for updating the key value mapping table;
the key value conversion module is used for converting the source key value into a target key value according to the key value mapping table;
and the key value sending module is used for sending the target key value to the target program.
9. An intelligent terminal, characterized in that the intelligent terminal comprises a memory, a processor and a key multiplexing program stored on the memory and operable on the processor, the key multiplexing program, when executed by the processor, implementing the steps of the key multiplexing method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having a key reuse program stored thereon, which when executed by a processor implements the steps of the key reuse method according to any one of claims 1-7.
CN202110987397.8A 2021-08-26 2021-08-26 Key multiplexing method and device, intelligent terminal and computer readable storage medium Pending CN113709534A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110987397.8A CN113709534A (en) 2021-08-26 2021-08-26 Key multiplexing method and device, intelligent terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110987397.8A CN113709534A (en) 2021-08-26 2021-08-26 Key multiplexing method and device, intelligent terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN113709534A true CN113709534A (en) 2021-11-26

Family

ID=78655086

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110987397.8A Pending CN113709534A (en) 2021-08-26 2021-08-26 Key multiplexing method and device, intelligent terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN113709534A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502208A (en) * 2023-06-28 2023-07-28 深圳市莱仕达电子科技有限公司 Cross-device compatible guiding method, device and system

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195802A (en) * 2010-03-18 2011-09-21 中兴通讯股份有限公司 Terminal software transmission method, server and terminal
CN103747311A (en) * 2013-12-18 2014-04-23 华为技术有限公司 Application control method, device and system
CN105516765A (en) * 2014-09-25 2016-04-20 阿里巴巴集团控股有限公司 Button matching method and device and signal processing method and device of remote controller
CN106549781A (en) * 2015-09-18 2017-03-29 北京国双科技有限公司 server monitoring list updating method and device
CN106933647A (en) * 2015-12-29 2017-07-07 广州爱九游信息技术有限公司 A kind of method, apparatus and system for generating simulator button control information
CN107257504A (en) * 2017-07-06 2017-10-17 深圳Tcl数字技术有限公司 Key assignments update method, remote control and the readable storage medium storing program for executing of button in remote control
CN108228620A (en) * 2016-12-14 2018-06-29 北京搜狗科技发展有限公司 A kind of Word library updating method and device
CN109634912A (en) * 2018-12-10 2019-04-16 苏州思必驰信息科技有限公司 Data migration method and system
CN110032412A (en) * 2019-02-28 2019-07-19 努比亚技术有限公司 A kind of key-press input control method, terminal and computer readable storage medium
CN111813433A (en) * 2020-06-30 2020-10-23 惠州视维新技术有限公司 Method for updating key values in remote controller, remote controller and storage medium

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102195802A (en) * 2010-03-18 2011-09-21 中兴通讯股份有限公司 Terminal software transmission method, server and terminal
CN103747311A (en) * 2013-12-18 2014-04-23 华为技术有限公司 Application control method, device and system
CN105516765A (en) * 2014-09-25 2016-04-20 阿里巴巴集团控股有限公司 Button matching method and device and signal processing method and device of remote controller
CN106549781A (en) * 2015-09-18 2017-03-29 北京国双科技有限公司 server monitoring list updating method and device
CN106933647A (en) * 2015-12-29 2017-07-07 广州爱九游信息技术有限公司 A kind of method, apparatus and system for generating simulator button control information
CN108228620A (en) * 2016-12-14 2018-06-29 北京搜狗科技发展有限公司 A kind of Word library updating method and device
CN107257504A (en) * 2017-07-06 2017-10-17 深圳Tcl数字技术有限公司 Key assignments update method, remote control and the readable storage medium storing program for executing of button in remote control
CN109634912A (en) * 2018-12-10 2019-04-16 苏州思必驰信息科技有限公司 Data migration method and system
CN110032412A (en) * 2019-02-28 2019-07-19 努比亚技术有限公司 A kind of key-press input control method, terminal and computer readable storage medium
CN111813433A (en) * 2020-06-30 2020-10-23 惠州视维新技术有限公司 Method for updating key values in remote controller, remote controller and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116502208A (en) * 2023-06-28 2023-07-28 深圳市莱仕达电子科技有限公司 Cross-device compatible guiding method, device and system
CN116502208B (en) * 2023-06-28 2024-01-19 深圳市莱仕达电子科技有限公司 Cross-device compatible guiding method, device and system

Similar Documents

Publication Publication Date Title
CN110737840B (en) Voice control method and display device
WO2014051207A1 (en) Electronic device, server and control method thereof
CN108089977B (en) Application program exception handling method and device and mobile terminal
US20140156277A1 (en) Information processing device and content retrieval method
CN107329761B (en) Message prompt processing method and electronic equipment
CN105516765A (en) Button matching method and device and signal processing method and device of remote controller
CN110097884B (en) Voice interaction method and device
CN110035120A (en) Information push method, device, electronic equipment and storage medium
CN112732217A (en) Information interaction method, terminal and storage medium of intelligent glasses for 5G messages
CN113054981A (en) Key list updating method, terminal and readable storage medium
CN113709534A (en) Key multiplexing method and device, intelligent terminal and computer readable storage medium
WO2020222386A1 (en) Method and apparatus for updating a cluster probability model
CN114422836A (en) Remote controller key updating method and device, remote controller and storage medium
CN103647996A (en) Data-resource transmission method and device
CN106851373B (en) Control method and device for set top box terminal equipment
CN111600729A (en) Group member adding method and electronic equipment
CN111290689B (en) Electronic equipment, main control device, control method and touch control sharing system thereof
CN107333183B (en) Channel sorting method and device and electronic equipment
CN111813741A (en) File sharing method and electronic equipment
CN112449222A (en) Signal source control method, system, display terminal and storage medium
CN108494580A (en) A kind of method, medium, terminal and the equipment of update facility information
CN108563682B (en) Method and device for ordering multimedia files
CN114090148A (en) Information synchronization method and device, electronic equipment and computer readable storage medium
CN113821832A (en) Automatic identification method and automatic identification device for verification text
CN114666673A (en) Method, device and equipment for renaming information source channel and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination