CN113850988B - Key value correction method, device, equipment and computer readable medium - Google Patents

Key value correction method, device, equipment and computer readable medium Download PDF

Info

Publication number
CN113850988B
CN113850988B CN202011572926.XA CN202011572926A CN113850988B CN 113850988 B CN113850988 B CN 113850988B CN 202011572926 A CN202011572926 A CN 202011572926A CN 113850988 B CN113850988 B CN 113850988B
Authority
CN
China
Prior art keywords
key value
value information
target
code
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011572926.XA
Other languages
Chinese (zh)
Other versions
CN113850988A (en
Inventor
韦未来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Chaoge Smart Internet Technology Co ltd
Original Assignee
Guangdong Chaoge Smart Internet Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Chaoge Smart Internet Technology Co ltd filed Critical Guangdong Chaoge Smart Internet Technology Co ltd
Priority to CN202011572926.XA priority Critical patent/CN113850988B/en
Publication of CN113850988A publication Critical patent/CN113850988A/en
Application granted granted Critical
Publication of CN113850988B publication Critical patent/CN113850988B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C23/00Non-electrical signal transmission systems, e.g. optical systems
    • G08C23/04Non-electrical signal transmission systems, e.g. optical systems using light waves, e.g. infrared
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C25/00Arrangements for preventing or correcting errors; Monitoring arrangements

Landscapes

  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Input From Keyboards Or The Like (AREA)
  • Selective Calling Equipment (AREA)

Abstract

The embodiment of the disclosure discloses a key value correction method, a key value correction device, key value correction equipment and a computer readable medium. One embodiment of the method comprises: acquiring a key value information set of a target remote controller and infrared signal information sent by the target remote controller; generating target key value information based on the infrared signal information; determining whether key value information matched with the target key value information exists in the key value information set; and in response to the target key value information does not exist, correcting the target key value information to obtain a key value correction result. According to the embodiment, the correction of the key value interfered by the external environment is realized, so that the problem that the key value of the key is invalid due to the interference of the infrared signal is solved, the user experience is improved, convenience is provided for the life of a user, the range of the infrared receiving end equipment model selection is widened, and the production cost of an enterprise is reduced.

Description

Key value correction method, device, equipment and computer readable medium
Technical Field
The embodiment of the disclosure relates to the field of wireless communication, provides a method for improving the anti-interference capability and the recognition rate of infrared remote control, and particularly relates to a key value correction method, a key value correction device, key value correction equipment and a computer readable medium.
Background
The infrared communication technology is a wireless communication technology that uses infrared rays to transmit data. Currently, the method related to key value correction usually discards the interfered data in the infrared analysis process, so as to correct the key value.
However, when the above method is adopted, there are often technical problems as follows:
firstly, the key values of the keys cannot be effectively corrected, so that the infrared signal receiving end cannot receive the effective key values of the keys, and the anti-interference capability of the infrared signal receiving end is further reduced.
Secondly, because the interfered data is not considered, the recognition rate of the infrared signal receiving end to the infrared signal and the probability of correcting are reduced, and further, the problem that key values of keys are invalid occurs.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose key value correction methods, apparatuses, electronic devices, and media to solve one or more of the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a key value correction method, including: acquiring a key value information set of a key of a target remote controller and infrared signal information sent by the target remote controller; generating target key value information based on the infrared signal information; determining whether key value information matched with the target key value information exists in the key value information set; and responding to the absence, and correcting the key value information of the target key to obtain a key value correction result.
In a second aspect, some embodiments of the present disclosure provide a key value correction apparatus, including: the acquisition unit is configured to acquire a key value information set of a key of a target remote controller and infrared signal information sent by the target remote controller; a generating unit configured to generate target key value information based on the infrared signal information; a determining unit configured to determine whether there is key value information matching the target key value information in the set of key value information; and the correction unit is configured to respond to the absence, correct the target key value information and obtain a key value correction result.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device, on which one or more programs are stored, which when executed by one or more processors cause the one or more processors to implement the method described in any implementation of the first aspect.
In a fourth aspect, some embodiments of the disclosure provide a computer readable medium on which a computer program is stored, wherein the program when executed by a processor implements the method described in any implementation of the first aspect.
The above embodiments of the present disclosure have the following advantages: according to the key value correction method of some embodiments of the disclosure, the key value of the key can be effectively corrected, and the infrared signal receiving terminal can receive the effective key value of the key, so that the anti-interference capability of the infrared signal receiving terminal is improved. Specifically, the reason why the anti-interference capability of the infrared signal receiving end is weak is that: at present, methods related to key value correction generally discard interfered data in an infrared analysis process, and lack of key value comparison data, so that the anti-interference capability of an infrared signal receiving end is weak. Based on this, some embodiments of the present disclosure provide a key value correction method, first, a key value information set of a target remote controller and infrared signal information sent by the target remote controller are obtained. Because the key value information set of the key is obtained, when the data obtained by analyzing the infrared signal information is not matched with the key value information of the key in the key value information set, the infrared signal receiving end responds to the data obtained by analyzing, and therefore the problem of wrong response caused by interference of the infrared signal information is solved. And then, generating target key value information based on the infrared signal information. The generated target key value information is used for comparing with the key value information in the key value information set, so that whether the target key value information is effective key value information or not is judged. And then, determining whether the key value information matched with the target key value information exists in the key value information set. Therefore, the target key value information is compared with the key value information in the key value information set to obtain a comparison result. And finally, in response to the target key value information, correcting the target key value information to obtain a key value correction result. And the key value information set does not have key value information matched with the target key value information, so that the target key value information is corrected, and a key value correction result is obtained. Optionally, in response to the presence, determining the target key value information as a resolution result. The key value information matched with the target key value information exists in the key value information set, and the generated target key value information is effective. And sending the key value correction result or the analysis result to a terminal display screen for displaying. And displaying the key value correction result or the analysis result on a terminal, so that related technicians can better see the correction effect. Because the key value comparison data is added, the key value is effectively corrected, so that the infrared signal receiving end can receive the effective key value, and the anti-interference capability of the infrared signal receiving end is improved.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and features are not necessarily drawn to scale.
Fig. 1 is a schematic diagram of an application scenario of a key-value correction method according to some embodiments of the present disclosure;
fig. 2 is a flow diagram of some embodiments of a key-value correction method according to the present disclosure;
FIG. 3 is a schematic structural diagram of some embodiments of a key value correction apparatus according to the present disclosure;
FIG. 4 is a schematic block diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence of the functions performed by the devices, modules or units.
It is noted that references to "a" or "an" in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will appreciate that references to "one or more" are intended to be exemplary and not limiting unless the context clearly indicates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram 100 of an application scenario of a key value correction method according to some embodiments of the present disclosure.
As shown in fig. 1, first, the computing device 101 may obtain a key value information set 102 of a target remote controller and infrared signal information 103 sent by the target remote controller. Then, based on the infrared signal information 103, target key value information 104 is generated. Then, it is determined whether there is key value information matching the target key value information 104 in the set of key value information 102. And finally, in response to the absence, correcting the target key value information 104 to obtain a key value correction result 105. Optionally, the target key value information 104 may also be determined as the resolution result 106 in response to the existence. Then, the key value correction result 105 or the analysis result 106 is sent to the terminal display screen 107 for display.
The computing device 101 may be hardware or software. When the computing device is hardware, it may be implemented as a distributed cluster composed of multiple servers or terminal devices, or may be implemented as a single server or a single terminal device. When the computing device is embodied as software, it may be installed in the hardware devices enumerated above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of computing devices in FIG. 1 is merely illustrative. There may be any number of computing devices, as implementation needs dictate.
With continued reference to fig. 2, a flow 200 of some embodiments of a key-value correction method according to the present disclosure is shown. The key value correction method comprises the following steps:
step 201, acquiring a key value information set of a key of a target remote controller and infrared signal information sent by the target remote controller.
In some embodiments, an executing body (such as the computing device 101 shown in fig. 1) of the key value correction method may acquire the key value information set of the key of the target remote controller and the infrared signal information sent by the target remote controller through a wired connection manner or a wireless connection manner.
Specifically, the key value information of the remote controller may be information of key values of the remote controller synchronously established at the infrared receiving end when the key values of the remote controller are defined. The key value information may include a key name, a key value, and the like. The infrared signal information may be transmitted by the remote controller according to a key being pressed when a key operation is performed on the remote controller. The infrared signal information may be a 32-bit binary number. As an example, the above key value information may be [ key name (up), key value (0x2dd24db2) ].
And 202, generating target key value information based on the infrared signal.
In some embodiments, the execution body may generate the target key value information based on an infrared signal.
Specifically, the target key value information may be key value information obtained by performing analysis processing, correction processing, and numerical conversion processing on the infrared signal, and may include a key name, a key value, and the like. As an example, the above target key value information may be [ key name (up), key value (0x2dd24db0) ].
In some optional implementation manners of some embodiments, the executing body may generate the target key value information based on an infrared signal, and may include the following steps:
firstly, analyzing the infrared signal information to obtain an analysis data sequence. The analysis process may be a process of converting the infrared signal information into a binary number sequence. The parsed data sequence may be a sequence of binary numbers.
As an example, the analysis process may be to encode the infrared signal first and then decode the encoded infrared signal. The parsed data sequence may be 0010110111010010.
And secondly, correcting each analytic data in the analytic data sequence to generate corrected analytic data, so as to obtain a corrected analytic data sequence.
Specifically, the correction processing may be processing for correcting the disturbed analysis data and not changing the valid data. The interfered analysis data may be analysis data that cannot be recognized by the infrared receiving terminal. The valid data may be analysis data that can be recognized by the infrared receiving terminal.
As an example, the parsed data sequence may be 001011011101001001001101101100x 0. The disturbed analytic data may be x. The correction processing may be to correct the analysis data x to 0. The corrected analysis data sequence may be 00101101110100100100110110110000.
Optionally, performing a modification process on each of the analysis data in the analysis data sequence to generate modified analysis data, may include the following steps:
and responding to the analytic data meeting a first preset condition, and performing bit complementing processing on the analytic data to obtain bit complementing data serving as corrected analytic data.
Specifically, the first predetermined condition may be that the analysis data is interfered analysis data and cannot be identified by the infrared receiving end. The bit-padding process may be to correct the disturbed analysis data to 0 or 1.
As an example, the analysis data may be x, which cannot be recognized by the infrared receiving terminal. The analysis data x may be corrected to data 0, and the bit-complement data 0 may be obtained as the corrected analysis data.
Optionally, the modifying each analytic data in the analytic data sequence to generate modified analytic data may further include:
and determining the analysis data as modified analysis data in response to the analysis data not meeting the first preset condition.
As an example, the above-described parsed data may be 0. The analysis data can be identified by the infrared receiving end. The analysis data 0 is determined as corrected analysis data.
And thirdly, carrying out digital system conversion processing on the corrected analytic data sequence to obtain target key value information. Specifically, the number system conversion process may be a binary to decimal, binary to hexadecimal process.
As an example, the modified parsed data sequence may be 00101101110100100100110110110000. The above-mentioned number system conversion process may be a binary to hexadecimal process. The above target key value information may be 0x2dd24db 0.
Step 203, determining whether the key value information set has key value information matched with the target key value information.
In some embodiments, the execution body may determine whether there is key value information in the set of key value information that matches the target key value information.
Specifically, the target key value information is compared with each piece of key value information in the key value information set. Therefore, whether the key value information matched with the target key value information exists in the key value information set or not is determined. As an example, the above-described set of key value information may be [ [ key name (up), key value (0x2dd24db2) ], [ key name (down), key value (0x2dd2f00f) ] ].
And 204, responding to the absence, and correcting the key value information of the target key to obtain a key value correction result.
In some embodiments, the execution main body may correct the key value information of the target key in response to the absence of the target key, and obtain a key value correction result.
Specifically, the above target key value information may be [ key name (up), key value (0x2dd24db0) ]. The modifying the target key value information may be converting the target key value information into key value information matched with a predetermined number of key value information in the key value information set. The predetermined number may be one. The above correction result may be [ key name (up), key value (0x2dd24db2) ].
In some optional implementation manners of some embodiments, the target key value information includes a user code, a key value code, and a stop bit, and the key value information includes a user code and a key value code; the executing body may modify the key value information of the target key to obtain a key value modification result, and may include the following steps:
the first step is to compare the user code in the target key value information with the user codes of the key value information in the key value information set to obtain a first user code comparison result set.
Specifically, the execution main body may compare the user code in the target key value information with the user codes of the key value information in the key value information set, so as to obtain a first user code comparison result set. The comparison between the user code in the target key value information and the user code of each piece of key value information in the key value information set may be to compare whether the user code in the target key value information is the same as the user code of each piece of key value information in the key value information set. The first user code comparison result may be that the user codes are the same or different.
As an example, the above target key value information may be [ key name (up), key value (0x2dd24db0) ]. The user code of the above-mentioned target key value information may be 0x2dd 2. The above-described key value information set may be [ [ key name (up), key value (0x2dd24db2) ], [ key name (down), key value (0x2dd2f00f) ] ]. The user code of each key information in the above-mentioned set of key information may be 0x2dd 2. The first user code comparison result set may be [ user codes are the same, and user codes are different ].
And secondly, determining a first user code comparison result meeting a second preset condition in the first user code comparison result set as an alternative user code comparison result to obtain an alternative user code comparison result set.
Specifically, the executing body may determine a first user code comparison result meeting a second preset condition in the first user code comparison result set as an alternative user code comparison result, so as to obtain an alternative user code comparison result set. The second preset condition may be that a predetermined number of data in the first user code comparison result set are first user code comparison results with the same user code. The predetermined number may be one, two, three, etc. As an example, the alternative user code comparison result set may be [ user codes are the same, user codes are the same ].
And thirdly, determining the key value information corresponding to each alternative user code comparison result in the alternative user code comparison result set as first alternative key value information to obtain a first alternative key value information set.
Specifically, the execution main body may determine, as the first candidate key value information, the key value information corresponding to each candidate user code comparison result in the candidate user code comparison result set, to obtain the first candidate key value information set. As an example, the above-described first alternative set of key value information may be [ [ key name (up), key value (0x2dd24db2) ], [ key name (down), key value (0x2dd2f00f) ] ].
And fourthly, comparing the key value codes in the target key value information with the key value codes of all the first alternative key value information in the first alternative key value information set to obtain a first key value code comparison result set.
Specifically, the execution main body may compare the key value code in the target key value information with the key value codes of each first alternative key value information in the first alternative key value information set to obtain a first key value code comparison result set. The comparison between the key value code in the target key value information and the key value code of each first alternative key value information in the first alternative key value information set may be to determine whether the key value code in the target key value information is completely different from the key value code of each first alternative key value information in the first alternative key value information set. The first key-value codes may be completely different or partially identical.
As an example, the above-mentioned key value code comparison result set may be [ key value code portions are the same, key value code portions are the same ]. The key value code in the above target key value information may be 4db 0. The key value code of the above-mentioned first alternative key value information may be 4db 2.
And fifthly, responding to the fact that the first key value code comparison result set meets a third preset condition, correcting the key value codes in the target key value information to obtain a key value code correction result.
Specifically, the execution main body may modify the key value codes in the target key value information in response to that the first key value code comparison result set satisfies a third preset condition, so as to obtain a key value code modification result. The third preset condition may be that existing data in the first key-value code comparison result set are first key-value code comparison results with partially identical key-value codes. As an example, the key value code correction result may be 4db 2.
Optionally, the key-value code includes a high-order byte and a low-order byte; the executing body may correct the key value code in the target key value information to obtain a key value code correction result, and may include the following substeps:
in response to that the key value code in the target key value information meets a sixth preset condition, replacing a complement of a high-order byte in the key value code in the target key value information with a low-order byte in the key value code in the target key value information.
Specifically, the execution main body may replace, in response to that the key value code in the target key value information satisfies a sixth preset condition, a complement of a higher-order byte in the key value code in the target key value information with a lower-order byte in the key value code in the target key value information. The sixth preset condition may be that a high-order byte in a key value code in the target key value information is the same as a high-order byte in a key value code in corresponding first candidate key value information in the first candidate key value information set, and a low-order byte in the key value code in the target key value information is different from a low-order byte in a key value code in corresponding first candidate key value information in the first candidate key value information set.
As an example, the key code in the above-described target key value information may be 4db 0. The key value code in the corresponding first alternative key value information may be 4db 2. The upper byte in the key value code in the target key value information may be 4 d. The upper byte in the key value code in the first alternative key value information may be 4 d. The lower byte in the key value code in the above-mentioned target key value information may be b 0. The lower byte in the key value code in the first alternative key value information may be b 2. The complement of the upper byte in the key value code in the target key value information may be b 2. The lower byte in the key value code in the replaced target key value information may be b 2.
And a second substep, in response to that the key value code in the target key value information meets a seventh preset condition, replacing the complement of the lower byte in the key value code in the target key value information with the upper byte in the key value code in the target key value information.
Specifically, the execution main body may replace, in response to that the key value code in the target key value information satisfies a seventh preset condition, a complement of a lower byte in the key value code in the target key value information with a higher byte in the key value code in the target key value information. The seventh preset condition may be that a higher-order byte in a key value code in the target key value information is different from a higher-order byte in a key value code in corresponding first candidate key value information in the first candidate key value information set, and a lower-order byte in the key value code in the target key value information is the same as a lower-order byte in a key value code in corresponding first candidate key value information in the first candidate key value information set.
As an example, the key value code in the above target key value information may be 0bd 4. The key value code in the corresponding first alternative key value information may be 2bd 4. The upper byte in the key value code in the target key value information may be 0 b. The upper byte in the key value code in the first alternative key value information may be 2 b. The lower byte in the key value code in the above-mentioned target key value information may be d 4. The lower byte in the key value code in the above-mentioned first alternative key value information may be d 4. The lower byte in the key value code in the above-mentioned target key value information may be d 4. The complement of the lower byte in the key value code in the target key value information may be 2 b. The upper byte in the key value code in the replaced target key value information may be 2 b.
And sixthly, correcting the stop bit in the key value information of the target key based on the key value code correction result to obtain a key value correction result.
Specifically, the execution main body may correct the stop bit in the key value information of the target key based on the key value code correction result, so as to obtain a key value correction result. After the user code and the key value code in the target key value information are corrected, the condition of correcting the stop bit in the target key value information can be relaxed. And even if the length of the stop bit is not enough, the corrected target key value information is used as a key value correction result.
In some optional implementation manners of some embodiments, the executing body may correct the key value information of the target key to obtain a key value correction result, and may further include the following steps:
firstly, comparing the key value codes in the target key value information with the key value codes of each piece of key value information in the key value information set to obtain a second key value code comparison result set.
Specifically, the execution main body may compare the key value code in the target key value information with the key value codes of the key value information in the key value information set, so as to obtain a second key value code comparison result set. The comparison between the key value code in the target key value information and the key value code of each piece of key value information in the key value information set may be to compare whether the key value code in the target key value information is the same as the key value code of each piece of key value information in the key value information set. The second key value code comparison result may be that the key value codes are the same or that the key value codes are different.
As an example, the above target key value information may be [ key name (up), key value (0x4db02dd2) ]. The key value code may be 0x2dd 2. The above-described key value information set may be [ [ key name (up), key value (0x4db22dd2) ], [ key name (down), key value (0xf00f2dd2) ] ]. The second key-value code comparison result set may be [ key-value codes are the same, and key-value codes are different ].
And secondly, determining a second key value code comparison result meeting a fourth preset condition in the second key value code comparison result set as an alternative key value code comparison result to obtain an alternative key value code comparison result set.
Specifically, the execution subject may determine, as the candidate key value code comparison result, a second key value code comparison result that meets a fourth preset condition in the second key value code comparison result set, so as to obtain a candidate key value code comparison result set. The fourth predetermined condition may be that a predetermined number of second key-value code comparison results with the same key-value code exist in the second key-value code comparison result set. The predetermined number may be one, two, three, etc. As an example, the above alternative key-value code comparison result set may be [ key-value codes are the same, key-value codes are the same ].
And thirdly, determining the key value information corresponding to each alternative key value code comparison result in the alternative key value code comparison result set as second alternative key value information to obtain a second alternative key value information set.
Specifically, the execution main body may determine, as second candidate key value information, key value information corresponding to each candidate key value code comparison result in the candidate key value code comparison result set, so as to obtain a second candidate key value information set. As an example, the above-described second set of candidate key value information may be [ [ key name (up), key value (0x4db22dd2) ], [ key name (down), key value (0xf00f2dd2) ] ].
And fourthly, comparing the user code in the target key value information with the user codes of each second alternative key value information in the second alternative key value information set to obtain a second user code comparison result set.
Specifically, the execution main body may compare the user code in the target key value information with the user codes of each second alternative key value information in the second alternative key value information set to obtain a second user code comparison result set. The comparing the user code in the target key value information with the user codes of the second alternative key value information in the second alternative key value information set may be to determine whether the user code in the target key value information is completely different from the user code of each second alternative key value information in the second alternative key value information set. The second user code comparison result may be that the user codes are completely different or that the user codes are partially the same.
As an example, the second user code comparison result set may be [ user code portions are the same, user code portions are the same ]. The user code in the above target key value information may be 4db 0. The user code of the above-mentioned second alternative key value information may be 4db 2.
And fifthly, in response to that the second user code comparison result set meets a fifth preset condition, correcting the user codes in the target key value information to obtain a user code correction result.
Specifically, the executing body may modify the user code in the target key value information in response to the second user code comparison result set meeting a fifth preset condition, so as to obtain a user code modification result. The fifth preset condition may be that existing data in the second user code comparison result set is a second user code comparison result with partially identical user codes. As an example, the user code correction result may be 4db 2.
Optionally, the user code includes a high byte and a low byte; the executing body may correct the user code in the target key value information to obtain a user code correction result, and may include the following substeps:
in response to that the user code in the target key value information meets an eighth preset condition, replacing a complement of a high-order byte in the user code in the target key value information with a low-order byte in the user code in the target key value information.
Specifically, the execution main body may replace, in response to that the user code in the target key value information satisfies an eighth preset condition, a complement of a higher byte in the user code in the target key value information with a lower byte in the user code in the target key value information. The eighth preset condition may be that a high-order byte in a user code in the target key value information is the same as a high-order byte in a user code in corresponding second candidate key value information in the second candidate key value information set, and a low-order byte in the user code in the target key value information is different from a low-order byte in a user code in corresponding second candidate key value information in the second candidate key value information set.
As an example, the user code in the above-described target key value information may be 4db 0. The user code in the corresponding second alternative key value information may be 4db 2. The upper byte in the user code in the target key value information may be 4 d. The upper byte in the user code in the second alternative key value information may be 4 d. The lower byte in the user code in the above-mentioned destination key value information may be b 0. The lower byte in the user code in the above-described second alternative key value information may be b 2. The complement of the upper byte in the user code in the above-mentioned destination key value information may be b 2. The lower byte in the user code in the replaced destination key value information may be b 2.
And a second substep, in response to that the user code in the target key value information meets a ninth preset condition, replacing a complement of a lower byte in the user code in the target key value information with a higher byte in the user code in the target key value information.
Specifically, the execution main body may replace, in response to that the user code in the target key value information satisfies a ninth preset condition, a complement of a lower byte in the user code in the target key value information with a higher byte in the user code in the target key value information. The ninth preset condition may be that a high-order byte in a user code in the target key value information is different from a high-order byte in a key value code in corresponding second candidate key value information in the second candidate key value information set, and a low-order byte in the key value code in the target key value information is the same as a low-order byte in the key value code in corresponding second candidate key value information in the second candidate key value information set.
As an example, the user code in the above-described target key value information may be 0bd 4. The user code in the corresponding second alternative key value information may be 2bd 4. The upper byte in the user code in the above target key value information may be 0 b. The upper byte in the key value code in the second alternative key value information may be 2 b. The lower byte in the user code in the destination key value information may be d 4. The lower byte in the key value code in the second alternative key value information may be d 4. The complement of the lower byte in the user code in the target key value information may be 2 b. The upper byte in the user code in the replaced destination key value information may be 2 b.
And sixthly, correcting the stop bit in the key value information of the target key based on the user code correction result to obtain a key value correction result.
Specifically, the execution body may correct a stop bit in the key value information of the target key based on the user code correction result to obtain a key value correction result. After the user code and the key value code in the target key value information are corrected, the condition of correcting the stop bit in the target key value information can be relaxed. And even if the length of the stop bit is not enough, the corrected target key value information is used as a key value correction result.
The optional content in step 202 and the optional content in step 204 are used as an inventive point of the embodiment of the present disclosure, and solve the second technical problem mentioned in the background art, that is, because interfered data is not considered, the recognition rate and the probability of correcting the infrared signal by the infrared signal receiving end are reduced, and further, the problem of invalid key values occurs. The factors that cause the low recognition rate of the infrared signal from the infrared signal receiving end are as follows: because the interfered data is not considered, the interfered data is discarded, and the data is lacked when the infrared signal receiving end corrects the infrared signal information, the possibility that the infrared signal receiving end corrects the infrared signal information is reduced, the infrared signal receiving end has a low infrared signal identification rate, and the problem that the key value of the key is invalid occurs. If the factors are solved, the interfered data are supplemented, the probability of correcting the infrared signal by the infrared signal receiving end is improved, and the problem of invalid key values of the keys can be solved. To this effect, the above step 202 and the above step 204 introduce a manner related to key value modification: data supplementary mode and high and low byte complementary mode. Firstly, in the process of analyzing the infrared signal by the infrared signal receiving end, if the data which is failed in analysis is regarded as interfered data, and the interfered data is supplemented, the data can be supplemented to be 0 or 1. This makes it possible to correct the infrared signal information without discarding the disturbed data but supplementing it. And then, comparing the analyzed target key value information with the key value information in the pre-acquired key value information set, wherein if the target key value information can be inquired in the pre-acquired key value information set, the target key value information is complete. If the target key value information cannot be inquired in the key value information set of the key acquired in advance, the target key value information is indicated to be missing and needs to be corrected. And finally, according to a high-low byte complementary mode, correcting the key value information of the target key, and respectively inquiring the user code and the high-low byte of the key value code in a pre-acquired key value information set of the key. If the high byte can be queried but the low byte cannot be queried, the low byte is corrected. The low byte is replaced with the complement of the high byte. The low byte data is thus derived from the correct high byte data. Furthermore, the interfered data is not discarded but supplemented, the probability of correcting the infrared signal by the infrared signal receiving end and the recognition rate of the infrared signal by the infrared signal receiving end are improved, and the problem of invalid key values of the keys is solved.
Optionally, in response to the presence, determining the target key value information as an analysis result; and sending the key value correction result or the analysis result to a terminal display screen for displaying.
Specifically, the execution main body may determine the target key value information as an analysis result in response to the key value information matching the target key value information in the key value information set. And sending the key value correction result or the analysis result to a terminal display screen for displaying.
The above embodiments of the present disclosure have the following advantages: according to the key value correction method of some embodiments of the disclosure, the key value of the key can be effectively corrected, and the infrared signal receiving terminal can receive the effective key value of the key, so that the anti-interference capability of the infrared signal receiving terminal is improved. Specifically, the reason why the interference rejection capability of the infrared signal receiving end is weak is that: at present, methods related to key value correction generally discard interfered data in an infrared analysis process, and lack key value comparison data, so that the anti-interference capability of an infrared signal receiving end is poor. Based on this, some embodiments of the present disclosure provide a key value correction method, which includes first obtaining a key value information set of a target remote controller and infrared signal information sent by the target remote controller. Because the key value information set of the key is obtained, when the data obtained by analyzing the infrared signal information is not matched with the key value information of the key in the key value information set, the infrared signal receiving end responds to the data obtained by analyzing, and therefore the problem of wrong response caused by interference of the infrared signal information is solved. And then, generating target key value information based on the infrared signal information. The generated target key value information is used for being compared with the key value information in the key value information set, and therefore whether the target key value information is valid key value information or not is judged. And then, determining whether the key value information matched with the target key value information exists in the key value information set. Therefore, the target key value information is compared with the key value information in the key value information set to obtain a comparison result. And finally, in response to the absence, correcting the key value information of the target key to obtain a key value correction result. And the key value information set does not have key value information matched with the target key value information, so that the target key value information is corrected, and a key value correction result is obtained. Optionally, in response to the presence, determining the target key value information as a resolution result. The key value information matched with the target key value information exists in the key value information set, and the generated target key value information is effective. And sending the key value correction result or the analysis result to a terminal display screen for displaying. And displaying the key value correction result or the analysis result on a terminal, so that related technicians can better see the correction effect. Because the key value comparison data is added, the key value is effectively corrected, so that the infrared signal receiving end can receive the effective key value, and the anti-interference capability of the infrared signal receiving end is improved.
With further reference to fig. 3, as an implementation of the above method for the above figures, the present disclosure provides some embodiments of a key value correction apparatus, which correspond to those of the method embodiments described above in fig. 2, and which may be applied in various electronic devices.
As shown in fig. 3, an apparatus 300 for key value modification of some embodiments includes: an acquisition unit 301, a generation unit 302, a determination unit 303, and a correction unit 304. The acquiring unit 301 is configured to acquire a key value information set of a target remote controller and infrared signal information sent by the target remote controller; a generating unit 302 configured to generate target key value information based on the infrared signal information; a determining unit 303 configured to determine whether there is key value information matching the target key value information in the set of key value information; and a correcting unit 304 configured to, in response to the absence, correct the target key value information to obtain a key value correction result.
It will be understood that the units described in the apparatus 300 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and advantages described above with respect to the method are also applicable to the apparatus 300 and the units included therein, and are not described herein again.
Referring now to FIG. 4, a block diagram of an electronic device (e.g., computing device 101 of FIG. 1)400 suitable for use in implementing some embodiments of the present disclosure is shown. The server shown in fig. 4 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 4, electronic device 400 may include a processing device (e.g., central processing unit, graphics processor, etc.) 401 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)402 or a program loaded from a storage device 408 into a Random Access Memory (RAM) 403. In the RAM403, various programs and data necessary for the operation of the electronic apparatus 400 are also stored. The processing device 401, the ROM 402, and the RAM403 are connected to each other through a bus 404. An input/output (I/O) interface 404 is also connected to bus 404.
Generally, the following devices may be connected to the I/O interface 404: input devices 406 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 407 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage devices 408 including, for example, magnetic tape, hard disk, etc.; and a communication device 409. The communication means 409 may allow the electronic device 400 to communicate wirelessly or by wire with other devices to exchange data. While fig. 4 illustrates an electronic device 400 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 4 may represent one device or may represent multiple devices, as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer-readable medium, the computer program comprising program code for performing the method illustrated by the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network through the communication device 409, or from the storage device 408, or from the ROM 402. The computer program, when executed by the processing device 401, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the apparatus; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring a key value information set of a key of a target remote controller and infrared signal information sent by the target remote controller; generating target key value information based on the infrared signal information; determining whether key value information matched with the target key value information exists in the key value information set; and in response to the target key value information does not exist, correcting the target key value information to obtain a key value correction result.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, which may be described as: a processor includes an acquisition unit, a generation unit, a determination unit, and a correction unit. The names of the units do not limit the units themselves in some cases, and for example, the acquiring unit may also be described as a "unit that acquires the key value information set of the keys of the target remote controller and the infrared signal information transmitted by the target remote controller".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), system on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), etc.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the technical method may be formed by replacing the above-mentioned features with (but not limited to) technical features having similar functions disclosed in the embodiments of the present disclosure.

Claims (9)

1. A key value correction method includes:
acquiring a key value information set of a target remote controller and infrared signal information sent by the target remote controller;
generating target key value information based on the infrared signal information;
determining whether key value information matched with the target key value information exists in the key value information set;
in response to the target key value information does not exist, correcting the target key value information to obtain a key value correction result;
the target key value information comprises a user code, a key value code and a stop bit, and the key value information comprises the user code and the key value code; and
the modifying the key value information of the target key to obtain a key value modification result comprises:
comparing the user code in the target key value information with the user codes of the key value information of all keys in the key value information set to obtain a first user code comparison result set;
determining a first user code comparison result meeting a second preset condition in the first user code comparison result set as an alternative user code comparison result to obtain an alternative user code comparison result set;
determining the key value information corresponding to each alternative user code comparison result in the alternative user code comparison result set as first alternative key value information to obtain a first alternative key value information set;
comparing the key value codes in the target key value information with the key value codes of each first alternative key value information in the first alternative key value information set to obtain a first key value code comparison result set;
in response to that the first key value code comparison result set meets a third preset condition, correcting the key value codes in the target key value information to obtain a key value code correction result;
and correcting the stop bit in the target key value information based on the key value code correction result to obtain a key value correction result.
2. The method of claim 1, wherein the method further comprises:
in response to the existence, determining the target key value information as an analysis result;
and sending the key value correction result or the analysis result to a terminal display screen for displaying.
3. The method of claim 1, wherein the generating target key value information based on the infrared signal information comprises:
analyzing the infrared signal information to obtain an analyzed data sequence;
correcting each analytic data in the analytic data sequence to generate corrected analytic data, so as to obtain a corrected analytic data sequence;
and performing numerical system conversion processing on the corrected analytic data sequence to obtain target key value information.
4. The method of claim 3, wherein the modifying each parsed data in the sequence of parsed data to generate modified parsed data comprises:
and responding to the analysis data meeting a first preset condition, and performing bit complementing processing on the analysis data to obtain bit complementing data serving as corrected analysis data.
5. The method of claim 4, wherein the modifying each parsed data in the sequence of parsed data to generate modified parsed data further comprises:
and in response to the analytic data not meeting the first preset condition, determining the analytic data as corrected analytic data.
6. The method of claim 1, wherein the modifying the key value information of the target key to obtain a key value modification result further comprises:
comparing key value codes in the target key value information with key value codes of all key value information in the key value information set to obtain a second key value code comparison result set;
determining a second key value code comparison result meeting a fourth preset condition in the second key value code comparison result set as an alternative key value code comparison result to obtain an alternative key value code comparison result set;
determining key value information corresponding to each alternative key value code comparison result in the alternative key value code comparison result set as second alternative key value information to obtain a second alternative key value information set;
comparing the user code in the target key value information with the user codes of each second alternative key value information in the second alternative key value information set to obtain a second user code comparison result set;
in response to that the second user code comparison result set meets a fifth preset condition, correcting the user codes in the target key value information to obtain a user code correction result;
and correcting the stop bit in the key value information of the target key based on the user code correction result to obtain a key value correction result.
7. The method of claim 1, wherein the key-value code includes upper and lower bytes; and
the modifying the key value code in the target key value information to obtain a key value code modification result includes:
in response to that the key value codes in the target key value information meet a sixth preset condition, replacing the complement codes of the high-order bytes in the key value codes in the target key value information with the low-order bytes in the key value codes in the target key value information;
and in response to that the key value codes in the target key value information meet a seventh preset condition, replacing the complement codes of the lower-order bytes in the key value codes in the target key value information with the higher-order bytes in the key value codes in the target key value information.
8. The method of claim 6, wherein the user code comprises upper bytes and lower bytes; and
the correcting the user code in the target key value information to obtain a user code correction result includes:
in response to that the user code in the target key value information meets an eighth preset condition, replacing a complement of a high-order byte in the user code in the target key value information with a low-order byte in the user code in the target key value information;
and in response to that the user code in the target key value information meets a ninth preset condition, replacing a complement of a lower byte in the user code in the target key value information with a higher byte in the user code in the target key value information.
9. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-8.
CN202011572926.XA 2020-12-24 2020-12-24 Key value correction method, device, equipment and computer readable medium Active CN113850988B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011572926.XA CN113850988B (en) 2020-12-24 2020-12-24 Key value correction method, device, equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011572926.XA CN113850988B (en) 2020-12-24 2020-12-24 Key value correction method, device, equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN113850988A CN113850988A (en) 2021-12-28
CN113850988B true CN113850988B (en) 2022-09-27

Family

ID=78972078

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011572926.XA Active CN113850988B (en) 2020-12-24 2020-12-24 Key value correction method, device, equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN113850988B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080095720A (en) * 2007-04-24 2008-10-29 삼성전자주식회사 Method for providing key code information and video apparatus thereof
CN102708671A (en) * 2012-05-18 2012-10-03 深圳市九洲电器有限公司 Transmitting method, receiving method, device and system for infrared remote control signal
CN203084539U (en) * 2013-02-28 2013-07-24 西安邮电大学 Intelligent household control system
CN105959765A (en) * 2016-06-30 2016-09-21 青岛海信宽带多媒体技术有限公司 Infrared remote controller-based terminal start control method and apparatus, and set top box
CN106297264A (en) * 2016-08-31 2017-01-04 杭州赫智电子科技有限公司 The coded method of the multiple ultra-red order of a kind of compatibility and system
CN107257504A (en) * 2017-07-06 2017-10-17 深圳Tcl数字技术有限公司 Key assignments update method, remote control and the readable storage medium storing program for executing of button in remote control
CN108322797A (en) * 2017-01-16 2018-07-24 阿里巴巴集团控股有限公司 A kind of response of key assignments and response configuration method, device, the device and operating system

Family Cites Families (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0678382A (en) * 1992-08-25 1994-03-18 Rohm Co Ltd Code generator for remote controller
US9532097B1 (en) * 2011-10-31 2016-12-27 The Directv Group, Inc. Method and system for controlling a controlled device with a remote control device through a display device
CN202422395U (en) * 2011-12-30 2012-09-05 北京朝歌数码科技股份有限公司 Dual-module learning-type remote control
CN103051417B (en) * 2012-11-30 2015-09-09 浙江西盈科技有限公司 A kind of fixing code length complementary type coding method for Infrared remote controller and coding/decoding method thereof
CN103686276A (en) * 2013-12-04 2014-03-26 乐视致新电子科技(天津)有限公司 Infrared remote controller code value conflict avoiding system and method
CN103942946B (en) * 2013-12-31 2017-10-13 海尔集团公司 Cloud Server for home wiring control
CN105118285B (en) * 2015-09-25 2018-09-25 广州视睿电子科技有限公司 The method and system of anti-interference infrared remote control decoding
CN105427577B (en) * 2015-11-23 2019-06-07 青岛海信电器股份有限公司 A kind of processing method of infrared data, processing unit and coding/decoding method
CN105979322A (en) * 2016-05-18 2016-09-28 深圳创维-Rgb电子有限公司 Intelligent television client modification method and system
CN108694826B (en) * 2018-06-28 2020-06-05 浙江嘉科电子有限公司 Infrared encoding and decoding method
CN109872522B (en) * 2019-03-25 2021-01-01 河北棣烨信息技术有限公司 Algorithm for decompressing infrared code based on sample index

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080095720A (en) * 2007-04-24 2008-10-29 삼성전자주식회사 Method for providing key code information and video apparatus thereof
CN102708671A (en) * 2012-05-18 2012-10-03 深圳市九洲电器有限公司 Transmitting method, receiving method, device and system for infrared remote control signal
CN203084539U (en) * 2013-02-28 2013-07-24 西安邮电大学 Intelligent household control system
CN105959765A (en) * 2016-06-30 2016-09-21 青岛海信宽带多媒体技术有限公司 Infrared remote controller-based terminal start control method and apparatus, and set top box
CN106297264A (en) * 2016-08-31 2017-01-04 杭州赫智电子科技有限公司 The coded method of the multiple ultra-red order of a kind of compatibility and system
CN108322797A (en) * 2017-01-16 2018-07-24 阿里巴巴集团控股有限公司 A kind of response of key assignments and response configuration method, device, the device and operating system
CN107257504A (en) * 2017-07-06 2017-10-17 深圳Tcl数字技术有限公司 Key assignments update method, remote control and the readable storage medium storing program for executing of button in remote control

Also Published As

Publication number Publication date
CN113850988A (en) 2021-12-28

Similar Documents

Publication Publication Date Title
CN111198813B (en) Interface testing method and device
CN108874825B (en) Abnormal data verification method and device
CN114928574B (en) Information transmission method, apparatus, electronic device, and computer-readable medium
CN112311720B (en) Data transmission method and device
CN112995199B (en) Data encoding and decoding method, device, transmission system, terminal equipment and storage medium
CN112905930A (en) Interface request retransmission method and device
CN114461247A (en) Hot update method, device, electronic equipment and computer readable medium
CN113850988B (en) Key value correction method, device, equipment and computer readable medium
CN114067800A (en) Voice recognition method and device and electronic equipment
CN112803950A (en) Data compression method, device and equipment and computer storage medium
CN112203103B (en) Message processing method, device, electronic equipment and computer readable storage medium
CN112507676B (en) Method and device for generating energy report, electronic equipment and computer readable medium
CN115016823A (en) Target software upgrading method, device, electronic equipment, medium and program product
CN114490718A (en) Data output method, data output device, electronic equipment and computer readable medium
CN111221424B (en) Method, apparatus, electronic device, and computer-readable medium for generating information
CN111460020B (en) Method, device, electronic equipment and medium for resolving message
CN110874308B (en) Method and device for generating unique value
CN114090103A (en) Form generation method and device, electronic equipment and computer readable medium
CN111680754A (en) Image classification method and device, electronic equipment and computer-readable storage medium
CN112311833B (en) Data updating method and device
CN115348320B (en) Communication data conversion method and device and electronic equipment
CN116702168B (en) Method, device, electronic equipment and computer readable medium for detecting supply end information
CN117130719A (en) Data source switching method, device, electronic equipment and computer readable medium
CN117632557A (en) Program interface exception handling method, apparatus, device and computer readable medium
CN113761339A (en) User intention information generation method, device, equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant