CN117406871A - Key control method and device, electronic equipment and storage medium - Google Patents

Key control method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN117406871A
CN117406871A CN202311354556.6A CN202311354556A CN117406871A CN 117406871 A CN117406871 A CN 117406871A CN 202311354556 A CN202311354556 A CN 202311354556A CN 117406871 A CN117406871 A CN 117406871A
Authority
CN
China
Prior art keywords
key
remapping
operable
operable key
target application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311354556.6A
Other languages
Chinese (zh)
Inventor
刘张超
张俊莲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hefei Lianbao Information Technology Co Ltd
Original Assignee
Hefei Lianbao Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hefei Lianbao Information Technology Co Ltd filed Critical Hefei Lianbao Information Technology Co Ltd
Priority to CN202311354556.6A priority Critical patent/CN117406871A/en
Publication of CN117406871A publication Critical patent/CN117406871A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/02Input arrangements using manually operated switches, e.g. using keyboards or dials
    • G06F3/023Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Computer Interaction (AREA)
  • Input From Keyboards Or The Like (AREA)

Abstract

The invention discloses a key control method, a device, electronic equipment and a storage medium, and relates to the technical field of data processing, wherein the method comprises the following steps: the method comprises the steps that the electronic equipment runs a target application, and a first target function of a first operable key under the target application is executed in response to an operation event aiming at the first operable key; receiving a conversion instruction, and responding to an operation event aiming at a second operable key, and executing a second target function of the second operable key under the target application; the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different. According to the method, the function of the shortcut key formed by the plurality of keys defined in the target application can be realized through the existing operable key on the keyboard, and the use experience and the use efficiency of the keyboard are improved.

Description

Key control method and device, electronic equipment and storage medium
Technical Field
The disclosure relates to the technical field of data processing, and in particular relates to a key control method, a key control device, electronic equipment and a storage medium.
Background
Some applications are provided with shortcuts. A shortcut key is typically a combination of a set of keys for performing a particular operation or function. However, pressing multiple keys simultaneously causes inconvenience to the user, and it is difficult to remember all the shortcuts.
The existing solution is to set up several independent keys. The user may define a shortcut function for each individual key. And then realizing the function of the shortcut key through the independent key. However, this method requires an increased number of keys, which increases hardware costs. And after an independent key is bound with a shortcut key, the functions of the independent key are not changed, the implementation mode is inflexible, and the application occasion is limited.
Disclosure of Invention
The disclosure provides a key control method, a key control device, electronic equipment and a storage medium, so as to at least solve the technical problems in the prior art.
According to a first aspect of the present disclosure, there is provided a key control method, the method including: the method comprises the steps that the electronic equipment runs a target application, and a first target function of a first operable key under the target application is executed in response to an operation event aiming at the first operable key; receiving a conversion instruction, and responding to an operation event aiming at a second operable key, and executing a second target function of the second operable key under the target application; the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different.
In an embodiment, the executing, in response to an operation event for a second operable key, a second target function of the second operable key under the target application includes: determining a remapped key value of a second operable key under the target application in response to an operation event for the second operable key; and executing the second target function based on the remapped key value.
In an embodiment, the determining the remapped key value of the second operable key under the target application includes: determining an identification code of the target application; screening out a remapping configuration table aiming at the target application according to the identification code in a remapping global configuration table, wherein the remapping global configuration table comprises remapping configuration tables of a plurality of applications; a remap key value of the second operable key under the target application is determined based on a remap configuration table for the target application.
In an embodiment, the method further comprises: determining, for each application, a remapping configuration table for each application, wherein each remapping configuration table comprises remapping information for at least one operating key; and integrating the remapping configuration tables of the applications to obtain the remapping global configuration table.
In an embodiment, the determining, based on a remapping configuration table for the target application, a remapping key value of the second operable key under the target application includes: determining whether remapping information of the second operable key is included in a remapping configuration table of the target application; and if so, determining the remapping key value of the second operable key according to the remapping information of the second operable key.
In an embodiment, the method further comprises: and responding to the display instruction, and displaying the remapping configuration table of the target application.
In an embodiment, the determining the remapping configuration table for each application includes: responding to the editing request, and displaying a man-machine interaction editing interface; and receiving remapping information aiming at each application through the man-machine interaction editing interface, and obtaining a remapping configuration table of each application based on the remapping information of each application.
According to a second aspect of the present disclosure, there is provided a key control device, characterized by comprising: the first response module is used for running a target application by the electronic equipment, and responding to an operation event aiming at a first operable key, and executing a first target function of the first operable key under the target application; the second response module is used for receiving a conversion instruction and responding to an operation event aiming at a second operable key to execute a second target function of the second operable key under the target application; the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different.
According to a third aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the methods described in the present disclosure.
According to a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of the present disclosure.
According to the key control method, the device, the electronic equipment and the storage medium, when the electronic equipment runs the target application, a first target function of a first operable key under the target application is executed in response to an operation event aiming at the first operable key, after a conversion instruction is received, a second target function of a second operable key under the target application is executed in response to an operation event aiming at the second operable key, wherein the first operable key and the second operable key are the same operable key, and the first target function and the second target function are different.
By applying the method, the user can realize the function of the shortcut key of the target application by only remembering and pressing one operable key, and the combination of a plurality of keys is not needed to be remembered and pressed, so that the keyboard is more convenient to use, the office efficiency of the user can be improved, the memory burden of the user on a plurality of groups of shortcut keys is reduced, and the use experience of the user on the keyboard can be improved. Compared with the method that a plurality of keys are additionally arranged for realizing the function of the shortcut key in the prior art, the method only needs to use the existing keys in the keyboard, does not need to add additional keys, and saves hardware cost. The second target function of the second operable key in the method corresponds to the target application, namely the second target function can be changed according to different target applications, so that the second target function is applicable to different use scenes, and the implementation mode is more flexible.
Drawings
The above, as well as additional purposes, features, and advantages of exemplary embodiments of the present disclosure will become readily apparent from the following detailed description when read in conjunction with the accompanying drawings. Several embodiments of the present disclosure are illustrated by way of example, and not by way of limitation, in the figures of the accompanying drawings, in which:
in the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
Fig. 1 is a schematic diagram illustrating an implementation flow of a key control method according to an embodiment of the disclosure;
FIG. 2 illustrates a schematic diagram of a remapping global configuration table in accordance with an embodiment of the present disclosure;
FIG. 3 illustrates a schematic diagram of a remapping configuration table in accordance with an embodiment of the present disclosure;
fig. 4 is a schematic diagram showing a composition structure of a key control device according to an embodiment of the present disclosure;
fig. 5 shows a schematic diagram of a composition structure of an electronic device according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, features and advantages of the present disclosure more comprehensible, the technical solutions in the embodiments of the present disclosure will be clearly described in conjunction with the accompanying drawings in the embodiments of the present disclosure, and it is apparent that the described embodiments are only some embodiments of the present disclosure, but not all embodiments. Based on the embodiments in this disclosure, all other embodiments that a person skilled in the art would obtain without making any inventive effort are within the scope of protection of this disclosure.
According to a first aspect of the embodiments of the present disclosure, a key control method is provided, and fig. 1 shows a schematic implementation flow diagram of the key control method according to the embodiments of the present disclosure, as shown in fig. 1, where the method includes:
in step 101, the electronic device runs a target application, and in response to an operation event for the first operable key, executes a first target function of the first operable key under the target application.
Step 102, receiving a conversion instruction, and responding to an operation event aiming at a second operable key, and executing a second target function of the second operable key under a target application; the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different.
It should be noted that, the electronic device in the present application is configured with a keyboard for inputting characters, commands and performing various operations. The keyboard may be a built-in keyboard of the electronic device or an external keyboard connected to the electronic device through an interface. The first operable key in step 101 and the second operable key in step 102 are the same operable key on the keyboard, which may be any key in a physical keyboard. In order that different functions of the same operable key can be more clearly described and distinguished, an operable key for realizing a first target function is defined as a first operable key, and an operable key for realizing a second target function is defined as a second operable key. Physically, the first operable key and the second operable key are the same key. The operable keys can be selected and set from all keys according to the use requirement of a user, such as a numeric key 1, an alphabetic key A and the like.
In step 101, it may be understood that the electronic device may simultaneously run a plurality of applications, and the target application is an application with which the current user is interacting. The electronic device may be a desktop computer, a notebook computer, a tablet computer, or the like.
The operational event of the operable key includes a key pressed event, a key released event, and the like. The operational events of the operable keys may be monitored by a keyboard controller in the electronic device. The first target function is an original function of the operable key, and the original function refers to standard operation or character generated after the first operable key is pressed when the operable key is the first operable key, wherein the standard operation or character is determined according to the keyboard layout and the setting of an operating system. For example, if the operable key is the number key 1, the corresponding first target function is "typing the character 1".
In one embodiment, the keyboard controller may be an EC (Embedded Controller ) in an electronic device.
Step 101 is specifically described by taking the case that the operable key is the number key 1 and the target application is document editing software as an example:
the electronic device is running a plurality of applications in which the user is currently using the document editing software. If the user presses the number key 1 (first operable key), an electrical signal is generated to indicate that the number key 1 is pressed. Once the keyboard controller monitors the electric signal, the keyboard controller determines key information corresponding to the electric signal, wherein the key information is usually a key value of a key, and transmits the key information to an operating system. The operating system receives key information from the keyboard controller and then interprets the key information as a corresponding character, here a character "1", according to the internal mechanisms of the operating system. The operating system then sends the character "1" to the document editing software. After the document editing software receives the character "1", it performs a first target function of inserting the character "1" at the cursor position in the document currently being edited.
In step 102, the conversion instruction is a command sent by the user to the electronic device, and is used for instructing the electronic device to convert the operable key from realizing the first target function to realizing the second target function. And after receiving the conversion instruction, if the operation event of the (second) operable key is monitored, executing the second target function of the (second) operable key. The second target function is a custom function of the operable keys. The user-defined function is that the user maps key values of other keys or shortcut keys to the operable keys according to own requirements or habits, so that the operable keys realize functions of the other keys or shortcut keys. For example, the first target function, i.e., the original function, of a certain operable key is "input letter a", and the user can map the key value corresponding to the function "input letter B" onto the operable key as the custom function, i.e., the second target function, of the operable key. Thus, the original function ("input letter a") of the operable key can be achieved through the aforementioned step 101. The aforementioned custom function ("enter letter B") may be implemented by the aforementioned step 102.
In the method, the second target function of the second operable key corresponds to the target application. I.e. the second target function of the second operable key may change as the target application changes. Specifically, the method can be realized by configuring a corresponding remapping configuration table for each application program, and defining a second target function of the operable key under the application program in each remapping configuration table. For example, when the target application is image editing software, the operable key is the digital key 1, and the second target function may be the corresponding function "redo the previous action" of the shortcut key "ctrl+shift+z" according to the remapping configuration table corresponding to the image editing software; when the target application is document editing software, it may be determined that the corresponding function "set the selected letter as uppercase" of the shortcut key "ctrl+shift+a" may be the second target function at this time according to the remapping configuration table corresponding to the document editing software.
Continuing with the above example one, the step 102 is specifically described taking the case where the operable key is the numeric key 1 (the original function of the key 1 is to input the character "1") and the target application is the document editing software:
let us assume that the function "save document" of the shortcut key "ctrl+s" is set as the second target function of the operable key. After receiving the conversion instruction, if the keyboard controller monitors that the number key 1 is pressed, the keyboard controller determines a remapping key value corresponding to the second target function and sends the remapping key value to the operating system. The operating system receives the remapped key value, recognizes that the operation of storing the document needs to be executed, namely, sends a command to the document editing software, and requires the command to execute the operation of storing, thereby realizing the second target function of the digital key 1 and the function of storing the document.
By applying the method, on one hand, the user can realize the function of the shortcut key formed by a plurality of keys defined in the target application by only memorizing and pressing one operable key, and the combination of the plurality of keys is not required to be memorized and pressed, so that the keyboard is more convenient to use, and the office efficiency of the user can be improved. And the memory burden of the user on a plurality of groups of shortcut keys is reduced, and the use experience of the user on the keyboard can be improved. Compared with the method that a plurality of keys are additionally arranged for realizing the function of the shortcut key in the prior art, the method only needs to use the existing keys in the keyboard, does not need to add additional keys, and saves hardware cost. The second target function of the second operable key in the method corresponds to the target application, namely the second target function can be changed according to different target applications, so that the second target function is applicable to different use scenes, and the implementation mode is more flexible. On the other hand, if damaged keys exist in the keyboard, the functions of the damaged keys can be realized through other keys, a new keyboard is not required to be replaced, and the equipment cost is saved.
In one embodiment, the receiving the conversion instruction in the method may be specifically implemented by the following ways: on the basis of the existing keyboard hardware, an auxiliary key is added for receiving a conversion instruction of a user. The auxiliary key is provided with an indicator light. When the indicator light is on, the representation that the operable key is the first operable key at the moment can realize the first target function. And when the indicator light is not turned on, the representation that the operable key is the second operable key at the moment can realize the second target function. That is, under normal conditions (or default conditions), the indicator light is not turned on, the operable key performs the first target function, and after the user presses the auxiliary key, the indicator light is turned on, at which time the operable key performs the second target function.
The method is characterized in that an auxiliary key is added on the basis of the existing hardware of the keyboard and is used for realizing the switching between different functions of the operable keys. The user can switch the first target function and the second target function of the operable key only by pressing the auxiliary key, and the operation is simple and convenient. The state of the indicator light on the auxiliary key can clearly inform the user that the current function to be executed by the operable key is the first target function or the second target function, and error operation of the user can be reduced.
In one embodiment, in response to an operation event for a second operable key, performing a second target function of the second operable key under the target application, comprising: determining a remapped key value of the second operable key under the target application in response to an operation event for the second operable key; based on the remapped key value, a second target function is performed.
Each key on the keyboard has a unique key value that is the original key value of the key. The original key value is a standard identifier of the key under the default keyboard layout and configuration, and is used for helping the operating system and the application program distinguish different keys, so as to execute the original function of the key, namely, the first target function. The remapped key value is an identification of other keys or shortcuts assigned to keys by the user or the system for performing the functions of the other keys or shortcuts, i.e. the second target function.
Specifically, if a second operable key pressing event is detected, determining a remapping key value corresponding to the second operable key through the keyboard controller, then sending the remapping key value to the operating system, and after the operating system analyzes the remapping key value, notifying the target application to execute the second target function.
For example, the number key 1 corresponds to the original key value of "49", and the original function is "input number 1". The original key value corresponding to the numeric key 2 is "50", and the original function is "input number 2". Assuming number key 1 is used as an operable key, the original function of number key 2 is remapped to number key 1 as a custom function of number key 1. The original key value corresponding to the operable key is "49" and the remapped key value is "50". When the second operable key is detected to be pressed, it is determined that the remapped key value of the second operable key is "50", and the remapped key value is transmitted to the target application, which performs the second target function, i.e. "input number 2".
In one embodiment, determining the remapped key value of the second operable key under the target application includes: determining an identification code of the target application; screening out a remapping configuration table aiming at a target application according to the identification code in the remapping global configuration table, wherein the remapping global configuration table comprises remapping configuration tables of a plurality of applications; the remapped key value of the second operable key under the target application is determined based on the remapped configuration table for the target application.
The identification code of the target application is a code for uniquely identifying the target application, and may be an ID (Identity document, identity) of the target application. The remapping global configuration table comprises remapping configuration tables of a plurality of application programs, and the remapping configuration table corresponding to the target application can be searched in the remapping global configuration table based on the identification codes of the application programs. The remapping configuration table includes remapping information for the operable keys, the remapping information being which shortcut key or key value of other key is mapped to which operable key.
Fig. 2 is a schematic diagram of a remapping global configuration table according to an embodiment of the disclosure, as shown in fig. 2, where the remapping global configuration table includes n APPs, where n APPs are APP1, APP2, APP3 to APPn, respectively. Wherein APP1, APP2, APP3 to APPn are identification codes of the respective applications. Specifically, the keyboard management software may determine an identification code of a target application currently running on the electronic device, and then send the identification code to the keyboard controller, where the keyboard controller may find a remapping configuration table of the target application in the remapping global configuration table according to the identification code. The keyboard controller then determines the remapped key value of the second operable key based on the configuration information in the remapped configuration table.
In an alternative embodiment, the keyboard management software may be a separate software or a functional module embedded in the management software of the electronic device.
For example, if the definition in the remapping configuration table corresponding to the image editing software: redefining the key value of the shortcut key "ctrl+shift+z" of "repeat last action" onto the numeric key "1". The remap configuration table corresponding to the text editing software is defined as follows: the key value of the shortcut key "ctrl+shift+a" with the "selected letter set to uppercase" is redefined onto the numeric key "1". And after receiving the conversion instruction, if the current target application is detected to be the image editing software, and after the digital key 1 is pressed, executing the repeated last action in the image editing software. If the target application switches to the text editing software, after pressing the number key "1", the "set the selected letter as uppercase" is executed in the text editing software.
In the method, different application programs are configured with different remapping configuration tables, and when the application programs are opened or switched, the remapping configuration tables corresponding to the target application are automatically selected according to the identification codes of the target application, so that a second target function of the operable key is realized. When the application program is replaced, the configuration for a new application program is not needed, and the flexibility is high.
In one embodiment, the method further comprises: determining, for each application, a remapping configuration table for each application, wherein each remapping configuration table comprises remapping information for at least one operating key; and integrating the remapping configuration tables of the applications to obtain a remapping global configuration table.
And according to the use requirement and preference of the user for each application program, a corresponding remapping configuration table is formulated for each application program. The remapping configuration table comprises remapping information of at least one operation key, and the remapping information of the operation key comprises the function of which shortcut key or key is remapped to the operation key as a custom function of the operation key. The remapping information may also include remark specifications for custom functions.
Taking the remapping configuration table for determining the document editing software as an example for explanation, if the user uses the document editing software to make the use frequency of shortcut keys such as shortcut keys "ctrl+s", "ctrl+b", "ctrl+enter", "alt+ctrl+i" higher and the shortcut keys are combinations of a plurality of keys and are not easy to operate when being pressed at the same time, the functions of the shortcut keys are mapped to the digital keys 1, 2, 3 and 4 respectively, so as to form the remapping configuration table shown in fig. 3. The method comprises the steps of determining the remapping configuration tables of a plurality of application programs, and integrating the remapping configuration tables of all the application programs to form a remapping global configuration table.
Since each application involves different tasks and operations, the shortcuts defined under the different applications are also different. Therefore, in the application, the remapping relation between the operable key and different shortcut keys is set for each application, so that the second target function of the operable key corresponds to the shortcut key defined under the target application under different target applications, and the method is applicable to various application scenes.
In an embodiment, the method further comprises: and responding to the display instruction, and displaying the remapping configuration table of the target application.
The display instruction is a command sent by the user to view the remapping configuration tables of the target application. And after receiving the display instruction, displaying the remapping configuration table of the target application on a screen for reference by a user. The method can be realized by the auxiliary key, for example, long pressing for more than 2 seconds is to send a display instruction. And if the electronic equipment detects that the auxiliary key is pressed and the time is 2 seconds, displaying a remapping configuration list of the target application on a screen.
If the configuration list of an application program has more remapping information of the operable keys defined in the configuration list, the user is not easy to remember, so that the method of displaying the remapping information of the remapping configuration list on the application program interface is adopted for reference with the user, and the use experience of the user is improved.
In one embodiment, determining the remap key value of the second operable key under the target application based on the remap configuration table for the target application includes: determining whether remapping information of the second operable key is included in the remapping configuration table of the target application; if so, determining the remapping key value of the second operable key according to the remapping information of the second operable key.
After the keyboard controller monitors the electric signal generated after the operable key is pressed, which key is currently pressed when the operable key is pressed can be determined according to the electric signal, then whether remapping information of the operable key is included in a remapping table of a target application is searched, if yes, a key value corresponding to the remapped key corresponding to the operable key is determined according to the remapping information, and then the key value is used as a remapping key value of the operable key. If not, prompt information such as 'the key is not defined with a custom function' and the like can be displayed on the screen.
In one embodiment, determining the remapping configuration tables for each application includes: responding to the editing request, and displaying a man-machine interaction editing interface; and receiving remapping information aiming at each application through a man-machine interaction editing interface, and obtaining a remapping configuration table of each application based on the remapping information of each application.
The remapping configuration table may be custom edited by a user, at least by two ways. Pathway one: the user opens keyboard management software, such as real-time rendering software, a computer manager and the like, and the electronic equipment receives remapping information edited by the user aiming at each application program through a man-machine interaction editing interface of the keyboard management software and synchronizes the remapping information to the keyboard controller, and then obtains and stores a remapping configuration table of each application program.
Pathway two: the user can enter the editing state through the auxiliary key, and then the user presses the key to be remapped and the remapped key respectively. The keyboard controller obtains remapping information according to the keys selected by the user and synchronizes to the keyboard control software, and then obtains and stores the remapping configuration table of each application program.
The method can enable the user to carry out custom editing on the remapping configuration table through keyboard management software or auxiliary keys, and the editing mode is simple and easy to operate. The user can carry out self-defined setting on the remapping configuration table according to own use requirement or preference, so that the keys on the keyboard are more in line with the use habit of each user, and the use efficiency of the user is further improved.
From the foregoing, it can be known that the auxiliary key is an independent key, and functions and descriptions of the auxiliary key are as follows:
1. one click on the auxiliary key. The corresponding functions are as follows: the operable key is instructed to switch from implementing the first target function to executing the second target function, or the operable key is instructed to switch from implementing the second target function to executing the first target function. Status of indicator lights on auxiliary keys: the indicator light is normally on or the indicator light is normally off.
2. The auxiliary key is continuously double-clicked. The corresponding functions are as follows: entering the edit remap configuration table state, or exiting the edit remap configuration table state. Status of indicator lights on auxiliary keys: the indicator light is normally on or the indicator light is normally off.
3. Pressing the auxiliary key for more than 2 seconds: . The corresponding functions are as follows: and pressing the auxiliary key and continuing to display the state for more than 2 seconds, and displaying a remapping configuration table corresponding to the current target application on the screen in the form of floating characters. When the auxiliary key is released, the display disappears. Status of indicator lights on auxiliary keys: the indicator light is normally on.
In summary, the present application can mainly solve the following problems:
1. according to the method and the device, the functions of the shortcut keys formed by the plurality of keys are mapped to one operable key, so that a user can press one operable key to realize the functions of the shortcut keys. The method solves the problems that when a user uses the shortcut keys, the combination of various shortcut keys is difficult to remember, and when the user uses the shortcut keys, a plurality of keys are required to be pressed simultaneously, so that the operation is difficult.
2. According to the method and the device, the functions of the shortcut keys are mapped to the existing keys in the keyboard, so that the keys can realize the original functions of the keys and the functions of the self-defined shortcut keys, and other keys for realizing the functions of the shortcut keys are not required to be additionally arranged. The problem of need set up a plurality of independent buttons, the hardware cost is high in prior art is solved.
3. By providing different remapping configuration tables for different application programs, the second target function of an operable key under each application program is defined in the remapping configuration table of each application program. When the target application is switched, the corresponding remapping configuration table under the current target application is automatically selected to realize the corresponding second target function of the operable key under the current target program. The problem of in prior art after a button binds with the shortcut key, its function can not change again, the realization mode is inflexible, the use occasion is restricted is solved.
According to another aspect of the present disclosure, there is provided a key control device, fig. 4 shows a schematic diagram of a composition structure of a key control device according to an embodiment of the present disclosure, and as shown in fig. 4, the device includes:
a first response module 401, configured to run a target application by the electronic device, and execute a first target function of the first operable key under the target application in response to an operation event for the first operable key;
a second response module 402, configured to receive a conversion instruction, and execute a second target function of the second operable key under the target application in response to an operation event for the second operable key;
the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different.
In one embodiment of the present disclosure, the second response module 402 is further configured to determine a remapped key value of the second operable key under the target application in response to an operation event for the second operable key; based on the remapped key value, a second target function is performed.
In one embodiment of the present disclosure, the second response module 402 is further configured to determine an identification code of the target application; in the remapping global configuration table, a remapping configuration table aiming at a target application is screened according to the identification code, wherein the remapping global configuration table comprises remapping configuration tables of a plurality of applications: the remapped key value of the second operable key under the target application is determined based on the remapped configuration table for the target application.
In one embodiment of the present disclosure, the apparatus further comprises: a determining module (not shown in the figure) for determining, for each application, a remapping configuration table for each application, wherein each remapping configuration table comprises remapping information for at least one operation key; and integrating the remapping configuration tables of the applications to obtain a remapping global configuration table.
In one embodiment of the present disclosure, the second response module 402 is further configured to determine whether the remapping configuration table of the target application includes remapping information of the second operable key; if so, determining the remapping key value of the second operable key according to the remapping information of the second operable key.
In one embodiment of the present disclosure, the apparatus further comprises: a display module (not shown in the figure) for displaying the remapping configuration table of the target application in response to the display instruction.
In one embodiment of the present disclosure, the determining module (not shown in the figures) is further configured to display a human-computer interaction editing interface in response to the editing request; and receiving remapping information aiming at each application through a man-machine interaction editing interface, and obtaining a remapping configuration table of each application based on the remapping information of each application.
Fig. 5 illustrates a schematic block diagram of an example electronic device 500 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 5, the apparatus 500 includes a computing unit 501 that can perform various suitable actions and processes according to a computer program stored in a Read Only Memory (ROM) 502 or a computer program loaded from a storage unit 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the device 500 can also be stored. The computing unit 501, ROM 502, and RAM 503 are connected to each other by a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Various components in the device 500 are connected to the I/O interface 505, including: an input unit 506 such as a keyboard, a mouse, etc.; an output unit 507 such as various types of displays, speakers, and the like; a storage unit 508 such as a magnetic disk, an optical disk, or the like; and a communication unit 509 such as a network card, modem, wireless communication transceiver, etc. The communication unit 509 allows the device 500 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The computing unit 501 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 501 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The calculation unit 501 performs the respective methods and processes described above, for example, a detection method of an image capturing apparatus. For example, in some embodiments, a method of detecting an image acquisition device may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as the storage unit 508. In some embodiments, part or all of the computer program may be loaded and/or installed onto the device 500 via the ROM 502 and/or the communication unit 509. When the computer program is loaded into the RAM 503 and executed by the computing unit 501, one or more steps of the detection method of one image capturing apparatus described above may be performed. Alternatively, in other embodiments, the computing unit 501 may be configured to perform a detection method of the image acquisition device by any other suitable means (e.g. by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuitry, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems-on-a-chip (SOCs), complex Programmable Logic Devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server incorporating a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel or sequentially or in a different order, provided that the desired results of the technical solutions of the present disclosure are achieved, and are not limited herein.
Furthermore, the terms "first," "second," and the like, are used for descriptive purposes only and are not to be construed as indicating or implying a relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In the description of the present disclosure, the meaning of "a plurality" is two or more, unless explicitly defined otherwise.
The foregoing is merely specific embodiments of the disclosure, but the protection scope of the disclosure is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the disclosure, and it is intended to cover the scope of the disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. A key control method, the method comprising:
the method comprises the steps that the electronic equipment runs a target application, and a first target function of a first operable key under the target application is executed in response to an operation event aiming at the first operable key;
receiving a conversion instruction, and responding to an operation event aiming at a second operable key, and executing a second target function of the second operable key under the target application;
wherein the first operable key and the second operable key are the same operable key and are a single operable key; the first target function and the second target function are different.
2. The method of claim 1, wherein the executing a second target function of a second operable key under the target application in response to an operation event for the second operable key comprises:
determining a remapped key value of a second operable key under the target application in response to an operation event for the second operable key;
and executing the second target function based on the remapped key value.
3. The method of claim 2, the determining a remapped key value of the second operable key under the target application comprising:
determining an identification code of the target application;
screening out a remapping configuration table aiming at the target application according to the identification code in a remapping global configuration table, wherein the remapping global configuration table comprises remapping configuration tables of a plurality of applications;
a remap key value of the second operable key under the target application is determined based on a remap configuration table for the target application.
4. A method according to claim 3, characterized in that the method further comprises:
determining, for each application, a remapping configuration table for each application, wherein each remapping configuration table comprises remapping information for at least one operating key;
and integrating the remapping configuration tables of the applications to obtain the remapping global configuration table.
5. The method of claim 3 or 4, wherein the determining the remapped key value of the second operable key under the target application based on the remapped configuration table for the target application comprises:
determining whether remapping information of the second operable key is included in a remapping configuration table of the target application;
and if so, determining the remapping key value of the second operable key according to the remapping information of the second operable key.
6. The method according to claim 3 or 4, characterized in that the method further comprises:
and responding to the display instruction, and displaying the remapping configuration table of the target application.
7. The method of claim 4, wherein determining a remapping configuration table for each application comprises:
responding to the editing request, and displaying a man-machine interaction editing interface;
and receiving remapping information aiming at each application through the man-machine interaction editing interface, and obtaining a remapping configuration table of each application based on the remapping information of each application.
8. A key control device, the device comprising:
the first response module is used for running a target application by the electronic equipment, and responding to an operation event aiming at a first operable key, and executing a first target function of the first operable key under the target application;
the second response module is used for receiving a conversion instruction and responding to an operation event aiming at a second operable key to execute a second target function of the second operable key under the target application;
the first operable key and the second operable key are the same operation key and are single operation keys; the first target function and the second target function are different.
9. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
10. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1-7.
CN202311354556.6A 2023-10-18 2023-10-18 Key control method and device, electronic equipment and storage medium Pending CN117406871A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311354556.6A CN117406871A (en) 2023-10-18 2023-10-18 Key control method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311354556.6A CN117406871A (en) 2023-10-18 2023-10-18 Key control method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN117406871A true CN117406871A (en) 2024-01-16

Family

ID=89497479

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311354556.6A Pending CN117406871A (en) 2023-10-18 2023-10-18 Key control method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN117406871A (en)

Similar Documents

Publication Publication Date Title
CN109062479B (en) Split screen application switching method and device, storage medium and electronic equipment
US8384566B2 (en) Pressure-sensitive keyboard and associated method of operation
CN104571832A (en) Mobile terminal and control system and method thereof
CN111638823B (en) Application icon display method and device and electronic equipment
US20170068374A1 (en) Changing an interaction layer on a graphical user interface
US20030223182A1 (en) Information processing apparatus and window size control method used in the same unit
US8555191B1 (en) Method, system, and apparatus for keystroke entry without a keyboard input device
CN111857497B (en) Operation prompting method and electronic equipment
CN116483246A (en) Input control method and device, electronic equipment and storage medium
US6018336A (en) Computer system having digitizing tablet
CN112698735A (en) Information input method and device and electronic equipment
CN108920072A (en) Electronic device touchscreen control method, device, electronic equipment and storage medium
CN109857298B (en) Application starting method, device, equipment and storage medium
CN118131919A (en) Keyboard control method, device, system and storage medium
US20110227830A1 (en) Method and apparatus for safe disconnection of external devices from a computer
CN116149515A (en) Control method and electronic equipment
CN117406871A (en) Key control method and device, electronic equipment and storage medium
US20200050314A1 (en) Touch sensing method, electronic device and non-transitory computer readable recording medium device
US20190302952A1 (en) Mobile device, computer input system and computer readable storage medium
CN112162689B (en) Input method and device and electronic equipment
CN113126780A (en) Input method, input device, electronic equipment and readable storage medium
WO2018209464A1 (en) Contact list control method and terminal
CN116009849B (en) Graphic interface display method and device based on visual programming platform
CN111045638B (en) Cursor control method and device, storage medium and terminal
CN114489858B (en) Application software information setting method and device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination