CN110275623B - Method and device for triggering key values of keys - Google Patents
Method and device for triggering key values of keys Download PDFInfo
- Publication number
- CN110275623B CN110275623B CN201810215617.3A CN201810215617A CN110275623B CN 110275623 B CN110275623 B CN 110275623B CN 201810215617 A CN201810215617 A CN 201810215617A CN 110275623 B CN110275623 B CN 110275623B
- Authority
- CN
- China
- Prior art keywords
- key value
- key
- value
- virtual
- virtual key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F3/00—Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
- G06F3/01—Input arrangements or combined input and output arrangements for interaction between user and computer
- G06F3/02—Input arrangements using manually operated switches, e.g. using keyboards or dials
- G06F3/023—Arrangements for converting discrete items of information into a coded form, e.g. arrangements for interpreting keyboard generated codes as alphanumeric codes, operand codes or instruction codes
- G06F3/0238—Programmable keyboards
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Human Computer Interaction (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Input From Keyboards Or The Like (AREA)
Abstract
According to the key value triggering method and device, whether the target key triggered by the user has the virtual key value is judged according to the virtual key value function of each pre-stored key; under the condition that a target key triggered by a user has a virtual key value, acquiring the virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and under the condition that the target key triggered by the user does not have a virtual key value, transmitting the real key value of the target key to the electronic product so that the electronic product can execute corresponding operation according to the real key value of the key. By the mode, the key value of the keyboard is effectively expanded, and the use requirement of a user is met.
Description
Technical Field
The present invention relates to computer technology, and in particular, to a method and apparatus for triggering a key value.
Background
The keyboard is a main device for users to interact with the electronic product, and the electronic product can execute functions corresponding to the keys by pressing the keys on the keyboard.
In the prior art, each key of the keyboard corresponds to a real key value, and in general, the real key value is set by a keyboard manufacturer when the keyboard leaves the factory, and when an electronic product monitors a keyboard event and receives a real key value input by the keyboard, an operation corresponding to the real key value is performed to realize a corresponding function.
However, due to different usage habits of users, the existing technical scheme of setting the key to fix the real key value by the keyboard manufacturer cannot meet the user demand.
Disclosure of Invention
Aiming at the problem that the key function in the prior art cannot meet the use requirement of a user, the invention provides a key value triggering method and equipment.
In one aspect, the method for triggering the key value of the key provided by the invention comprises the following steps:
judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key;
if yes, acquiring a virtual key value of the target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value.
In an optional implementation manner, before the determining whether the target key triggered by the user has the virtual key value according to the pre-stored virtual key value function of each key, the triggering method further includes:
monitoring for keyboard events;
when a key pressing event is monitored, locking the current display window;
when a key bounce event is monitored, the virtual key value or the real key value of the target key is sent to the electronic product, and the triggering method further comprises the following steps:
and releasing the current display window.
In an optional implementation manner, the determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key includes:
acquiring a real key value of a target key triggered by a user;
judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value;
According to the virtual key value function of the target key, the virtual key value of the target key is obtained, and the method specifically comprises the following steps:
and when the function value is not null, determining the obtained function value as a virtual key value of the target key.
In an optional implementation manner, the determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key includes:
acquiring a real key value of a target key triggered by a user;
calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored;
according to the virtual key value function of the target key, the virtual key value of the target key is obtained, and the method specifically comprises the following steps:
and when the function value is not null, determining the obtained function value as a virtual key value of the target key.
In an optional implementation manner, the determining whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key includes:
Acquiring a real key value of a target key triggered by a user;
inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally;
according to the virtual key value function of the target key, the virtual key value of the target key is obtained, and the method specifically comprises the following steps:
calling a virtual key value function corresponding to the real key value and obtaining a function value;
and determining the obtained function value as a virtual key value of the target key.
In an optional implementation manner, before the sending the virtual key value to the electronic product, the method includes:
establishing a virtual key value sending sub-thread;
the sending the virtual key value to the electronic product includes:
and transmitting the virtual key value of the target key to the electronic product through the virtual key value transmitting sub-thread.
In an optional implementation manner, the triggering method further includes, while sending the virtual key value to the electronic product:
transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
Intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
In another aspect, the present invention provides a key value triggering device, including:
the key value acquisition unit is used for judging whether the target key triggered by the user has a virtual key value according to a pre-stored virtual key value function of each key; when the target key triggered by the user is determined to have a virtual key value, the key value obtaining unit is further used for obtaining the virtual key value of the target key according to a virtual key value function of the target key;
the communication unit is used for sending the virtual key value to the electronic product when the key value acquisition unit determines that the target key triggered by the user has the virtual key value, so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and the key value acquisition unit is also used for sending the real key value of the target key to the electronic product when the target key triggered by the user does not have the virtual key value, so that the electronic product can execute corresponding operation according to the real key value of the key.
In an alternative embodiment, the triggering device further comprises a monitoring unit;
before the key value obtaining unit judges whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the monitoring unit is used for monitoring a keyboard event;
the key value acquisition unit is also used for locking the current display window when the monitoring unit monitors a key pressing event, and releasing the current display window when the monitoring unit monitors a key bouncing event; the communication unit is further configured to send a virtual key value or the real key value of the target key to an electronic product when the monitoring unit monitors a key bounce event.
In an optional implementation manner, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
Alternatively, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
alternatively, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
In an alternative embodiment, the trigger device further includes a thread establishing unit;
The thread establishing unit is used for establishing a virtual key value sending sub-thread before the communication unit sends the virtual key value of the target key to the electronic product;
and the communication unit sends the virtual key value of the target key to the electronic product through the virtual key value sending sub-thread.
In an optional implementation manner, the communication unit is further configured to send, by using the virtual key value sending sub-thread, a real key value invalidation instruction of the target key to the electronic product, so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, based on the real key value invalidation instruction of the target key, it is determined that corresponding operation is performed only according to the virtual key value;
or the communication unit is further configured to intercept the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and execute a corresponding operation according to the virtual key value.
In still another aspect, the present invention provides a key value triggering apparatus, including: a processor and a memory for storing instructions executable by the processor;
Wherein the processor is configured to:
judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key;
if yes, acquiring a virtual key value of the target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value.
According to the key value triggering method and device, whether the target key triggered by the user has the virtual key value is judged according to the pre-stored virtual key value function of each key; when the target key is determined to have a virtual key value, acquiring the virtual key value of the target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value; when the target key does not have a virtual key value, the real key value of the target key is sent to the electronic product so that the electronic product can execute corresponding operation according to the real key value.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the disclosure and together with the description, serve to explain the principles of the disclosure.
Fig. 1 is a flow chart of a method for triggering a key value according to a first embodiment of the present invention;
fig. 2 is a flow chart of a method for triggering a key value according to a second embodiment of the present invention;
fig. 3 is a flow chart of another method for triggering a key value according to the second embodiment of the present invention;
fig. 4 is a flow chart of a triggering method of a key value of a key according to a second embodiment of the present invention;
fig. 5 is a schematic diagram of an architecture of a key value triggering device according to a third embodiment of the present invention.
Fig. 6 is a schematic hardware structure of a key value triggering device according to a third embodiment of the present invention.
Specific embodiments of the present disclosure have been shown by way of the above drawings and will be described in more detail below. These drawings and the written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the disclosed concepts to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The keyboard is a main device for a user to interact with the electronic product, and the user presses each key on the keyboard to enable the electronic product to execute a function corresponding to the key.
The actual key value of a key is generally a character string for distinguishing each key, and is a fixed value set by a keyboard manufacturer when the keyboard leaves the factory. In the existing triggering process of key values of keys, when a user presses a key, a keyboard can send a real key value corresponding to the key to a port of an electronic product, so that the electronic product can monitor a keyboard event triggered by the user and send the received real key value to application software or an application program carried by the electronic product. The corresponding operations and functions are then performed by the application software or application program based on the received actual key values.
However, due to different usage habits of users, the existing key value triggering manner cannot meet the personalized usage requirements of the users, for example:
when a certain program in the electronic product is set to execute the operation a when the true key value corresponding to the left Ctrl key is received, that is, the user can only trigger the left Ctrl key to cause the program to execute the operation a. And the usage habits of the users are different, when the user wants to use other keys, such as a left Shift key, to make the program execute the operation a, the related files in the program system configuration need to be modified. In many cases, such as a system based on an engineering singlechip, the program does not provide the modification function, so a new trigger mode of key values in the keyboard is needed to meet the use requirement of the user.
The following describes the technical scheme of the present application and how the technical scheme of the present application solves the above technical problems in detail with specific embodiments. The following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example 1
Fig. 1 is a flowchart of a method for triggering a key value according to an embodiment of the present invention.
As shown in fig. 1, the triggering method of the key value includes:
step 101, judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key;
if yes, go to step 102; if not, step 103 is performed.
102, obtaining a virtual key value of a target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value of the target key;
step 103, the real key value of the target key is sent to the electronic product, so that the electronic product executes corresponding operation according to the real key value of the target key.
It should be noted that, the execution main body of the key value triggering method provided in the first embodiment of the present invention is a key value triggering device, and the key value triggering device may be installed in each electronic product under each operating system, or may be independently installed in a local device and interact with an electronic product disposed at a remote end. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, tablet computers, etc. In addition, the program loaded in the key value triggering device can be written in languages such as C/C++, java, shell or Python.
Specifically, the triggering device of the key value determines whether the target key with the key pressing event has the corresponding virtual key value according to the pre-stored virtual key value function of each key. The virtual key value function may specifically be a function expression, a calculation expression or a conversion expression for representing a correspondence between a real key value and a virtual key value of a key, which is generally preset by a user, and the setting mode may be multiple: setting a virtual key value function for each key, setting the function value of the virtual key value function of the key needing to trigger the virtual key value function as a virtual key value, and setting the function value of the virtual key value function of the key needing not to trigger the function as null; or, the virtual key value function is set only for the key which needs to trigger the virtual key value function, and the key which does not need to trigger the function does not set the virtual key value function. Of course, other arrangements may be used, and the invention is not limited in this regard.
In addition, the virtual key value of the key is similar to the representation mode of the real key value of the key but different in representation content, and the specific key value can be set by the user according to the actual situation, so that the invention is not limited. Taking the foregoing left Ctrl key and the left Shift key as examples, the real key value of the left Ctrl key is 0x11, the real key value of the left Shift key is 0x10, if the user wants to implement the function of the left Ctrl key by using the left Shift key, a corresponding virtual key value function needs to be set for the left Shift key, so that when the left Shift key is triggered, the virtual key value 0x11 of the left Shift key is sent to the port of the electronic product.
Meanwhile, as can be seen, the virtual key value function of each key can be preset by a user and stored in the triggering device of the key value, and the virtual key value function can be stored in a virtual key value function list mode, namely, the real key value and the virtual key value function of each key with the virtual key value are in one-to-one correspondence and are stored; the method can also adopt a database form for storage, namely a plurality of virtual key value functions are stored in the same function library, and are queried and called through a preset query and call mode. That is, according to the pre-stored virtual key value function of each key, it can be determined whether the target key has the corresponding virtual key value.
Then, when the target key is determined to have a virtual key value, the virtual key value of the target key can be determined according to a virtual key value function of the target key, and the virtual key value of the target key is sent to the electronic product so that the electronic product can execute corresponding operation according to the virtual key value of the target key; and when the target key does not have the virtual key value, transmitting the real key value of the target key to the electronic product so as to execute corresponding operation by the electronic product according to the real key value of the target key.
In the prior art, the operation of sending key values to an electronic product is generally implemented by a main thread: when a user presses a key, the trigger device establishes a main thread to send a real key value corresponding to the key to a port of the electronic product through the main thread, so that application software or an application program in the electronic product executes corresponding operation and function according to the real key value.
In the embodiment of the application, because whether the target key has the virtual key value is judged, and the virtual key value or the real key value is sent to the electronic product according to the judging result, when the target key has the virtual key value, a virtual key value sending sub-thread is also established so that the virtual key value of the target key can be sent to the electronic product through the virtual key value sending sub-thread. When the target key has a virtual key value, the target key is sent to the electronic product through a virtual key value sending sub-thread so that the electronic product can execute corresponding operation according to the virtual key value; when the target key does not have the virtual key value, the real key value of the target key is sent to the electronic product through the main thread, so that the electronic product can execute corresponding operation according to the real key value.
Preferably, under the condition that the target key has a virtual key value, the virtual key value sending sub-thread can intercept the real key value sent by the main thread, so that the electronic product only receives the virtual key value; or the virtual key value sending sub-thread sends a virtual key value and a real key value invalidation instruction of a target key to the electronic product at the same time, so that the electronic product only executes corresponding operation according to the virtual key value under the condition that the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time; or intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value and executes corresponding operation according to the virtual key value.
Taking the aforementioned application scenario as an example: in the prior art, when a program in an electronic product receives a real key value 0x11 of a left Ctrl key, an operation A is executed; in the embodiment of the invention, a user can pre-store a virtual key value function X of a left Shift key in a trigger device of a key value, and configure the virtual key value of the left Shift key to be the same value as a real key value of a left Ctrl key, namely 0X11 by utilizing the virtual key value function X. Once the user triggers the left Shift key, the triggering device of the key value judges and obtains the conclusion that the left Shift key has a virtual key value, then, the triggering device obtains the virtual key value 0x11 of the left Shift key according to the left Shift key, and directly sends the virtual key value 0x11 to the program of the electronic product, so that the program in the electronic product executes corresponding operation according to 0x11, namely, the function that the user triggers the left Shift key to realize the corresponding operation of the left Ctrl key is completed, and of course, in the process, the triggering device sends the virtual key value 0x11 of the left Shift key to the electronic product, and simultaneously, can also send a real key value invalidation instruction of the left Shift key to the electronic product, so that the electronic product executes corresponding operation only according to 0x11 based on the real key value invalidation instruction; or in the process, the triggering device intercepts the sending operation of the real key value of the left Shift key, so that the electronic product only receives the virtual key value 0x11 of the left Shift key, and executes corresponding operation according to 0x11. Correspondingly, when the user triggers the left Ctrl key, under the condition that the left Ctrl key is judged to have no virtual key value, the triggering device directly sends the real key value 0x11 of the left Ctrl key to the program of the electronic product, so that the program of the electronic product can execute corresponding operation according to 0x11, namely, when the user triggers the left Ctrl key, the function of the operation corresponding to the left Ctrl key is realized.
In other words, in the above embodiment, the user may trigger the left Ctrl key or the left Shift key, and the program of the electronic product executes the corresponding operation according to 0x11 and implements the corresponding function, so that the manner can facilitate the users with different operation habits to perform the key operation, thereby satisfying the user requirement, and also solving the problem in the prior art that the key function cannot be effectively expanded due to the fact that the key values are all fixed real key values preset in factory.
In an optional implementation manner, when the electronic product runs, the triggering device based on the key value of the electronic product can monitor a keyboard event, lock the current display window of the electronic product when the key pressing event appears, and execute the virtual key value function according to the prestored keys to judge whether the target key triggered by the user has the virtual key value; and when the key bounce event is monitored, sending the virtual key value or the real key value of the target key to the electronic product, and releasing the current display window.
Specifically, the keyboard event may include a key press event and a key pop event, where the key press event may specifically refer to that a user clicks a virtual keyboard on a touch screen and triggers a key instruction on the virtual keyboard, and may also refer to that the user presses a key in an entity keyboard or a key in an entity input device through a physical pressing manner; correspondingly, the key bounce event may specifically be an instruction triggered by a user after the key press event to enable keys in input devices such as a virtual keyboard or an entity keyboard to return to an original state, which may be implemented by a key position where a finger of the user leaves the virtual keyboard, or may be implemented by self-bouncing and homing of the keys when the finger of the user leaves the keys of the entity keyboard or the entity input device.
Then, when the triggering device of the key value monitors the key pressing event triggered by the user, the current display window is locked until the key bouncing event is monitored, and the current window is released. That is, in the current display window locking state, the triggering device cannot monitor the key pressing event of other keys, that is, the triggering device can only determine whether one target key has a virtual key value at a time, and in this way, confusion caused by determining whether a plurality of keys all have virtual key values at the same time is avoided.
According to the triggering method of the key values of the keys, whether the target key triggered by the user has the virtual key value is judged according to the virtual key value function of each pre-stored key; under the condition that a target key triggered by a user has a virtual key value, acquiring the virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product executes corresponding operation according to the virtual key value of the target key; and under the condition that the target key triggered by the user does not have the virtual key value, transmitting the real key value of the target key to the electronic product so as to execute corresponding operation by the electronic product according to the real key value of the key. By the mode, the key value of the keyboard is effectively expanded, and the use requirement of a user is met.
Example two
On the basis of the first embodiment, fig. 2 to fig. 4 are respectively three key value triggering methods according to the present invention in order to further illustrate the key value triggering method according to the present invention.
Fig. 2 is a flow chart of a key value triggering method according to a second embodiment of the present invention. As shown in fig. 2, the method includes:
step 201a, obtaining a real key value of a target key triggered by a user;
step 202a, determining whether there is a virtual key value function corresponding to the real key value of the target key.
If not, the target key does not have the virtual key value, and step 205a is executed; if yes, go to step 203a.
And 203a, calling a virtual key value function corresponding to the real key value of the target key, obtaining a function value, and judging whether the function value is null.
If yes, the target key does not have a virtual key value, and step 205a is executed; if not, the target key has a virtual key value, and step 204a is performed.
Step 204a, determining the obtained function value as a virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value.
Step 205a, the real key value of the target key is sent to the electronic product, so that the electronic product performs a corresponding operation according to the real key value of the target key.
It should be noted that, similar to the embodiment, the execution body of the key value triggering method provided in the second embodiment is a key value triggering device, and the key value triggering device may be installed in each electronic product under each operating system, or may be independently installed in a local device and interact with an electronic product disposed at a remote end. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, tablet computers, etc. In addition, the program loaded in the key value triggering device can be written in languages such as C/C++, java, shell or Python.
Specifically, the triggering device of the key value determines whether the target key with the key pressing event has the corresponding virtual key value according to the pre-stored virtual key value function of each key. The virtual key value function may specifically be a function expression, a calculation expression or a conversion expression for representing a correspondence between a real key value and a virtual key value of a key, which is preset by a user, and the setting mode may be multiple: setting a corresponding virtual key value function for each key, wherein the function value of the virtual key value function of the key needing to trigger the virtual key value function is set as a virtual key value, and the function value of the virtual key value function of the key needing not to trigger the function is set as null; or, the virtual key value function is set only for the key which needs to trigger the virtual key value function, and the key which does not need to trigger the function does not set the virtual key value function. Of course, other arrangements may be used, and the invention is not limited in this regard.
Unlike the first embodiment, in the method for triggering a key value of a key shown in fig. 2, according to a pre-stored virtual key value function of each key, whether the target key triggered by the user has a virtual key value is determined, specifically, the method may include steps 201a to 203a, and the two steps of determining whether the target key has a virtual key value function and whether the function value is null are performed, so that whether the virtual key value function is triggered or not can be determined by the embodiment shown in fig. 2 no matter which of the two setting manners is adopted.
Specifically, after the user triggers the target key, first, the triggering device will acquire the real key value of the target key, and the acquiring manner is similar to the prior art, which is not described in detail in this embodiment. Then, the triggering device of the key value of the key determines whether a virtual key value function corresponding to the real key value of the target key exists according to the virtual key value function of each pre-stored key. When the virtual key value function corresponding to the target key exists, the virtual key value function is called to obtain a function value, and whether the function value is null is judged, so that when the fact that the corresponding virtual key value function exists in the target key and the function value is not null is determined, the triggering device sends the virtual key value to the electronic product, and otherwise, the triggering device sends the real key value of the target key to the electronic product. Therefore, in this embodiment, by determining whether the corresponding virtual key value function exists and whether the function value of the virtual key value function is null, whether the virtual key value of the key is triggered is determined, so that accuracy of determination is improved, and misoperation caused by misdetermination is avoided.
Unlike the previous embodiments, fig. 3 and 4 provide two alternative embodiments, respectively, for the way in which the virtual key value function is set by the user:
fig. 3 is a flowchart of another key value triggering method according to the second embodiment of the present invention. As shown in fig. 3, the method includes:
step 201b, obtaining a real key value of a target key triggered by a user.
Step 202b, calling a virtual key value function corresponding to the real key value, obtaining a function value, and judging whether the function value is null.
If the function value is null, the target key does not have a virtual key value, and step 204b is executed; if the function value is not null, the target key has a virtual key value, and step 203b is executed.
Step 203b, determining the obtained function value as a virtual key value of the target key, and sending the virtual key value to an electronic product, so that the electronic product can execute corresponding operation according to the virtual key value.
Step 204b, the real key value of the target key is sent to the electronic product, so that the electronic product executes corresponding operation according to the real key value of the target key.
Unlike the foregoing embodiment, this embodiment shown in fig. 3 is particularly directed to the case where one virtual key function is set for each key, in which case the function value of the virtual key function of the key that needs to trigger the virtual key function is set to a virtual key value, and the function value of the virtual key function of the key that does not need to trigger the function is set to null, that is, the virtual key function is set in such a manner that the virtual key functions of all keys are locally pre-stored.
For example, in the process of setting the virtual key functions, the user can edit the virtual key value functions of each key one by one at the setting interface or the designated interface, and the virtual key value functions can be specifically pre-stored in the local function library, and the user only needs to call and store the settings according to the needs.
Further, according to different demands of users, the virtual key value functions are generally divided into two types, wherein one type corresponds to the virtual key value function with the virtual key value function, namely, the function value obtained by calling and running the virtual key value function is the virtual key value expected by the user; the other class corresponds to virtual key functions without virtual key functions, i.e. the function values obtained by calling and running such virtual key functions should be null. In the process of setting the virtual key value functions by the user, if the user does not finish setting the virtual key value functions of all keys, the triggering device can correspondingly prompt the user to remind the user of finishing setting; further, after the device alerts, if the user still does not wish to continue to set the virtual key value functions of some keys, the triggering device may default to the virtual key value functions that the user does not need to trigger the virtual key value functions of some keys, where the triggering device will directly set the virtual key value functions of some keys as those virtual key value functions with null function values.
Therefore, in this embodiment, the virtual key function corresponding to the real key is called to obtain the function value, and whether the function value is empty is determined, so as to trigger the virtual key function. Compared with the embodiment shown in fig. 2, the calling speed and the triggering speed are faster, and the triggering efficiency is improved.
Fig. 4 is a flowchart of a triggering method of a key value according to a second embodiment of the present invention. As shown in fig. 4, the method includes:
step 201c, obtaining a real key value of a target key triggered by a user;
step 202c, inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally.
If not, the target key does not have the virtual key value, and step 204c is executed; if so, the target key has a virtual key value, and step 203c is performed.
Step 203c, calling a virtual key value function corresponding to the real key value, obtaining a function value, determining the obtained function value as the virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value.
Step 204c, the real key value of the target key is sent to the electronic product, so that the electronic product executes corresponding operation according to the real key value of the target key.
Unlike the foregoing embodiment, the embodiment shown in fig. 4 is directed to a manner in which the user sets the virtual key function to the key that needs to trigger the virtual key function, and the key that does not need to trigger the function does not set the virtual key function. In this case, the key that needs to trigger the virtual key function has a virtual key function pre-stored locally, while the key that does not need to trigger the function does not have any virtual key function pre-stored locally. That is, at least a part of virtual key value functions of the keys are locally pre-stored.
For example, in the process of setting the virtual key function, the user can edit the virtual key function of the key with the virtual key function one by one in the setting interface or the designated interface, and the virtual key function can be pre-stored in the local function library, so that the user only needs to call and store the setting according to the requirement.
Further, unlike the foregoing embodiments, the virtual key function in the present embodiment is a function having a virtual key function, that is, a function value obtained by calling and running such a virtual key function should be a virtual key desired by a user. In the process of setting the virtual key value function by the user, if the user finishes setting the virtual key value function of part of keys, the user can be correspondingly prompted to avoid missing the setting of the keys by the user; further, after the device alerts, if the user still does not wish to continue to set the virtual key function of some keys, the default may be that the user does not need to trigger the virtual key function for these keys, and no other processing is performed.
Therefore, in this embodiment, whether the virtual key value function corresponding to the real key value is locally pre-stored is queried, and the virtual key value function corresponding to the real key value is directly called to obtain the function value, so that the obtained function value is determined as the virtual key value of the target key. Compared with the embodiment shown in fig. 2, the calling speed and the triggering speed are faster, the triggering efficiency is improved, and compared with the embodiment shown in fig. 3, the method occupies smaller storage space and is more suitable for electronic products with weaker processing capacity and storage capacity.
Optionally, on the basis of the implementation manners shown in fig. 2 to fig. 4, the triggering method further includes, as in the first embodiment, the following steps: monitoring for keyboard events; correspondingly, when a key pressing event is monitored, locking a current display window, and judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key; and when a key bounce event is monitored, sending the virtual key value or the real key value of the target key to an electronic product, and releasing the current display window.
According to the key value triggering method provided by the second embodiment, on the basis of the first embodiment, whether the target key has the corresponding virtual key value function is judged, and whether the function value of the virtual key value function is empty is judged, so that whether the target key triggered by the user has the virtual key value is judged, the judging accuracy is improved effectively, and misoperation caused by misjudgment is avoided.
Example III
Fig. 5 is a schematic structural diagram of a key value triggering device according to a third embodiment of the present invention, where, as shown in fig. 5, the key value triggering device includes:
a key value obtaining unit 10, configured to determine whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key; when the target key triggered by the user is determined to have a virtual key value, the key value obtaining unit is further used for obtaining the virtual key value of the target key according to a virtual key value function of the target key;
when the key value obtaining unit 10 determines that the target key triggered by the user has a virtual key value, the communication unit 20 is configured to send the virtual key value to the electronic product 30, so that the electronic product 30 performs a corresponding operation according to the virtual key value of the target key; otherwise, the communication unit 20 is configured to send the real key value of the target key to the electronic product 30, so that the electronic product 30 performs a corresponding operation according to the real key value of the target key.
The triggering device of the key value can be installed in each electronic product under each operating system, and can also be independently installed in local equipment and interacted with the electronic product arranged at the far end. The electronic products include, but are not limited to, smart phones, smart terminals with physical or virtual keyboards, desktop computers, tablet computers. In addition, the program in the key-value triggering device can be written in the languages of C/C++, java, shell or Python.
In an alternative embodiment, the triggering device further comprises a monitoring unit; before the key value obtaining unit 10 determines whether the target key triggered by the user has a virtual key value according to the pre-stored virtual key value function of each key, the monitoring unit is used for monitoring the keyboard event; the key value obtaining unit 10 is further configured to lock and lock a current display window when the monitoring unit monitors a key press event, and release the current display window when the monitoring unit monitors a key pop event; the communication unit 20 is further configured to send the virtual key value or the real key value of the target key to the electronic product 30 when the monitoring unit monitors a key-up event.
In one optional embodiment, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
Alternatively, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
alternatively, the key value obtaining unit 10 is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key has no virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
In an alternative embodiment, the triggering device establishes a unit; the thread creating unit is configured to create a virtual key value sending sub-thread before the communication unit 20 sends the virtual key value of the target key to the electronic product 30; the communication unit 20 sends the virtual key value of the target key to the electronic product 30 through the virtual key value sending sub-thread.
In an optional implementation manner, the communication unit 20 is further configured to send, to the electronic product 30 through the virtual key value sending sub-thread, a real key value invalidation instruction of the target key, so that when the electronic product 30 receives the virtual key value of the target key and the real key value of the target key at the same time, based on the real key value invalidation instruction of the target key, it is determined that a corresponding operation is performed only according to the virtual key value; or, the communication unit 20 is further configured to intercept the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product 30 only receives the virtual key value, and perform a corresponding operation according to the virtual key value.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working processes and corresponding advantageous effects of the above-described system may refer to corresponding processes in the foregoing method embodiments, which are not described herein again.
In other embodiments, fig. 6 is a schematic hardware structure diagram of a key value triggering device according to a third embodiment of the present invention. As shown in fig. 6, the key value triggering device may specifically be a non-transitory computer readable storage medium including instructions, including:
A processor 32 and a memory 31 for storing processor executable instructions;
wherein the processor 32 is configured to:
judging whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key;
if yes, acquiring a virtual key value of the target key according to a virtual key value function of the target key, and sending the virtual key value to an electronic product so that the electronic product can execute corresponding operation according to the virtual key value;
if not, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value.
The memory 31 may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, etc. While processor 32 may be implemented by one or more Application Specific Integrated Circuits (ASICs), digital signal processor architectures (DSPs), digital Signal Processing Devices (DSPDs), programmable Logic Devices (PLDs), field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessor architectures, or other electronic components.
The instructions may be written in a language such as C/C++, java, shell, or Python, and the embodiment is not limited thereto.
According to the triggering device for key values of keys provided by the third embodiment, whether a target key triggered by a user has a virtual key value is judged according to a virtual key value function of each pre-stored key; under the condition that a target key triggered by a user has a virtual key value, acquiring the virtual key value of the target key, and sending the virtual key value to an electronic product so that the electronic product executes corresponding operation according to the virtual key value of the target key; and under the condition that the target key triggered by the user does not have the virtual key value, transmitting the real key value of the target key to the electronic product so as to execute corresponding operation by the electronic product according to the real key value of the key. By the mode, the key value of the keyboard is effectively expanded, and the use requirement of a user is met.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any adaptations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It is to be understood that the present disclosure is not limited to the precise arrangements and instrumentalities shown in the drawings, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.
Claims (9)
1. A method for triggering a key value of a key, which is applied to a triggering device of the key value, and is characterized by comprising the following steps:
acquiring a real key value of a target key triggered by a user;
judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value;
if the virtual key value exists, a virtual key value sending sub-thread is established, and the obtained function value is determined to be the virtual key value of the target key;
transmitting the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread so that the electronic product can execute corresponding operation according to the virtual key value;
If the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
the triggering method further comprises the following steps of when the virtual key value is sent to the electronic product:
transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
2. A method for triggering a key value of a key, which is applied to a triggering device of the key value, and is characterized by comprising the following steps:
acquiring a real key value of a target key triggered by a user;
calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored;
If the virtual key value exists, a virtual key value sending sub-thread is established, and the obtained function value is determined to be the virtual key value of the target key;
transmitting the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread so that the electronic product can execute corresponding operation according to the virtual key value;
if the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
the triggering method further comprises the following steps of when the virtual key value is sent to the electronic product:
transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
3. A method for triggering a key value of a key, which is applied to a triggering device of the key value, and is characterized by comprising the following steps:
acquiring a real key value of a target key triggered by a user;
inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally;
if the virtual key value exists, a virtual key value sending sub-thread is established, and a virtual key value function corresponding to the real key value is called to obtain a function value; determining the obtained function value as a virtual key value of the target key;
if the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
the triggering method further comprises the following steps of when the virtual key value is sent to the electronic product:
transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
Intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
4. A method of triggering a key value according to any one of claims 1-3, wherein before determining whether a target key triggered by a user has a virtual key value, the method of triggering further comprises:
monitoring for keyboard events;
when a key pressing event is monitored, locking the current display window;
when a key bounce event is monitored, the virtual key value or the real key value of the target key is sent to the electronic product, and the triggering method further comprises the following steps:
and releasing the current display window.
5. A key value triggering device, comprising:
the key value acquisition unit is used for judging whether the target key triggered by the user has a virtual key value according to a pre-stored virtual key value function of each key; when the target key triggered by the user is determined to have a virtual key value, the key value obtaining unit is further used for obtaining the virtual key value of the target key according to a virtual key value function of the target key;
The communication unit is used for sending the virtual key value to the electronic product when the key value acquisition unit determines that the target key triggered by the user has the virtual key value, so that the electronic product can execute corresponding operation according to the virtual key value of the target key; the key value acquisition unit is further used for sending the real key value of the target key to the electronic product when the target key triggered by the user does not have the virtual key value, so that the electronic product can execute corresponding operation according to the real key value of the key;
the thread establishing unit is also included;
the thread establishing unit is used for establishing a virtual key value sending sub-thread before the communication unit sends the virtual key value of the target key to the electronic product;
the communication unit sends the virtual key value of the target key to an electronic product through the virtual key value sending sub-thread;
the communication unit is further configured to send, to the electronic product through the virtual key value sending sub-thread, a real key value invalidation instruction of the target key, so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, based on the real key value invalidation instruction of the target key, it is determined that corresponding operation is performed only according to the virtual key value;
Or the communication unit is further used for intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value and executes corresponding operation according to the virtual key value;
the key value acquisition unit is specifically configured to: acquiring a real key value of a target key triggered by a user; judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
alternatively, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored; when the function value is not null, determining the obtained function value as a virtual key value of the target key;
Alternatively, the key value obtaining unit is specifically configured to: acquiring a real key value of a target key triggered by a user; inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally; calling a virtual key value function corresponding to the real key value and obtaining a function value; and determining the obtained function value as a virtual key value of the target key.
6. The key-value triggering device as recited in claim 5, further comprising a monitoring unit;
before the key value obtaining unit judges whether a target key triggered by a user has a virtual key value according to a pre-stored virtual key value function of each key, the monitoring unit is used for monitoring a keyboard event;
the key value acquisition unit is also used for locking the current display window when the monitoring unit monitors a key pressing event, and releasing the current display window when the monitoring unit monitors a key bouncing event; the communication unit is further configured to send a virtual key value or the real key value of the target key to an electronic product when the monitoring unit monitors a key bounce event.
7. A key value triggering device, comprising: a processor and a memory for storing instructions executable by the processor;
wherein the processor is configured to:
acquiring a real key value of a target key triggered by a user;
judging whether a virtual key value function corresponding to the real key value of the target key exists or not; if not, the target key does not have a virtual key value; if yes, calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if yes, the target key does not have the virtual key value; if the function value is not null, the target key has a virtual key value;
if yes, establishing a virtual key value sending sub-thread, and determining the obtained function value as a virtual key value of the target key;
transmitting the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread so that the electronic product can execute corresponding operation according to the virtual key value;
if the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
While sending the virtual key to the electronic product, the processor is further configured to:
transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
8. A key value triggering device, comprising: a processor and a memory for storing instructions executable by the processor;
wherein the processor is configured to:
acquiring a real key value of a target key triggered by a user;
calling a virtual key value function corresponding to the real key value and obtaining a function value, judging whether the function value is empty, and if the function value is empty, the target key does not have a virtual key value; if the function value is not null, the target key has a virtual key value; the virtual key value functions of all keys are locally pre-stored;
If the virtual key value exists, a virtual key value sending sub-thread is established, and the obtained function value is determined to be the virtual key value of the target key;
transmitting the virtual key value of the target key to an electronic product through the virtual key value transmitting sub-thread so that the electronic product can execute corresponding operation according to the virtual key value;
if the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
while sending the virtual key to the electronic product, the processor is further configured to: transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
9. A key value triggering device, comprising: a processor and a memory for storing instructions executable by the processor;
wherein the processor is configured to:
acquiring a real key value of a target key triggered by a user;
inquiring whether a virtual key value function corresponding to the real key value is pre-stored locally or not; if yes, the target key has a virtual key value; if not, the target key does not have a virtual key value; wherein, at least partial virtual key value function of the key is pre-stored locally;
if the virtual key value exists, a virtual key value sending sub-thread is established, and a virtual key value function corresponding to the real key value is called to obtain a function value; determining the obtained function value as a virtual key value of the target key;
if the virtual key value is not available, the real key value of the target key is sent to the electronic product, so that the electronic product can execute corresponding operation according to the real key value;
while sending the virtual key to the electronic product, the processor is further configured to: transmitting a real key value invalidation instruction of the target key to the electronic product through the virtual key value transmitting sub-thread so that when the electronic product receives the virtual key value of the target key and the real key value of the target key at the same time, corresponding operation is determined to be executed only according to the virtual key value based on the real key value invalidation instruction of the target key; or,
Intercepting the sending operation of the real key value through the virtual key value sending sub-thread, so that the electronic product only receives the virtual key value, and executing corresponding operation according to the virtual key value.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810215617.3A CN110275623B (en) | 2018-03-15 | 2018-03-15 | Method and device for triggering key values of keys |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810215617.3A CN110275623B (en) | 2018-03-15 | 2018-03-15 | Method and device for triggering key values of keys |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110275623A CN110275623A (en) | 2019-09-24 |
CN110275623B true CN110275623B (en) | 2023-08-08 |
Family
ID=67958580
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810215617.3A Active CN110275623B (en) | 2018-03-15 | 2018-03-15 | Method and device for triggering key values of keys |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110275623B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110941352B (en) * | 2019-11-28 | 2021-05-18 | 北京海泰方圆科技股份有限公司 | Keyboard generation method, security information input method and device and mobile terminal |
CN111628781B (en) * | 2020-06-17 | 2023-07-14 | 玉林师范学院 | A Matrix Keyboard Based on RS232 Serial Communication |
CN112203082B (en) * | 2020-09-27 | 2023-06-09 | 深圳创维-Rgb电子有限公司 | Virtual key value data driving frame test method, television and readable storage medium |
Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH086695A (en) * | 1994-06-22 | 1996-01-12 | Oki Electric Ind Co Ltd | Recognition and processing method for extended key code |
CN1268833A (en) * | 1999-03-24 | 2000-10-04 | 英业达集团(上海)电子技术有限公司 | Method of mobile telephone virtual keyboard |
CN1282195A (en) * | 1999-07-22 | 2001-01-31 | 英业达集团(上海)电子技术有限公司 | Mobile telephone handset with remote control function and its remote control function treatment method |
TW436723B (en) * | 1998-12-24 | 2001-05-28 | Inventec Corp | Virtual keypad method of mobile phone |
CN101729816A (en) * | 2009-12-11 | 2010-06-09 | 惠州Tcl移动通信有限公司 | User defined shortcut remote controller and implementation method thereof |
CN102096998A (en) * | 2009-12-10 | 2011-06-15 | 中国联合网络通信集团有限公司 | Remote control information receiving and processing method and system as well as digital television receiving device |
CN102299985A (en) * | 2010-06-25 | 2011-12-28 | 上海三旗通信科技有限公司 | Full keyboard adopting extension I/O (Input/Output) mode for mobile phone |
CN102622156A (en) * | 2011-01-26 | 2012-08-01 | 腾讯科技(深圳)有限公司 | Method, device and system for acquiring virtual keyboards |
CN102707893A (en) * | 2012-05-21 | 2012-10-03 | 上海华勤通讯技术有限公司 | Display system and display method for virtual keyboard of mobile terminals |
CN102790918A (en) * | 2012-08-17 | 2012-11-21 | 中国科学院声学研究所 | Smart television and method for receiving remote controller input by smart television |
CN102915113A (en) * | 2012-08-24 | 2013-02-06 | 深圳创维-Rgb电子有限公司 | Method and apparatus for supporting data input |
CN103000008A (en) * | 2012-12-13 | 2013-03-27 | 青岛海信宽带多媒体技术有限公司 | Method and apparatus for responding remote signals of remote receiving equipment |
CN103631507A (en) * | 2012-08-27 | 2014-03-12 | 腾讯科技(深圳)有限公司 | Method and device for providing virtual keyboard |
CN105100844A (en) * | 2015-08-04 | 2015-11-25 | 恬家(上海)信息科技有限公司 | Remote controller and realization method thereof |
WO2016045503A1 (en) * | 2014-09-25 | 2016-03-31 | 阿里巴巴集团控股有限公司 | Remote controller key matching and signal processing method and apparatus |
CN105516771A (en) * | 2015-12-11 | 2016-04-20 | Tcl海外电子(惠州)有限公司 | Television remote controller and television set |
CN105677200A (en) * | 2015-12-31 | 2016-06-15 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal control method and device and mobile terminal |
CN105867812A (en) * | 2016-03-25 | 2016-08-17 | 乐视控股(北京)有限公司 | Method and device for adjusting keys of virtual keyboard |
CN105915991A (en) * | 2016-06-02 | 2016-08-31 | 深圳创维-Rgb电子有限公司 | Television button combined processing method and system |
CN107515719A (en) * | 2016-06-16 | 2017-12-26 | 中兴通讯股份有限公司 | A kind of triggering method of virtual key, device and terminal |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7161524B2 (en) * | 2003-03-28 | 2007-01-09 | Universal Electronics Inc. | System and method for using an universal remote control to access extended operational functions of a device |
KR20130126067A (en) * | 2012-05-10 | 2013-11-20 | 삼성전자주식회사 | Method and system for controlling function of display device using remote control unit |
-
2018
- 2018-03-15 CN CN201810215617.3A patent/CN110275623B/en active Active
Patent Citations (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH086695A (en) * | 1994-06-22 | 1996-01-12 | Oki Electric Ind Co Ltd | Recognition and processing method for extended key code |
TW436723B (en) * | 1998-12-24 | 2001-05-28 | Inventec Corp | Virtual keypad method of mobile phone |
CN1268833A (en) * | 1999-03-24 | 2000-10-04 | 英业达集团(上海)电子技术有限公司 | Method of mobile telephone virtual keyboard |
CN1282195A (en) * | 1999-07-22 | 2001-01-31 | 英业达集团(上海)电子技术有限公司 | Mobile telephone handset with remote control function and its remote control function treatment method |
CN102096998A (en) * | 2009-12-10 | 2011-06-15 | 中国联合网络通信集团有限公司 | Remote control information receiving and processing method and system as well as digital television receiving device |
CN101729816A (en) * | 2009-12-11 | 2010-06-09 | 惠州Tcl移动通信有限公司 | User defined shortcut remote controller and implementation method thereof |
CN102299985A (en) * | 2010-06-25 | 2011-12-28 | 上海三旗通信科技有限公司 | Full keyboard adopting extension I/O (Input/Output) mode for mobile phone |
CN102622156A (en) * | 2011-01-26 | 2012-08-01 | 腾讯科技(深圳)有限公司 | Method, device and system for acquiring virtual keyboards |
CN102707893A (en) * | 2012-05-21 | 2012-10-03 | 上海华勤通讯技术有限公司 | Display system and display method for virtual keyboard of mobile terminals |
CN102790918A (en) * | 2012-08-17 | 2012-11-21 | 中国科学院声学研究所 | Smart television and method for receiving remote controller input by smart television |
CN102915113A (en) * | 2012-08-24 | 2013-02-06 | 深圳创维-Rgb电子有限公司 | Method and apparatus for supporting data input |
CN103631507A (en) * | 2012-08-27 | 2014-03-12 | 腾讯科技(深圳)有限公司 | Method and device for providing virtual keyboard |
CN103000008A (en) * | 2012-12-13 | 2013-03-27 | 青岛海信宽带多媒体技术有限公司 | Method and apparatus for responding remote signals of remote receiving equipment |
WO2016045503A1 (en) * | 2014-09-25 | 2016-03-31 | 阿里巴巴集团控股有限公司 | Remote controller key matching and signal processing method and apparatus |
CN105100844A (en) * | 2015-08-04 | 2015-11-25 | 恬家(上海)信息科技有限公司 | Remote controller and realization method thereof |
CN105516771A (en) * | 2015-12-11 | 2016-04-20 | Tcl海外电子(惠州)有限公司 | Television remote controller and television set |
CN105677200A (en) * | 2015-12-31 | 2016-06-15 | 宇龙计算机通信科技(深圳)有限公司 | Mobile terminal control method and device and mobile terminal |
CN105867812A (en) * | 2016-03-25 | 2016-08-17 | 乐视控股(北京)有限公司 | Method and device for adjusting keys of virtual keyboard |
CN105915991A (en) * | 2016-06-02 | 2016-08-31 | 深圳创维-Rgb电子有限公司 | Television button combined processing method and system |
CN107515719A (en) * | 2016-06-16 | 2017-12-26 | 中兴通讯股份有限公司 | A kind of triggering method of virtual key, device and terminal |
Non-Patent Citations (1)
Title |
---|
Win32扩展功能键盘程序的编写;杨强, 黄勇锋;微型电脑应用(第07期);53-54+3 * |
Also Published As
Publication number | Publication date |
---|---|
CN110275623A (en) | 2019-09-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111273832B (en) | Content sharing method, device, terminal and storage medium | |
CN110275623B (en) | Method and device for triggering key values of keys | |
CN106547451B (en) | Multi-open application program method, multi-open application program device and terminal | |
US20050097570A1 (en) | Universal computer input event translator | |
CN106775282A (en) | Operate the method and device of terminal | |
CN111708471B (en) | Control processing method and related device | |
US11287948B2 (en) | Method for controlling the execution of a program configurable into a disabled state and enabled state | |
CN112399006B (en) | File sending method and device and electronic equipment | |
CN106228063A (en) | Auxiliary function permission control method and device and terminal equipment | |
US11740916B1 (en) | System and method for providing a customized graphical user interface based on user inputs | |
CN108322834B (en) | Television setting method, television and computer readable storage medium | |
CN105094644B (en) | For the voice search method and system of application program | |
US10628031B2 (en) | Control instruction identification method and apparatus, and storage medium | |
CN105786321B (en) | A kind of function switching method and device | |
CN105808032A (en) | Focus control method and device based on android control | |
CN110570830B (en) | Equipment adjusting method and device, storage medium and electronic equipment | |
WO2017166789A1 (en) | System locking method and apparatus | |
CN111552537A (en) | Theme switching method and device, computer equipment and storage medium | |
CN108984024B (en) | Touch operation method, device, storage medium and electronic device | |
CN111708579A (en) | Operating system setting recovery method, device, equipment and storage medium | |
CN113141530B (en) | Remote control interaction based method and device, electronic equipment and storage medium | |
CN111367406B (en) | Method, device, equipment and medium for refreshing pull-down of applet window | |
CN108124174B (en) | Television and television application control method and device thereof | |
CN112083839A (en) | Terminal operation method, terminal and device with storage function | |
CN105791510A (en) | Information processing method and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: 100095 Building 2, Longxin Industrial Park, Zhongguancun environmental protection technology demonstration park, Haidian District, Beijing Applicant after: Loongson Zhongke Technology Co.,Ltd. Address before: 100095 Building 2, Longxin Industrial Park, Zhongguancun environmental protection technology demonstration park, Haidian District, Beijing Applicant before: LOONGSON TECHNOLOGY Corp.,Ltd. |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |