[go: up one dir, main page]

CN111434044A - Protective shell with touch function and touch method and system thereof - Google Patents

Protective shell with touch function and touch method and system thereof Download PDF

Info

Publication number
CN111434044A
CN111434044A CN201780097410.4A CN201780097410A CN111434044A CN 111434044 A CN111434044 A CN 111434044A CN 201780097410 A CN201780097410 A CN 201780097410A CN 111434044 A CN111434044 A CN 111434044A
Authority
CN
China
Prior art keywords
touch
mobile terminal
touch screen
processor
key value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201780097410.4A
Other languages
Chinese (zh)
Inventor
刘佳庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Royole Technologies Co Ltd
Original Assignee
Shenzhen Royole Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Royole Technologies Co Ltd filed Critical Shenzhen Royole Technologies Co Ltd
Publication of CN111434044A publication Critical patent/CN111434044A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04BTRANSMISSION
    • H04B1/00Details of transmission systems, not covered by a single one of groups H04B3/00 - H04B13/00; Details of transmission systems not characterised by the medium used for transmission
    • H04B1/38Transceivers, i.e. devices in which transmitter and receiver form a structural unit and in which at least one part is used for functions of transmitting and receiving
    • H04B1/3827Portable transceivers
    • H04B1/3888Arrangements for carrying or protecting transceivers
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/02Constructional features of telephone sets
    • HELECTRICITY
    • H05ELECTRIC TECHNIQUES NOT OTHERWISE PROVIDED FOR
    • H05KPRINTED CIRCUITS; CASINGS OR CONSTRUCTIONAL DETAILS OF ELECTRIC APPARATUS; MANUFACTURE OF ASSEMBLAGES OF ELECTRICAL COMPONENTS
    • H05K5/00Casings, cabinets or drawers for electric apparatus
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Telephone Function (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a protective shell which comprises a shell body, a touch screen, a communication unit and a processor, wherein the touch screen, the communication unit and the processor are respectively arranged on the shell body; the processor is configured to: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction according with the Hid protocol according to the key value; the control communication unit sends the control command to a mobile terminal to allow the mobile terminal to respond to the control command and execute corresponding operation. The application also discloses a protective shell touch method and system. According to the protective shell with the touch function, when the touch screen of the protective shell responds to touch operation and generates the trigger signal, the trigger signal is responded to generate the control instruction which accords with the Hid protocol and the control instruction is sent to the mobile terminal to control the mobile terminal, and user experience is better.

Description

Protective shell with touch function and touch method and system thereof Technical Field
The present application relates to the field of electronic devices, and in particular, to a protective case with a touch function and a touch method and system thereof.
Background
Mobile terminals, such as mobile phones, tablet computers, are generally protected externally by a protective case to prevent the device screen and the device housing from being worn or damaged. However, the existing protective shell has a single function, and a common protective shell only has a protection function and does not have a touch function. The existing protective shell with the touch function generally needs to download and install a corresponding application program on the mobile terminal, so that the simple touch function can be realized, the application program occupies the memory of the device and can increase the data processing amount of the device, and the operation burden of the device is heavy.
Disclosure of Invention
The embodiment of the application discloses a protective shell with a touch function and a touch method and a touch system thereof, which aim to solve the problems.
The embodiment of the application discloses protective housing with touch-control function includes: the touch screen, the communication unit and the processor are respectively arranged on the shell, the processor is respectively electrically connected with the touch screen and the communication unit, and the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the processor is configured to: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction conforming to the Hid protocol according to the key value; and controlling the communication unit to send the control instruction to a mobile terminal so as to allow the mobile terminal to respond to the control instruction and execute corresponding operation.
The embodiment of the application discloses a protective shell touch method, which is applied to a protective shell, wherein the protective shell comprises a shell body and a touch screen, the touch screen is arranged on the shell body, and the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the protective shell touch method comprises the following steps: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction conforming to the Hid protocol according to the key value; and sending the control instruction to a mobile terminal to allow the mobile terminal to respond to the control instruction and execute corresponding operation.
The embodiment of the application discloses a protective shell touch system, which comprises a protective shell and a mobile terminal, wherein the protective shell is used for being sleeved on the mobile terminal and comprises a shell, a touch screen, a communication unit and a processor, the touch screen, the communication unit and the processor are respectively arranged on the shell, the processor is respectively electrically connected with the touch screen and the communication unit, and the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the processor is configured to: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction conforming to the Hid protocol according to the key value; and controlling the communication unit to send the control instruction to the mobile terminal, and receiving the control instruction and executing corresponding operation by the mobile terminal.
According to the protective shell with the touch function and the touch method and the touch system, the control instruction which accords with the Hid protocol can be directly sent to the mobile terminal after the trigger signal is generated on the touch screen, the mobile terminal can directly respond to the control instruction, the application program corresponding to the protective shell does not need to be installed on the mobile terminal, the memory of the mobile terminal is occupied, the running speed of the mobile terminal is improved, the abrasion of the entity keys of the mobile terminal can be reduced, the finger operation of a user is facilitated, and the user experience is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic block diagram of a protective case touch system according to an embodiment of the present application.
Fig. 2 is a schematic structural view of the protective shell in fig. 1 according to an embodiment of the present application.
Fig. 3 is a schematic structural diagram of the mobile terminal in fig. 1 according to an embodiment of the present application.
Fig. 4 is a flowchart illustrating a protective case touch method according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a schematic block diagram of a touch system 1000 of a protective case according to an embodiment of the present disclosure, where the touch system 1000 includes the protective case 100 and a mobile terminal 200, the protective case 100 is installed On the mobile terminal 200 to protect at least a back and a sidewall of the mobile terminal 200 from being worn and damaged, and the protective case 100 and the mobile terminal 200 are connected through a network 300. the network 300 may be the Internet (Internet), an On-Demand virtual private network (On-Demand virtual L ease L ine), a Wireless network (Wireless network) including WIFI and bluetooth, a telephone network including a GPRS network and a CDMA network, a broadcast network, etc. the protective case 100 generates a control command conforming to the Hid protocol in response to a touch operation performed by a user thereon, and the control command is transmitted to the mobile terminal 200 through the network 300. the mobile terminal 200 responds to the control command and performs a corresponding operation.
Specifically, referring to fig. 2, the protective case 100 includes a housing 110, a processor 120, a memory 130, a communication unit 140, and a touch screen 150. The processor 120, the memory 130, the communication unit 140, and the touch screen 150 are disposed at suitable positions of the housing 110. Preferably, the processor 120, the memory 130 and the communication unit 140 are disposed within the housing 110, and the touch screen 150 is disposed on the back and/or side of the housing 110.
The housing 110 may be made of plastic, metal, etc. The case 110 is mounted on the mobile terminal 200 to protect at least the back and sidewalls of the mobile terminal 200 from abrasion or damage.
The Processor 120 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, and the processor 120 is the control center of the case 100 and is connected to the various parts of the case 100 by various interfaces and lines.
The memory 130 is used to store computer programs and/or modules, and the processor 120 implements various functions of the protective case 100 by running or executing the computer programs and/or modules stored in the memory 130 and calling data stored in the memory 130. In addition, the memory 130 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), a plurality of magnetic disk storage devices, a Flash memory device, or other volatile solid state storage devices.
The communication unit 140 is used for establishing a wireless communication connection with other devices having a communication function, for example, the mobile terminal 200. Specifically, in this embodiment, the communication unit 140 is a bluetooth chip. It is understood that in other embodiments, the communication unit 140 may also be a WiFi chip or other chips with communication functions.
In this embodiment, the touch screen 150 is a flexible touch display screen, and can be bent and deformed. It is understood that in other embodiments, the touch screen 150 may also be a rigid touch display screen.
In this embodiment, the protective case 100 further includes a power source 160. The power source 160 may be, but is not limited to, a dry cell battery, a storage battery, or the like. The power source 160 is disposed at a suitable location within the housing 110. The power supply 160 provides power to all of the electronic components within the protective case 100. It is understood that in other embodiments, the power source 160 may be omitted, and the protective case 100 is plugged into the mobile terminal 200 via a power line to supply power to the protective case 100; or the protective case receives the power radiated by the mobile terminal 200 in a wireless radiation manner to implement power supply to the protective case 100.
Referring to fig. 3, the mobile terminal 200 may be, but is not limited to, a mobile phone, a tablet computer, an e-reader, a wearable electronic device, and the like, and is not limited herein. The mobile terminal 200 includes, but is not limited to, a processor 210, and a memory 220, a touch display module 230 and a communication unit 240 electrically connected to the processor 210, respectively. It will be understood by those skilled in the art that fig. 1 is only an example of the mobile terminal 200 and does not constitute a limitation of the mobile terminal 200, and that the mobile terminal 200 may include more or less components than those shown in fig. 1, or some components may be combined, or different components, e.g., the mobile terminal 200 may also include an input-output device, a network access device, a data bus, etc.
The Processor 210 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable gate array (FPGA) or other Programmable logic device, discrete gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or a processor, which may be any conventional processor or the like, that is the control center for the mobile terminal 200 and that connects the various parts of the overall mobile terminal 200 using various interfaces and lines.
The memory 220 is used to store computer programs and/or modules, and the processor 210 implements various functions of the mobile terminal 200 by operating or executing the computer programs and/or modules stored in the memory 220 and calling data stored in the memory 220. In addition, the memory 220 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), a plurality of magnetic disk storage devices, a Flash memory device, or other volatile solid state storage devices.
The touch display module 230 is used for responding to a touch operation of a user thereon and executing a corresponding operation, and displaying various contents to be displayed on the mobile terminal 200.
The communication unit 240 is used for establishing a wireless communication connection with other devices having a communication function, such as the protective case 100. Specifically, in this embodiment, the communication unit 240 is a bluetooth chip. It is understood that in other embodiments, the communication unit 240 may also be a WiFi chip. The mobile terminal 200 establishes a network communication connection with the communication unit 140 of the protective case 100 through the communication unit 240.
The touch screen 150 generates a trigger signal in response to a user's touch operation on the touch screen 150 by a finger and in response to the finger being lifted in an interrupted manner. The processor 120 generates a key value conforming to the Hid protocol in response to the trigger signal, generates a control command conforming to the Hid protocol according to the key value, and transmits the control command to the mobile terminal 200. Specifically, the memory 130 stores a correspondence between preset key values and instructions. The processor 120 obtains an instruction corresponding to the key value from the memory 130 according to the key value. Processor 120 generates control instructions according to the Hid protocol based on the instructions. The processor 120 controls the communication unit 140 to transmit a control instruction to the mobile terminal 200. The communication unit 240 receives the control command transmitted by the communication unit 140. The processor 210 responds to the control instructions and performs the corresponding operations. The touch operation may be a single touch operation, a double click operation, a sliding operation, a dragging operation, a pressing operation, and the like. The control instruction can be control instructions such as dormancy, awakening, electrode, page turning, returning, volume increasing and decreasing, brightness increasing and decreasing and the like.
An example is described in detail below. It should be noted that this example is intended to clearly illustrate the present application, and not to limit the present application.
Specifically, in this embodiment, the communication unit 140 and the communication unit 240 are bluetooth chips, the touch operation is a single-click operation, the touch screen 150 responds to a single-click operation of a user on the touch screen 150 and responds to a finger lift in an interrupted manner, the processor 120 responds to the trigger signal and generates a key value conforming to the Hid protocol through the function controller _ control _ send (constructer _ CTR L _ HOME), and then sends the key value to a corresponding function _ his _ inp _ rep _ send (& m _ his, inp _ ccont ro L _ key _ INDEX, inp _ CC _ REPORT _ key _ MAX _ L EN, (U8 _ t) & cmd) & d, for example, the key value is menu0x09,0x 40. the function _ his _ inp _ rep _ send _ d _ send is a runtime function call _ sd _ gap _ 2 (runtime function _ gap _ send) in the bluetooth protocol stack, and sends a corresponding click control command to the mobile terminal control unit 200 to execute the mobile control command control unit 200, and receive the mobile control command through the mobile control unit 200 _ handle _ 3875.
It can be understood that, in an embodiment, the touch positions of the touch screen 150 and the touch display module 230 correspond to each other. When a touch operation is performed at a certain position on the touch screen 150, the touch operation is performed at a corresponding position of the touch display module 230. Thus, the touch screen 150 can replace all or part of the touch function of the touch display module 230. Since the touch screen 150 is disposed on the back and/or the side wall of the casing 110 of the protective case 100, and the casing 110 is mounted on the back and the side wall of the mobile terminal 200, the touch operation performed on the touch screen 150 can not only control the mobile terminal 200, but also does not shield the touch display module 230 of the mobile terminal 200. For example, when a user plays a game or browses a webpage, inconvenience caused by shielding of a finger screen is avoided, and better user experience is achieved.
In another embodiment, the touch operations on the touch screen 150 correspond to the operations executed by the mobile terminal 200 one to one. For example, a double-click operation on the touch screen 150 corresponds to a wake-up operation on the mobile terminal 200. The up-sliding operation on the touch screen 150 corresponds to the page-up operation on the mobile terminal 200. It should be noted that the illustration is only for example and not to limit the actual protection scope of the present application.
Referring to fig. 4, fig. 4 is a flowchart illustrating a touch method of a protective case according to an embodiment of the disclosure. The protective case touch method is applied to the protective case touch system 1000, and the execution sequence is not limited to the sequence shown in fig. 4. The protective case touch system 1000 includes a protective case 100 and a mobile terminal 200. The protective case 100 is mounted on the mobile terminal 200 to protect at least the back and sidewalls of the mobile terminal 200 from abrasion and damage. The protective case 100 and the mobile terminal 200 are connected through a network 300. The protective shell touch method comprises the following steps:
in step 400, the protective case 100 and the mobile terminal 200 establish a wireless network connection through the network 300. Specifically, when the power switch of the protective case 100 is turned on, the power supply 160 supplies power to all the electronic components of the protective case 100, and the protective case 100 is thus activated. The communication unit 140 of the protective case 100, such as bluetooth, starts scanning the electronic device whose periphery opens the wireless connection function. When the communication unit 240 of the mobile terminal 200, such as bluetooth, is turned on, a wireless network connection can be established with the protective case 100.
In step 410, the touch screen 150 of the protective case 100 generates a corresponding trigger signal in response to a touch operation performed thereon by a user. Specifically, when a user performs a touch operation on the touch screen 150 of the protective case 100 by a finger, the touch screen 150 generates a trigger signal in response to the finger being lifted in an interrupted manner.
In step 420, the processor 120 generates a key value according with the Hid protocol in response to the trigger signal, and sends a control command to the mobile terminal 200 after generating a control command according with the Hid protocol according to the key value.
In particular, the processor 120 is responsive to the trigger signal and generates a key value that conforms to the Hid protocol. The memory 130 stores a correspondence between a predetermined key value and a control instruction. The processor 120 obtains an instruction corresponding to the key value from the memory 130 according to the key value. Processor 120 generates control instructions according to the Hid protocol based on the instructions. The processor 120 controls the communication unit 140 to transmit a control instruction to the mobile terminal 200.
In step 430, the communication unit 240 of the mobile terminal 200 receives the control command.
In step 440, the processor 210 of the mobile terminal 200 responds to the control instruction and performs corresponding operations.
According to the protective shell with the touch function and the touch method and the touch system, the control instruction which accords with the Hid protocol can be directly sent to the mobile terminal after the trigger signal is generated on the touch screen, the mobile terminal can directly respond to the control instruction without installing the application program corresponding to the protective shell on the mobile terminal, the memory occupation of the mobile terminal is reduced, the running speed of the mobile terminal is improved, the abrasion of the entity keys of the mobile terminal can be reduced, the finger operation of a user is facilitated, and the user experience is improved.
The foregoing is a preferred embodiment of the present application and it should be noted that those skilled in the art can make various improvements and modifications without departing from the principle of the present application, and such improvements and modifications are also considered as the scope of the present application.

Claims (17)

  1. A protective shell comprises a shell body, a touch screen, a communication unit and a processor, wherein the touch screen, the communication unit and the processor are respectively arranged on the shell body, the processor is respectively electrically connected with the touch screen and the communication unit, and the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the processor is configured to: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction conforming to the Hid protocol according to the key value; and controlling the communication unit to send the control instruction to a mobile terminal so as to allow the mobile terminal to respond to the control instruction and execute corresponding operation.
  2. The protective case of claim 1, further comprising a memory disposed on the case and electrically connected to the processor, the memory storing a correspondence between preset key values and instructions, the processor being configured to: and acquiring an instruction corresponding to the key value from the memory according to the key value, and generating the control instruction conforming to the Hid protocol according to the instruction.
  3. The protective case of claim 1, wherein the touch operation is at least one of a single click, a double click, a slide, a drag, and a press operation, and the control command is at least one of a sleep, a wake, a click, a page turn, a return, a volume increase or decrease, and a brightness increase or decrease.
  4. The protective case of claim 1, wherein the touch screen corresponds to a touch position of a touch display module of the mobile terminal.
  5. The protective case of claim 1, wherein touch operations on the touch screen correspond one-to-one to operations performed by the mobile terminal.
  6. A protective case according to claim 1 further comprising a power source disposed on the case, the power source providing power to the protective case.
  7. A protective shell touch method is applied to a protective shell, the protective shell comprises a shell body and a touch screen, the touch screen is arranged on the shell body, the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the protective shell touch method comprises the following steps:
    generating a key value conforming to the Hid protocol in response to the trigger signal;
    generating a control instruction conforming to the Hid protocol according to the key value; and
    and sending the control instruction to a mobile terminal to allow the mobile terminal to respond to the control instruction and execute corresponding operation.
  8. The touch method for a protective case according to claim 7, wherein the step of generating the control command conforming to the Hid protocol according to the key value specifically comprises: and acquiring an instruction corresponding to the key value from the corresponding relation between the preset key value and the instruction according to the key value, and generating the control instruction conforming to the Hid protocol according to the instruction.
  9. The touch method for the protective case according to claim 7, wherein the touch operation is at least one of a single click, a double click, a slide, a drag, and a press operation, and the control command is at least one of a sleep, a wake-up, a click, a page turn, a return, a volume increase or decrease, and a brightness increase or decrease.
  10. The protective case touch control method of claim 7, wherein the touch screen corresponds to touch positions of the touch display module of the mobile terminal in a one-to-one manner.
  11. The protective case touch method of claim 7, wherein touch operations on the touch screen correspond to operations executed by the mobile terminal one to one.
  12. A protective shell touch system comprises a protective shell and a mobile terminal, wherein the protective shell is used for being sleeved on the mobile terminal and comprises a shell, a touch screen, a communication unit and a processor, the touch screen, the communication unit and the processor are respectively arranged on the shell, the processor is respectively electrically connected with the touch screen and the communication unit, and the touch screen responds to touch operation of a user on the touch screen through a finger and generates a trigger signal when the user responds to the lifting of the finger in an interruption mode; the processor is configured to: generating a key value conforming to the Hid protocol in response to the trigger signal; generating a control instruction conforming to the Hid protocol according to the key value; and controlling the communication unit to send the control instruction to the mobile terminal, and receiving the control instruction and executing corresponding operation by the mobile terminal.
  13. The protective case touch system of claim 12, wherein the protective case further comprises a memory, the memory is disposed on the case and electrically connected to the processor, the memory stores a correspondence between a preset key value and an instruction, and the processor is configured to: and acquiring an instruction corresponding to the key value from the memory according to the key value, and generating the control instruction conforming to the Hid protocol according to the instruction.
  14. The protective case touch system of claim 12, wherein the touch operation is at least one of a single click, a double click, a slide, a drag, and a press operation, and the control command is at least one of a sleep, a wake, a click, a page turn, a return, volume plus or minus, and brightness plus or minus.
  15. The protective-case touch system of claim 12, wherein the touch screen corresponds to a touch position of a touch display module of the mobile terminal.
  16. The protective-case touch system of claim 12, wherein touch operations on the touch screen correspond one-to-one to operations performed by the mobile terminal.
  17. The protective case touch system of claim 12, wherein the protective case further comprises a power source disposed on the case, the power source providing power to the protective case.
CN201780097410.4A 2017-12-27 2017-12-27 Protective shell with touch function and touch method and system thereof Pending CN111434044A (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2017/119116 WO2019127140A1 (en) 2017-12-27 2017-12-27 Protection shell having touch function, and touch method and system therefor

Publications (1)

Publication Number Publication Date
CN111434044A true CN111434044A (en) 2020-07-17

Family

ID=67062768

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201780097410.4A Pending CN111434044A (en) 2017-12-27 2017-12-27 Protective shell with touch function and touch method and system thereof

Country Status (2)

Country Link
CN (1) CN111434044A (en)
WO (1) WO2019127140A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116193551B (en) * 2023-04-24 2023-07-25 环球数科集团有限公司 Low-power-consumption intelligent electronic control device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101957640A (en) * 2010-10-27 2011-01-26 汉王科技股份有限公司 Protective sleeve with touch input function
CN203027309U (en) * 2012-12-10 2013-06-26 上海伦图电子有限公司 Mobile phone protective shell
CN104661454A (en) * 2013-11-22 2015-05-27 鸿富锦精密工业(深圳)有限公司 Protecting shell and touch control electronic device
CN205050107U (en) * 2015-09-06 2016-02-24 叶永雄 Intelligence touch -sensitive screen protection film and mobile phone touch screen protective housing
CN105407233A (en) * 2015-12-10 2016-03-16 深圳一微克科技有限公司 Control recognition method and device based on mobile phone protection case
CN105744016A (en) * 2014-12-31 2016-07-06 深圳富泰宏精密工业有限公司 Protective sleeve and electronic device assembly using same
CN106993099A (en) * 2017-04-07 2017-07-28 王伟 A kind of mobile phone protective cover and its control method with flexible touch screen
US20170310353A1 (en) * 2001-11-19 2017-10-26 Otter Products, Llc Protective cover for electronic device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170310353A1 (en) * 2001-11-19 2017-10-26 Otter Products, Llc Protective cover for electronic device
CN101957640A (en) * 2010-10-27 2011-01-26 汉王科技股份有限公司 Protective sleeve with touch input function
CN203027309U (en) * 2012-12-10 2013-06-26 上海伦图电子有限公司 Mobile phone protective shell
CN104661454A (en) * 2013-11-22 2015-05-27 鸿富锦精密工业(深圳)有限公司 Protecting shell and touch control electronic device
CN105744016A (en) * 2014-12-31 2016-07-06 深圳富泰宏精密工业有限公司 Protective sleeve and electronic device assembly using same
CN205050107U (en) * 2015-09-06 2016-02-24 叶永雄 Intelligence touch -sensitive screen protection film and mobile phone touch screen protective housing
CN105407233A (en) * 2015-12-10 2016-03-16 深圳一微克科技有限公司 Control recognition method and device based on mobile phone protection case
CN106993099A (en) * 2017-04-07 2017-07-28 王伟 A kind of mobile phone protective cover and its control method with flexible touch screen

Also Published As

Publication number Publication date
WO2019127140A1 (en) 2019-07-04

Similar Documents

Publication Publication Date Title
US20230246475A1 (en) Electronic device and method for wired and wireless charging in electronic device
EP3435199B1 (en) Method, mobile terminal and non-transitory computer-readable storage medium for adjusting scanning frequency of touch screen
EP3780676B1 (en) Method for automatically switching sim cards, and electronic apparatus
KR102219861B1 (en) Method for sharing screen and electronic device thereof
US9772711B2 (en) Input processing method and electronic device thereof
US20160109936A1 (en) Display control method and protective cover in electronic device
KR20150107448A (en) Task Migration Method and Apparatus
US9411399B2 (en) Portable electronic device and method of providing remaining amount of electric power of battery in portable electronic device
CN107147798A (en) A control method for terminal output current and terminal
CN110837343A (en) Snapshot processing method and device and terminal
CN110602772A (en) WiFi module control method, control device, electronic device and storage medium
CN111104180B (en) Application program optimization method and device, storage medium and electronic equipment
CN107291213B (en) Mode selection method, apparatus, terminal, and computer-readable storage medium
CN111309325A (en) Method and device for reference of third-party library and mobile terminal
KR102257823B1 (en) Apparatus and method for controlling operation of arithmetic and logical device
CN107277906B (en) Mode selection method, device, terminal and computer readable storage medium
CN111434044A (en) Protective shell with touch function and touch method and system thereof
CN107340963B (en) Information processing method and electronic equipment
CN107729145A (en) Application program operation control method and device
CN111404242A (en) Charging method, charging device, storage medium and mobile terminal
US11700324B2 (en) Electronic device having connection path between buck converters
CN111666226B (en) Page bump protection method for operating system memory recovery and user equipment
CN111857522A (en) Interactive method, portable terminal, terminal rear cover and storage medium
KR20210092083A (en) The electronic device processing image data and the method for processing image data
CN112770296B (en) Registration activation method and device for electronic equipment, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: Building 43, Dayun software Town, No. 8288 Longgang Avenue, Henggang street, Longgang District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Ruoyu Technology Co.,Ltd.

Address before: Building 43, Dayun software Town, No. 8288 Longgang Avenue, Henggang street, Longgang District, Shenzhen City, Guangdong Province

Applicant before: SHENZHEN ROYOLE TECHNOLOGIES Co.,Ltd.

CB02 Change of applicant information
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200717

WD01 Invention patent application deemed withdrawn after publication