Key operation identification method and device

A recognition method and button technology, applied in the field of communication, can solve problems such as poor user experience, high cost of mobile terminal design, and inflexible processing methods, and achieve low cost, simple and flexible implementation methods, and good user experience

Inactive Publication Date: 2017-10-31
ZTE CORP
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Embodiments of the present invention provide a key operation identification method and device to at least solve the problem of high mobile terminal design costs, inflexible processing methods, and poor user experience caused by using hardware to solve the problem of user misoperation of keys in the related art. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Key operation identification method and device
  • Key operation identification method and device
  • Key operation identification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Taking running on a mobile terminal as an example, figure 1 It is a block diagram of the hardware structure of a mobile terminal according to a key operation identification method according to an embodiment of the present invention. Such as figure 1 As shown, the mobile terminal 10 may include one or more (only one is shown in the figure) processor 102 (the processor 102 may include but not limited to a processing device such as a microprocessor MCU or a programmable logic device FPGA, etc.), for A memory 104 for storing data, and a transmission device 106 for communication functions. Those of ordinary skill in the art can understand that, figure 1 The shown structure is only for illustration, and it does not limit the structure of the above-mentioned electronic device. For example, the mobile terminal 10...

Embodiment 2

[0069]In this embodiment, there is also provided a key operation recognition device, which is used to implement the above embodiments and preferred implementation modes, and what has already been described will not be repeated. As used below, the term "module" may be a combination of software and / or hardware that realizes a predetermined function. Although the devices described in the following embodiments are preferably implemented in software, implementations in hardware, or a combination of software and hardware are also possible and contemplated.

[0070] Figure 5 is a structural block diagram of a key-operated identification device according to an embodiment of the present invention, such as Figure 5 As shown, the device includes a receiving module 52, a first acquiring module 54, a judging module 56 and a determining module 58:

[0071] A receiving module 52, configured to receive a key trigger message for the mobile terminal;

[0072] The first acquiring module 54,...

Embodiment 3

[0093] In this embodiment, a key-operated mobile terminal is also provided. Figure 7 is a schematic structural diagram of a mobile terminal according to an embodiment of the present invention, such as Figure 7 As shown, the mobile terminal 70 includes: a gravity sensor 702, an image acquisition device 704 and a processor 706:

[0094] The gravity sensor 702 is configured to collect the acceleration value of the mobile terminal, and send the acceleration value as a state value to the processor for processing, wherein the state value is used to indicate that the mobile terminal is relative to the current the user's exercise status;

[0095] An image collection device 704, configured to collect the facial features of the current user;

[0096] Optionally, the image collection device 704 can collect face recognition parameters such as gray feature points, light intensity, and angle of the current user; it can also collect the face contour of the current user; it can also colle...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a key operation identification method and device. The method comprises the following steps of: receiving a key trigger message aiming at a mobile terminal; obtaining a state value of the mobile terminal and detecting a facial feature of the current user, wherein the state value is used for indicating a movement state of the mobile terminal relative to the current user; judging whether the state value is smaller than a preset threshold value or not and judging whether the facial feature is detected or not; determining whether a key operation corresponding to the key trigger message is an effective key operation or not according to judging results obtained in the last step. Through the method and device, the problems that the mobile terminal design cost is high, the processing manner is inflexible and the user experience is bad as key misoperation problems of users are solved by utilizing a hardware manner in correlation techniques are solved, so that the effects of being simple and flexible in realization manner, low in cost and good in user experience are achieved.

Description

technical field [0001] The present invention relates to the field of communications, in particular to a method and device for identifying key operations. Background technique [0002] During the normal use of the mobile terminal by the user, the buttons of the mobile terminal (such as external physical buttons) are often touched by mistake, causing troubles to the user. In the case of the side of the mobile phone, sometimes when walking with the mobile phone in hand, the user accidentally presses the physical button. In this case, the mobile phone often restarts without the user's knowledge, shuts down or increases or decreases the volume inexplicably, causing great trouble to the user when using the mobile phone. In related technologies, it is common practice to use physical protection measures for misoperation of external physical buttons of the mobile phone. For example, such as adding a protective cover, increasing the hardness of the physical key, and increasing the k...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F3/01
CPCG06F3/01G06F3/011
Inventor 赵金
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products