QT60161B-A QUANTUM [Quantum Research Group], QT60161B-A Datasheet - Page 18

no-image

QT60161B-A

Manufacturer Part Number
QT60161B-A
Description
16 KEY QMATRIX KEYPANEL SENSOR IC
Manufacturer
QUANTUM [Quantum Research Group]
Datasheet

Available stocks

Company
Part Number
Manufacturer
Quantity
Price
Part Number:
QT60161B-AS
Manufacturer:
Atmel
Quantity:
10 000
Part Number:
QT60161B-ASG
Manufacturer:
FREESCALE
Quantity:
21 956
Part Number:
QT60161B-ASG
Manufacturer:
Atmel
Quantity:
10 000
5.2 Scope Commands
The host should always set the scope parameter when
initializing the part during normal operation as well as during
setup. Scope commands are persistent and apply to all
subsequent functions that are affected by scope, until a
different scope command is issued. On powerup or after reset
the device defaults to scope = 'all keys'.
Many functions only address one key regardless of the
current scope; in these cases the key being addressed is
always the key last set by the ‘s’ or ‘x’ and ‘y’ commands. If
the ‘s’ command was last set to key 9, then even though the
‘S’ command was issued afterwards the one-key scope will
remain key ‘9’. Similarly if ‘x’ was set to 2 and ‘y’ to 3, then
the one-key scope will remain key x=2 / y=3 (key #14). This
rule operates for either Put or Get commands.
Key numbering convention: The numbering of keys goes by
row then column. For example, the key in row X=3, column
Y=1 (X3Y1) is key 7. The formula for conversion of an X-Y
location to a key number is:
Row and column numbers are per Fig. 1-5. Keys are acquired
in this same burst sequence, i.e. X0Y0, X1Y0, X2Y0 etc.
Lowercase 'S'. Targets a specific individual key for all further
functions that are affected by scope. The second byte must
contain a binary key number from 0..15.
Uppercase 'S'. Addresses all keys in the matrix for all further
functions that can target a group of keys.
Lowercase 'X'. Targets keys in a specific row for functions
that can address key groups. The second byte must contain a
row number from 0..3.
Lowercase 'Y'. Targets keys in a specific column for functions
that can address key groups. The second byte is a binary
column number from 0..3.
lQ
x
s
S
y
Put
Get
Put
Get
Put
Get
Put
Get
key number = X_row + (Y_column x 4)
0
0
0
0
X
X
X
X
78 - R
73 - S
79 - C
53 - A
Scope
Scope
Scope
Scope
n/a
n/a
n/a
n/a
n/a
n/a
n/a
n/a
OW
PECIFIC
OLUMN
LL
K
K
EYS
EYS
Bytes / Cmd
Bytes / Cmd
Bytes / Cmd
Bytes / Cmd
K
K
EYS
S
S
EY
n/a
n/a
n/a
n/a
COPE
COPE
2
1
2
2
S
S
COPE
COPE
2nd Byte Range
2nd Byte Range
2nd Byte Range
2nd Byte Range
0x00..0x0F
0x00..0x03
0x00..0x03
n/a
n/a
n/a
n/a
n/a
©Quantum Research Group Ltd.
Returns
Returns
Returns
Returns
0x73
0x53
0x78
0x79
n/a
n/a
n/a
n/a
18
5.3 Status Commands
Status commands cause the sensor to report back
information related to keys and their signals.
It is not necessary to set the part to Get mode with these
commands, although it is advised to leave the part in Get
mode as a normal precaution (see Section 5.1)
Numeric '0'. Returns the signal level in 16-bit unsigned binary
for one key whose location is determined by scope. The least
significant byte is returned first.
Note that the signal direction is inverted: decreasing values
correspond to more touch due to the physics of key detection
described in Section 1.1.
Numeric '1'. Returns the value {Reference - Signal} in
unsigned 8-bit binary for one key whose location is
determined by scope. If Signal > Reference, the result is
truncated to zero. The return value is also limited to 255
(0xFF).
Increasing amounts of this value correspond to increasing
amounts of touch as the sign of signal is inverted (see 0x30
above).
Numeric '2'. Returns the Reference value in unsigned 16-bit
binary for one key whose location is determined by scope.
The least significant byte is returned first.
Numeric '5'. Returns the Detection Integrator counter value
for one key whose location is determined by scope. This
function is useful primarily for circuit diagnostics.
Numeric '6'. Returns the entire eeprom checksum. This
function is useful primarily for diagnostics and should
periodically be used to check for valid eeprom contents.
The checksum should be computed when the entire device's
settings, including the locked reference levels ('L' command)
are known. The host can then periodically test the checksum
to validate eeprom integrity. If needed, the eeprom can then
1
0
2
5
6
Get
Get
Get
Get
Get
Put
Put
Put
Put
Put
0
0
0
0
0
X
X
X
X
X
31 - D
30 - S
32 - R
35 - D
36 - E
Scope
Scope
Scope
Scope
Scope
n/a
n/a
n/a
n/a
n/a
n/a
1
ELTA
1
1
1
IGNAL FOR
EPROM
EFERENCE
ETECTION
www.qprox.com QT60161B / R1.03
S
IGNAL FOR
Bytes / Cmd
Bytes / Cmd
Bytes / Cmd
Bytes / Cmd
Bytes / Cmd
C
HECKSUM
I
S
V
NTEGRATOR
n/a
n/a
n/a
n/a
n/a
1
1
1
1
1
INGLE
ALUE
S
K
INGLE
EY
# Bytes Rtnd
# Bytes Rtnd
# Bytes Rtnd
# Bytes Rtnd
# Bytes Rtnd
C
OUNTS
K
n/a
n/a
n/a
n/a
n/a
2
1
2
1
1
EY
0x00..0xFF
0x00..0xFF
0x00..0xFF
0..0xFFFF
0..0xFFFF
Returns
Returns
Returns
Returns
Returns
n/a
n/a
n/a
n/a
n/a

Related parts for QT60161B-A