5.2 Scope Commands
The host should always set the scope parameter when
initializing the part during normal operation as well as during
setup. Scope commands are persistent and apply to all
subsequent functions that are affected by scope, until a
different scope command is issued. On powerup or after reset
the device defaults to scope = 'all keys'.
Many functions only address one key regardless of the
current scope; in these cases the key being addressed is
always the key last set by the
‘
s
’
or
‘
x
’
and
‘
y
’
commands. If
the
‘
s
’
command was last set to key 9, then even though the
‘
S
’
command was issued afterwards the one-key scope will
remain key
‘
9
’
. Similarly if
‘
x
’
was set to 2 and
‘
y
’
to 3, then
the one-key scope will remain key x=2 / y=3 (key
#
14). This
rule operates for either Put or Get commands.
Ke
y
num
b
erin
g
c
on
v
ention:
The numbering of keys goes by
row then column. For example, the key in row X=3, column
Y=1 (X3Y1) is key 7. The formula for conversion of an X-Y
location to a key number is
:
key number = X
_
row
+
(Y
_
column x 4)
Row and column numbers are per Fig. 1-5. Keys are acquired
in this same burst sequence, i.e. X0Y0, X1Y0, X2Y0 etc.
s
0
X
73 - S
PECIFIC
K
EY
S
COPE
Scope
n/a
n/a
n/a
n/a
Get
0x73
0x00..0x0F
2
n/a
Put
Returns
2nd Byte Range
Bytes / Cmd
Lowercase 'S'. Targets a specific individual key for all further
functions that are affected by scope. The second byte must
contain a binary key number from 0..15.
S
0
X
53 - A
LL
K
EYS
S
COPE
Scope
n/a
n/a
n/a
n/a
Get
0x53
n/a
1
n/a
Put
Returns
2nd Byte Range
Bytes / Cmd
Uppercase 'S'. Addresses all keys in the matrix for all further
functions that can target a group of keys.
x
0
X
78 - R
OW
K
EYS
S
COPE
Scope
n/a
n/a
n/a
n/a
Get
0x78
0x00..0x03
2
n/a
Put
Returns
2nd Byte Range
Bytes / Cmd
Lowercase 'X'. Targets keys in a specific row for functions
that can address key groups. The second byte must contain a
row number from 0..3.
y
0
X
79 - C
OLUMN
K
EYS
S
COPE
Scope
n/a
n/a
n/a
n/a
Get
0x79
0x00..0x03
2
n/a
Put
Returns
2nd Byte Range
Bytes / Cmd
Lowercase 'Y'. Targets keys in a specific column for functions
that can address key groups. The second byte is a binary
column number from 0..3.
5.3 Status Commands
Status commands cause the sensor to report back
information related to keys and their signals.
It is not necessary to set the part to Get mode with these
commands, although it is advised to leave the part in Get
mode as a normal precaution (see Section 5.1)
0
0
X
30 - S
IGNAL
FOR
S
INGLE
K
EY
Scope
0..0xFFFF
2
1
1
Get
n/a
n/a
n/a
n/a
Put
Returns
# Bytes Rtnd
Bytes / Cmd
Numeric '0'. Returns the signal level in 16-bit unsigned binary
for one key whose location is determined by scope. The least
significant byte is returned first.
Note that the signal direction is inverted
:
decreasing values
correspond to more touch due to the physics of key detection
described in Section 1.1.
1
0
X
31 - D
ELTA
S
IGNAL
FOR
S
INGLE
K
EY
Bytes / Cmd
Scope
0x00..0xFF
1
1
1
Get
n/a
n/a
n/a
n/a
Put
Returns
# Bytes Rtnd
Numeric '1'. Returns the value
{
Reference - Signal
}
in
unsigned 8-bit binary for one key whose location is
determined by scope. If Signal
>
Reference, the result is
truncated to zero. The return value is also limited to 255
(0xFF).
Increasing amounts of this value correspond to increasing
amounts of touch as the sign of signal is inverted (see 0x30
above).
2
0
X
32 - R
EFERENCE
V
ALUE
Scope
0..0xFFFF
2
1
1
Get
n/a
n/a
n/a
n/a
Put
Returns
# Bytes Rtnd
Bytes / Cmd
Numeric '2'. Returns the Reference value in unsigned 16-bit
binary for one key whose location is determined by scope.
The least significant byte is returned first.
5
0
X
35 - D
ETECTION
I
NTEGRATOR
C
OUNTS
Bytes / Cmd
Scope
0x00..0xFF
1
1
1
Get
n/a
n/a
n/a
n/a
Put
Returns
# Bytes Rtnd
Numeric '5'. Returns the Detection Integrator counter value
for one key whose location is determined by scope. This
function is useful primarily for circuit diagnostics.
6
0
X
36 - E
EPROM
C
HECKSUM
Scope
0x00..0xFF
1
1
n/a
Get
n/a
n/a
n/a
n/a
Put
Returns
# Bytes Rtnd
Bytes / Cmd
Numeric '6'. Returns the entire eeprom checksum. This
function is useful primarily for diagnostics and should
periodically be used to check for valid eeprom contents.
The checksum should be computed when the entire device's
settings, including the locked reference levels ('L' command)
are known. The host can then periodically test the checksum
to validate eeprom integrity. If needed, the eeprom can then
Quantum Research Group Ltd.
l
Q
18
www.qprox.com QT60161B / R1.03