2 theory of operation, 2 theory of operation -2 – Cirrus Logic EP93xx User Manual

Page 764

Advertising
background image

26-2

DS785UM1

Copyright 2007 Cirrus Logic

Keypad Interface
EP93xx User’s Guide

2

6

2

6

26

26.2 Theory of Operation

The circuitry scans an array of up to 64 keys. The keys are normally open, single pole
contacts arranged in an array of 8 rows by 8 columns. The array may be partially filled. The
key array rows are designated as ROW0 through ROW7, and the columns are designated as
COL0 through COL7.

Any 1 or 2 keys in the array that are pressed are de-bounced and decoded. If more than 2
keys are pressed, only the keys or apparent keys in the array with the lowest address will be
decoded.

Keys or apparent keys with address values greater than that of the lowest two will be ignored.
An apparent key is a condition that may occur when more than 2 keys are pressed. Apparent
keys are caused by alternate current paths in the key array.

A key address is the binary row number concatenated with the binary column address. Key
addresses range from 0x00 to 0x3F. A diagram of the key array is shown in

Figure 26-2

.

The circuitry scans the key array by driving each ROW line low, one line at a time. At the end
of each ROW time period, column data is read. The key array column lines are registered and
decoded by a multiplexer. The column address selects the column multiplexer input. Each of
the column lines is passively pulled up by the chip.

When a key is pressed, the column line for the key will be driven low when the row which
contains the key is driven low. On the next key array scan, the output of the multiplexer in the
chip will be asserted active when the row and column is the same as the key address. When
the multiplexer output is active then the key is detected and the address is stored, if it is one
of the first two from the start of a key array scan.

When more than 2 keys are pressed, it is possible to detect apparent keys. Apparent keys
look like actual pressed keys to the device but are not. An example of an apparent key is
described in

“Apparent Key Detection”

.

Advertising