Method and apparatus for accessing a contacts database and telephone services
First Claim
1. A method for operating a computing device, the method comprising:
- detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value;
providing a result of the first application using the first value of the first key entry;
providing a result of the second application using the second value of the first key entry;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
providing a result of the first application using the third value of the second key entry, providing a result of the second application using the fourth value of the second key entry, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of the only the first application using the first value of the first key entry and the third value of the second key entry.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein provide a method and technique for operating a computing device. An interface is displayed for enabling the computing device to control a voicemail system. The interface includes one or more display objects, wherein each display object is selectable by a user to enter a command input assigned to that display object. A selection is detected of any one of the one or more display objects, and the command input assigned to the display object is identified. A signal tone is generated corresponding to the command input. The signal input may be transmitted across a network to the voicemail system to communicate a command to the voicemail system.
63 Citations
17 Claims
-
1. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value;
providing a result of the first application using the first value of the first key entry;
providing a result of the second application using the second value of the first key entry;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
providing a result of the first application using the third value of the second key entry, providing a result of the second application using the fourth value of the second key entry, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of the only the first application using the first value of the first key entry and the third value of the second key entry. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value;
if the first key entry is a press and hold, performing one or more actions previously associated with the first key entry being pressed and held;
else, performing steps comprising;
providing a result of the first application using the first value of the first key entry;
providing a result of the second application using the second value of the first key entry;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
providing a result of the first application using the third value of the second key entry, providing a result of the second application using the fourth value of the second key entry, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of the only the first application using the first value of the first key entry and the third value of the second key entry. - View Dependent Claims (9, 10, 11)
-
-
12. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a alphabet value, and (ii) a second application operating on the computing device as having a numeric value;
if the computing device is in active telephonic use, automatically detecting the first key entry as a Dial Tone Multiplier Frequency signal associated with the numeric value;
else if the first key entry is a press and hold, performing one or more actions previously associated with the first key entry being pressed and held;
else, performing steps comprising;
providing a result of the first application using the alphabet value of the first key entry;
providing a result of the second application using the numeric value of the first key entry;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
providing a result of the first application using the third value of the second key entry, providing a result of the second application using the fourth value of the second key entry, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of the only the first application using the alphabet value of the first key entry and the third value of the second key entry. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-readable medium carrying instructions for operating a computing device, the instructions including instructions for performing steps comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value;
providing a result of the first application using the first value of the first key entry;
providing a result of the second application using the second value of the first key entry;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
providing a result of the first application using the third value of the second key entry, providing a result of the second application using the fourth value of the second key entry, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of the only the first application using the first value of the first key entry and the third value of the second key entry.
-
Specification