Method and apparatus for accessing a contacts database and telephone services
First Claim
1. A method for operating a computing device, the method comprising:
- detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value;
using the first value of the first key entry to produce a first result of the first application;
providing the first result;
using the second value of the first key entry to produce a second result of the second application;
providing the second result;
detecting a second key entry;
if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then;
using the third value of the second key entry to produce a third result of the first application,providing the third result,using the fourth value of the second key entry to produce a fourth result of the second application,providing the fourth result,else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of only the first application using the first value of the first key entry and the third value of the second key entry.
4 Assignments
0 Petitions
Accused Products
Abstract
Embodiments described herein provide a method and technique for operating a computing device. An interface is displayed for enabling the computing device to control a voicemail system. The interface includes one or more display objects, wherein each display object is selectable by a user to enter a command input assigned to that display object. A selection is detected of any one of the one or more display objects, and the command input assigned to the display object is identified. A signal tone is generated corresponding to the command input. The signal input may be transmitted across a network to the voicemail system to communicate a command to the voicemail system.
293 Citations
17 Claims
-
1. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value; using the first value of the first key entry to produce a first result of the first application; providing the first result; using the second value of the first key entry to produce a second result of the second application; providing the second result; detecting a second key entry; if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then; using the third value of the second key entry to produce a third result of the first application, providing the third result, using the fourth value of the second key entry to produce a fourth result of the second application, providing the fourth result, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of only the first application using the first value of the first key entry and the third value of the second key entry. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value; if the first key entry is a press and hold, performing one or more actions previously associated with the first key entry being pressed and held; else, performing steps comprising; using the first value of the first key entry to produce a first result of the first application; providing the first result; using the second value of the first key entry to produce a second result of the second application; providing the second result; detecting a second key entry; if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then; using the third value of the second key entry to produce a third result of the first application, providing the third result, using the fourth value of the second key entry to produce a fourth result of the second application, providing the fourth result, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of only the first application using the first value of the first key entry and the third value of the second key entry. - View Dependent Claims (9, 10, 11)
-
-
12. A method for operating a computing device, the method comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a alphabet value, and (ii) a second application operating on the computing device as having a numeric value; if the computing device is in active telephonic use, automatically detecting the first key entry as a Dial Tone Multiplier Frequency signal associated with the numeric value; else if the first key entry is a press and hold, performing one or more actions previously associated with the first key entry being pressed and held; else, performing steps comprising; using the alphabet value of the first key entry to produce a first result of the first application; providing the first result; using the numberic value of the first key entry to produce a second result of the second application; providing the second result; detecting a second key entry; if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then; using the third value of the second key entry to produce a third result of the first application, providing the third result, using the fourth value of the second key entry to produce a fourth result of the second application, providing the fourth result, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of only the first application using the alphabet value of the first key entry and the third value of the second key entry. - View Dependent Claims (13, 14, 15, 16)
-
-
17. A computer-readable medium carrying instructions for operating a computing device, the instructions including instructions for performing steps comprising:
-
detecting a first key entry that is ambiguous as being interpretable by (i) a first application operating on the computing device as having a first value, and (ii) a second application operating on the computing device as having a second value; using the first value of the first key entry to produce a first result of the first application; providing the first result; using the second value of the first key entry to produce a second result of the second application; providing the second result; detecting a second key entry; if the second key entry is ambiguous as being interpretable by the first application as having a third value and by the second application as having a fourth value, then; using the third value of the second key entry to produce a third result of the first application, providing the third result, using the fourth value of the second key entry to produce a fourth result of the second application, providing the fourth result, else if the second key entry is unambiguous as being interpretable by only the first application, then providing a result of only the first application using the first value of the first key entry and the third value of the second key entry.
-
Specification