Browse Prior Art Database

Method for Automatic Contextual Transposition by Confirmation of Delivery Option

IP.com Disclosure Number: IPCOM000111592D
Original Publication Date: 1994-Mar-01
Included in the Prior Art Database: 2005-Mar-26
Document File: 2 page(s) / 58K

Publishing Venue

IBM

Related People

Johnson, WJ: AUTHOR [+2]

Abstract

Provided is a means for allowing a user to specify an application and context therein for being automatically transposed to upon receiving a Confirmation of Delivery (COD) status.

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 52% of the total text.

Method for Automatic Contextual Transposition by Confirmation of
Delivery Option

      Provided is a means for allowing a user to specify an
application and context therein for being automatically transposed to
upon receiving a Confirmation of Delivery (COD) status.

      Often a user wants to automatically be transposed to a
particular application context upon receipt of a particular
confirmation of delivery status.  For example, when a particular COD
status is received, the originator may want to be immediately placed
into the connected telephone application for calling a third party.
A method is needed for a user to specify a COD option which
automatically transposes the user to an arbitrarily specified context
upon receiving the COD status.

      An originator of a distribution, at the time of setting a COD
option, has the ability to mark an arbitrary application context
which he will automatically be transposed to upon receipt of the COD
status.  The user specifies whether a specific recipient, all
recipients or a specified set of recipients in the recipient list are
to be the key for causing automatic transposition.  Not until all
selected recipients have status returned will the originator be
automatically transposed to the specified application.  When status
is received for all selected recipients, the automatic transposition
occurs as soon as the originating user is detected at the computer
(e.g., using keyboard).  If the system is soft-locked during
successful dete...