“I am driving/busy” automatic response system for mobile phones

ABSTRACT

A cell phone which has been modified by the addition of software which responds to the press of one or more Busy keys by automatically sending a pre-typed text message to the sender of the latest text message just received or automatically answering an incoming call immediately upon pressing the Busy key and playing a pre-recorded audio message. The outgoing text or audio message can inform the sender of the incoming text or the caller that the user is driving or otherwise engaged and cannot respond immediately. In some embodiments, one or more Busy keys can be added keys or one or more existing keys on the cell phone or on the keypad of the cell phone or on a touchscreen or a visual depiction of a keypad on a touchscreen of the cell phone.

BACKGROUND OF THE INVENTION

Recent studies have shown that driving while texting on a cell phone ismore dangerous than driving while intoxicated. Older studies have linkedhigher traffic accident rates to talking on cell phones while driving.

However, some people use their cell phones for business and do not wantclients or customers to wonder why they did not call back right away.Other people just want to be able to respond promptly in some fashionwithout endangering themselves or others so the person calling them ortexting them knows what is going on or does not start to worry since theperson normally responds right away to a text or phone call.

An article in a Nov. 22, 2009 Dallas newspaper described a subscriptionsystem called ZoomSafer™ that renders driving when a cell phone ispresent safer. The system uses the GPS on the phone to detect when theuser is driving and then disables the cell phone until the driver stopsthe car. This system is believed to shut off the user's phone while theuser is driving. The problem with such a system is that the user maywish to know who is calling or texting, and, if the call or text isimportant enough, pull over, stop the car and answer the text or call.

Other companies such as GM assume that drivers' judgment can be trustedand they have implemented handsfree Onstar™ systems to voice dialnumbers that have been previously stored and given a nametag by pushingthe Onstar phone button and asking the user to speak the nametag. Thesystem then automatically dials the phone number stored in the car'scomputer using a cell phone built into the car and minutes purchasedfrom Onstar. GM has also implemented Bluetooth™ systems to dial thephone owned by the user by coupling the user's cell phone to the car'saudio system and allowing the user to dial a number from a keypaddisplayed on the navigation system display of the vehicle or from thecell phone or cell phone address book. The audio of the call is playedthrough the car's audio system and a microphone in the car picks up thedriver's voice and couples it to the cell phone for transmission usingthe Bluetooth system. Ford and Microsoft are selling systems that relyon voice commands to dial phones. The systems that disable the cellphone using the GPS have caught the attention of the insurance companiesbecause studies show that driving while talking on a cell phone isdangerous even if the driver is using a headset and has both hands onthe wheel. One insurance company has said it will offer discounts tocustomers who use a call-blocking service to disable their phones. Othercompanies such as Aegis Mobility and obdEdge employ systems that placerestrictions on phones based upon the phone's GPS signal, data from thecar itself or from nearby cell towers. Any incoming calls are routed tovoice mail or a message explaining that the phone's user is driving.Exceptions can be made for certain numbers. The exceptions are the onlycontrol the user of the cell phone has in these systems to allow a callto come through. This puts too much restriction on the driver toanticipate who might be calling and gives the driver no option to seethe caller IDs of all incoming calls and decide whether or not to pullover and take the call or just take the call while driving and take therisk.

Another prior art feature found in some phones is called “Quick Text”and it features a menu from which the user can choose “canned” (alreadytyped and stored in the phone) responses to send in response to a textmessage received. In a “Quick Text” capable phone, all the steps toreply to a text message must be done as they are normally done, but witha few extra keystrokes, the user can choose a message that has alreadybeen typed instead of having to type a reply message. That is, the userreceives a notification that a text (SMS) message has arrived, does akeystroke or two to select the text application program and select thetext message to view, does a keystroke to put the phone into reply modebut then the user may do another keystroke to open a menu of cannedmessages to send as a reply. Typically, this is a keystroke to select an“Options” icon (give a command to open a menu which includes a command“Add Quick Text”). Then another keystroke is required to select the “AddQuick Text” command. This keystroke brings up a list of canned messagesthat can be selected and sent such as “thanks”, “yes”, “no”, etc. One ormore keystrokes or scrolling action or trackball action is then requiredto select the canned message to send and then another keystroke isrequired to put the canned message into the reply screen as the messageto be sent. Then another keystroke is required to actually send thecanned message just selected. That is quite a few keystrokes andrequires too much attention to the phone, its display and its keypad. Itwould be too many keystrokes and diverted attention to do while drivingand still drive safely.

There has therefore arisen a need for a simple, fast, safe way for theuser of a cell phone who is driving to know who is calling or texting,and, with a single push of a button, send a pre-typed message to a textsender or a pre-recorded voice message to a caller who is calling inwhile the owner of a cell phone is driving or otherwise engaged if thedriver chooses not to take the call or reply to the text while drivingand chooses not to pull over and take the call or reply to the text.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is a block diagram of the environment in which the inventionworks and a block diagram of a broad concept of the invention.

FIG. 2 is a block diagram of an example along the lines of the teachingsof the invention in the form of a Blackberry™ Bold smartphone that hasbeen modified to add two Busy: Respond Later™ keys 50 for SMS and 52 fora Call to the hardware.

FIG. 3 is a block diagram of another smartphone which has a single,context-sensitive key that has either been added to the existing keypadand read by keypad controller or which is an existing key on the keypadwhich is read by the kernel software through a keyboard driver.

FIG. 4 is a diagram of the modified software stack architecture of atypical smartphone to which the Busy: Respond Later™ application hasbeen added.

FIG. 5 is a flow diagram of one embodiment for a two Busy button processimplemented by a Busy: Respond Later™ application to automaticallyrespond to a Busy button push in either of two ways depending upon whichbutton was pushed.

FIG. 6 is a flowchart for one example of a single, context sensitive BRLapp process where the BRL app responds in either of two ways dependingupon what the context was when the context sensitive Busy button waspushed.

FIG. 7 is a flowchart for one example of a single-button,context-sensitive embodiment to, upon one or more pushes of a singleBusy button, both launch the Busy application 169 (FIG. 4) and use it tosend an automated text message in response if a text message was justreceived or, if an incoming call is being received when said Busy buttonis pushed, play an automated voice response to a caller and thenautomatically send the call to voice mail and record any message thecaller leaves.

FIG. 8 is a flowchart for one example of a single-button,context-sensitive embodiment to, upon one or more pushes of a singleBusy button both launch the Busy application 169 (FIG. 4) and use it tosend an automated text message in response if a text message was justreceived or, if an incoming call is being received when saidBusy buttonis pushed, play the automated voice response to a caller and then hangup the phone to end the call without sending the caller to voicemail.

FIG. 9 is a flowchart for one example of a two-button “one push”embodiment to, upon one or more pushes of a single Busy button, bothautomatically launch the Busy application 169 (FIG. 4) and use it toautomatically send a pre-typed text message in response if a textmessage was just received or, if an incoming call is being received whensaid Busy button is pushed, play an automated voice response to a callerand then automatically send the call to voice mail and record anymessage the caller leaves.

FIG. 10 is a flowchart for one example of a two-button “one push”embodiment to, upon one or more pushes of a single Busy button, bothautomatically launch the Busy application 169 (FIG. 4) and use it toautomatically send a pre-typed text message in response if a textmessage was just received or, if an incoming call is being received whensaid Busy button is pushed, play an automated voice response to a callerand then automatically hang up the phone without sending the call tovoicemail.

FIG. 11 is a flowchart of a two-key embodiment which requires multiplepushes within a short time to automatically launch the Busy application169 (FIG. 4) and automatically send a pre-typed text reply to a textsender or a pre-recorded voice response to a caller.

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENT

A conventional cell phone, preferably one which displays the identity ofa caller or text sender who is in the address book of the owner of thecell phone, is modified to implement the teachings of the invention. Themodification involves having either one or two new buttons on the phoneor keypad (or one or two keystrokes of existing keys), hereaftersometimes referred to as Busy buttons, which can be pushed toautomatically send a pre-typed text message and/or answer an incomingcall and send a pre-recorded voice message to the caller if the Busy:Respond Later™ application has been launched and the user chooses not toimmediately answer the text or phone call while driving or otherwiseengaged. In some embodiments, the Busy: Respond Later™ applicationprocess might be launched manually by the user before he or she startsto drive, etc. In other embodiments, the Busy: Respond Later™application process is automatically launched when the GPS of the phonesenses the phone is moving at a speed faster than a user can walk. Inother embodiments, the Busy: Respond Later™ application process isautomatically launched when the phone is booted up. In the claims, thestep of launching the Busy: Respond Later™ process is intended to coverat least all four of these embodiments for how the Busy: Respond Later™process is launched.

The Busy: Respond Later™ button or buttons can either be a new button orbuttons added to the phone or to the keypad of the phone, as isillustrated in the examples, or already existing buttons on the phone orkeypad of the phone. In some embodiments, the outgoing message can befixed such as “I am busy right now and will respond later”. In otherembodiments, the outgoing automated message (text or voice message) canbe selected by the user during configuration of the Busy: Respond Later™application from a number of different “canned” messages supplied by themanufacturer of the phone. In other embodiments, the outgoing message ormessages is a message that the user types in and/or records using avoice notes application, if the phone has one. In other embodiments, theoutgoing Busy: Respond Later™ message may be established by the user byimporting an MP3 file recorded on another device into the phone or bydownloading a text message or voice message or both types of messagesfrom a ringtone service or some other service like a ringtone servicefrom which text and voice messages for the Busy: Respond Later™application may be downloaded for free or for a fee. In configurablemessage embodiments, the user can pick the message to be sent or playedbefore they get in the car and start driving or go on vacation or starta meeting.

A single button, context sensitive embodiment, can be implemented in“hot key” embodiments with two pre-existing keys on the cell phonekeypad which must be pushed simultaneously for the Busy: Respond Later™technology to be triggered. When the Busy: Respond Later™ technology istriggered, it sends an automated response to the sender of a text or thecaller of an incoming call informing them of the busy status of the userof the cell phone.

Similar embodiments are implemented for two button embodiments where onebutton is used to automatically respond to an SMS message and anotherbutton is pushed to automatically answer an incoming call and respondwith an appropriate message. Either or both of these buttons can beadded to the phone or the existing keypad or they can be existing keyson the phone or keypad or they can be existing keys on the phone orkeypad which will trigger the automated response only if another “hotkey” on the phone or keypad is pushed simultaneously. The hot keyembodiments are not favored since to push two buttons on a cell phonesimultaneously in a moving car would probably require both hands whichwould be dangerous. However, the hot key and the other key could belocated next to each other such that one finger can push bothsimultaneously.

In some embodiments, one button (or a hot key and another button) ispushed to respond automatically to a text message just received with apre-typed message, and another button is pushed to answer an incomingcall and play a pre-recorded message to the caller. These embodimentsinvolve, in the case of an SMS message, automatically playing a macro(giving the appropriate series of commands) which makes the appropriatefunction calls to the operating system of the phone and/or applicationprogrammatic interface calls to the SMS application to do whatever isnecessary to manipulate the SMS application. The series of functionsperformed by this “macro” are to: select the SMS message just received;put the SMS application in reply mode; put a pre-typed message in thekeyboard buffer or wherever symbols typed from the keyboard are storedwhen an SMS message is composed; and give the operating system a sendcommand to send the pre-typed message. In the case of an incoming phonecall, the Busy: Respond Later™ macro makes the appropriate functioncalls to the operating system to: answer an incoming call; retrieve adigitized voice message and send that data to the processor buffer wheredigitized data from the cell phone's microphone is stored; and send thedata to the transceiver used to transmit voice data for a cell phonecall; and automatically hang up the phone or route the call tovoicemail.

In the preferred, context-sensitive embodiments, a singlecontext-sensitive button is pushed (or a hot key and another button)which responds to a text message automatically if a text message hasjust been received, or answers and incoming call and responds by playinga pre-recorded message.

In one push, non-hot-key embodiments, a text message is automaticallyresponded to after one push of a newly added SMS button or key or onepush of a pre-existing button or key with a pre-typed reply message thatthe owner of the phone is busy driving or otherwise engaged and cannotrespond to a text message which has just been received.

In one push non-hot-key embodiments, an incoming phone call is respondedto automatically with a single button push of a newly added Busy:Respond Later™ CALL button or key or a button or key which alreadyexists on the phone or keyboard which causes the incoming call to beanswered and a pre-recorded message played that informs the caller thatthe owner of the cell phone is busy and cannot speak with the caller atthe moment.

The technology varies from phone to phone in terms of the type ofsoftware and the function calls made to manipulate the operating system,SMS application and phone call application which implements the Busy:Respond Later™ technology, referred to in the claims as an automatedresponse application program. Basically, the Busy: Respond Later™technology functions, when triggered, to do whatever is necessary on thehost phone to give the appropriate commands to designate the textmessage to which an automated reply is being sent, select it and enterthe reply mode, enter the pre-recorded text message and, finally, toautomatically give the send command. In the case of an incoming phonecall, the Busy: Respond Later™ technology, when triggered, makeswhatever function calls are necessary to answer an incoming callautomatically and play a pre-recorded message to the incoming caller andthen hang up the phone or route it to voicemail. All processes whichwork for whatever phone the technology is implemented on are intended tobe covered by the appended claims.

The message that is sent to respond to an incoming text just received orplayed to an incoming caller could be anything. “I am driving and cannotrespond immediately” is one example.

FIG. 1 is a block diagram of the environment in which the teachings ofthe invention find utility and a block diagram of a broad conceptaccording to the appended claims defining a functionality which theinventors believe is novel and not obvious. A cell phone 10 which iscapable of sending and receiving text messages has circuitry andsoftware 11 which is conventional for sending and receiving textmessages and making and receiving phone calls but which is modified witha Busy: Respond Later™ technology 12 which carries out functionsaccording to the appended claims. The Busy: Respond Later™ technology 12comprises a button or “key” on the cell phone or on the “keypad” or“keyboard” which can be pushed when the user of the cell phone isdriving or otherwise busy and receives an incoming text message or phonecall to which the user cannot or does not wish to respond toimmediately.

The Busy: Respond Later technology 12 also comprises whatever circuitryand/or software which is necessary for the particular host cell phoneto, in the case of an incoming text message: 1) receive the push of theBusy: Respond Later™ key; 2) select the text message which has just beenreceived; 3) do whatever is necessary for the particular host cell phonein which the Busy: Respond Later™ technology is resident to put the cellphone in reply mode to reply to the text message just received; 4) dowhatever is necessary for the particular host cell phone in which theBusy: Respond Later™ technology is resident to automatically entercharacters of a reply text message that informs the sender of the textmessage that the recipient is busy and cannot respond immediately; and5) do whatever is necessary for the particular host cell phone in whichthe Busy: Respond Later™ technology is resident to give the command tosend the text message. Thus, a user of a cell phone can reply to anincoming text message automatically with a single push of a button,which can easily be accomplished while the user is driving or otherwiseengaged and cannot respond to the text message just received safely orwho simply does not wish to respond to the text message just receivedimmediately. At least one example will be given below for specific cellphone technology.

In the case of an incoming phone call while the user of the cell phoneis driving or otherwise does not wish to speak with the caller butwishes to tell the caller the user is busy and cannot speak with thecaller at the moment, the Busy: Respond Later™ technology 12 comprises abutton or “key” on the cell phone or on the “keypad” or “keyboard” ofthe cell phone which: 1) receives the push of the Busy: Respond Later™key; 2) does whatever is necessary for the particular host cell phone inwhich the Busy: Respond Later™ technology is resident to answer theincoming phone call; 3) does whatever is necessary for the particularhost cell phone in which the Busy: Respond Later™ technology is residentto play a pre-recorded message to the caller indicating that the user isdriving or otherwise busy and cannot talk to the caller at the moment;and 4) does whatever is necessary for the particular host cell phone inwhich the Busy: Respond Later™ technology is resident to hang up thephone.

The terms “button,” “key,” “keypad” and “keyboard” in embodimentsdescribed herein include not only physical keys and keyboards such asare found on most cell phones such as the Blackberry™ smartphone butalso on touch sensitive areas on the desktops or any display such as thedisplay of the keyboard on touchscreen cell phones or smartphones suchas the iPhone™.

There can be a single key for the Busy: Respond Later™ technology whichis context sensitive and does whatever is necessary to respond to anincoming phone call or a text message which was just received, dependingupon which was received, or there can be two keys, one to respond totext messages just received and one to respond to an incoming phonecall.

A typical environment in which the teachings are employed is shown inFIG. 1. The cell phone 10 is coupled by radio frequencies carriers 14 toa conventional cell system 16 such as the Sprint cellular system.Cellular systems include transceivers that handle voice signals thathave been converted to digital data and modulated onto an RF carrierwhich is routed by router 18 to landline switching circuitry forhardwired telephony, commonly referred to as plain old telephone serviceor POTS 20. The conventional telephony circuitry routes voice signalsand/or digital data along a path to conventional wired phones 22. Therouter 18 also routes packets containing digitized voice data ofconversations between cell phones to other cell systems (which caninclude the cell system of which phone 10 is resident) which sends thepacket data on to the one of cell phone 26 which is at the other end ofthe conversation after modulating the data onto an RF carrier of theproper frequency and using the modulation scheme in use for voiceconversations in the cell system 24.

It is possible for text messages to be sent to a cell phone from acomputer. For example, client computer 30 coupled to server 32 via LAN33 can send a text message to cell phone 10 via an Internet ServiceProvider 38, the internet 34 and data router 18 in cell system 16. Link38 represents both an ISP and some sort of physical layer modem toconnect the server 32 to the internet such as a UVERSE™ modem, cablemodem, satellite service modem, POTS dial up modem, etc. Text messagesfrom cell phone 10 are packetized and sent back via the SMS channel ofthe cell system 16 (part of the control channel used for call setup),data router 18, internet 34 and ISP 38, server 32 to client computer 30.Some computers 36 are coupled to the internet 34 directly and notthrough a LAN such as by a wireless broadband USB card, cell phoneacting as a modem or any other type modem supplied by an InternetService Provider (ISP) such as UVERSE™, Comcast, etc.

Details of how cellular systems work can be found in Macario, Raymon,“Cellular Radio: Principles and Design” (McGraw Hill 1997).

Text messages of the Short Message Service or SMS are methods ofcommunication that send text between cell phones or from a PC to a cellphone. SMS messages are limited to 160 characters total. Even if aperson is not talking on their cell phone, the phone is constantlysending and receiving information. It is talking to its cell phone towerover a data pathway called a control channel modulated onto a radiocarrier. The reason for this chatter is so that the cell phone knowswhich cell your phone is in so that it can be found for incoming callsor texts, and so that the cell phone can change cell towers as it movesaround. Every so often, the phone and the tower exchange a packet ofdata that lets both of them know everything is in good working order andwho is where in the cell system. This is called a handshake.

The cell phone also uses the control channel for call setup. Whensomeone tries to call your phone, the cell tower sends your phone amessage over the control channel telling your phone to play itsringtone. The tower in cell system 16 also gives your phone a pair ofvoice channel frequencies, one to transmit on and one to receive on, forfull duplex communication. The control channel also provides the digitaldata pathway for SMS messages and router 18 which routes packets ofdigitized voice data and also routes packets of SMS data. Internet webbrowsing and e-mail are different digital data pathways that areseparate from the data pathways used to send and receive digitized voicedata and SMS messages. Data router 40 is actually in the web and e-maildata pathway of the cell system 16 and is used by the cell phone 10 tosend and receive e-mail messages and to browse the worldwide web.

The cell system has a core network which includes a centralized SMSC(Short Message Switching Control—symbolized by router 18 in FIG. 1).When somebody sends a text message, the text message is packetized intoa data packet which is modulated onto a radio carrier and sent as dataon the control channel. The text message packet or packets flow to thecell system tower in which the sender phone resides, then to thecentralized SMSC symbolized by router 18. In some embodiments (notshown), the SMSC is a separate routing and switching system separatefrom the routing and switching system which handles voice call data.From the SMSC, the text message is routed to the cell tower in which therecipient phone resides and sent out to the phone on that tower'scontrol channel. The actual format of the SMS packets includes thingslike the length of the message, a time stamp, the destination phonenumber, the format, etc.

FIG. 2 is a block diagram of an example along the lines of the teachingsof the invention in the form of a Blackberry™ Bold smartphone that hasbeen modified to add two Busy: Respond Later™ keys 50 (SMS) and 52(Call) to the already existing keyboard 54 of the phone or two Busy:Respond Later™ touchscreen areas to the display on a touchscreen phonesuch as the iPhone™. The Busy keys 50 and 52 can also be placed anywhereelse on the phone such as the sides, top or bottom of the phone so thatthey can be easily found by feel without looking at the keypad orkeyboard. The smartphones and all other modern cell phones have asoftware stack architecture (to be described further below) startingwith an operating system or kernel which controls processing by themicroprocessor 54. Key pushes are detected by the keypad controller 56and sent to the microprocessor 54. Modifications (not shown) to thesoftware that controls processor 54 to implement the Busy: RespondLater™ functionality will be described below. In other embodiments, thetwo Busy keys 50 and 52 represent keys on the conventional keypad 54which are reprogrammed to trigger the Busy: Respond Later™ function whenpressed when an incoming text just arrived or when an incoming call isarriving. These can be single key pushes of, for example, the space barwhen an incoming text has just been received or a single push of theshift or symbol key when an incoming call is arriving. The softwaresenses the context and assumes a push of the spacebar right as the firstthing that happens after a text was received means the Busy: RespondLater™ auto message is to be sent to the sender of that text justreceived. Likewise, the software assumes that a push of the shift orsymbol key while an incoming phone call is ringing means the Busy:Respond Later™ message should be sent to the caller since there would beno other reason to push that key in that situation since it has nothingto do with answering the call or diverting it to voicemail in theabsence of the Busy: Respond Later™ functionality.

In the embodiment of FIG. 2, one Busy key 50 (SMS) is pushed toautomatically reply to an SMS text message just received and a secondBusy key 52 (CALL) is pushed to automatically answer an incoming phonecall before it goes to voicemail and play a pre-recorded message thatthe user of the cell phone is driving or otherwise engaged and cannotspeak to the caller at the moment. In some embodiments, the outgoingvoice message can be played and then the phone is diverted directly intovoicemail such as happens when the ignore button is pushed on aBlackberry™ or iPhone™ when another call comes in while the user istalking on a first call.

Those skilled in the art appreciate how the hardware of the phone worksso only brief explanation will be given here. Power is supplied byli-ion rechargeable battery 58 and a power management circuit 60controls the charging of the battery and reporting its status. Circuit62 is fusion flash nonvolatile memory and volatile dynamic random accessRAM memory manufactured by Samsung. A quad band transceiver 64implements GSM protocol RF transmission and reception so the phone canbe used in GSM systems here and abroad for phone calls. A tri-band RFtransceiver 66 does the transmitting and receiving of RF carriersmodulated with digital data packets for web browsing, e-mail, etc. Thesetransceivers receive transmit data from processor 54 and send receiveddata to it.

Power amplifier 68 amplifies RF carriers modulated with GSM protocolvoice data and is coupled to antenna 70. Power amplifiers 72 and 74amplify transmitted and received RF carrier signals modulated by codedivision multiple access (CDMA) data for browsing, e-mail, etc.

LCD controller 76 allows processor 54 to control the phone's display 78.

Still photograph camera and video camera 80 receives commands fromprocessor 54 to snap pictures or take video and sends the captured photoor video data to processor 54.

Bluetooth transceiver 82 couples processor 54 to external devices suchas car phone systems or Bluetooth headsets to allow phone calls to beheard through the car audio or a wireless external headset.

GPS receiver 84 receives GPS signals, determines the phone's positionand sends that data to processor 54.

802.11 a/b/g transceiver 86 allows the phone to couple wirelessly to theinternet as a client computer through other than the cell system's datapath. PMIC wi-fi circuit 88 manages power for the wi-fi access process.Power amplifier 90 couples the wi-fi RF signals from wi-fi transceiver86 to antenna 92 for 802.11a protocol signals in the 5 GHz band, andpower amp 94 couples wi-fi 2.4 GHz RF signals from wi-fi transceiver 86in the 801.11 b/g protocol.

The audio of phone calls and other audio from movies being played backis converted from digital to analog by Codec 96 and coupled to speaker98, earpiece 100 and headphone jack 102.

SIM card 104 stores all the phones contacts and settings and identifiesthe user and the user's account. It works only with GSM phones such asthe iPhone and Blackberry and not with CDMA phones from Sprint orVerizon.

Controller chip 106 establishes a USB 2.0 interface for a micro-USB port108 on the phone so that data and photos can be uploaded from the phoneto a computer and for a Micro SD slot 110 so that an auxiliary memorycard can be inserted in the phone.

Microphone 112 and analog-to-digital converter 114 convert voice soundwaves to analog signals and analog signals to digital data for processor54 to use in phone calls, recording voice notes, taking movies, etc.

FIG. 3 is a block diagram of another smartphone which has a single,context-sensitive Busy key 120 that has either been added to theexisting keypad 122 and read by keypad controller 124 or which is anexisting key on the keypad 122 which is read by the software throughcontroller 124. The Busy key 120 can also be placed anywhere else on thephone such as the sides, top or bottom of the phone so that they can beeasily found by feel without looking at the keyboard. In any of theseembodiments, the key is read in a context sensitive way so as to triggera Busy: Respond Later™ function when it is pushed after a text messagehas been received or when an incoming call is arriving. All otherhardware of the phone is conventional and will not be explained in greatdetail here since its structure and operation is familiar to thoseskilled in the art. Microprocessor 126 is controlled by a softwarearchitecture to be explained below comprised of an operating system,various drivers and application programs as was the case for thesmartphone example of FIG. 2. The 3G/4G modem interfaces the smartphone121 to the data router 40 (FIG. 1) of the cell system 16 (FIG. 1) and tothe internet. This circuit implements a network protocol which isintended for multimedia smartphones and features increased bandwidth andtransfer rates to accommodate web-based applications and phone-basedaudio and video files. 3G modems can implement one of several cellularaccess technologies: CDMA 2000 which is based upon 2G or secondgeneration Code Division Multiple Access modulation of RF carriers withdata packets; WCDMA which stands for Wideband Code Division MultipleAccess; and TD-SCDMA which stands for Time Division Synchronous CodeDivision Multiple Access. 3G networks have potential transfer speeds upto 3 Mbps (about 15 seconds to download a 3-minute MP2 song). Forcomparison, the fastest 2G phones can achieve 144 Kbps. 3G phones arelike mini laptops and can support video conferencing, receivingstreaming video from the internet, sending and receiving faxes andinstantly downloading e-mail with attachments. 4G protocols are evenfaster and they are being deployed now.

General Packet Radio Services (GPRS) is an older wireless network datatransfer protocol for smartphones that is a packet based communicationservice. It is a 2.5G protocol that was the standard till recently. Itis a packet-switched, always-on connection that remains active as longas the phone is within range of a tower. It allows the smartphone to dothings like run applications remotely over the network, interface withthe internet, participate in instant messenger sessions, act as awireless modem for a computer and transmit and receive e-mails. It islimited to 114 kilobytes per second, so it has been replaced by EnhancedData GSM Environment (EDGE) protocols which can transmit at 384 kbps,but it is still a 2.5G protocol. 3G protocols transmit data in megabitsper second (some as fast as 10 Mbps) and are taking over. Some UScarriers such as Sprint™ offer 3G protocols (EVDO). NTT DoCoMo Inc.tested a 4G protocol Feb. 9, 2007 that is 500 times faster than 3Gprotocols, and those protocols will eventually take over. The teachingsof the invention may be employed in all these protocols.

The Modified Software Stack Architecture

FIG. 4 is a diagram of the modified software stack architecture of atypical smartphone to which the Busy: Respond Later™ application hasbeen added.

The typical software of a smartphone can be visualized as a stack. Ateach layer of the stack there are programs and application programmaticinterfaces or APIs. APIs provide access to functions of a programinvoked through its API without the programmer of the calling programneeding to know the details of the structure and operation of the calledprogram.

At the lowest level is the kernel 160. The kernel is the operatingsystem which implements management systems for processes and somedrivers for hardware. The kernel of a cell phone, among other things,manages the hardware circuitry and software resources for the keyboard,the display screen or touchscreen, the address book, the phone dialer,the battery and the network connection. The operating system provides astable, consistent interface for application programs on the applicationlayer 168 including the Busy: Respond Later™ application 169 to dealwith the hardware of the smartphone without having to know the hardwarecircuitry of the particular smartphone upon which the application isresident.

To the extent power on self test code and BIOS code are used in cellphone operating systems as they are in desktop computers, the kernelimplements these functions as code stored in nonvolatile memory such asROM or FLASH memory. A bootstrap loader code section may also be storedin nonvolatile memory and functions to load the kernel or operatingsystem into memory of the phone to take over further processing, set updivisions of memory that hold the operating system, user information andapplications and it establishes data structures to hold the myriad ofsignals, flags and semaphores needed to communicate within and betweenthe subsystems and applications of the computer. Finally, it turnscontrol over to the operating system kernel 160 which, inter alia,performs processor management, memory management, device management,storage management, application programmatic interface and userinterface functions. These functions of the kernel also allow the userof the phone to multitask and run more than one application at a time.When an application like the Busy: Respond Later™ application isrunning, it may cause several other processes to launch simultaneouslysuch as launching the text messaging function (possibly on layer 162 orpossibly one of the functions of the kernel 160—the layer is notimportant) and memory access or storage I/O process to retrieve theconfiguration file data, if a configuration file is used, and toretrieve the pre-typed text message designated to be sent when the Busykey (SMS) 50 or Busy key (Context Sensitive) 120 is pushed. The Busy:Respond Later™ application is a process in the operating system sense ofthe word meaning it is software that performs the designated action andit can be controlled by the user, other application or by the operatingsystem. The kernel 160 schedules processor time for the Busy: RespondLater™ application and suspends it when necessary to run other processesor handle interrupts. Interrupts are signals sent to the processor byhardware or software to cause the kernel to handle some need of thesender of the interrupt. To allow multiple processes to appear to run onthe phone simultaneously, the kernel switches between differentprocesses thousands of times per second. Each process uses a certainamount of RAM, and uses registers, stacks and queues within theprocessor and operating system memory to do its process. The kernelallocates a certain number of processor cycles to the process. Whenthose cycles are expended, the kernel switches processes by allocating acertain number of processor cycles to the new process, making a copy ofall the registers, stacks, flags and queues used by the process beingsuspended (process #1) and noting the point in process #1 whereexecution was suspended (making a copy of the program counter). Process#2 is then started by loading the registers, stacks, queues, flagspreviously stored for process #2 and setting the program counter at thecount at which it was suspended when process #2 was last suspended.After process #2 completes its allocated number of processor cycles, itsregisters, stacks, queues, flags and program count are copied and theprocess #1 is restored by bringing the copies of the registers, stacks,queues, flags and program count back into the appropriate registers andmemory locations. Each process has a process control block with an IDfor the process, pointers to the locations in the program and its datawhere processing last occurred, register contents, states of variousflags and switches, pointers to the upper and lower bounds in memoryrequired for the process, a list of files opened by the process, apriority of the process and the status of all input/output devicesneeded by the process.

Each process has a status associated with it. Many processes consume noprocessor time until they get some sort of input such as a keystrokefrom the user. The Busy: Respond Later™ application is an example ofsuch a process. Until the Busy key is pushed, the Busy: Respond Later™application 169 does not do anything. While it is waiting, it is“suspended” and all the information in the process control block for theBusy: Respond Later™ application's process is maintained. The processcontrol block may be created in some embodiments, when the Busy: RespondLater™ application is launched just before the driver starts driving orattending a meeting that is not to be interrupted. In other embodiments,the Busy: Respond Later™ application does not launch until the Busy keyis pushed.

The kernel also does memory management by setting up memory boundariesfor each process and using the various types of memory such as cache,RAM, virtual memory and nonvolatile memory such as flash or disk drives(if present).

Drivers on the various layers like layer 166 are programs that act astranslators between the electrical signals of the circuitry in the phonesuch as the keyboard and display and the high level programminginstructions of the operating system. Drivers take data that the kernel160 has defined as a file and translates the data into streams of bitsstored in specific locations on storage devices as a series of laserpulses in a printer. In the case of the Busy: Respond Later™application, a driver program in layer 166 takes the pre-recorded textfile 171 to be sent when the Busy key (SMS) 50 or Busy key (ContextSensitive) 120 is pushed and places it in the keyboard buffer 175 whenthe Busy: Respond Later™ application sends API function calls to thekernel asking it to activate the text messaging application and send atext message. The keyboard buffer 175 is used by the operating system tofeed characters to the text messaging packetization process when thatprocess is activated. The characters of the pre-recorded text messageare then fed into the text message packetization process from thekeyboard buffer 175 under command of the operating system as fast as thetext message packetization process can handle the characters and when itneeds them. The text message packetization process builds a controlpacket having the pre-recorded text message therein and sends it. Moredetails of this will be explained below.

The operating system kernel 160 can be anything such as the operatingsystems provided by Research in Motion for the Blackberry™ smartphone,Windows Mobile™, the iPhone™ operating system, the Palm™ operatingsystem for any of its smartphones or, preferably, the open sourceoperating system Android™ for the Google smartphone. The operatingsystem controls the hardware circuitry shown in block diagrams of FIGS.2 and 3 and the hardware could also be the Google smartphone circuitrycommercially available from High Tech Computer Corporation (HTC) fromTaiwan and known as the HTC G1™ smartphone. The Android operating systemis open source though and is designed to support phones made bydifferent manufactures unlike the iPhone operating system which isexclusive to the hardware of the iPhone™. Because the Android™ operatingsystem is open source, its source code is available to any developer whowishes to create an application for the phone. The Android operatingsystem supports the hardware (not shown) of the HTC G1 smartphone whichincludes a microprocessor (Qualcomm 7201) coupled to a 3.2 inch LCDtouchscreen (which slides aside to expose a full QWERTY keyboard), a GPStransceiver, 192 megabytes of random access memory, an accelerometer, anelectronic compass, a 3.2 megapixel camera and WiFi and 3G connectivitycircuitry (transmitters, power amplifiers, drivers, protocol layers todo packetization, etc.). There is also a memory storage card expansionslot. A USB adapter provides headphone support. The Android operatingsystem was built using the Linux version 2.6 operating system. TheAndroid kernel includes: memory management programs; security settings;power management software and several hardware drivers. A driver issoftware that allows the operating system to control a circuit. Forexample, the Android camera driver allows the user to send commands tothe camera such as take a photo, store the photo, delete the photo,display the photo, etc.

At the next level up in the software architecture of FIG. 4 is themiddleware libraries 162 which is a collection of software librariesthat provide the functionality of the smartphone such as security, webbrowsing, PDA functions, messaging, calculator, calendar, still andvideo pictures, etc. As mentioned above, some of these functions arebuilt into the operating system kernel in the preferred embodimentswhere the kernel 160 is the Android operating system.

The libraries of software layer 162 are sets of instructions thatcontrol the smartphone operating system, microprocessor and otherhardware to handle different kinds of data. For example, the mediaframework library contains instructions controlling how the operatingsystem controls the hardware of the phone to support playback andrecording of various audio, video and picture formats. Think of thelibraries as specialists in specific tasks and the operating system as ageneralist that knows how to control the hardware assets of the phone tocarry out the instructions given by the specialist library. There islikely to be a library to handle text messaging and a library to handlephone functions such as answer a call, play a voicemail message, hang upthe call, answer an incoming call or ignore an incoming call during anongoing call, etc. These text and phone functions may be incorporatedinto the kernel 160 in some embodiments since they are so much anintrinsic part of what every cell phone does and not special add onfunctions such as video recording, audio recording, audio playback andweb browsing. Web browsing is usually a library and not built into theoperating system in most embodiments.

The middleware libraries use the hardware circuits of the phone toaccomplish their functions by making Application Programmatic Interface(API) function calls to the kernel 160. For example, a web browserapplication can request a web page by making an appropriate functioncall to the kernel commanding it to address the data communicationinterface circuitry and cause it to transmit out to the internet aUniform Resource Locator (URL) passed to the kernel with the APIfunction call. Each library of the middleware layer itself has an APIwhich allows the kernel to call the middleware library and pass itcommands or data received from other circuits in the cell phone.

The next level up in the stack or even at the same layer as themiddleware libraries is the Application Execution Environment (AEE) 164is a layer of tools which allows developers to create their ownprograms. In the Android operating system, AEE layer 164 is at the samelayer as the middleware libraries 162 and comprises a set of core JAVAlibraries that Android application program developers use to developapplication programs for the phone. Application programs for the phoneare like the software programs you use on your computer to do specificthings like recording voice memos, browse the internet, send and receivee-mail, send and receive text messages. On some cell phones such as theBlackberry™ or iPhone™ smartphones, applications do things like GPSnavigation, finding the closest parking structure or restaurant,remembering where you parked your car and pointing it out on a Googlemap, etc. Some of these functions like GPS navigation, etc. may also beon the application layer 168. Basically, functions of the phone may beput on various layers such as the application layer or middlewarelibrary layer, but some are more appropriate for certain layers ratherthan others. It does not matter for purposes of the invention whichlayer upon which specific functions needed for the various embodimentsare implemented. The particular layer a function is on is not at thistime thought to be critical to the invention. For example, texting maybe on the application layer 168, in the kernel 160, in the middlewarelibraries 162 or the runtime Java libraries.

The AEE layer 164 may include the GSM radio frequency transmitter driveror CDMA radio frequency transmitter driver also in some embodimentsalthough that function may also be incorporated into the kernel or otherlayers. Generally functions that may be improved or altered or whichprocesses (2.5G to 3G for example) are implemented separately from thekernel so that when changes or improvements are made, the entireoperating system does not have to be propagated again with the changesto all the machines which use it. These RF transmission and modulationfunctions are more likely to be on the AEE layer in the Androidoperating system since the Android kernel is designed to supporthardware from different manufacturers and some of them use GSM protocol(AT&T) and some use CDMA protocol (Sprint).

In the Android operating system, the runtime layer 162 also includes alibrary that implements the Dalvik Virtual Machine. A virtual machine isa software application that behaves as if it were an independent devicewith its own operating system. A virtual machine can emulate a computerthat runs on an entirely different OS than the OS of the host machinerunning the virtual machine application. That is how Macs can display aWindows XP machine desktop and run Windows applications when running theParallels™ application. The Android kernel uses virtual machines to runeach application program as its own separate process. This allows eachapplication to run without dependence on any other, and prevents thecrash of one application from crashing any other applicationssimultaneously running in their own virtual machines. Running a separatevirtual machine for every application also simplifies memory managementfor the kernel. In some embodiments, the text messaging, phone functionsand Busy: Respond Later™ processes are each run on their own separatevirtual machine running on the underlying platform, especially if thekernel 160 is Android™ OS.

The next level in the stack is a user interface and applicationframework 166 which is a set of programs that cooperate with theoperating system to implement the basic functions of the phone and itsuser interface (drive and read the display, keyboard, trackball or otherpointing device, etc.). Layer 166 includes a display manager program insome embodiments that is tightly tied to the kernel 160 and manages thephone display for the kernel. Such basic functions as resourceallocation, telephone applications, switching between processes orprograms and keeping track of the phone's physical location are done atthis layer 166 in the embodiments using the Android kernel and in manyother embodiments. The application framework 166 can be thought of as aset of basic tools which application developers can access to buildhigher level and more complex applications on the application layer 168and for the the Busy: Respond Later™ application 169. Although the Busy:Respond Later™ application 169 is shown as its own layer in FIG. 4because it is an add-on application that most smartphones may not havewhen they come from the factory, in reality, to the kernel, the Busy:Respond Later™ application is just another application on theapplication layer 168.

The programs on application framework layer 166 include software thatrenders the graphics and layouts seen on the display. Basically, thislayer of software, in most embodiments, includes drivers and interfaceswith the display, keyboard and pointing device and may provide I/Oservices to all the other memory and storage devices in the phone.Memory and storage device I/O services and drivers may be included inthe kernel 160 in some embodiments.

Finally, there is the application suite 168. This software layerrepresents the software applications that implement various basicfunctions the user can invoke such as making phone calls or receivingthem, accessing the web browser, accessing the contacts list or addressbook, etc. Some of the basic applications of the Sprint Blackberry™phone, represented by icons on the desktop are: launching the webbrowser and sending it a URL to direct it to the Sprint™ software store,making entries on calendars, setting alarms, reading and sending e-mail,receiving and sending text messages via SMS (if this function is not inthe kernel), making and receiving phone calls (if this function is notin the kernel), using GPS navigation, performing instant messaging,locking the phone keyboard, performing media playback, performing webbrowsing (if not on the library layer 162), viewing an automaticallycompiled log of incoming and outgoing calls, viewing live TV, displayinga map, etc.

A barebones system to practice the invention only needs the kernel andI/O services software for the memory or storage device in whichpre-typed text messages or outgoing voice messages are stored, display,keyboard and pointing device drivers and the protocol layer or libraryor application that implements text message functions and phonefunctions such that a predefined text or voice message may be sent by atouch of a button to the sender of an incoming text or the caller of anincoming phone call.

The Busy: Respond Later™ Application Process

The Busy: Respond Later™ application (BRL process) and its ApplicationProgrammatic Interface (API) is shown at 169 in FIG. 4. It is typicallypart of the application layer 168 even though it appears in FIG. 4 to beits own layer. The Busy keys are shown at 50 (SMS), 52 (Call) and 120(Context Sensitive). If the embodiment is a one-key, context sensitiveembodiment, then only one key 120 is present. If the embodiment is a twokey embodiment, Busy keys (SMS) 50 and (Call) 52 are both present. Anyof these keys can be newly added buttons or keys or existing keys on thephone or keyboard. In some embodiments where existing keys are used forBusy keys 50, 52 and 120, one of the keys on the keyboard may bedesignated a hot key that must be simultaneously pushed to activate theexisting key that represents Busy key 50 (SMS) or existing button or keythat represents Busy key 52 (Call).

FIG. 4 shows how the BRL process 169 talks to the Busy keys 50, 52 or120 and loads the pre-recorded text message(s) 171 or pre-recorded voicefiles 181 into memory 175 and 177 used by the operating system to sendtext messages or play outgoing voice messages, respectively. Theautomatic text message to be sent in response to an incoming text isstored in file 171 somewhere in memory on the smartphone. Multipleautomatic response text files may exist and the user can select themessage to be sent by manipulating data in a configuration file 179during setup of the phone or just before starting to drive or starting ameeting. Likewise, digitized automatic voice response messages arestored in files 181 somewhere in memory on the phone. Each file may havea different message recorded by the user or downloaded from some servicelike a ringtone download service.

As a specific example of how, in some embodiments, the BRL process 169creates pre-recorded text files 171 or pre-recorded voice files 181consider the following. Suppose a pre-recorded voice file 181 is to becreated by the BRL app (hereafter Busy app) 169 using a voice notesapplication on layer 168. The BRL app 169 makes one or more functioncalls to the API of the kernel asking it to activate the voice notesapplication and create a file with a specific name into which thepre-recorded voice message is to be recorded. Suppose the kernelprovides an API function named MakeFile for creating files. When writingthe part of the BRL app 169 program that creates the pre-recorded voicemessage file 181, the programmer would insert a line that looks likethis:

MakeFile [1, % Name, 2]

In this example, the instruction tells the operating system 160 tocreate a file that will allow random access to its data (signified bythe 1—the other option might be 0 for a serial file), will have a nametyped in by the user (% Name) and will be a size that varies dependingon how much data is stored in the file (signified by the 2—other optionsmight be zero for a fixed size, and 1 for a file that grows as data isadded but does not shrink when data is removed). The following is whatthe operating system does to turn the instruction into action.

The operating system 160 sends a query to the memory management functionof the kernel 160 to get the location of the first available freestorage location.

With that information, the operating system creates an entry in the filesystem of the cell phone showing the beginning and ending locations ofthe file, the name of the file, the file type, whether the file has beenarchived, which users have permission to look at or modify the file, andthe date and time of the file's creation.

The operating system writes information at the beginning of the filethat identifies the file, sets up the type of access possible andincludes other information that ties the file to the application. In allof this information, the queries to the disk drive and addresses of thebeginning and ending point of the file are in formats heavily dependenton the manufacturer and model of the phone.

Because the programmer has written the program to use the API for diskstorage, the programmer doesn't have to keep up with the instructioncodes, data types and response codes for every possible phone and memorystructure. The operating system, connected to drivers for the varioushardware subsystems, deals with the changing details of the hardware.The programmer must simply write code for the API and trust theoperating system to do the rest.

Although the text files 171 and voice files 181 and configuration file179 and Busy keys 50, 52 and 120 are shown as connected to the Busy:Respond Later™ application, these are logical data paths only. Inreality, the Busy: Respond Later™ application creates these files,accesses and reads the files, displays information on the display andreads the keyboard and Busy keys through the operating system kernel andits API 160 and the user interface driver framework and its API 166 anddrivers on layer 166 that do storage input/output (I/O). Layer 166includes drivers for the display and keyboard and pointer device andstorage such as RAM or FLASH memory of the smartphone. Preferably, thepre-recorded text and voice messages in files 171 and 181 are stored innon-volatile memory. All the circuits shown in FIGS. 2 and 3 haveinterface circuitry (drivers) to talk to the microprocessor, typicallythrough a bus and most if not all have driver applications which aresoftware applications that allow the operating system to control thecircuitry of the microprocessor to talk to the circuitry of the variousperipheral devices such as the display, keyboard, pointing device,memory, GSM protocol RF transceiver 64, 3G protocol data transceiver 66,etc. to enable the microprocessor to send and receive data to and fromthese circuits.

FIG. 5 shows an example of a typical way an automated response wouldwork for a text message just received after the BRL process 169 (FIG. 4)is launched. Step 200 represents the process of launching the BRLprocess which is referred to in the claims as an “automated responseapplication program”. This launching step is performed manually in someembodiments by the user finding a button or key or an icon for the BRLprocess 169 on the phone, keypad, touchscreen or desktop of the phoneand selecting it. In other embodiments, step 200 represents the step ofautomatically launching the BRL process 169 when the GPS of the phonedetects that the phone is moving at driving speeds (faster than a humancan walk or run in some embodiments). In other embodiments, step 200represents the step of automatically launching the BRL process 169whenever the phone is powered on. In embodiments where the BRL processis turned on automatically whenever the phone is moving at driving speedit involves the BRL process 169 making a function call to the kernel 160to determine the phone's GPS position and then making the same functioncall a few minutes later to obtain the phone's position again and thencalculating the distance between those two positions and dividing thatdistance by the time elapsed between the two position reports. The GPSputs times stamps in the meta-data of position reports so that meta-datacan be checked to determine the time the phone was at each location. Anyother way of determining the phone's speed through space will alsosuffice for this purpose. Whatever the phone's speed, the speed iscompared against the speed at which a person can walk (or run in someembodiments) and if the phone is moving faster than a user can run, theBRL process 169 is automatically launched. Embodiments that allow manualturn on of the BRL process 169 or auto turn on at power up arepreferred. In the claims, the claim elements referring to activating anautomated response application program are intended to be interpreted tocover all these different embodiments for how the BRL process 169 isstarted.

Now suppose a text message is received while driving or in a meeting andthe user of the phone presses the Busy key 50 (SMS) (FIG. 2) to send anautomated text message in reply. It is possible that an accidental pushof either of the Busy keys 50 or 52 in FIG. 2 or Busy key 120 in FIG. 3can occur while the phone is being carried in the purse or pocket of theuser. To prevent such a random push of the Busy key from launching theBusy application 169 in FIG. 4, the Busy application 169 is written toinquire of the kernel 160 when was the push of the Busy key relative tothe time of the last text message and to inquire whether an incomingcellular call is being received. The push of the Busy key is ignored ifa cell call is not arriving or a text message was not received withinsome predetermined small time such as 2 minutes from the time when theBusy key was pushed. This inquiry is part of the launch process of step200 in FIGS. 5 and 6 and is part of the initial processing of all otherlaunch steps in FIGS. 7-10. All the embodiments of FIGS. 5-10 should beinterpreted however in the claims to have a similar embodiment that doesnot do this threshold inquiry of finding out when the Busy key waspushed relative to the time of the last text message or if an incomingcell call is arriving at the time the Busy key was pushed, and ignoringthe Busy key push if a cell call is not arriving or a text message wasnot received within some predetermined small time such as 2 minutes fromthe time when the Busy key was pushed.

Step 204 in FIG. 5 represents the steps that the BRL process 169 takesafter it is informed by the operating system that the Busy key 50 (SMS)has been pressed to retrieve the text of the automated text messagereply and cause the text messaging process to send the automatedresponse text message to the sender of the text message just received.Several sub-steps are carried out to accomplish this overall function.

Before functions recited in step 204 happen, there are other events thatoccur, and the details of one or more examples follow. Those skilled inthe art appreciate that there is more than one way to cause the basicfunction of step 204 to occur and what follows is only one or moreexamples. The claims where the broad functions of step 208 are statedare to be interpreted to cover all the various ways of accomplishing thefunction of step 208 since they are all structurally and functionallyequivalent.

First, the fact that the Busy key 50 (SMS) has been pushed is detectedby the keypad controller 56 in FIG. 2. This event represents either thedetection by keypad controller 56 of the press of a dedicated Busy key50 (SMS) or the press of an existing key on the phone, keypad orkeyboard within some interval after an SMS message is received and theuser is notified or the detection of a simultaneous press of a hot keyand some other existing key on the keypad of the phone. In configurableembodiments, configuration file 179 (FIG. 4) stores data as to whichexisting keys are designated to serve the functions of Busy key 50 (SMS)or Busy key 52 (Call) or Busy key 120 (Context Sensitive).

The detection of the push of the Busy key 50 (SMS) (FIG. 2) causes akeyboard driver 166 (FIG. 4), which functions to translate between thekernel 160 and the keypad controller 56 (FIG. 2), to make a functioncall to the kernel 160 to notify it that the Busy key 50 (SMS) has beenpushed. The kernel then makes a function call to the BRL process 169through its API to notify the BRL process that the Busy key 50 (SMS) hasjust been pushed.

The BRL process 169 responds by retrieving the text message to beautomatically sent and causing it to be sent. This step itself involvesseveral substeps. First, the BRL process 169 makes a function call tothe kernel requesting access to configuration file 179 (if present) sothe particular text message to be sent can be determined. This resultsin the kernel making a function call to the API of the storage I/Odriver on layer 166 requesting configuration file 179 be provided to theBRL process 169. This results in the contents of configuration file 179being sent to the BRL process 169, which reads it and determines whichof the pre-recorded text messages to send. The BRL process 169 thenmakes a function call to the kernel's API requesting access to theparticular one of pre-recorded text files 171 which is to be sent whichresults, by a similar process, in the contents of the text file beingsent to the BRL process 169. If the embodiment in question is notconfigurable and only one pre-recorded text message is available tosend, the steps of first accessing the configuration file and thenaccessing whatever file it points to can be omitted. In such one messageonly embodiments, the text to be sent can be stored in the BRL app 169and no access to files stored elsewhere on the phone need be made. Step204 should be interpreted to cover all of these possible embodiments.

In order for the BRL process 169 to send the pre-recorded text message,it must cause the text messaging application to be launched, select themost recent text message received, send the pre-recorded text message tothe text messaging process and cause the send command to be given. Toaccomplish these functions, step 204 represents the steps of sending afunction call to the kernel to request it to launch the text messagingprocess. Normally, the user launches the text messaging process bymanipulating the track ball or the touchscreen to select the textmessaging icon on the desktop or by pushing some other key orcombination of keys on the keypad. Regardless of the type of phone orkeypad controller or touchscreen controller, whatever is done on theparticular phone involved to launch the text messaging function resultsin a function call to the API of the kernel. The BRL process 169automatically makes that same function call to the kernel that thekeypad controller and its driver would normally make to launch the textmessaging process when the user does what they normally do on the phoneto launch the text messaging process. Next the BRL process 169 makeswhatever function call the keypad controller or touchscreen controllerwould make to select the most recent text message received. On aBlackberry™ smartphone where the messaging application records allincoming and outgoing text messages and phone calls, the user must rollthe trackball to the text message to which a reply is to be sent. Sincethere will be many text messages on the message log usually, and theywill be mixed in with message logs of phone calls received and made,some human intelligence is involved. The user must look at the messagelog, mentally select the text message to which a reply is to be sent,roll the trackball to it and press the trackball to select the messageand press the trackball again to bring up a menu of things the user cando with the message, e.g., copy, reply, forward, delete. Then the usermust roll the trackball down to the reply command and press thetrackball again to put the text messaging process into reply mode. Allthis manual processing is replaced in the BRL process by making afunction call to the kernel's API and asking for the contents of themessage log to be sent to the BRL process 169. This file will haveentries in it for incoming phone calls, outgoing phone calls, incomingtexts and outgoing texts. The BRL process 169 (FIG. 4) makes a timestampentry when it receives word that the Busy key 50 (SMS) has been pushedand then searches the metadata of the various entries in the message logfor an incoming text message with a timestamp just before the timestampof the push of the Busy key SMS. When an incoming text message is foundwith metadata indicating it was received immediately preceding the Busykey push, the BRL process 169 then makes appropriate function calls tothe kernel API or the text messaging application (whatever isappropriate for the host phone) to cause it to select that text messagejust located and put the text messaging application into reply mode. TheBRL app 169 then makes appropriate function calls to the kernel or thetext messaging application and passes the text to be sent automaticallyto the text messaging application. This may be done by way of storingthe text message in the keyboard buffer 175 (FIG. 4) or it may be doneby sending the message to be sent automatically to the text messagingapplication as an argument to a function call that says send as a textthe message included in the argument to this function. Whatever must bedone on the phone to send a reply text message is done in theappropriate sequence by the BRL process 169 making the appropriatefunction calls at the appropriate time.

The text message application then packetizes the pre-recorded textmessage received from the BRL process into control packets which includeheader information about which text message the packetized text messageis a reply. These packets containing the automated text message replyare then sent with a function call to the kernel 160 (FIG. 4). Thekernel 160 then sends the packets to the library or driver which iscontrolling the radio frequency transmitter which is receiving andsending the control packets to the cell towers. That application ordriver or library that implements the text message functionality thensends the control packet to the cell tower. (This may be done in someembodiments through function calls to the kernel 160 with the controlpackets as arguments). The kernel then makes a function call to thedriver in the application execution environment 164 for the GSM RFtransmitter 164 and passes it the control packet. The RF transmitterthen sends the control packet to the cell tower and the automatic textmessage response is thereby transmitted into the cell system just as ifit were typed manually by the user.

Now suppose while the user of the phone is driving, an incoming phonecall occurs. The cell phone displays the caller ID and the usertypically will look at it to determine who is calling. If the caller issufficiently important to the user, the user may choose to pull over andanswer the call normally and talk to the caller. However, if the userchooses to keep driving instead of taking the call, the user presses theBusy key 52 (Call) in FIG. 4 for an incoming call. This causes the basicfunction indicated in step 208 to happen where the digitized voice of anautomated reply is played to the caller which indicates that the calledparty is busy driving or otherwise engaged and cannot take the call atthat time.

Before the functions of step 208 happen, other events occur and thedetails of one or more examples thereof follow. Those skilled in the artappreciate that there is more than one way to cause the basic functionof step 208 to occur and what follows is only one or more examplesthereof. The claims where the broad functions of step 208 are stated areto be interpreted to cover all the various ways of accomplishing thefunction of step 208 since they are all structurally and functionallyequivalent.

First, the fact that the Busy key 52 (Call) has been pushed is detectedby the keypad controller 56 in FIG. 2. The causes a keyboard driver 166in FIG. 4, which functions to translate between the kernel 160 and thekeypad controller 56, to make a function call to the kernel 160 tonotify it that the Busy key (Call) 52 has been pushed (or the existingkey or existing key and hot key designated for that function in theconfiguration file 179). The kernel then makes a function call to theBRL process 169 through its API to notify the BRL process that the Busykey 50 (SMS) has just been pushed.

The BRL process 169 responds by retrieving the digitized data of theautomated reply voice message to be automatically sent and causing it tobe played to the caller as an automated response to the incoming call.This step itself involves several substeps. First, in configurableembodiments, the BRL process 169 makes a function call to the kernelrequesting access to configuration file 179 shown in FIG. 4 (if present)so the particular voice message to be sent can be determined. Thisresults in the kernel making a function call to the API of the storageI/O driver on layer 166 requesting configuration file 179 be provided tothe BRL process 169. This results in the contents of configuration file179 being sent to the BRL process 169, which reads it and determineswhich of the pre-recorded voice messages to send. The digital data ofthe pre-recorded voice messages can be either recorded by the user anddigitized on the phone or downloaded from a server on the internet likering tones are downloaded. The BRL process 169 then makes a functioncall to the kernel's API requesting access to the particular one of thepre-recorded voice files 181 which is to be sent which results, by asimilar process, in the contents of the voice file being sent to the BRLprocess 169. If the embodiment in question is not configurable and onlyone pre-recorded voice message file is available to send, the steps offirst accessing the configuration file and then accessing whatever fileit points to can be omitted. In some one voice message only embodiments,the digital data of the voice message to be sent can be stored in aversion of the BRL app 169 which is hardwired in circuitry with its ownmemory, and no access to digitized voice files stored elsewhere on thephone need be made. Step 208 should be interpreted to cover all of thesepossible software and hardware embodiments to accomplish the statedfunction since they are all equivalent.

To actually play the automated voice response to the caller, the BRL app169 makes the same function call or calls that would be made if the userwere to push whatever button exists on the phone to answer an incomingcall. Typically that would be a function call to the kernel from thekeypad controller's driver software 166 to indicate that the user haspushed the button that needs to be pushed to answer the call. Thisresults in the kernel making whatever function calls it normally makesto control the phone's phone call circuitry and transmitters to answerthe call, and start transmitting and receiving on the channelsdesignated by the control packet from the cell tower designating thechannel frequencies for send and receive and telling the phone to playits ringtone. The BRL process then makes whatever function calls arenecessary to copy the digitized voice data of the automated voicemessage reply into the outgoing voice message buffer 177 in FIG. 4. Thisis the same buffer that is filled with digitized voice data when a userspeaks during a normal cell phone call and the phone digitizes the voiceand puts the data into buffer 177. The digitized voice data in buffer177 is then packetized by the phone's call circuitry and software intopackets for whatever CDMA, GSM or other protocol the phone uses for cellcalls.

FIG. 6 is a flowchart for one example of a single, context sensitive BRLapp process where the BRL app responds in either of two ways dependingupon what the context was when the Busy button 120 (Context Sensitive)(FIG. 4) was pushed. Step 212 represents the launching of the BRL appwhich can be done in any of the ways previously described. Step 210represents the process of the keypad controller detecting the push ofthe Busy button 120 (Context Sensitive) (which can be a newly addedbutton or an existing key on the keyboard or a hot key and anotherexisting key on the keyboard). The driver 166 for the keypad controllermakes one or more API calls to the kernel informing it of this event andrequesting the kernel to inform the BRL app whether an SMS text was justreceived or an incoming phone call is being received. The kernel doeswhatever is necessary for its structure and operation to determine if atext message was just received or an incoming cell call is beingreceived, and responds in step 212 with a function call to the API ofthe BRL app 169 (FIG. 4). This function call informs the BRL app ofwhether a text message has just been received or a cell call isarriving. The BRL app responds by performing the functions of step 214if a text was just received or performing the functions of step 216 if acell call is occurring. In step 214, the BRL app retrieves the text ofthe automated text message to be sent and causes it to be sent to thesender of the most recently received text message, all as previouslydescribed.

In step 216, the Busy app 169 (FIG. 4) makes a function call to thekernel to cause it to answer the call. This function call is the sameone made by the keyboard driver 166 when the user is receiving anincoming cell call and presses the “answer” button on the keypad. Thiscauses the kernel to make a function call to the cellular phone callprocess on whatever software layer or circuitry that process isimplemented. This function call causes the cell phone call process toanswer the call by whatever mechanism the phone uses to perform thatfunction. Usually that involves causing the ring tone to stop beingplayed, and setting up the receiver and transmitter frequencies to thefrequencies set in the control packet that contained the “ring your ringtone” message. The cell phone call circuitry and software then sets upprocessing to receive digitized voice data from the caller and convertit to analog and play it on speaker 98 (FIG. 2) and set up processing topacketize digitized voice data spoken by the user receiving the call andtransmitting the packets to the cell tower via transmitter 64 and poweramplifier 68 (FIG. 2).

The BRL app 169 then retrieves the digitized data of the automated voicein the manner previously described and causes it to be played to thecaller in the manner previously described. In some embodiments, step 216includes the step of making whatever function calls and doing whateveris necessary on the host cell phone to divert an incoming cellular callto voicemail after playing the pre-recorded audio message retrieved bythe BRL app 169 so that the caller can leave a message regarding what heor she was calling about. One such embodiment is depicted in FIG. 7.

It is useful to have the automated response system do everything thatneeds to be done with just a single push of a button to send anautomated response including launching the Busy application. Theembodiments of FIGS. 7, 8, 9 and 10 all share that same feature. Asingle push of a button does it all. The embodiments of FIGS. 7 and 8are single-button, context-sensitive embodiments. The embodiments ofFIGS. 9 and 10 are two-button embodiments where one button is pushed torespond automatically to a text message just received and another buttonautomatically answers an incoming call and automatically plays a voicemessage.

FIG. 7 Embodiment

FIG. 7 is a flowchart for one example of a single-button,context-sensitive embodiment to, upon one or more pushes of a singleBusy button, both launch the Busy application 169 (FIG. 4) and use it tosend an automated text message in response if a text message was justreceived or, if an incoming call is being received when said Busy buttonis pushed, play an automated voice response to a caller and thenautomatically send the call to voice mail and record any message thecaller leaves.

Step 220 represents the process of the keyboard driver software 166(FIG. 4) and the keypad controller 124 (FIG. 3) detecting the fact thata single, context-sensitive Busy key 120 has been pushed one or moretimes. In some embodiments, only a single push may be required. In otherembodiments, two or more consecutive pushes of the Busy key within apredetermined time may be necessary to launch the Busy app 169 toprevent an accidental push while the phone is being carried in the purseor pocket of the user from launching the Busy app and automaticallyreplying to a text message or an incoming phone call. This key will bepushed by the user when either a text message has just been received oran incoming cell phone call is ringing the phone. The driver 166 makes afunction call to the kernel 160 in FIG. 4 with an argument informing thekernel that the Busy key 120 (Context Sensitive) has been pushed andrequesting that the Busy app 169 (FIG. 4) be launched and thatinformation be sent to the Busy application by the kernel informing theBusy app whether a text message has just been received or an incomingcell phone call is arriving. The kernel, in a version of thisembodiment, has been modified to respond to the press of the Busy key bymaking a function call to the Busy application 169 to launch it, assymbolized by step 222. In step 222, the kernel 166 also determineswhether a text message has just arrived or an incoming cell phone callis presently ringing the phone, and this status information is sent tothe Busy app 169 when it is launched.

Step 224 symbolizes the process carried out by the Busy app ofresponding to the API function call by the kernel by launching theappropriate text messaging or cell call process, as appropriate basedupon the status information sent by the kernel as to whether a text hasjust been received or a cell call is currently ringing the phone.

If a text message has just been received, step 226 is performed by theBusy app to retrieve the automated text message response and to causethis automated message to be sent in response to the text message justreceived. The details of this step and alternatives are the same aspreviously discussed in the discussion of step 214 in FIG. 6.

If an incoming phone call is currently ringing the cell phone, the Busyapplication responds to the function call by the kernel by performingstep 228. In this step, the Busy app makes a function call to the kernelto cause it to answer the call. This function call is the same one madeby the keyboard driver 166 (FIG. 4) when the user is receiving anincoming cell call and presses the “answer” button on the keyboard. Thiscauses the kernel to make a function call to the cellular phone callprocess on whatever software layer or circuitry that process isimplemented. This function call causes the cell phone call process toanswer the call by whatever mechanism the phone uses to perform thatfunction. Usually that involves causing the ring tone to stop beingplayed, and setting up the receiver and transmitter frequencies to thefrequencies set in the control packet that contained the “ring your ringtone” message. The cell phone call circuitry and software then sets upprocessing to receive digitized voice data from the caller and convertit to analog and play it on speaker 98 (FIG. 2) and set up processing topacketize digitized voice data spoken by the user receiving the call andtransmitting the packets to the cell tower via transmitter 64 and poweramplifier 68 (FIG. 2).

The Busy app then also (step 228 continued) retrieves the digital dataof the automated voice message to be played and causes it to be playedby the kernel to the caller as an automated response to the incomingphone call. Typically, this is done by sending the digitized voice data(already compressed) to the kernel which makes a function call to thecell phone call process and sends it the compressed voice data. The cellphone process has a packetization process which takes the compressedvoice data of the automated voice message and puts it into packets inthe format (GSM, TDMA, etc.) used by the cell phone networks cellularcall data path in the same way the outgoing voicemail announcementmessage is transmitted. The packets containing the “I am busy and cannottake your call right now” type message are then transmitted on thecellular network's cell phone data path and are routed via the otherpathways discussed in FIG. 1. When they reach the cell phone of thecaller, the digitized voice data is converted back to the analog voicesignal and played to the caller. If the caller is calling from an analogland line, the digitized voice data is converted to an analog signal atthe central switching office of the landline system connected to thecallers phone and this analog voice signal is transmitted to the landline phone. The details of this process up to this point are aspreviously discussed in connection with the discussion of step 216 inFIG. 6.

It may be frustrating for callers to hear only the automated voicemessage and not be able to leave a message saying what they are callingabout. To alleviate that, the Busy app also performs the followingfunction in step 228. After the automated “I am busy” voice message istransmitted, the Busy app then makes whatever function call to the APIof the kernel as is necessary to divert the call directly intovoicemail. The resulting processing will then be similar to theprocessing which results when the user receives an incoming phone calland presses the ignore button except that at this point, the call hasalready been answered and the transmitter and receiver have already beenset up on the frequencies designated in the control packet thatinstructed the phone to sound its ringtone. The resulting function callscause the kernel to take the digital data in the packets that containthe digitized voice of the incoming caller and store them in a voicemailfile created by the kernel with metadata in the header of the file thatindicates the caller's name if the caller ID is not blocked and is inthe phone's address book, and which also indicates the date and the timeof the call.

FIG. 8 Embodiment

FIG. 8 is a flowchart for one example of a single-button,context-sensitive embodiment to, upon one or more pushes of a singleBusy button both launch the Busy application 169 (FIG. 4) and use it tosend an automated text message in response if a text message was justreceived or, if an incoming call is being received when said Busy buttonis pushed, play the automated voice response to a caller and then hangup the phone to end the call without sending the caller to voicemail.

The process of FIG. 8 is identical to the process of FIG. 7 up to theperformance of step 228 in FIG. 7. In FIG. 8, step 230 is performedinstead of step 228. Step 230 is similar in processing to step 228except that after playing the automated response voice message, insteadof automatically sending the call to voice mail, the Busy applicationmakes the same function call to the kernel as the keyboard driver wouldmake if the user pressed the end call or hang up button on the phone.This causes the kernel to make the appropriate processing to hang up thephone without sending the call to voicemail.

FIG. 9 Embodiment

FIG. 9 is a flowchart for one example of a two-button “one push”embodiment to, upon one or more pushes of a single Busy button, bothautomatically launch the Busy application 169 (FIG. 4) and use it toautomatically send a pre-typed text message in response if a textmessage was just received or, if an incoming call is being received whensaid Busy button is pushed, play an automated voice response to a callerand then automatically send the call to voice mail and record anymessage the caller leaves.

Step 232 represents the process of the keyboard driver 166 (FIG. 4) andkeypad controller 56 (FIG. 2) detecting the “push” of either the Busykey (SMS) 50 (FIG. 2) or the Busy key (Call) 52 (FIG. 2) and sendingthis event to the API of the kernel 160 (FIG. 4) as a function call witha request. In some embodiments (FIG. 11 for example) spurious Busy keypushes are eliminated by counting how many times the Busy key was pushedin a predetermined amount of time. In embodiments represented by FIG. 9,spurious Busy key pushes are eliminated by determining when the pushoccurred relative to the time of the latest text message in the case ofa Busy key 50 (SMS) push or if an incoming call is ringing the phone inthe case of a Busy key 52 (Call) push. In the embodiment of FIG. 9, step232 also represents the process of sending an API function call to thekernel asking it to report the time the last text message was receivedif the Busy key (SMS) is pushed or to report whether an incoming cellcall is currently ringing the phone if the Busy key (Call) was pushed.

The Busy keys 50 (SMS) and 52 (Call) can be new buttons added anywhereon the phone or displayed anywhere on any touchscreen display,preferably the home display (the first one shown when the touchscreen isactivated from sleep). They can also be existing keys on the keypad,preferably ones that can be found by feel without looking at the keypadsuch as the spacebar, or existing keys on the keypad which need to bepushed simultaneously with a hot key which can be another key on thekeypad. Preferably, the Busy keys 50 (SMS) and 52 (Call) are buttonswhich have been added to the sides, top or bottom edges of the phone tomake them easy to find by feel without having to look at the phone.

The term “push” should be interpreted to mean one or more pushes of theBusy key (SMS) 50 or one or more pushes of the Busy key (Call) 52. Thereason for requiring multiple pushes of the Busy key within a given timeor inquiring when the last text message was received or whether anincoming call is ringing the phone currently is to prevent accidentalBusy key pushes while the phone is being carried from launching the Busyapplication and sending spurious text messages that the user is busy ordriving when that is not the case. Some embodiments may require only asingle push. In these embodiments, the steps 236 and 238 are performedto ensure that the push of the Busy key was not spurious. Step 236 is aprocess carried out by the Busy app 169 (FIG. 4) to compare the time ofthe Busy key (SMS) push, as reported by the kernel, to the time thelatest text message was received, as reported by the kernel, to ensurethat the Busy key (SMS) 50 was pushed within some close time proximityto the receipt of the most recent text message (such as two minutes). Ifnot, it is probably a spurious push and is ignored. Step 238 isperformed by the Bus app. 169 (FIG. 4) to determine if the Busy key(Call) 52 was pushed while an incoming cell call is ringing the phone.If not, the push is probably spurious.

Other embodiments, symbolized by the flowchart of FIG. 11, may requiretwo or three consecutive pushes (referred to as X in FIG. 11) within apredetermined time (referred to as Y seconds in FIG. 11). In theseembodiments, the only request to the kernel in step 232 is to report thetimes the Busy key was pushed each time it was pushed within the lastpredetermined number of minutes or seconds. In these embodiments, steps236 and 238 are not required because it is unlikely that, for example,two or three consecutive pushes of the same Busy key 50 or 52 within amatter of seconds was random and spurious. In these embodiments, theBusy app 169 (FIG. 4) is informed of a Busy key push and the time of thepush and which Busy key was pushed by the kernel each time a Busy key ispushed (steps 239 and 240 from FIG. 11). The Busy app then launches andstarts a timer and starts counting the pushes within an elapsed time ofY seconds (or minutes, step 243). If X pushes of the same key occurswithin Y time (step 245), the Busy app determines which Busy key waspushed (steps 247 and 249) and then performs the automated text messagereply (step 240) or the automated voice message reply following bydiverting the call to voicemail (step 242). In some alternativeembodiments, the diversion of the call to voicemail can be eliminatedand the phone is just hung up automatically after automatically playingthe pre-recorded voice message.

Returning to the consideration of FIG. 9, step 234 represents theprocess of the kernel making an API function call to the Busy app tolaunch it and send it the time of the Busy key push, whether the Busykey 50 (SMS) was pushed or whether the Busy key 52 (Call) was pushed,and send it the requested information as to the time when the mostrecent text was just received in the case of a Busy key 50 (SMS) push orwhether or not an incoming phone call is currently ringing the phone inthe case of a Busy key 52 (Call) push.

Step 236 represents the process carried out by the Busy app 169 (FIG. 4)to determine if a text was received within a predetermined time of theBusy key 50 (SMS) push. If so, step 240 is performed and its details areas previously described in the other flowcharts in which a step 240appears. If step 236 determines that a text was not just received withina predetermined time such as a few seconds or a minute or two of theBusy key push, step 238 is performed. Step 238 determines if an incomingphone call is currently ringing the phone when the Busy key 52 (Call)was pushed. If so, step 242 is performed to answer the call, play anautomated voice response indicating the user is driving or busy and thendiverting the call to voicemail. If steps 236 and 238 determine thatneither a text was just received nor is an incoming phone call currentlyringing the phone, the conclusion is that the push of the Busy key was aspurious push, and step 250 is performed to shut down the Busy app.

FIG. 10 Embodiment

FIG. 10 is a flowchart for one example of a two-button “one push”embodiment to, upon one or more pushes of a single Busy button, bothautomatically launch the Busy application 169 (FIG. 4) and use it toautomatically send a pre-typed text message in response if a textmessage was just received or, if an incoming call is being received whensaid Busy button is pushed, play an automated voice response to a callerand then automatically hang up the phone without sending the call tovoicemail.

The embodiment of FIG. 10 is identical to the embodiment of FIG. 9except that, in step 253, the call is simply ended after thepre-recorded audio message is played instead of diverting the call tovoicemail.

Although the invention has been disclosed in terms of the preferred andalternative embodiments disclosed herein, those skilled in the art willappreciate that modifications and improvements may be made withoutdeparting from the scope of the invention. For example, the functionsdescribed herein can be performed by any piece of software on any layerof FIG. 4 including modifications of the kernel. Modifications of thekernel are not preferred because that requires redistribution of theoperating system to all platforms using an obsolete version of theoperating system just to implement a new application like the Busy app.However, it is only important for purposes of practicing the variousembodiments, that the functions described for each embodiment beperformed somewhere by either hardware or software, and the automatedtext or voice response be sent from the phone to the sender of the textor a caller. All such modifications are intended to be included withinthe scope of the claims appended hereto.

1. A method carried out on a cell phone comprising: A) activating anautomated response application program on a cell phone; B) receiving atext message on said cell phone; C) receiving a command from a user ofsaid cell phone to send an automated text message response; and D)automatically selecting the latest text message received and sending apre-typed text message to the sender of said latest text messageindicating in any way the user of said cell phone cannot immediatelyrespond to said text message.
 2. The method of claim 1 wherein saidpre-typed text message is one of several pre-typed text messages whichcan be automatically sent and further comprising the steps of accessinga configuration file to determine the pre-typed text message to send andusing the pre-typed text message pointed to by said configuration fileas the pre-typed text message to send to the sender of said latest textmessage in step D.
 3. The method of claim 1 wherein step C comprisessensing that a “hot key” has been pressed along with an existing key onthe phone or on the keypad or on the touchscreen of the phone or on thetouchscreen depiction of a keypad of said cell phone assigned to be aBusy (SMS) key such that said hot key and existing key assigned as saidBusy (SMS) key are both pressed for intervals which at least partiallyoverlap.
 4. The method of claim 1 wherein step C comprises sensing thata Busy (SMS) key has been pressed by said user, said Busy (SMS) keybeing a key which has been added to said cell phone or to said keypad ofsaid cell phone.
 5. The method of claim 1 further comprising the step ofdisplaying the identity of the sender of said latest text message ifknown.
 6. A method carried out on a cell phone comprising the steps: A)activating an automated response application program on a cell phone; B)receiving a text message on said cell phone or receiving an incomingcellular phone call on said cell phone; C) receiving a command from auser of said cell phone to send an automated text message response if atext message has been received or receiving a command to play apre-recorded audio message to the caller of an incoming phone call thatis ringing the ringtone of said cell phone; and D) if a command has beenreceived from said user to send an automated text message in response toa text message which has been received, automatically selecting thelatest text message received and sending a pre-typed text message to thesender of said latest text message indicating in any way the user ofsaid cell phone will not immediately respond to said text message; andE) if a command has been received from said user to automatically play apre-recorded voice message to a caller, automatically answering anincoming cell phone call and playing a pre-recorded audio message tosaid caller.
 7. The method of claim 6 wherein step E further comprisesthe step of automatically hanging up said cell phone after playing saidpre-recorded audio message.
 8. The method of claim 6 wherein step Efurther comprises the step of automatically diverting the incomingcellular call to voicemail after playing said pre-recorded audiomessage.
 9. The method of claim 6 wherein step D further comprises thestep of reading data from a configuration file pointing to one of aplurality of pre-typed text messages that can be automatically sent andretrieving the text of the pre-typed text message pointed to by saidconfiguration file and sending said text as said pre-typed text messageto the sender of said latest text message.
 10. The method of claim 6wherein step E further comprises the step of reading data from aconfiguration file pointing to one of a plurality of pre-recorded audiomessages that can be played to a caller, and retrieving the data of thepre-recorded audio message pointed to by said configuration file andusing said retrieved data to play said pre-recorded audio message tosaid caller.
 11. The method of claim 10 further comprising the steps ofdownloading pre-recorded text messages and pre-recorded audio messagesfrom a server on the internet which provides them for free or for a feeand storing said downloaded text messages and pre-recorded audiomessages on said phone in a plurality of files stored in non-volatilememory of said phone, said files comprising pre-recorded text messagesand pre-recorded audio messages some of which may have been typed bysaid user and some of which may have been recorded by said user.
 12. Themethod of claim 6 wherein step C comprises detecting the fact that theuser of said cell phone pressed a Busy (SMS) key which has been added tosaid cell phone or a keypad of said cell phone or the touchscreen ofsaid cell phone or a visual depiction of a keypad on a touchscreen ofsaid cell phone or comprises detecting the fact that the user of saidcell phone pressed a Busy (Call) key which has been added to said cellphone or a keypad of said cell phone or to the touchscreen of said cellphone or to a visual depiction of a keypad on a touchscreen of said cellphone.
 13. The method of claim 6 wherein step C comprises detecting thefact that the user of said cell phone pressed, within a predeterminedtime after receiving a text message, a Busy (SMS) key which is analready existing key on said cell phone or on a keypad of said cellphone or on the touchscreen of said cell phone or on a visual depictionof a keypad on a touchscreen of said cell phone or wherein step Ccomprises detecting the fact that the user of said cell phone pressed aBusy (Call) key during playing of a ringtone of said cellphoneindicating a cellular call was being received, said Busy (Call) keybeing a key which already exists on said cell phone or on a keypad ofsaid cell phone or on the touchscreen of said cell phone or on a visualdepiction of a keypad on a touchscreen of said cell phone.
 14. Themethod of claim 6 wherein step C comprises detecting the fact that theuser of said cell phone pressed a Busy (SMS) key which is thecombination of pressing of a hot key and another key both of which arekeys which already exist on said cell phone or on a keypad of said cellphone or on a touchscreen of said cell phone or on a visual depiction ofa keypad on a touchscreen of said cell phone or wherein step C comprisesdetecting the fact that the user of said cell phone pressed a Busy(Call) key during playing of a ringtone of said cellphone indicating acellular call was being received, said Busy (Call) key being thecombination of a hot key and another key both of which already exist onsaid cell phone or on a keypad of said cell phone or on a touchscreen ofsaid cell phone or on a visual depiction of a keypad on a touchscreen ofsaid cell phone.
 15. The method of claim 13 further comprising the stepof displaying the identity of the sender of said text message and/or theidentity of the caller of an incoming cellular call which is beingreceived.
 16. A method carried out on a cell phone comprising the steps:A) activating an automated response application program on a cell phone;B) receiving a text message on said cell phone or receiving an incomingcellular phone call on said cell phone; C) receiving a context-sensitivecommand from a user of said cell phone which comprises detectingpressing by said user of a context sensitive Busy key which indicatessaid user wishes to send an automated text message response if a textmessage has been received or play a pre-recorded audio message to thecaller of an incoming phone call that is ringing the ringtone of saidcell phone; and D) determining whether a text message was received justbefore said context sensitive Busy key was pushed or an incomingcellular call is causing the ringtone of said cell phone to be played atthe time said Busy key is pushed; E) if said Busy key was pressed inresponse to a text message which has just been received, automaticallyselecting the latest text message received and send a pre-typed textmessage to the sender of said latest text message indicating in any waythe user of said cell phone is driving or cannot or chooses for anyother reason to not immediately respond to said text message; and F) ifsaid Busy key was pressed while the ringtone of said cell phone is beingplayed indicating an incoming cellular call, automatically answering anincoming cell phone call, and playing a pre-recorded audio message tosaid caller indicating said user is driving or cannot or chooses for anyother reason to not take the call immediately.
 17. The method of claim16 wherein step C comprises pressing a Busy key which has been added tosaid cell phone or to a keyboard of said cell phone or to a touchscreenof said cell phone or to a visual depiction of said keyboard displayedon a touchscreen of said cell phone.
 18. The method of claim 16 whereinstep C comprises pressing a Busy key which is one or more existing keyson said cell phone or on a keyboard of said cell phone or on atouchscreen of said cell phone or on a visual depiction of said keyboarddisplayed on a touchscreen of said cell phone.
 19. The method of claim16 wherein steps E and F further comprise accessing a configuration fileand reading pointer data therein which points to one of a plurality ofpre-typed text message files to use to send said pre-typed text messageand which points to one of a plurality of pre-recorded audio messagefiles to use to play said pre-recorded audio message.