Chinese phonetic alphabet digital inputting method
A technology of pinyin letters and numbers, applied in the field of communication, can solve the problems of inability to input words, inconvenience, and inconvenience of inputting very used words, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
example 1
[0059] Example 1: Enter the Chinese character "北"
[0060] The pinyin letter combination of "北" is "bei", the number of the first letter "b" is "11", and the number of the non-initial "eijing" is "24", so the number code of "北" is "1124" , press the number keys "1", "1", "2" and "4" respectively, and "North" will appear on the screen.
example 2
[0061] Example 2: Enter the word "Beijing"
[0062] The pinyin letter combination of "Beijing" is "bei jing", the number of the first letter "b" is "11", and the number of the non-initial "ei jing" is "244453", so the number code of "Beijing" is " 11244453", press the number keys "1", "1", "2", "4", "4", "4", "5" and "3", and "Beijing" will appear on the screen.
example 3
[0063] Example 3: Enter the word "Tiananmen"
[0064] The pinyin letter combination of "Tiananmen" is "tiananmen", the number of the first letter "t" is "77", and the number of the non-initial "iananmen" is "41515525", so the number code of "Beijing" is "7741515525", Press the number keys "7", "7", "4", "1", "5", "1", "5", "5", "2", "5", and "Tiananmen" will appear on the on the screen.
[0065] In the current letter layout on mobile phones, the number keys 5, 7, and 9 no longer play any role after inputting the first letter. On the contrary, the frequency of use of the number keys 4, 6, and 8 in the entire process of inputting pinyin letters But very high. Facts have proved that the arrangement of letters on the mobile phone keyboard has caused serious obstacles to the use of Chinese Pinyin functions in embedded digital terminal products. This obstacle includes the implementation of Chinese Pinyin functions in embedded software systems, and also includes In terms of the co...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More