1460711418-c97437e8-94f3-4565-b543-cea98b3e4a49

What the invention claimed is:

1. A skin-irritating game machine comprising:
a main unit, said main unit comprising a control circuit assembly, a plurality of input buttons for signal input into said control circuit to set a predetermined reference value, a plurality of electric sockets respectively connected to said control circuit assembly, said control circuit assembly comprising a battery power supply, an input circuit, an IC chip, and a skin-irritating control circuit; and
a plurality of control cables respectively connected to said electric sockets of said main unit, said control cables each comprising a cable, an electric plug disposed at one end of said cable and connected to one electric socket of said main unit, and two metal contact elements connected in parallel to one end of said cable remote from said electric plug and adapted for adhering to the skin of a player;
wherein when the player presses one button assigned from the buttons of said main unit after a reference value had been set through the buttons of said main unit, a signal is provided to said IC chip for comparison with the set reference value, and said IC chip drives said skin-irritating control circuit to send an irritating voltage through the metal contact elements of the respective control cable to irritate the skin of the player if the value of the comparison result is beyond a predetermined range of the set reference value.
2. The skin-irritating game machine of claim 1, wherein said control circuit assembly further comprises a liquid crystal display.
3. The skin-irritating game machine of claim 2, wherein said main unit comprises a transparent window glass suspended above said liquid crystal display.
4. The skin-irritating game machine of claim 1, wherein said control circuit assembly further comprises a voice control circuit for voice output upon input of an input signal from the buttons of said main unit.
5. The skin-irritating game machine of claim 1, wherein said main unit further comprises a plurality of indicator lights respectively connected to said electric sockets through said control circuit assembly.
6. The skin-irritating game machine of claim 1, wherein said control cables each further comprises a button connected between the respective cable and the respective metal contact elements for inputting a signal to said control circuit assembly to drive said skin-irritating control circuit.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A method comprising:
providing leveled control functions to a user account, the providing including classifying functions provided to the user account into at least two levels, each level including one or more functions, each level corresponding to a security verification; and
authorizing the user account.
2. The method as recited in claim 1, further comprising:
receiving a request for opening a respective level from the user account;
determining that the user account passes a respective security verification corresponding to the respective level; and
opening one or more functions of the respective level to the user account.
3. The method as recited in claim 2, further comprising:
maintaining an opening status of an opened level until the user account logs off or the opened level is closed to the user account.
4. The method as recited in claim 1, wherein the providing leveled control functions to the user account comprises:
receiving a request for opening the leveled control functions from the user account;
determining that the user account satisfies a first condition;
determining that the user account passes a security verification corresponding to the leveled control function; and
opening the leveled control functions to the user account.
5. The method as recited in claim 4, wherein the security verification corresponding to the leveled control functions includes personal information verification.
6. The method as recited in claim 1, wherein the authorizing the user account comprises:
receiving a request for authorizing from the user account;
determining that the user account satisfies a second condition;
forwarding the request for authorizing to a controlling party of the user account;
receiving security verification related information sent by the controlling party;
forwarding the security verification related information to the user account;
receiving responding information corresponding to the security verification related information from the user account;
determining that the user account passes the security verification based on the responding information; and
authorizing the user account.
7. The method as recited in claim 6, wherein:
the security verification related information includes a security question or a combination of the security question and a verification code; and
the responding information corresponding to the security verification related information includes an answer to the security question or a combination of the answer to the security question and the verification code.
8. The method as recited in claim 1, wherein the at least two levels include a first level and a second level and the method further comprises allowing a request for opening the second level from the user account only after the first level is opened to the user account.
9. The method as recited in claim 8, further comprising:
receiving a log-in request from the user account;
conducting an identity verification corresponding to the first level when the user account logs in;
determining that the user account passes the identity verification;
opening one or more functions of the first level to the user account;
maintaining an opening status of the first level for the user account until the user account logs off;
receiving a request for opening a second level from the user account;
conducting an identity verification corresponding to the second level;
determining that the user account passes the identity verification corresponding to the second level;
opening one or more functions of the second level to the user account; and
maintaining an opening status of the second level for the user account until the user account logs off
10. The method as recited in claim 8, the at least two levels further include a third level and the method further comprises allowing a request for opening the third level from the user account only after the second level is opened to the user account.
11. The method as recited in claim 10, further comprising:
receiving a request for opening a third level from the user account;
conducting an identity verification corresponding to the third level;
determining that the user account passes the identity verification corresponding to the third level;
opening a privilege of using one or more functions of the third level to the user account; and
maintaining an opening status of the privilege of using the one or more functions of the third level for the user account until the user account logs off or the privilege of using the one or more functions of the third level is closed to the user account.
12. The method as recited in claim 11, further comprising:
after the privilege of using the one or more functions of the third level is opened to the user account, receiving a request for setting a logic of the one or more functions of the third level from the user account;
setting the logic of the one or more functions;
determining that the logic of the one or more functions satisfies; and
implementing the one or more functions of the third level.
13. The method as recited in claim 10, wherein the third level provides or includes a custom-made message reading function and the method further comprises:
receiving a request for setting a message reading logic from the user account;
setting the message reading logic;
determining that the message reading logic satisfies; and
pushing a message to the user account or a receiving party designated by the user account.
14. The method as recited in claim 10, wherein the third level provides or includes a custom-made log supervising function and the method further comprises:
receiving a request for setting log from the user account;
generating a custom-made log logic according to the request for setting log;
determining that the custom-made log logic is satisfied; and
generating a log according to the custom-made log logic.
15. The method as recited in claim 10, wherein the third level provides or includes a mobile device remote administering function and the method further comprises:
when opening the mobile device remote administering function to the user account, designating a mobile device for remote administering;
receiving a request for setting a remoter administering triggering logic from the user account;
setting the remote administering triggering logic;
determining that the remote administering triggering logic is satisfied; and
triggering the designated mobile device to conduct remote administering.
16. An apparatus comprising:
a level configuring module that provides leveled control functions to a user account and classifies the functions into at least two levels, each level including one or more functions and each level corresponds to a respective security verification;
a level initiating module that opens the leveled control functions to the user account or authorizes the user account; and
a level controlling module, after the level initiating module opens the leveled control functions or authorizes the user account, when the user account is used to log-in subsequently, receives a request for opening a respective level from the user account, determines that the user account passes a security verification corresponding to the respective level, opens functions of the requested level to the user account, and maintains an opening status of the opened level until the user account logs off or the opened level is closed to the user account.
17. The apparatus as recited in claim 16, wherein:
the level configuring module classified the levels into a first level and a second level; and
the level controlling module, when receiving a log-in request from the user account, applies an identity verification for log-in, opens one or more functions of the first level to the user account in response to determining that the user account passes the identity verification for log-in, and maintains an opening status of the first level until the user account logs off; and
the level controlling module further, when receiving a request for opening the second level from the user account, conducts a security verification corresponding to the second level, opens one or more functions of the second level to the user account in response to determining that the user account passes the identity verification corresponding to the second level, and maintains an opening status of the second level until the user account logs off
18. The apparatus as recited in claim 16, wherein:
the level configuring module classifies the levels into a first level, a second level; and a third level; and
the level controlling module further receives a request for opening a third level from the user account, conducts an identity verification corresponding to the third level, determines that the user account passes the identity verification corresponding to the third level, opens a privilege of using one or more functions of the third level to the user account, and maintains an opening status of the privilege of using the one or more functions of the third level to the user account until the user account logs off or the privilege of using the one or more functions of the third level is closed to the user account.
19. The apparatus as recited in claim 18, further comprising a function implementing module that, after the privilege of using the one or more functions of the third level is opened, receives a request for setting a custom-made logic of the one or more functions of the third level from the user account, sets one or more function logics, and implements the one or more functions of the third level when the custom-made function logics are satisfied.
20. A server comprising:
an apparatus comprising:
a level configuring module that provides leveled control functions to a user account and classifies the functions into at least two levels, each level including one or more functions and each level corresponds to a respective security verification;
a level initiating module that opens the leveled control functions to the user account or authorizes the user account; and
a level controlling module, after the level initiating module opens the leveled control functions or authorizes the user account, when the user account is used to log-in subsequently, receives a request for opening a respective level from the user account, determines that the user account passes a security verification corresponding to the respective level, opens functions of the requested level to the user account, and maintains an opening status of the opened level until the user account logs off or the opened level is closed to the user account.