1460928248-b7732453-dee5-454d-9df4-90ed9a584330

1. A method, comprising:
transmitting, by a first transmitter, an inquiry from a mobile device of a user to a key authority via a wide area transmission network in order to obtain an access key for accessing functions of a user operable device having limited accessibility,
the key authority verifying said inquiry,
said key authority assigning said access key if the inquiry is validated,
said key authority transmitting said access key via the wide area transmission network to said mobile device,
the mobile device storing said access key in said mobile device,
transmitting, by a second transmitter, said access key via a short range communication network from said mobile device to a controller unit controlling said user operable device,
the controller unit generating a validation key,
the controller unit validating said access key by comparing said access key with said validation key, and
the controller unit granting said user access to said functions of said user operable device if the access key is valid,
wherein said transmitting and verifying said inquiry comprises several transmissions and retransmissions, including
a request to operate said user operable device,
a response by the key authority, the response being a response to said request to operate said user operable device and a request for information, and
a transmission of requested information to the key authority, wherein said information is used by the key authority for co-coding the access key with one or more conditions for operating the user operable device.
2. The method according to claim 1, further comprising said controller unit transmitting information concerning the validity of said access key via said short range communication network to said mobile device.
3. The method according to claim 1, further comprising said controller unit transmitting information concerning operable functions accessible by said user via said local area transmission network to said mobile device.
4. The method according to claim 1, wherein transmitting said inquiry to said key authority includes transmitting a desired period of time value defining the period of validity of said access key.
5. The method according to claim 1, wherein said transmitting and verifying said inquiry includes transmitting and verifying identification of said user.
6. The method according to claim 1, wherein said transmitting and verifying said inquiry includes transmitting and verifying payment information.
7. The method according to claim 6, wherein said payment information includes credit card data.
8. The method according to claim 6, wherein said payment information includes bank account data.
9. The method according to claim 1, wherein said key authority is a service provider.
10. The method according to claim 1, wherein said key authority is a call center operable manually or automatically by a voice assistant.
11. The method according to claim 1, wherein said key authority is a WEB server accessible via a WEB page.
12. The method according to claim 1, wherein said key authority is a WAP server accessible via a WAP page.
13. The method according to claim 1, wherein different access keys are provided for accessing different functions of said user operable device.
14. The method according to claim 13, wherein said different access keys are sorted hierarchically according to hierarchically sorted functions of said user operable device.
15. The method according to claim 1, wherein a device identification is co-coded in said access key.
16. The method according to claim 1, wherein a period of validity of a total access period is co-coded in said access key.
17. The method according to claim 1, wherein a period of validity of a first access period is co-coded in said access key.
18. The method according to claim 1, wherein a number of access procedures is co-coded in said access key.
19. The method according to claim 1, wherein said validation key is generated based on device identification data of said user operable device.
20. The method according to claim 1, wherein said validation key is generated based on time information.
21. The method according to claim 1, wherein said validation key is generated based on a period of validity.
22. The method according to claim 1, further comprising transmitting a reference key from said key authority to said controller unit via an interface.
23. The method according to claim 22, wherein said reference key is stored in the controller unit.
24. The method according to claim 22, wherein said reference key is part of a data used for generating said validation key.
25. The method according to claim 1, wherein a key is stored in the controller unit, said stored key is part of a data used for generating said validation key.
26. The method according to claim 1, wherein some or all transmissions are secured using encrypted transmitting methods.
27. The method of claim 1, wherein the wide area transmission network is a wireless wide area transmission network.
28. A mobile device of a user, comprising:
an input device for inputting inquiry data,
a first transmitter for transmitting an inquiry comprising said inquiry data to a key authority via a wide area transmission network in order to obtain an access key for accessing functions of a user operable device having limited accessibility,
a receiver for receiving, via said wide area transmission network, the access key assigned by said key authority after verifying said inquiry,
a storage for storing said access key,
a second transmitter for transmitting, via a short range communication network, said access key to a controller unit controlling said user operable device, said controller unit is configured to generate a validation key for comparing with the access key and grant said user access to said functions of said user operable device if the access key is valid
wherein transmitting the inquiry to the key authority comprises several transmissions and retransmissions, including
a request to operate said user operable device, and
a transmission of information requested by the key authority, wherein said information is used by the key authority for co-coding the access key with one or more conditions for operating the user operable device.
29. The mobile device according to claim 28, comprising additionally a receiver for receiving information concerning the validity of said access key from said controller unit via the short range communication network.
30. The mobile device according to claim 28, comprising additionally a receiver for receiving information concerning operable functions accessible to said user from said controller unit via the short range communication network.
31. The mobile device according to claim 28, comprising additionally a coder for recoding said access key.
32. The mobile device according to claim 28, wherein the key authority is a WEB server and the mobile device further comprises a WEB client for accessing the WEB server via a WEB page.
33. The mobile device according to claim 28, wherein the key authority is a WAP server and the mobile device further comprises a WAP client for accessing the WAP server via a WAP page.
34. The mobile device of claim 28, wherein said inquiry includes identification and payment information of said user and the first transmitter is configured to perform several transmissions and retransmssions in transmitting said identification and payment information to said key authority.
35. A mobile device of a user, comprising:
means for inputting inquiry data,
means for transmitting an inquiry comprising said inquiry data to a key authority via a wide area transmission network in order to obtain an access key for accessing functions of a user operable device having limited accessibility,
means for receiving, via said wide area transmission network, the access key assigned by said key authority after validating said inquiry,
means for storing said access key, and
means for transmitting, via a short range communication network, said access key to a controller unit controlling the user operable, said controller unit is configured to generate a validation key for comparing with the access key and grant said user access to said functions of said user operable device if the access key is valid,
wherein transmitting the inquiry to the key authority comprises several transmissions and retransmissions, including
a request to operate said user operable device, and
a transmission of information requested by the key authority, wherein said information is used by the key authority for co-coding the access key with one or more conditions for operating the user operable device.
36. The mobile device of claim 35, further comprising:
means for receiving from said controller unit information concerning the validity of said access key via the short range communication network.
37. The mobile device of claim 35, further comprising:
means for receiving from said controller unit information concerning functions accessible to the user of the mobile device via the short range communication network.
38. The mobile device of claim 35, wherein said inquiry includes identification and payment information of said user and the means for transmitting said inquiry is configured to perform several transmissions and retransmssions in transmitting said identification and payment information to said key authority.
39. A system comprising a mobile device of a user and a controller unit controlling a user operable device having limited accessibility, wherein the mobile device comprises:
means for inputting inquiry data,
means for transmitting an inquiry comprising said inquiry data to a key authority via a wide area transmission network in order to obtain an access key for the user to access functions of the user operable device,
means for receiving, via said wide area transmission network, the access key assigned by said key authority,
means for storing said access key, and
means for transmitting said access key to the controller unit via a local area transmission network;
and wherein the controller unit comprises:
means for receiving said access key transmitted by the mobile device via the local area transmission network,
means for generating a validation key based on device identification data of said user operable device,
means for validating said access key by comparing said access key with said validation key, and
means for providing said user access to said functions of said user operable device if the access key is validated,
wherein transmitting the inquiry to the key authority comprises several transmissions and retransmissions, includiun a request to operate said user operable device, and a transmission of information requested by the key authority, and wherein said information is used by the key authority for co-coding the access key with one or more conditions for operating the user operable device.
40. The system of claim 39, wherein the mobile device further comprises:
means for receiving information concerning the validity of said access key from said controller unit via the local area transmission network.
41. The system of claim 39, wherein the mobile device further comprises:
means for receiving from said controller unit information concerning functions accessible to the user of the mobile device via the local area transmission network.
42. The system of claim 39, wherein the controller unit further comprises:
means for transmitting information concerning the validity of said access key or information concerning functions accessible by said user to said mobile device via the local area transmission network.
43. The system of claim 39, wherein said inquiry data includes identification and payment information of said user and the means for transmitting said inquiry is configured to perform several transmissions and retransmssions in transmitting said identification and payment information to said key authority.
44. A system comprising a mobile device of a user and a controller unit controlling a user operable device, wherein the mobile device comprises:
a device for inputting inquiry data,
a first transmitter for transmitting an inquiry comprising said inquiry data to a key authority via a wide area transmission network in order to obtain an access key for the user of the mobile device to access functions of the user operable device,
a receiver for receiving, via said wide area transmission network, the access key assigned by said key authority,
a storage for storing said access key, and
a second transmitter for transmitting said access key via a local area transmission network to said controller unit,

and wherein the controller unit comprises:
a receiver for receiving said access key transmitted by the mobile device via the local area transmission network,
a unit for generating a validation key based on device identification data of said user operable device,
a unit for validating said access key by comparing said access key with said validation key, and
a unit for providing said user access to said functions of said user operable device if the access key is validated,
wherein transmitting the inquiry to the key authority comprises several transmissions and retransmissions, including a request to operate said user operable device, and a transmission of information requested by the key authority, and wherein said information is used by the key authority for co-coding the access key with one or more conditions for operating the user operable device.
45. The system according to claim 44, wherein said unit for generating said validation key contains device identification data of said user operable device for generating said validation key.
46. The system according to claim 44, wherein said unit for generating said validation key contains time information for generating said validation key.
47. The system according to claim 44, wherein said unit for generating said validation key contains a period of validity for generating said validation key.
48. The system according to claim 44, comprising additionally a storage for storing said access key.
49. The system according to claim 44, comprising additionally a storage for storing a key or several keys used for generating the validation key.
50. The system according to claim 44, comprising additionally a transmitter for transmitting information concerning the validity of said access key or information concerning functions accessible by said user to said mobile device via the local area transmission network.
51. The system according to claim 44, comprising additionally an interface unit for communicating with a key authority.
52. The system according to claim 51, wherein said interface unit is connected to the key authority via a transmission network.
53. The system according to claim 52, wherein said transmission network is a wide area transmission network.
54. The system according to claim 52, wherein said transmission network is a short range communication network.
55. The system of claim 44, wherein said inquiry data includes identification and payment information of said user and the first transmitter is configured to perform several transmissions and retransmssions in transmitting said identification and payment information to said key authority.

The claims below are in addition to those above.
All refrences to claim(s) which appear below refer to the numbering after this setence.

1. A computer, comprising:
a power button;
a flash read-only memory (ROM) for storing a power button protection state for the power button;
a processor;
a near field communication (NFC) module;
a chipset, coupled to the processor and the flash ROM; and
a coprocessor, coupled to the power button, the NFC module and the chipset, wherein the coprocessor is operative to verify whether a current user identification (UID) of a NFC card equals a default user identification (UID) after the NFC module generates an interrupt request (IRQ), and the coprocessor is operative to change the power button protection state when the current UID equals the default UID.
2. The computer according to claim 1, wherein the coprocessor is operative to change the power button protection state from a disabled state to an enabled state when the current UID equals the default UID.
3. The computer according to claim 1, wherein the coprocessor is operative to change the power button protection state from an enabled state to a disabled state when the current UID equals the default UID.
4. The computer according to claim 1, wherein the coprocessor is operative to read the current UID from the NFC card after the NFC module generates the IRQ.
5. The computer according to claim 1, wherein the coprocessor is further operative to check whether the power button protection state is enabled, and to lock the power button when the power button protection state is enabled.
6. The computer according to claim 5, wherein the power button protection state is written to the flash ROM when the power button is locked.
7. The computer according to claim 1, wherein the coprocessor is further operative to check whether the power button protection state is enabled, and to unlock the power button when the power button protection state is not enabled.
8. The computer according to claim 7, wherein the power button protection state is written to the flash ROM when the power button is unlocked.
9. The computer according to claim 1, wherein the coprocessor comprises a general purpose inputoutput (GPIO) pin to receive the IRQ.
10. A control method for a computer, the method comprising:
determining, by a coprocessor, whether a near field communication (NFC) module generates an interrupt request (IRQ);
reading a current user identification (UID) from a NFC card if the IRQ is generated;
verifying whether the current UID equals a default UID; and
changing a power button protection state when the current UID equals the default UID.
11. The control method according to claim 10, wherein the power button protection state is changed from a disabled state to an enabled state when the current UID equals the default UID.
12. The control method according to claim 10, wherein the power button protection state is changed from an enabled state to a disabled state when the current UID equals the default UID.
13. The control method according to claim 10, further comprising:
checking whether the power button protection state is enabled;
locking a power button when the power button protection state is enabled; and
unlocking the power button when the power button protection state is not enabled.
14. The control method according to claim 13, wherein the power button protection state is written to a flash ROM when the power button is locked.
15. The control method according to claim 13, wherein the power button protection state is written to a flash ROM when the power button is unlocked.
16. The control method according to claim 10, further comprising:
initializing the coprocessor; and
initializing the NFC module.
17. The control method according to claim 16, wherein the step of initializing the NFC module comprises:
outputting a writing command to the NFC module after outputting a reset command to the NFC module;
delaying for a first default time after the writing command is outputted to the NFC module;
outputting a read command to the NFC module after the delaying for the first default time; and
delaying for a second default time after the read command is outputted to the NFC module.
18. The control method according to claim 17, wherein the step of initializing the NFC module further comprises:
checking whether the initializing of the NFC module is completed; and
checking whether an informing signal is received from the NFC module if the initializing of the NFC module is completed.