Method and system for inputting user instructions of a user-controllable telecommunication device

ABSTRACT

A method and systems for inputting user instructions to central controller of a service provider. The user instruction is inputted based on transmission of RFID identification data of a RFID transponder to the central controller. The RFID identification data of a RFID transponder is transmitted to a RFID transceiver, having a RFID transceiver identification, over an RFID interface. The RFID identification data and the RFID transceiver identification are then forwarded to the central controller of the service provider over a network connection between the RFID transceiver and the central controller, causing the central controller to select specific user instruction based on the RFID identification data and the RFID transceiver identification. The selected specific user instruction then causes the central controller to apply corresponding adjustment to operations that relate to the one or more electronic devices corresponding to the user of the RFID transponder.

TECHNICAL FIELD

The present invention relates to a method, a system and a device for inputting user instructions into a user-controllable telecommunication device, whereby a RFID transponder is brought into the sphere of scope of an RFID transceiver, and whereby RFID identification data are transmitted from the RFID transponder to the RFID transceiver.

STATE OF THE ART

In recent years, the number of users of telecommunication devices has increased rapidly. By now, many persons are in possession of a multitude of different telecommunication devices, such as, for example, landline terminals at home or in the office, which are connected via a landline network or via a mobile radio terminal, usable via a mobile radio network. Telecommunication devices are controllable by means of user instructions selected by the user. A user instruction for controlling a telecommunication device creates, for example, a user-specific configuration of a telecommunication terminal and/or of a central processing unit of a telecommunication network. A user of a landline telephone can, by inputting a user instruction, for example control a central processing unit of a telecommunication network in such a way that calls to this landline telephone are forwarded to a mobile radio terminal of the user. The user can, for example when leaving the workplace, enter this user instruction into the landline business telephone installed at the workplace, and then remain available on the mobile radio telephone for calls to the business number. A user instruction can however also be applied to the deactivation of a first SIM (Subscriber Identity Module) card of a first mobile radio terminal and the subsequent activation of a second SIM card of a second mobile radio terminal, or to the activation of that SIM card, which has been set aside for incoming calls. A user in possession of a first mobile radio terminal with features which are especially suitable for business use, and a second mobile radio device with features especially suited to leisure time activities, can, by inputting a user instruction for controlling a telecommunication device, such as, for example, a Home Location Register in this case, initiate the activation of his preferred mobile radio device. The state of the art inputting of user instructions is done via the keyboard of a telecommunication terminal by pressing a combination or sequence of keys. In doing so, the user can be suitably assisted, for example, by means of a display attached to the telecommunication device, as well as by a menu-based indication and a selection of user instructions. Often the inputting of a user instruction is based on the control method of a telecommunication device which is always the same. A user who, for example, activates the call forwarding feature when leaving the office, and deactivates it again in the morning when entering the office, will therefore execute the same combination and/or sequence or keys every day. Hereby it is often necessary to observe the indications of a menu-based display device.

A method is known, for example, from the patent specification U.S. Pat. No. 6,446,127 B1, in which a user of a Personal Information Device (PID) can transmit data to a central processing unit of a telephone network, whereby a call forwarding feature is activated or deactivated due to this data, whereby the PID is programmable to initiate an activation or deactivation at a particular time of day or according to a calendar that has been entered. A disadvantage of this procedure is that the user must manage the time of entering a user instruction by means of inputting corresponding time data into the PID, where even minor changes in the behavior of the user in comparison with the time schedule stored in the PID, require adjustments to be made. A further disadvantage of this procedure is that the user must continue to execute various user instructions using a menu-based input device.

In recent years, the state of the art technology of so-called RFID (Radio Frequency Identification) technology has continued to develop. RFID technology in essence entails an RFID transceiver for acquiring RFID data of a RFID transponder (TRANSmit/resPOND), RFID transponders are also known in state of the art technology as RFID tags. RFID data may encompass just one bit, for example, for monitoring theft at the exit of a department store. For this type of theft control, RFID transponders are attached to the articles to be monitored. At the exit of the store, as RFID transponders are removed from the article or deactivated after the required payment has been made, an RFID transceiver checks to see whether such an RFID transponder can be detected. RFID data can however amount to several hundred kBytes, for example for the documentation of the manufacturing stages and test results of an industrial work piece. Such documentation, for example, has the advantage that manufacturing steps can be optimally adapted to preceding manufacturing steps. RFID transponders can on the one hand be designed in such a way that RFID data can only be read out. On the other hand, RFID transponders can also be designed in such a way that RFID data can be read out of RFID transponders as well as being written into them. The operating principle of the RFID technology relies on the capacitative or inductive coupling and decoupling of electro-magnetic waves, whereby the distance between the RFID transponder and the RFID transceiver may amount to only a few centimeters, or, for example, up to thirty meters. Active RFID transponders are equipped with an own energy source, for example a battery, Passive RFID transponders do not possess an own energy source. When using a passive RFID transponder, energy for activating the electronics of the RFID transponder can, for example, be inductively coupled and for example be used for charging a condenser. As soon as this condenser possesses enough energy, the control electronics of the RFID transponder can, for example, initiate the decoupling of RFID data. The decoupling takes place by, for example, emitting suitably modulated electro-magnetic waves.

DISCLOSURE OF THE INVENTION

It is an object of the present invention to propose a new method and a new system for inputting user instructions, which do not possess the disadvantages of state of the art technology.

According to the present invention these objectives are achieved in particular by the elements of the independent claims. In addition, further advantageous embodiments emerge from the dependent claims and the description.

In particular, these objectives are achieved by the invention by bringing a RFID transponder into the sphere of scope of an RFID transceiver for inputting user instructions of a user-controllable telecommunication device, whereby RFID identification data of the RFID transponder is transmitted to the RFID transceiver. The RFID identification data and/or an RFID transceiver identification is/are transmitted by the RFID transceiver to a collection module, whereby an assigned user instruction is selected by means of the collection module as well as by means of tables containing RFID identification data and/or tables containing RFID transceiver identifications, accessible to the collection module, whereby the user-controllable telecommunication device is controlled by means of the collection module according to the selected user instruction. Such a method has the particular advantage that the user is able to initiate a user instruction quickly and easily. As RFID transponders can be manufactured very cheaply and very small, the user may, for example, take along several RFID transponders and initiate the required user instruction by bringing the corresponding RFID transponder into the sphere of scope of the RFID transceiver.

In one embodiment the RFID identification data as well as the RFID transceiver identification are transmitted to a collection module connectable to the telecommunication network by means of a connection module connectable to a RFID transceiver and a telecommunication network. Such a method has the particular advantage that an existing telecommunication network can easily be completed by means of the devices required for executing the procedures according to the present invention. The methods according to the invention also have another advantage, namely that inputting a user instruction is very simple. The method is particularly suited to older persons and/or those with visual impairments and/or persons suffering from motor (multiple sclerosis) or other disorders (Alzheimer's). These persons are unable to input complex user instructions into a terminal, but are still able to make an RFID transponder interact with an RFID transceiver by means of correspondingly more expansive movements.

In another embodiment, RFID identification data as well as the RFID transceiver identification are transmitted to a collection module integrable to the user-controllable telecommunication device. Such a method has the particular advantage that the collection module may, for example, be designed as a software module, so that existing telecommunication devices can easily be completed with the devices required for executing the methods according to the present invention.

In another embodiment, the user instruction relates to the activation or deactivation of a call forwarding feature that forwards calls intended for a first telecommunication device to a second telecommunication device. Such a method has the advantage that users can activate the user instruction initiating the call forwarding feature, for example by means of any suitable connection module.

In another embodiment, the user instruction relates to the selection of a user profile of a telecommunication terminal. Such a method has the advantage that a user can easily load a personal user profile into a telecommunication terminal. In a first phase the user profile and permitted user instructions can, for example, be managed via the Internet by means of a PC. In a subsequent phase, the corresponding user instructions can be activated by means of an RFID transponder according to the method according to the invention. The user profile would contain details about languages, gender, location etc. of the user, which may, for example, be used as a filter for particular services.

In another embodiment, the user instruction relates to the initiation of a payment in a payment transaction procedure. Such a method has the advantage that a user can very easily initiate a payment. In this way for example data content that can be purchased that can be played back via a telecommunication network as an object (MP3 file) or as a data stream (TV broadcast).

In another embodiment, the user instruction relates to the deactivation of a first SIM module of a first mobile radio terminal and the activation of a second SIM module of a second mobile radio terminal. Such a method has the advantage that a user can switch very easily between the two mobile radio terminals.

In another embodiment, the user-controllable telecommunication device relates to the switchboard of a landline network or to a Home Location Register of a mobile radio network or to a Visiting Location Register or to any other similar register of a mobile radio network. Such a method has the advantage that changes to such a register can be done from any suitable location.

In another embodiment, the telecommunication network relates to a mobile radio network and/or a landline network and/or an Internet-based network and/or a Wireless Local Area Network N) and/or a Power Line Communication (PLC) network and/or a cable-based network. Such a method has the advantage that a high degree of interoperability between the various telecommunication networks is ensured. Parameters, for example user-related parameters for the user of a mobile radio network, can, for example, be modified via a PLC network, in fact, independently of the transmission quality of the mobile radio network or even in the absence of the coverage of a location by the mobile radio network or in the absence of a roaming agreement.

In another embodiment, the RFID transceiver is attached to a telecommunication terminal, whereby the RFID identification data and the RFID transceiver identification together with data of the telecommunication terminal are transmitted to the collection module, and whereby the collection module selects an assigned user instruction by means of corresponding tables containing RFID identification data and RFID transceiver identifications as well as a corresponding table of telecommunication terminals data. Such a method has the advantage of increasing security during the inputting of a user instruction.

At this point it should be stressed that the present invention, in addition to the method to which this invention relates, also relates to a system for executing this procedure.

BRIEF DESCRIPTION OF THE DRAWING

The different embodiments of the present invention are described below with the aid of examples; the examples of the embodiments are illustrated by the following attached FIGURE:

FIG. 1 shows a block diagram, which schematically illustrates a method and a system for inputting user instructions, whereby an RFID transponder 12 is, for example, brought into the sphere of scope of an RFID transceiver 9.

EMBODIMENT(S) OF THE INVENTION

In FIG. 1 the reference number 1 relates to a telecommunication network. The telecommunication network 1 can be any network for creating communication links between network devices, for example a PSTN (Public Switched Telephone Network) network, a mobile radio network, for example a GSM (Global System for Mobile Communication) network, a UMTS (Universal Mobile Telecommunication Service) network or any other mobile radio network, an Internet-based network such as a Wireless Local Area Network (WLAN) or a Power Line Communication (PLC) network or a cable-based network (Cable TV) or any other telecommunication network for linking remote network devices. The telecommunication network 1 can also include several different networks, which can be linked via a suitable network connection module. The telecommunication network 1 can, for example, include a PSTN network and a mobile radio network as well as a suitable network connection module, so that network devices of the mobile radio network are connectable with network devices of the PSTN network.

In FIG. 1 the reference number 2 relates to a collection module according to the invention. The collection module 2 includes devices for storing RFID identification data and identifications of RFID transceivers as well as devices for selecting user instructions, as well as for controlling a user-controllable telecommunication device according to the selected user instruction. The collection module 2 is preferably designed as a programmed software module to run on a suitable computer. The person skilled in the art will know that the collection module will also be partly or wholly designed as hardware. The person skilled in the art will also understand that the collection module 2 can also be made up of separated devices, whereby these separated devices, such as, for example, a device for storing a table and a device for selecting a user instruction, can be suitably be linked, for example, via the telecommunication network 1. A collection module 2 can for example be connected to various user-controllable telecommunication devices 3 at the same time and thereby be operated from an independent operator.

In FIG. 1 the reference number 3 relates to a user-controllable telecommunication device. The user-controllable telecommunication device 3 is for example a central processing unit of a landline network or a Home Location Register of a mobile radio network or a Visiting Location Register or any similar register of a mobile radio network or any other user-controllable telecommunication device. The collection module 2 can be connected to the user-controlled telecommunication device 3 via any suitable connection, for example via an Ethernet cable or via a private network or via the telecommunication network 1 or via any other suitable connection, whereby the user-controlled telecommunication device 3 is controllable by the collection module 2 via the said connection. The user-controllable telecommunication device is further connectable to the telecommunication network 1, whereby services and functions of the user-controllable telecommunication device 3, such as, for example, a call forwarding service or an SIM card localizing service, can be offered in addition to the said connection to the telecommunication network 1 as well as in addition to devices connectable to this telecommunication network 1.

In FIG. 1 the reference number 4 relates to a mobile radio terminal, for example to a GSM (Global System for Mobile Communications) mobile radio terminal, connectable to the telecommunication network 1 via a mobile radio connection 5, to a UMTS (Universal Mobile Telecommunication Service) mobile radio terminal or to any other mobile radio terminal connectable to the telecommunication network 1. The reference numbers 6, 7, and 8 relate to several landline terminals, connectable via a landline connection, for example to an analog landline telephone, an ISDN (Integrated Services Digital Network) landline telephone, a VoIP (Voice over IP) telephone or to any other landline terminal connectable to the telecommunication network 1. Further terminals could for example be TV equipment, radio receivers or Retinal Scanning Displays (RSD), which are connected to a telecommunication network and which, for example, do not possess keyboards or similar input devices. Thereby, for example, the choice of a film language can be entered by means of the method according to the invention and a corresponding RFID transponder.

In FIG. 1, the reference numbers 9 and 10 relate to two typical configurations of RFID transceivers. As an example, the RFID transceiver 9 is connectable to the telecommunication network 1 via a connection module 11. In addition, the RFID transceiver 10 has, for example, been attached to the landline terminal 8. In order to execute the method according to the invention, any suitable arrangement can be selected for an RFID transceiver, whereby RFID identification data and an RFID transceiver identification can be transmitted to the collection module 2 via any connection. This way an RFID transceiver can for example be connected to a cable network socket for transmitting TV signals and for transmitting Internet data packages, whereby RFID identification data and an identification of an RFID transceiver can for example be transmitted via a suitable Internet connection to the collection module 2. In addition an RFID transceiver can be connected to a mains socket, whereby RFID identification data and an RFID transceiver identification can be transmitted via a power line based Internet connection to the collection module 2.

In FIG. 1 the reference number 12 relates to an RFID transponder. The RFID transponder 12 can, for example, be installed in a plastic card, for example in credit card format, whereby a user can easily carry several such plastic cards, each with a different RFID transponder, and whereby each of these plastic cards can be designed in a suitable color or with a suitable inscription for easy identification by the user. An RFID transponder 12 can however also be attached to an article of daily use of the user, such as a watch, a key ring, a mobile radio device or to a personalized ballpoint pen. An RFID transponder 12 is basically suitable to be used with all telecommunication networks.

The manufacturers of the RFID transponder 12 can, for example, program or store the operators of the telecommunication network 1, for example the mobile radio network operators, the RFID identification data or codes into the RFID transponders 12.

In an embodiment, the RFID transponder 12 is programmed with RFID identification data or an unambiguous code, to which an identity, for example the MSISDN or IMSI number of a mobile radio network user, can be assigned. In another embodiment, several RFID transponders 12 are programmed with the same RFID identification data or the same code. This way, for example, user-specific, device-specific or universally valid user instructions can be created.

The agent of data content could also release RFID transponders 12 for the payment for the data content to be transmitted. In case of a payment by means of the RFID transponder 12, the corresponding amount be charged to an account linked to the RFID transponder 12. This account could for example be a prepaid, debit or postpaid account.

For inputting a user instruction, a user will select the desired RFID transponder 12 and bring it into the sphere of scope of a desired RFID transceiver 9, 10. As soon as the corresponding RFID transceiver 9, 10 detects the RFID transponder 12, the RFID transceiver 9, 10 transmits RFID identification data of the RFID transponder and an RFID transceiver identification to the collection module 2 via a connection between the RFID transponder and the collection module 2. The collection module then evaluates the RFID identification data and the RFID transceiver identification and selects a user instruction according to the tables containing RFID identification data and the RFID transceiver identification. The following table shows such a selection of a user instruction for the example of a call forwarding configuration:

RFID transponders RFID transceiver Selected user instruction 12 9 Activate call forwarding to mobile radio device 4 13 (not shown) 9 Deactivate call forwarding to mobile radio device 4 12 10 Activate call forwarding to landline network device 8

The solution according to the invention provides a large number of solutions in a variety of applications. An RFID transceiver can, for example, be incorporated in a plug which is insertable into a mains socket. In addition to the RFID transceiver the plug includes, for example, a connection module 11 for connecting the RFID transceiver with a collection module 2, as well as, for example, electronic keys and/or certificates for securing a data connection between the connection module 11 and the collection module 2 as described below. The connection module 11 can for example include an Internet protocol interface as well as an interface for transmitting Ethernet data packages via the mains cable. A secure Internet protocol-based connection between the connection module 11 and the collection module 2 can, for example, be established via an ADSL modem, also equipped with a mains socket and an interface for transmitting Ethernet data packages via the mains cable as well as via a corresponding Internet protocol interface of the collection module 2 as well as corresponding keys and/or certificates of the collection modules 2. The plug with the RFID transceiver can be placed at a suitable location, for example at the entrance to an office. The user of the office can now equip one of his personal articles of daily use, for example his watch, with an RFID transponder, whereby RFID identification data and an RFID transceiver identification are transmitted to the collection module 2 by means of the connection module 11, as soon as the user is within the sphere of scope of the RFID transceiver. According to the invention, this way the user-controllable telecommunication device 3 is controlled according to a user instruction assigned to the RFID identification data and the RFID transceiver identification. The sphere of scope of the RFID transceiver can, for example, be designed in such a way that it covers the entire office space of the user's office and the user instruction can for example include the deactivation of call forwarding to the telephone number of a landline telephone installed in the user's office. The connection module 11 can for example include means for instructing the RFID transceiver to test the RFID identification data of the RFID transponder at a particular time, whereby the connection module 11 will, after a successful test, again transmit the RFID identification data as well as the RFID transceiver identification to the collection module 2. The collection module 2 can, for example, include a validation module, whereby, for example, the validity duration of a user instruction and a second user instruction are set by the validation module, which second user instruction is used for controlling the user-controllable telecommunication device 3 after the expiration of the validity period of the user instruction.

In a further example of a possible application of the method according to the invention, the user-controllable telecommunication device 3 relates to the in-house switchboard of a business. The collection module 2 is, for example, installed in this internal switchboard and RFID transceivers are, for example, installed on the telephone devices operated by the internal switchboard. As soon as, for example, a user places a plastic card with an RFID transponder inside the sphere of scope of an RFID transceiver, RFID identification data and an RFID transceiver identification are transmitted to the collection module 2 by means of a connection module 11, whereby the coil on module controls the internal switchboard with an appropriate user instruction in such a way that a user profile assigned to the RFID transponder is, for example, loaded onto the corresponding telephone device by the internal switchboard. By means of additional plastic cards with RFID transponders, the user can, for example, also decide that he does not want to be disturbed for the moment, and calls are, for example, answered by the internal switchboard with an automatic message or forwarded to a definable call forwarding number.

In a further example of a possible application of the method according to the invention, the user-controllable telecommunication device relates to a central processing unit of a payment transaction process. An RFID transceiver is for example installed at the cash desk of a store. A client of the store can, for example, bring an RFID transponder into the sphere of scope of the RFID transceiver to pay for purchases, whereby RFID identification data and an RFID transceiver identification are transmitted to a collection module 2. The collection module 2 thereby obtains sufficient information for controlling the central processing unit of the payment transaction procedure by means of a user instruction in such a way that an appropriate payment transaction can be initiated. In order to secure this method, an input unit, linked to the cash register or to an RFID transceiver can be attached to the cash register for entering a personal secret, whereby this personal secret can be transmitted to the collection module 2 for verification.

In a further example of a possible application of the method according to the invention, the RFID transceiver relates to a portable device, which is, for example, connectable to a WLAN hotspot of a telecommunication network via a wireless interface by means of a connection module 11. The RFID transponder 12 further relates to small modules that can be installed in the housing of the RFID transceiver. The housing of the RFID transceiver and the RFID transponders are designed in such a way that pushing one of the RFID transponders into the housing of the RFID transceiver initiates the corresponding user instruction. This has the advantage that the whole device is a single, mobile and portable unit and that the RFID transponders can not get lost. 

1-18. (canceled)
 19. A method, comprising: inputting a user instruction to a central controller of a service provider, the inputting of user instruction comprising: transmitting RFID identification data of a RFID transponder to a RFID transceiver over an RFID interface, the RFID transceiver having a RFID transceiver identification; and transmitting the RFID identification data and the RFID transceiver identification to the central controller of the service provider over a network connection between the RFID transceiver and the central controller, wherein: the RFID transponder is selected from a plurality of RFID transponders corresponding to the user, the selected RFID transponder corresponding to a specific user instruction; the transmitted RFID identification data and the RFID transceiver identification cause the central controller of the service provider to select the specific user instruction based on the RFID identification data and the RFID transceiver identification; and the selected specific user instruction then causes the central controller of the service provider to affect operations that relate to the one or more electronic devices corresponding to the user.
 20. The method according to claim 19, wherein the transmitting of RFID identification data of the RFID transponder to the RFID transceiver occurs when RFID transponder is brought into a sphere of scope of the RFID transceiver.
 21. The method according to claim 19, wherein the affecting of the operations comprises diverting one or more operations from a first one of the one or more electronic devices to a second one of the electronic devices.
 22. The method according to claim 21, wherein the diverted one or more operations from the first electronic device to the second electronic device comprise communication operations.
 23. The method according to claim 19, wherein the central controller determines the selected specific user instruction based on tables specifying user instructions corresponding to particular RFID identification data and/or particular RFID transceiver identification.
 24. The method according to claim 19, wherein the validity of the selected specific user instruction is determined prior to triggering the affecting of the operations; and an alternate user instruction is applied when the validity of the selected specific user instruction has expired.
 25. The method according to claim 19, wherein the user instruction relates to activation or deactivation of a function that causes selection of a particular electronic device for a particular operation, selection of particular user profile corresponding to an electronic device, initiation of payment, and/or activation or deactivation of a particular component of an electronic device
 26. A system, comprising: a RFID transceiver, having a RFID transceiver identification, for use in inputting a user instruction to a central controller of a service provider, wherein the RFID transceiver is operable to: receive RFID identification data from a selected one of a plurality a RFID transponders via an RFID interface, the selected one of the plurality of RFID transponders corresponding to a specific user instruction; and transmit the RFID identification data and the RFID transceiver identification to the central controller of the service provider over a network connection between the RFID transceiver and the central controller; wherein: the transmitted RFID identification data and the RFID transceiver identification cause the central controller of the service provider to select the specific user instruction based on the RFID identification data and the RFID transceiver identification; and the selected specific user instruction then causes the central controller of the service provider to affect operations that relate to the one or more electronic devices corresponding to the user.
 27. The system according to claim 26, wherein the RFID identification data of the selected one of a plurality a RFID transponders is transmitted to the RFID transceiver when the RFID transponder is brought into a sphere of scope of the RFID transceiver.
 28. The system according to claim 26, wherein the affecting of the operations comprises diverting one or more operations from a first one of the one or more electronic devices to a second one of the electronic devices.
 29. The system according to claim 28, wherein the diverted one or more operations from the first electronic device to the second electronic device comprise communication operations.
 30. The system according to claim 26, wherein the central controller determines the selected specific user instruction based on tables specifying user instructions corresponding to particular RFID identification data and/or particular RFID transceiver identification.
 31. The system according to claim 26, wherein the validity of the selected specific user instruction is determined prior to triggering the affecting of the operations; and an alternate user instruction is applied when the validity of the selected specific user instruction has expired.
 32. The system according to claim 26, wherein the user instruction relates to activation or deactivation of a function that causes selection of a particular electronic device for a particular operation, selection of particular user profile corresponding to an electronic device, initiation of payment, and/or activation or deactivation of a particular component of an electronic device
 33. A system, comprising: a central controller of a service provider, for receiving user instructions from an RFID transceiver and for applying the user instructions, wherein the user instructions are received based on a user selection of an RFID transponder from a plurality of RFID transponders, the central controller being operable to: receive RFID identification data corresponding to the selected RFID transponder and an RFID transceiver identification, from the RFID transceiver via a network connection between the RFID transceiver and the central controller; select the specific user instruction based on the RFID identification data and the RFID transceiver identification; and apply one or more corresponding functions that affect operations that relate to the one or more electronic devices corresponding to the user, based on the selected user instruction.
 34. The system according to claim 33, wherein the RFID identification data of the selected RFID transponder is transmitted to the RFID transceiver when the selected RFID transponder is brought into a sphere of scope of the RFID transceiver.
 35. The system according to claim 33, wherein the affecting of the operations comprises diverting one or more operations from a first one of the one or more electronic devices to a second one of the electronic devices.
 36. The system according to claim 35, wherein the diverted one or more operations from the first electronic device to the second electronic device comprise communication operations.
 37. The system according to claim 33, wherein the central controller is operable to determine the selected specific user instruction based on tables specifying user instructions corresponding to particular RFID identification data and/or particular RFID transceiver identification.
 38. The system according to claim 33, wherein the central controller is operable to determine the validity of the selected specific user instruction prior to applying the one or more corresponding functions; and to apply an alternate user instruction when the validity of the selected specific user instruction has expired.
 39. The system according to claim 33, wherein the user instruction relates to activation or deactivation of a function that causes selection of a particular electronic device for a particular operation, selection of particular user profile corresponding to an electronic device, initiation of payment, and/or activation or deactivation of a particular component of an electronic device. 