Encrypted warranty verification and diagnostic tool
First Claim
1. A method comprising:
- retrieving, by a diagnostic system, encrypted utilization data from an electronic system, wherein the encrypted utilization data are generated from utilization data corresponding to usage of the electronic system;
decrypting the encrypted utilization data by the diagnostic system, the decrypting resulting in decrypted utilization data;
in response to determining that the decrypted utilization data are valid, extracting a first user boot-up timestamp from the decrypted utilization data that specifies a first occurrence in an electronic system lifecycle at which the electronic system was booted-up by a user; and
displaying, by the diagnostic system, at least a portion of the decrypted utilization data on a display, wherein the displayed portion of the decrypted utilization data includes the first user boot-up time.
1 Assignment
0 Petitions
Accused Products
Abstract
According to one embodiment of the present disclosure, an approach is provided in which a diagnostic system retrieves encrypted utilization data from an electronic system that were generated from utilization data corresponding to the electronic system'"'"'s usage. The diagnostic system decrypts the encrypted utilization data and determines whether the decrypted utilization data are valid. When the decrypted utilization data are valid, the diagnostic system displays the decrypted utilization data on a display. In another embodiment, the diagnostic system retrieves cryptographically-protected utilization data from the electronic system and determines the authenticity of the cryptographically-protected utilization data. Once the cryptographically-protected utilization data are authenticated, the diagnostic system displays the corresponding utilization data on a display.
-
Citations
21 Claims
-
1. A method comprising:
-
retrieving, by a diagnostic system, encrypted utilization data from an electronic system, wherein the encrypted utilization data are generated from utilization data corresponding to usage of the electronic system; decrypting the encrypted utilization data by the diagnostic system, the decrypting resulting in decrypted utilization data; in response to determining that the decrypted utilization data are valid, extracting a first user boot-up timestamp from the decrypted utilization data that specifies a first occurrence in an electronic system lifecycle at which the electronic system was booted-up by a user; and displaying, by the diagnostic system, at least a portion of the decrypted utilization data on a display, wherein the displayed portion of the decrypted utilization data includes the first user boot-up time. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. An information handling system comprising:
-
one or more processors; a memory coupled to at least one of the processors; a display accessible to at least one of the processors; a set of computer program instructions stored in the memory and executed by at least one of the processors in order to perform actions of; retrieving encrypted utilization data from an electronic system, wherein the encrypted utilization data are generated from utilization data corresponding to usage of the electronic system; decrypting the encrypted utilization data, the decrypting resulting in decrypted utilization data; and in response to determining that the decrypted utilization data are valid, extracting a first user boot-up timestamp from the decrypted utilization data that specifies a first occurrence in an electronic system lifecycle at which the electronic system was booted-up by a user; and displaying at least a portion of the decrypted utilization data on a display, wherein the displayed portion of the decrypted utilization data includes the first user boot-up time. - View Dependent Claims (8, 9, 10, 11)
-
-
12. A computer program product stored in a computer readable storage medium, comprising computer program code that, when executed by an information handling system, causes the information handling system to perform actions comprising:
-
retrieving encrypted utilization data from an electronic system, wherein the encrypted utilization data are generated from utilization data corresponding to usage of the electronic system; decrypting the encrypted utilization data, the decrypting resulting in decrypted utilization data; and in response to determining that the decrypted utilization data are valid, extracting a first user boot-up timestamp from the decrypted utilization data that specifies a first occurrence in an electronic system lifecycle at which the electronic system was booted-up by a user; and displaying at least a portion of the decrypted utilization data on a display, wherein the displayed portion of the decrypted utilization data includes the first user boot-up time. - View Dependent Claims (13, 14)
-
-
15. A method comprising:
-
retrieving, by a diagnostic system, cryptographically-protected utilization data from an electronic system, wherein the cryptographically-protected utilization data are generated from utilization data corresponding to usage of the electronic system; determining, by the diagnostic system, whether the cryptographically-protected utilization data are authentic; in response to determining that the cryptographically-protected utilization data are authentic, extracting a first user boot-up timestamp from the decrypted utilization data that specifies a first occurrence in an electronic system lifecycle at which the electronic system was booted-up by a user; and displaying, by the diagnostic system, at least a portion of the decrypted utilization data on a display, wherein the displayed portion of the decrypted utilization data includes the first user boot-up time. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification