Patent classifications
G06Q30/012
METHODS AND SYSTEMS FOR RECEIPT CAPTURING PROCESS
A receipt capture tool residing on a customer mobile device may be initiated when a customer completes an in-store or online purchase. The receipt capture tool may prompt the customer to capture an image of a receipt detailing a purchase and an item (e.g., product or service) purchased. For instance, the photo of a physical receipt may be taken by the mobile device, or an electronic receipt or email detailing the purchasing transmitted from a physical merchant or online merchant server may be stored. Receipt information may be extracted and saved with other information pertinent to the item purchased, including warranty information. If the customer needs to return or repair the item purchased at a future date, the receipt and warranty information may be subsequently accessed via their mobile device. The receipt and warranty information may also be stored in a searchable database to facilitate easy retrieval by the customer.
METHODS AND SYSTEMS FOR RECEIPT CAPTURING PROCESS
A receipt capture tool residing on a customer mobile device may be initiated when a customer completes an in-store or online purchase. The receipt capture tool may prompt the customer to capture an image of a receipt detailing a purchase and an item (e.g., product or service) purchased. For instance, the photo of a physical receipt may be taken by the mobile device, or an electronic receipt or email detailing the purchasing transmitted from a physical merchant or online merchant server may be stored. Receipt information may be extracted and saved with other information pertinent to the item purchased, including warranty information. If the customer needs to return or repair the item purchased at a future date, the receipt and warranty information may be subsequently accessed via their mobile device. The receipt and warranty information may also be stored in a searchable database to facilitate easy retrieval by the customer.
DERIVING INDEPENDENT SYMMETRIC ENCRYPTION KEYS BASED UPON A TYPE OF SECURE BOOT USING A SECURITY PROCESSOR
Embodiments of systems and methods for deriving independent symmetric encryption keys based upon a type of secure boot using a security processor are described. In some embodiments, a security processor may include: a core; and a memory coupled to the core, the memory having program instructions stored thereon that, upon execution by the core, cause the security processor to: identify a type of secure boot performed to bootstrap an Information Handling System (IHS); and derive a symmetric encryption key based upon the type of secure boot.
Method for consumption based redemption in an exchange item marketplace network
A method begins with a server in a data communication system identifying an instance for a user computing device associated with an exchange item to utilize the exchange item for acquisition of a particular item, where the exchange item has a quantifiable value and the particular item has an acquisition value. The method continues by, for the instance, determining compliance with one or more rules of a set of exchange item rules, determining that the quantifiable value of the exchange item is less than the acquisition value of the particular item, determining an alternative exchange item utilization protocol to facilitate the acquisition of the particular item such that the quantifiable value of the exchange item is greater than or equal to the acquisition value, and when requested, executing the alternative exchange item utilization protocol to facilitate the acquisition of the particular item.
Method for consumption based redemption in an exchange item marketplace network
A method begins with a server in a data communication system identifying an instance for a user computing device associated with an exchange item to utilize the exchange item for acquisition of a particular item, where the exchange item has a quantifiable value and the particular item has an acquisition value. The method continues by, for the instance, determining compliance with one or more rules of a set of exchange item rules, determining that the quantifiable value of the exchange item is less than the acquisition value of the particular item, determining an alternative exchange item utilization protocol to facilitate the acquisition of the particular item such that the quantifiable value of the exchange item is greater than or equal to the acquisition value, and when requested, executing the alternative exchange item utilization protocol to facilitate the acquisition of the particular item.
Systems and non-transitory computer-readable storage media for real-time event management system for mobile devices
A computerized system and method of managing events surrounding the lifecycle of used and new mobile devices. The system provides a “360 view” that integrates a mobile device's service options, such as financing and device protection, as well as at the device level regarding potential hardware/software errors. This provides an end-to-end view of consumers, such as claims on device protection plans, repayment issues, utilization of upgrades and/or other information in a user's profile across multiple underlying systems during the device's lifecycle.
Systems and non-transitory computer-readable storage media for real-time event management system for mobile devices
A computerized system and method of managing events surrounding the lifecycle of used and new mobile devices. The system provides a “360 view” that integrates a mobile device's service options, such as financing and device protection, as well as at the device level regarding potential hardware/software errors. This provides an end-to-end view of consumers, such as claims on device protection plans, repayment issues, utilization of upgrades and/or other information in a user's profile across multiple underlying systems during the device's lifecycle.
METHOD AND SYSTEM FOR MANAGING WARRANTY CLAIMS ASSOCIATED WITH INFORMATION HANDLING SYSTEMS
Techniques described herein relate to a method for deploying workflows with data management services. The method may include identifying, by a warranty measuring model associated with an information handling system, a first change event associated with the information handling system; obtaining first change information associated with the first change event; making a first determination that the first change event is not associated with an entry of a warranty audit table (WAT); generating a new WAT entry in the WAT using the first change information and an initial timestamp; identifying, by a warranty measuring model, a second change event associated with the information handling system; obtaining second change information associated with the second change event; making a second determination that the second change event is associated with an existing WAT entry of the WAT; updating the existing WAT entry using the second change information and a final timestamp.
Interactive information technology kiosk
Certain example embodiments provide systems, methods, apparatuses, and computer program products for an interactive information technology (IT) kiosk that can be used to access IT services (e.g., live IT services) for computing hardware. For example, the interactive IT kiosk may include various ports for connecting computing hardware to establish a connection to a service center and/or to provide diagnostic data to the service center, a video camera, a display screen (e.g., a touchscreen display), a microphone, and/or the like. These hardware components may allow for a service center to provide IT services related to the computing hardware in real-time and may allow for real-time communication with a user of the interactive IT kiosk without consuming additional computing resources of the computing hardware.
INFORMATION PROCESSING SYSTEM, INFORMATION PROCESSING DEVICE, AND CONTROL METHOD THEREOF
An information processing device includes: a first acquirer, a second acquirer, and a switcher. The first acquirer acquires user information of a user who executes a registration operation on a purchased merchandise. The second acquirer acquires a first time value for the registration operation based on the user information. The switcher switches a registration operation method for the purchased merchandise when a second time value required for the registration operation exceeds the first time value.