Computer system warranty upgrade method and apparatus

ABSTRACT

A computer system warranty upgrade method and apparatus are provided. When a warranty upgrade is desired, the computer requesting a warranty upgrade sends its configuration information to a remote warranty server computer. The warranty server prepares a warranty price quote specific to the particular configuration of the requesting computer. When the price quote is paid, the warranty server encrypts and transmits a warranty authorization to the requesting computer. The warranty authorization includes warranty type, duration, the specific configuration warranted and an identification number unique to the requesting computer. These data are authenticated and validated by a secure processor in the requesting computer. After validation, the validated data is stored in secure storage by the secure processor.

CROSS REFERENCE TO RELATED PATENT APPLICATION

[0001] This patent application is related to the copending, commonlyassigned patent application entitled COMPUTER SYSTEM WARRANTY UPGRADEMETHOD AND APPARATUS WITH CONFIGURATION CHANGE DETECTION FEATURE(Attorney Docket Number:16356.662,) filed concurrently herewith.

BACKGROUND

[0002] The disclosures herein relate generally to computer systems andmore particularly to upgrading the warranties associated with suchsystems.

[0003] Computer systems are typically sold with a base warranty thatprovides for repair or replacement of the system if a component of thesystem fails during an initial warranty period. A particular modelcomputer system may be sold in many different configurations. Forexample, the processor will be available in several different clockfrequencies; memory is available in many different increments; the sizeof disk storage will vary; and different video and audio controllers maybe employed. In other words, different machines will have differentfield replaceable units (FRU's) or modules in their configurations. Thewarranty typically attaches to the system in the condition it leaves thefactory, systems integrator or reseller. If a user makes changes to theconfiguration after sale, it is possible that the initial warranty willbe void or will not cover the new configuration.

[0004] However, customers do in fact frequently make changes to thesystem configuration after sale. For example, a larger hard disk driveor a higher performance video card may be added. This presents a problemwhen the user approaches the seller asking for an upgraded warrantycovering the new configuration. A question immediately arises as to whatthe price of the upgraded warranty should be. One typical approach is a“one size fits all” upgraded warranty price. In that case, a singlewarranty price is quoted that is the same for all configurations of aparticular model computer system even though the configurations vary.Here the warranty price is based on the average of expected warrantycosts spread across the many different configurations of a particularmodel. Unfortunately, if you guess wrong in determining the upgradedwarranty price, substantial revenue can be lost.

[0005] Another problem associated with warranties is fraud. It isdifficult to track exactly which FRU's or modules a customer has in amachine. In the past a number uniquely associated with a particularmachine, for example an Express Service Code number, Service Tag numberor serial number, was stored together with some configurationinformation by the seller. An unscrupulous user may make changes to thecomputer system configuration and then call the computer seller andattempt to obtain service on components not originally in the system.When the customer has paid for a warranty upgrade covering componentsnot originally in the system as sold, it is a challenging problem toknow which particular components, modules or FRU's are in the upgradedsystem.

[0006] Therefore, what is needed is a method of more accuratelydetermining warranty cost when a warranty upgrade is requested. Moreoverit is desirable that such methodology minimizes the likelihood of fraud.

SUMMARY

[0007] Accordingly, in one embodiment a method is provided for upgradingthe warranty of a computer system including a plurality of components ina configuration. The method includes receiving, by a warranty processor,a warranty upgrade request from the computer system. The warrantyupgrade request includes configuration information for the computersystem. The warranty processor then determines a warranty upgrade pricedependent on the particular configuration information in the warrantyupgrade request.

[0008] In another embodiment, a method is provided for upgrading thewarranty of a computer system including sending, by the computer system,of a warranty upgrade request to a remote warranty processor. Thewarranty upgrade request includes configuration information for theparticular computer system requesting the warranty upgrade. The methodalso includes receiving, by the computer system, of a warranty upgradeprice determined by the warranty processor dependent on theconfiguration information in the warranty upgrade request.

[0009] A principal advantage of these embodiments is that warranty costis accurately determined on a computer system by computer system basisaccording to the particular configuration of the system for which awarranty upgrade is requested.

BRIEF DESCRIPTION OF THE DRAWINGS

[0010]FIG. 1 shows a representative configurable electrical device onwhich the disclosed methodology is practiced.

[0011]FIG. 2 is a block diagram showing a simplified view of theelectrical device of FIG. 1.

[0012]FIG. 3 is a flowchart providing more detail regarding the steps ofone embodiment of the disclosed warranty upgrade process wherein theupgrade warranty request is “user initiated”.

[0013]FIG. 4 is a block diagram of the warranty server employed by thedisclosed methodology.

[0014]FIG. 5A is a flowchart providing more detail regarding the stepsof another embodiment of the disclosed warranty upgrade process whereinthe upgrade warranty request is “automatically initiated” uponconfiguration change.

[0015]FIG. 5B is a flowchart providing more detail regarding the stepsof yet another embodiment of the disclosed warranty upgrade processwherein the upgrade request is “automatically initiated” upon firstcomputer use or a predetermined amount of time thereafter.

[0016]FIG. 6A is a block diagram of a multi-processor server computerupon which the disclosed warranty upgrade methodology is practiced.

[0017]FIG. 6B is a block diagram of the processor memory module employedby the server computer of FIG. 6A.

[0018]FIG. 6C is a block diagram of the I/O module employed by theserver computer of FIG. 6A.

[0019]FIG. 7A is a block diagram of a blade server computer upon whichthe disclosed warranty upgrade methodology is practiced.

[0020]FIG. 7B is a block diagram of one of the blade computers employedin the computer of FIG. 7A.

DETAILED DESCRIPTION

[0021]FIG. 1 shows a representative configurable electrical device 100on which the disclosed methodology is practiced. In this particularembodiment, device 100 is a computer system including numerouscomponents, modules and FRU's which can be changed or upgraded by theuser or others.

[0022] Computer system 100 includes a processor 105 which operates atone of many different selected clock speeds, for example, 1.7 GHz, 1.8GHz and 2.0 GHz. Processors with higher clock rates tend to produce moreheat. Temperature and clock rates can affect the longevity of theprocessor and this characteristic can be used as a factor in determiningthe respective warranty upgrade prices as discussed later.

[0023] An Intel Hub Architecture (IHA) chip 110 provides system 100 withmemory and I/O functions. More particularly, IHA chip 110 includes aGraphics and AGP Memory Controller Hub (GMCH) 115. GMCH 115 acts as ahost controller that communicates with processor 100 and further acts asa controller for main memory 120. Main memory 120 is upgradeable by theuser and its size is another factor to use in determining upgradewarranty price. GMCH 115 also provides an interface to Advanced GraphicsPort (AGP) controller 125 which is coupled thereto. A display 130 iscoupled to AGP controller 125. Both controller 125 and display 130 areupgradeable components and these upgrades are usable as warranty pricefactors. For example, controller 125 is replaceable by a video graphicscontroller with higher memory and resolution than the originalcontroller. Likewise, display 130 can be replaced with a monitorexhibiting higher resolution and/or increased screen size. Therespective cost of these upgraded components as well as their failurerates are factors usable in determining the upgrade warranty price for aparticular system configuration.

[0024] IHA chip 110 further includes an I/O Controller Hub (ICH) 135which performs numerous I/O functions. ICH 135 is coupled to a SystemManagement Bus (SMBus) 140 which is coupled to one or more SM Busdevices 145. A secured processor (SP) 150 for securely storingauthorized warranty information is one of these SM Bus devices 145 aswill be described later in more detail.

[0025] ICH 135 is coupled to a Peripheral Component Interconnect (PCI)bus 155 and PCI slots 160. An Industry Standard Architecture (ISA)bridge 165 is coupled to PCI bus 155 to provide ISA bus compatibility ifdesired. A Super I/O controller 170 is coupled to ICH 135 to provideconnectivity to input devices such as a keyboard and mouse 175 as shownin FIG. 1.

[0026] A firmware hub (FWH) 180 is coupled to ICH 135 to provide aninterface to system BIOS 185 which is coupled to FWH 180. A local areanetwork (LAN) controller 190 is coupled to ICH 135 to provideconnectivity to networking and Internet Service Provider (ISP) services.A General Purpose I/O (GPIO) bus 195 is coupled to ICH 135. Four USBports 200 are coupled to ICH 135 as shown. USB devices such as printers,scanners, joysticks, etc. can be added to the system configuration onthis bus. These USB devices can be considered part of the systemconfiguration when determining the warranty upgrade price.

[0027] An integrated drive electronics (IDE) bus 205 is coupled to ICH135 to connect IDE drives 210 to the computer system. The size of theIDE drives is upgradeable and is a factor in determining warrantyupgrade price.

[0028]FIG. 2 is a block diagram showing a simplified computer system 100as an example of a representative electrical device for which a warrantyupgrade is desired by the user or others. Computer system 100 of FIG. 2is similar to computer system 100 of FIG. 1 except that some componentshave been eliminated for clarity. The secure processor 150 of computersystem 100 is coupled to secure storage 215 in which a warrantyauthorization including warranty configuration information is storedafter verification as described subsequently.

[0029] Computer system 100 is coupled via the Internet or otherconnective medium to a warranty processor or warranty server 300 at aremote location. Typically the warranty server resides at the computersystem manufacturer, the systems integrator, the computer reseller orother warranty service provider. However, the warranty server can belocated at virtually any location that makes commercial sense. Thefunction of warranty server 300 is to receive computer configurationinformation from a computer system 100 or other electrical device forwhich an upgraded warranty is requested, to determine the price of awarranty for that system based on factors including the specificconfiguration of that computer system, and to transmit an approvedwarranty configuration back to the computer system 100 for verificationand secure storage.

[0030]FIG. 3 is a flowchart providing more detail regarding the steps ofone embodiment of the disclosed warranty upgrade request, pricedetermination, approval and verification process. In this particularembodiment, the upgrade request is “user initiated”. The warrantyupgrade process commences at block 400 typically when the user (or otheroperator) has upgraded her computer system after s15 purchase anddesires to upgrade the computer system's warranty. As per step 405, theuser then runs a warranty upgrade program on the computer for which awarranty upgrade is to be requested. This is typically initiated byselecting and clicking on a particular screen icon. The computer forwhich a warranty upgrade is requested is also referred to as thewarranty-requesting computer, namely computer system 100.

[0031] The functions of the warranty-requesting program are nowdescribed. As per step 410, the warranty upgrade program collectsconfiguration information regarding computer system 100 and, as per step415, reports that information as a “warranty request” to an agentprogram 305 on warranty server 300. The warranty upgrade programcollects identifying information with respect to each significant FRUwithin the particular configuration of computer system 100. For example,the upgrade program can collect the model type, revision and serialnumber of each FRU. This effectively forms a hardware inventory that istransmitted to warranty server 300 via communications link 315 of FIG.2. In this manner, the warranty server is informed of the processortype, processor speed, system memory size with brand and model, harddisk drive model and capacity, CD ROM and DVD drives types and speeds,and other identifying FRU information regarding the particularconfiguration of computer system 100. A unique number identifying theparticular computer 100 itself, for example a serial number, is includedwith this configuration information. All of this configurationinformation, or a subset thereof, forms the warranty upgrade requestthat is transmitted to warranty server 300.

[0032] In one embodiment, agent 305 is a software program that evaluatesthe inventory information sent by computer system 100 to warranty server300. As per block 420, the agent determines a warranty price using oneor more of the following factors: 1) the configuration of computersystem 100, namely the specific FRU's in this particular combination ofcomponents, 2) any warranty time remaining on articles in theconfiguration, 3) reliability of components in the configuration, 4) theage of components in the configuration, and 5) the replacement cost ofcomponents in the configuration.

[0033] The agent then sends back to the requesting computer system 100 awarranty quote, as per block 425, including a price for an upgradedwarranty for a selected time period for this particular configuration.It should be appreciated that each configuration with its myriad ofcomponents and corresponding factors will have a unique warranty pricequote.

[0034] The user of the requesting computer system (warranty requester),or someone on her behalf, then pays the quoted warranty upgrade fee asper block 430. This may be done directly by the requester's computersystem 100 authorizing the agent 305 on the warranty server 300 tocharge an account or credit card, or may be performed through some otherfulfillment entity. Once warranty server 300 is informed that thewarranty quote has been paid, the agent sends a “warranty authorization”to requesting computer system 100 as per block 435. To accomplish this,the quoted configuration (FRU inventory), warranty type and time periodare wrapped with a digital signature to actually form the “warrantyauthorization” that is sent to the requesting computer. The uniqueidentification number of the requesting computer (e.g. serial number) isalso included in the warranty authorization. This signed warrantyauthorization now represents the customer's warranty rights for theparticular configuration contained therein.

[0035] As per block 440, secure processor 150 on requesting computersystem 100 receives the warranty authorization. Secure processor 150then tests the warranty authorization to see if it is valid. To test thedigitally signed warranty authorization for validity (block 445), secureprocessor 150 first verifies the digital signature for the warrantyauthorization. If the signature is not valid, then the warranty upgradeis rejected as per block 455 and process flow continues back to STARTblock 400 at which the warranty upgrade program can be run again at alater time. If the signature is valid, secure processor 150 thencompares the quoted configuration (inventory) in the warrantyauthorization received from warranty server 300 with the actualconfiguration of requesting computer system 100. If these two match,then the warranty authorization is valid and secure processor 150 storesthe warranty authorization in secure storage 215 as per block 450. Ifthe quoted configuration does not match the actual configuration, thenthe warranty upgrade is rejected as per block 455 and process flowcontinues back to START block 400 at which the warranty upgrade programcan be run again at a later time.

[0036] Communications link 315 is conveniently implemented as anInternet connection between requesting computer system 100 and warrantyserver 300. However other communications links may be employed as well,such as electromagnetic, radio frequency, cable and optical links forexample.

[0037]FIG. 4 provides more information with respect to the warrantyinformation stored on warranty server 300 after a warranty transactionis completed. More particularly, for each warranted computer system 100,warranty server 300 stores a unique computer ID number, for example aserial number, a Service Tag number or an Express Service Code number.The specifics of the warranted configuration are also stored, namely theinventory of FRU's or components making up the warranted computer system100. The type of warranty is also stored, for example a parts and laborwarranty or a parts-only warranty. The time period of the warranty foreach computer system 100 is also stored in warranty server 300. Warrantyserver 300 includes or has access to a database 310 that providesreliability and warranty cost data for components in allowedconfigurations.

[0038] Now that warranty information for requesting computer 100 isstored in warranty server 300 and warranty authorization informationincluding the authorized configuration is securely stored in requestingcomputer 100, a typical subsequent user warranty call to the warrantyservice provider is considered. When a customer calls the warrantyservice provider for warranty service for the 100 GB hard drive in her 2GHz computer system, she is requested to provide her unique computer IDnumber. The warranty service provider then accesses the warranty serverdatabase 310 configuration information corresponding to that particularcomputer. The provider finds that the 100 GB drive is indeed containedin the warranted configuration and that the warranty period is stillrunning. The customer is advised that the warranty covers the part and anew drive is dispatched to the customer or another service arrangementis made. In another scenario, it is possible that the customer hasinstalled an expensive aftermarket advanced video graphics controller inher machine. This controller is not the controller included in theconfiguration for the upgraded warranty. The aftermarket videocontroller malfunctions and the customer then calls for service. In thissituation, the warranty service provider accesses the database for thisparticular computer system and finds no such aftermarket graphicscontroller. The customer is politely informed that the controller is notthe warranted controller. It is noted that the call by the customer tothe warranty service provider could be a telephone call, or a query fromthe user's computer to the warranty server with an automated responsebeing provided directly by the warranty server.

[0039] As mentioned earlier, when warranty server 300 determines thewarranty price for a particular configuration, a number of factors areconsidered by the agent. One factor is the warranty value of anycomponents that are already under warranty. For example, in a particularcomputer system 100 a first component or module may have 2 years ofwarranty left; a second component or module may have 1 year of warrantyleft; and a third component or module may have a full 3 years ofwarranty left. These values are factored into the warranty pricedetermined and offered by agent 305 in warranty server 300. Moreparticularly, when the warranty-requesting computer system 100 sends itsconfiguration information to warranty server 300, the agent reads eachcomponent number from the configuration and associates each componentwith a corresponding component in its database which stores how muchwarranty is currently assigned to, or remaining on, such component.Also, failure rate history for certain components can be accessed in thedatabase and used as a factor in determining the upgrade warranty price.For example, it is known that as power supplies age, their failure rateincreases. If the computer system user wants to increase the warrantybeyond the base warranty (the original warranty), then the failure rateof power supplies with age is a valid factor in pricing the upgradewarranty. This information would typically be used as a factor mandatingan increase in the overall warranty upgrade price for a computer systemwith an older power supply.

[0040] The warranty request-processing agent 305 in warranty server 300can be implemented completely in software or in software with some humanoversight. When implemented completely in software, the agent 305interprets the warranty database 310 of the warranty server in responseto a warranty upgrade request from warranty requesting computer 100. Theagent correlates the components of the configuration sent from warrantyrequesting computer 100 (namely both their piece part numbers and theirserial numbers) using the factors described above to determine a uniquewarranty fee for a particular computer configuration. Once the warrantyis priced, quoted and fulfilled as described earlier, warranty server300 wraps the quoted configuration, warranty type and time periodtogether with a digital signature to form the “warranty authorization”which is sent back to requesting computer 100.

[0041] A secure process in requesting computer 100 validates the“warranty authorization” and stores validated warranty information(configuration and time periods) in a secure fashion. The secure processmay be implemented under security provided by the operating system or itis implemented as a secure processor 150 as described earlier. The“warranty authorization” sent from warranty server 300 to requestingcomputer system 100 is hashed by warranty server 300 using an algorithmsuch as Secure Hash Algorithm 1 (SHA-1) and that hash is then encryptedwith the warranty server's private key using public key encryptionmethodology such as the RSA encryption method—producing a warrantyauthorization that is digitally signed by the warranty server. Warrantyserver 300 creates a digital certificate for the warranty authorizationthat includes the encrypted hash, the hash algorithm, and the encryptionalgorithm.

[0042] Secure processor 150 receives the digitally signed “warrantyauthorization”. First, secure processor 150 hashes the “warrantyauthorization” using the hash algorithm specified by warranty server 300and decrypts the encrypted hash present in the digital certificate sentby warranty server 300 using the public key—private key encryptionmethod specified in the digital certificate. Secure processor 150 thencompares the calculated hash to the decrypted hash to authenticate thewarranty authorization. If the two hash values match, the warrantyauthorization is authentic, i.e. the warranty authorization is known tohave come from warranty server 300 and no information within theauthorization was changed during the transmission. If the hash values donot match, the authorization is rejected by secure processor 150 as perblock 455. Otherwise, the warranty information (configuration, type andtime period) is then validated by comparing the warranted configurationto the actual configuration. If the warranted configuration matches theactual configuration, then the warranty authorization is deemed validand is securely stored by secure processor 150 in secure storage 215.Secure processor 150 is designed to be inaccessible to the user of thecomputer. The computer user should not be able to alter the warrantyinformation although it is permissible for the user to view the warrantyinformation. One type of limited access secure processor which may beemployed as secure processor 150 is a Trusted Computing PlatformAlliance (TCPA) secure processor.

[0043] As seen in the flow chart of FIG. 5A, another feature of thedisclosed methodology involves the automatic recognition of aconfiguration change by computer system 100 and the provision of anoption for the computer user to upgrade the warranty when aconfiguration change is detected. FIG. 5A details steps in the warrantyupgrade program installed in computer system 100 that implement thistechnology. The warranty upgrade program can run in the background whileother programs are executing in computer system 100 as per block 500.The program causes computer 100 to monitor for any changes in itsconfiguration as per decision block 505. If no configuration change isfound the computer continues monitoring for configuration changes.However, if a configuration change is found, for example if the userupgrades the hard drive from a 20G drive to a 100G drive, this isdetected at decision block 505 and a dialog box appears on the displaywhich asks the computer operator/user if a warranty upgrade is desiredto cover the new configuration, as per block 510. Decision block 515tests to determine if the user desires such an upgraded warranty. If theuser does not want to upgrade the warranty, then a delay is imposed inblock 520. At some time in the future, the user is again asked if awarranty upgrade is desired. The program provides that this feature canbe optionally turned off so as to not annoy the user. The user can alsoset the value of the time delay provided by delay step 520. However, ifdecision block 515 determines that the user wants to upgrade thewarranty, then a warranty upgrade request is sent to the warranty server300 as per block 525. The content of this warranty request issubstantially the same as the warranty request of step 415 describedwith respect to the program flow chart of FIG. 3. For example, thiswarranty request includes computer configuration information and anidentification number unique to the particular computer system 100.After the warranty request is sent to the warranty server, warrantyprocessing continues with steps 420-455 substantially similar to suchprocessing in the block diagram of FIG. 3.

[0044] As seen in the flow chart of FIG. 5B, yet another feature of thedisclosed methodology involves the automatic initiation of a warrantyrequest after the first time that computer 100 is operated, i.e. whenthe warranty is not yet registered with the warranty server. The user isgiven the opportunity to opt out and not register the warranty if sodesired. When computer 100 is first operated, computer operation startsat block 535 after which the operating system is installed at block 540.Application software is then installed as per block 541. The warrantyprogram is installed at block 542 and run at block 543. The warrantyprogram on computer 100 monitors to determine if the warrantyregistration has already occurred as per block 545. If it is found thatthe warranty has already been registered with the warranty server, thenprocess flow returns to other machine operations as per block 550. Oneway for computer 100 to determine if the warranty has already beenregistered is to look at the contents of secure storage 215 to see if awarranty authorization is stored therein. If this is the first time thatcomputer 100 has been operated by a user, then the lack of a warrantyauthorization will be detected. In this event, process flow continues todecision block 555 at which the computer outputs a user query asking theuser if she wants to register the warranty with the warranty provider.If the user indicates that she does not want to register the warrantywith the warranty provider, then process flow returns to other machineoperations as per block 560. However, if it is found that the user wantsto register the warranty, then process flow continues to block 410 atwhich computer configuration data is collected. From block 410 to block452, process flow is similar to the process flow described with respectto FIG. 3, except that warranty quote step 425 and warranty quotepayment step 430 are omitted. Ultimately the warranty authorization isstored in secure processor 215 and warranty registration is complete.

[0045] The above has described the operation of computer 100 afteroperating system installation relative to initial warranty registration.For future sessions after operating system installation, computeroperation commences at block 543 such that the user is queried aboutwarranty registration during each computer session until warrantyregistration occurs. To avoid user annoyance, the warranty program givesthe user the opportunity to turn off the warranty registration userquery if that is desired. It is noted that the warranty authorization inthe secure processor could be factory installed, integrator installed,reseller installed or user installed.

[0046]FIG. 6A is a block diagram of a multi-processor server computer600 in which the disclosed warranty upgrade technology is employed.Computer 600 includes processor memory modules (PMM's) 605 respectivelycoupled to I/O modules (IOM's) 610. Power supplies 615 are coupled toboth PMM's 605 and IOM's 610 to provide power thereto. FIG. 6B is ablock diagram which shows PMM 605 in more detail. PMM 605 includes a CPU615 coupled to an Intel Northbridge chip 620 as shown. One or morememory modules 625 are coupled to the Northbridge 620 so that memory tofacilitate execution of computer programs is provided to CPU 605. FIG.6C is a block diagram which shows IOM 610 in more detail. IOM 610includes an Intel Southbridge chip to which SM bus 630 is coupled asshown. A secure processor 640, for example of the TCPA type discussedearlier is coupled to SM bus 640. Secure processor 640 validates andstores warranty configuration information in a secure memory (not shownin this view) as discussed earlier.

[0047]FIG. 7A is block diagram of a blade server 700 which includesmultiple blade computers (blades) 705. Each blade is essentially acomputer on a card. Blades 705 are all coupled to a common networkinterface 720. In this manner network interface 720 acts as a networkconcentrator to avoid a mass of I/O and power cables extending from eachblade. Network interface 720 is coupled to embedded server management(ESM) module 725 which detects the installation and removal of the othermodules within the chassis, and monitors the environmentalcharacteristics (such as thermal) of the chassis.

[0048] In one embodiment, ESM 725 includes a secure processor 735 whichperforms substantially the same secure processor functions describedearlier, for example, securely storing validated warranty configurationinformation. Secure processor (SP) 735 stores information describing theconfiguration of blade server 700 in a memory coupled thereto (notshown). In another embodiment, each blade 705 includes its own secureprocessor 765 such as shown in FIG. 7B. In more detail, blade 705includes one or more CPU's 740 coupled to an Intel Northbridge chip 745.Northbridge chip 750 is coupled to memory 750 and to Southbridge chip755 as shown. Southbridge chip 755 is coupled to SM bus 760. Secureprocessor 765 is coupled to SM bus 760 to provide blade 705 with securestorage of validated warranty configuration information in a mannerwhereby it cannot be compromised by the user.

[0049] Blade computers 705 are essentially self-contained computermodules each of which has a respective serial number associatedtherewith. These serial numbers are stored by secure processor 735 aspart of the configuration information for blade server 700. Componenttype information is also stored by secure processor 735 with therespective component serial numbers together with the otherconfiguration information discussed earlier. When server 700 isassembled, it is possible that some of blade computers 705 are new andsome are used. Thus, some blade computers will have different warrantyperiods than others. When the warranty for computer 700 is registered orupgraded, the configuration information stored by secure processor 735will include the respective warranty periods for the individual bladecomputers 705. Individual modules can have more than one serial numberor identification number. In that case, one or both numbers are storedin the configuration information along with the respective part type andwarranty period.

[0050] As can be seen, a principal advantage of these embodiments is theprovision of a warranty methodology wherein the upgrade warranty costand price for a configurable electrical device are determined based onthe particular upgraded configuration of the computer to be warranted.Advantageously, this methodology reduces warranty fraud. While thisnovel methodology has been described with reference to a computer systemwhich is one example of a configurable electrical device, the disclosedmethodology also applies to other configurable/upgradeable electricaldevices such as personal digital assistants (PDA's), cellular and othertelephone devices, satellite receivers, home entertainment systems,electronic gaming equipment, configurable automotive electronic devices,etc., and combinations thereof. Such devices have become so processordependent that they are considered to be computer systems. While in theparticular embodiments shown a configuration includes hardwareinformation, it should be appreciated that software associated with anelectrical device can also be upgraded and that such software also formspart of the overall configuration to be warranted.

[0051] Although illustrative embodiments have been shown and described,a wide range of modification, change and substitution is contemplated inthe foregoing disclosure and in some instances, some features of theembodiment may be employed without a corresponding use of otherfeatures. Accordingly, it is appropriate that the appended claims beconstrued broadly and in a manner consistent with the scope of theembodiments disclosed herein.

What is claimed is:
 1. A method of upgrading the warranty of a computersystem including a plurality of components in a configuration, themethod comprising: receiving, by a warranty processor, a warrantyupgrade request from the computer system, the warranty upgrade requestincluding configuration information for the computer system; anddetermining, by the warranty processor, a warranty upgrade pricedependent on the configuration information in the warranty upgraderequest.
 2. The method of claim 1 wherein the warranty upgrade requestincludes a unique identification number corresponding to the computersystem.
 3. The method of claim 1 wherein the warranty upgrade request isuser-initiated.
 4. The method of claim 1 further comprisingtransmitting, by the warranty processor, a warranty upgrade price to thecomputer system.
 5. The method of claim 4 further comprising receivingpayment, by the warranty processor, of the warranty upgrade price. 6 Themethod of claim 1 further comprising generating, by the warrantyprocessor, a warranty authorization including a warranted configuration.7. The method of claim 6 further comprising transmitting, by thewarranty processor, the warranty authorization to the computer system.8. The method of claim 6 further comprising digitally signing, by thewarranty processor, the warranty authorization to provide a digitallysigned warranty authorization.
 9. The method of claim 6 wherein thewarranty authorization includes warranty type information.
 10. Themethod of claim 6 wherein the warranty authorization includes warrantyduration information.
 11. The method of claim 6 wherein the warrantyauthorization includes a unique identification number of the computersystem.
 12. The method of claim 7 further comprising the computer systemreceiving the warranty authorization.
 13. The method of claim 12 furthercomprising the computer system storing in secure storage informationcontained in the warranty authorization.
 14. The method of claim 8further comprising the computer system authenticating the digitallysigned warranty authorization.
 15. The method of claim 12 furthercomprising the computer system storing the warranted configuration insecure storage if the warranted configuration matches the actualconfiguration, and otherwise rejecting the warranty authorization. 16.The method of claim 6 further comprising the computer system comparingthe warranted configuration in the warranty authorization with theactual configuration of the computer system, and storing the warrantyauthorization in secure storage if the warranted configuration matchesthe actual configuration, and otherwise rejecting the warrantyauthorization.
 17. The method of claim 16 wherein a secure processor inthe computer system performs the comparing and storing step.
 18. Themethod of claim 17 wherein the secure processor stores warranty typeinformation from the warranty authorization in the secure storage. 19.The method of claim 17 wherein the secure processor stores warrantyduration information from the warranty authorization in the securestorage.
 20. The method of claim 17 wherein the secure processor storesthe unique identification number from the warranty authorization in thesecure storage.
 21. The method of claim 1 wherein the warranty upgradeprice is determined using the replacement cost of a component in theconfiguration as a factor.
 22. The method of claim 1 wherein thewarranty upgrade price is determined using a remaining amount ofwarranty time for a component in the configuration as a factor.
 23. Themethod of claim 1 wherein the warranty upgrade price is determined usingage of a component in the configuration as a factor.
 24. The method ofclaim 1 wherein the warranty upgrade price is determined usingreliability data of a component in the configuration as a factor.
 25. Amethod of upgrading the warranty of a computer system including aplurality of components in a configuration, the method comprising:sending, by the computer system, of a warranty upgrade request to aremote warranty processor, the warranty upgrade request includingconfiguration information for the computer system; and receiving, by thecomputer system, of a warranty upgrade price determined by the warrantyprocessor dependent on the configuration information in the warrantyupgrade request.
 26. The method of claim 25 further comprising thecomputer system sending payment of the warranty upgrade price to thewarranty processor.
 27. The method of claim 25 further comprisingreceiving, by the computer system, from the warranty server a warrantyauthorization including a warranted configuration describing theconfiguration to be warranted.
 28. The method of claim 25 furthercomprising receiving by the computer system of a digitally signedwarranty authorization from the warranty server, the digitally signedwarranty authorization including a warranted configuration describingthe configuration to be warranted.
 29. The method of claim 27 whereinthe warranty authorization includes warranty type information.
 30. Themethod of claim 27 wherein the warranty authorization includes warrantyduration information
 31. The method of claim 27 wherein the warrantyauthorization includes the unique serial number of the computer system.32. The method of claim 28 further comprising the computer systemauthenticating the digitally signed warranty authorization.
 33. Themethod of claim 27 further comprising the computer system comparing thewarranted configuration in the warranty authorization with the actualconfiguration of the computer system, and storing the warrantyauthorization in secure storage if the warranted configuration matchesthe actual configuration, and otherwise rejecting the warrantyauthorization.
 34. The method of claim 33 wherein a secure processor inthe computer system performs the comparing and storing step.
 35. Amethod of upgrading the warranty of a configurable electrical deviceincluding a plurality of components in a configuration, the methodcomprising: receiving by a warranty processor of a warranty upgraderequest from the configurable electrical device, the warranty upgraderequest including configuration information for the configurableelectrical device, and determining by the warranty processor of awarranty upgrade price dependent on the configuration information in thewarranty upgrade request.
 36. A method of upgrading the warranty of aconfigurable electrical device including a plurality of components in aconfiguration, the method comprising: sending by the configurableelectrical device of a warranty upgrade request to a remote warrantyprocessor, the warranty upgrade request including configurationinformation for the configurable electrical device; and receiving by theconfigurable electrical device of a warranty upgrade price determined bythe warranty processor dependent on the configuration information in thewarranty upgrade request.
 37. A warranty processing system comprising: aprocessor, for receiving a warranty upgrade request from a remoteconfigurable electrical device, the warranty upgrade request includingconfiguration information for the remote configurable electrical device;and a database, coupled to the processor, for storing warranty costinformation for components included in the configuration information,the database providing the warranty cost information to the processor toenable the processor to determine a warranty upgrade price dependent onthe configuration information in the warranty upgrade request.
 38. Awarranty processing system comprising: a processor, for receiving awarranty upgrade request from a remote computer system, the warrantyupgrade request including configuration information for the remotecomputer system; and a database, coupled to the processor, for storingwarranty cost information for components included in the configurationinformation, the database providing the warranty cost information to theprocessor to enable the processor to determine a warranty upgrade pricedependent on the configuration information in the warranty upgraderequest.
 39. An electrical device comprising: a configurable electricalportion; a secure processor, coupled to the configurable electricalportion, for sending a warranty request including configurationinformation for the configurable electrical portion, and for receiving awarranty authorization including a warranted configuration; and astorage device, coupled to the secure processor, for storing thewarranty authorization.
 40. A computer system comprising: a secureprocessor for sending a warranty request including configurationinformation for the system, and for receiving a warranty authorizationincluding a warranted configuration; and a storage device coupled to thesecure processor for storing the warranty authorization.
 41. A method ofregistering the warranty of a computer system including a plurality ofcomponents in a configuration, the method comprising: monitoring, by thecomputer system, for a use of the computer system prior to warrantyregistration; sending, by the computer system, of a warrantyregistration request to a remote warranty processor when a use of thecomputer system prior to warranty registration is detected, the warrantyregistration request including configuration information for thecomputer system; and receiving, by the computer system, of a warrantyauthorization from the warranty processor, the warranty authorizationincluding a warranted configuration describing the configuration to bewarranted.
 42. The method of claim 41 wherein the warranty authorizationis digitally signed.
 43. The method of claim 41 wherein the warrantyauthorization includes warranty type information.
 44. The method ofclaim 41 wherein the warranty authorization includes warranty durationinformation
 45. The method of claim 42 wherein the digitally signedwarranty authorization includes a unique identification number of thecomputer system.
 46. The method of claim 42 further comprising thecomputer system authenticating the digitally signed warrantyauthorization to provide an authenticated warranty authorization. 47.The method of claim 41 further comprising the computer system comparingthe warranted configuration in the warranty authorization with theactual configuration of the computer system, and storing the warrantyauthorization in secure storage if the warranted configuration matchesthe actual configuration, and otherwise rejecting the warrantyauthorization.
 48. The method of claim 47 wherein a secure processor inthe computer system performs the comparing and storing step.
 49. Amethod of registering the warranty of a computer system including aplurality of components in a configuration, the method comprising:receiving, by a warranty processor, of a warranty registration requestfrom the computer system, the warranty registration request includingconfiguration information for the computer system, the warrantyregistration request being generated by the computer system when thecomputer system determines that a warranty has not yet been registeredfor the computer system; and sending, by the warranty processor, of awarranty authorization to the computer system, the warrantyauthorization including a warranted configuration describing theconfiguration to be warranted.
 50. The method of claim 49 furthercomprising digitally signing, by the warranty processor, of the warrantyauthorization to provide a digitally signed warranty authorization. 51.The method of claim 50 wherein the warranty upgrade request includes aunique identification number corresponding to the computer system. 52.The method of claim 50 wherein the warranty authorization includeswarranty type information.
 53. The method of claim 50 wherein thewarranty authorization includes warranty duration information.
 54. Themethod of claim 50 wherein the warranty authorization includes a uniqueidentification number of the computer system.
 55. A method ofregistering the warranty of a configurable electrical device including aplurality of components in a configuration, the method comprising thesteps of: monitoring, by the configurable electrical device for a use ofthe configurable electrical device prior to warranty registration;sending by the configurable electrical device of a warranty registrationrequest to a remote warranty processor when a use of the configurableelectrical device prior to warranty registration is detected, thewarranty registration request including configuration information forthe configurable electrical device; and receiving by the configurableelectrical device of a warranty authorization from the warrantyprocessor, the warranty authorization including a warrantedconfiguration describing the configuration to be warranted.
 56. Themethod of claim 55 further comprising storing, by the configurableelectrical device, of the warranty authorization in secure storage. 57.A method of registering the warranty of a configurable electrical deviceincluding a plurality of components in a configuration, the methodcomprising the steps of: receiving, by a warranty processor, of awarranty registration request from the configurable electrical device,the warranty upgrade request including configuration information for theconfigurable electrical device and being generated in response to a todetermination by the configurable electrical device that its warrantyhas not yet been registered; and sending, by the warranty processor, ofa warranty authorization to the configurable electrical device, thewarranty authorization including a warranted configuration describingthe configuration to be warranted.