Dynamic selection and scheduling of radio frequency communications

Information

  • Patent Application
  • 20060036514
  • Publication Number
    20060036514
  • Date Filed
    July 23, 2004
    19 years ago
  • Date Published
    February 16, 2006
    18 years ago
Abstract
A system and method of tracking and reselling inventoried items is disclosed. This method includes assigning an audit code to an incoming inventoried item, wherein the audit code comprises a manual audit code and an automated audit code; auditing the incoming inventoried item to assess the incoming inventory item as such for one or more of, for example, the destruction, demanufacture, resale, recondition, storage, and redeployment; sending the incoming inventoried item to one of a redeployment, a demanufacture, a recondition, a resale, a storage, and a destruction in accordance with the auditing; manually updating the manual audit code in accordance with the auditing and the sending; providing, after the sending and the manually updating, redeployment or resale of at least a portion of the incoming inventoried item audited as suitable for at least one of demanufacture, resale, recondition, and redeployment; and, finally updating the manual audit code based upon the information provided to the system.
Description
BACKGROUND OF THE INVENTION

1. Field of the Invention


The field of the invention is radio frequency communications.


2. Description of the Background


Transmission of data via radio signals is an effective means of communication to a variety of devices located within range of the signal. An advertiser or other provider of the data (including content) may pre-select a radio frequency carrier type (e.g. FM sub-carrier, AM sub-carrier, Cellular etc . . . ), a broadcasting station (e.g. KUS FM), and/or a frequency over which the data will be broadcast (e.g. 102.7 MHz (57 kHz RBDS) based on the geographic location of the target audience. The particular frequency maybe chosen because of its popularity with the target audience, its spectrum availability, the type or device that will receive the signals, and importantly because it's signals will cover (i.e. reach) the targeted audience.


Covering the target audience is deemed essential, and since many applications of radio frequency (RF) communication target an audience existing within a relatively small geographic area, often coverage is not a problem. For example, it is common to broadcast music or news over a pre-selected frequency to all areas of an office building. Pre-selection of the frequency and pre-tuning of the receivers to that frequency is a relatively easy process. Another example of an RF communication within a relatively small area is a radio controlled car that is set to receive signals broadcast over a pre-selected frequency. Yet another example is taught by U.S. Pat. No. 6,298,218 to Lowe et al. (October 2001). The '218 patent targets audiences within a few feet of the transmitting device. This is exemplified by an athletic club environment in which a user device receives different broadcasts on different frequencies depending on his proximity to specific pieces of gym equipment having transmitters. Thus, those applications that target audiences over a relatively small area typically work well with pre-selection of the frequency and the station. Coverage becomes an issue and complications arise, however, when the target audience is spread over an area that encompasses more than one frequency, station, and/or band. These complications are due in part to the necessity to pre-select many, perhaps hundreds or thousands, of frequencies and stations in order to cover the entire target audience. Thus, pre-selection of frequencies becomes extremely burdensome when a wide spread audience has been targeted.


The need to employ several stations simultaneously is addressed by U.S. Pat. No. 4,517,562 to Martinez (May 1985), however the '562 patent still does not solve or even recognize problems related to the difficulty of scheduling and coordinating communications over a wide spread area. These problems are exacerbated by competition for available RF spectrum and perhaps the distance between a data provider and a data recipient.


There is a need for systems and methods which facilitate use of radio signals to communicate to devices that may be spread over a relatively large area.


BRIEF SUMMARY OF THE INVENTION

A system and method of tracking and reselling inventoried items is disclosed. This method includes assigning an audit code to an incoming inventoried item, wherein the audit code comprises a manual audit code and an automated audit code; auditing the incoming inventoried item to assess the incoming inventory item as such for one or more of, for example, the destruction, demanufacture, resale, recondition, storage, and redeployment; sending the incoming inventoried item to one of a redeployment, a demanufacture, a recondition, a resale, a storage, and a destruction in accordance with the auditing; manually updating the manual audit code in accordance with the auditing and the sending; providing, after the sending and the manually updating, redeployment or resale of at least a portion of the incoming inventoried item audited as suitable for at least one of demanufacture, resale, recondition, and redeployment; and, finally updating the manual audit code based upon the information provided to the system.


Further, a system and method of reselling inventoried items is disclosed. This method includes auditing the incoming inventoried item to assess the incoming inventory item as suitable for resale; making the incoming inventoried item available for auction in accordance with the auditing; auctioning the incoming inventoried item by at least one of a line item auction and a lot auction; disposing of the incoming inventoried item, upon completion of the auctioning, in accordance with an outcome of the auctioning; and, tracking the disposing, wherein the tracking updates a code associated with the auditing.


A system for tracking and disposition of inventoried items is additionally included in the present invention. The system includes an audit code assigner that assigns a manual audit code and an automated audit code to the inventoried item, an auditor that audits the incoming inventoried item to assess the incoming inventory item as suitable for one or more of destruction, demanufacturing, resale, reconditioning, storage, and redeployment, at least one of a redeployer, a demanufacturor, a reconditioner, a reseller, a storer, and a destructor associated with the auditor, and at least one updator that manually updates the manual audit code at each of the audit code assignor, the auditor, and the at least one redeployer, demanufacturor, reconditioner, reseller, storer, and destructor.


Thus, the present invention provides an inventory tracking system and method that tracks and audits the status of all items within the inventory tracking system, including disposed items, and that tracks separately, but in communication with the inventory tracking system, auction items, items redeployed, reconditioned or for sale, or items destroyed.


BRIEF DESCRIPTION OF SEVERAL VIEWS OF THE DRAWINGS
SUMMARY OF THE INVENTION

The present invention is directed to systems and methods of delivering data from a source to a remote device in which a network node, different from the source, is employed to select frequencies and regional broadcast stations. Selection may be partly based on scheduling parameters including an availability of RF spectrum of a plurality of regional broadcast stations. Preferred embodiments utilize AM and FM sub-carrier bands, TV, Satellite, and Cellular bands.


It should be appreciated that the inventive subject matter is especially useful for remotely providing additional functionality and content, and remotely patching and updating software. Additionally contemplated uses include limiting functionality, remote programming, providing monetary value (e.g. updating a debit card), providing dynamic content including advertisements (e.g. to a smart card or digital billboard) and motion & audio instruction, providing localization of consumer appliances (as to date, time, etc . . . ), providing self-locating instructions (positional information), remotely enhancing product features, and providing commands that give products infinite dynamic behaviors (e.g. alarm clock buzzer sound, toy motions & sounds, and digital calendar pictures of the day that changes forever).


Benefit to a consumer or user of a remote device may be provided by: enabling the user to realize post purchase value of the remote device; ensuring up-to-date status of a remote device, enabling remote fixing of bugs and potential bugs; lowering the cost of a remote device by eliminating the need to include all of the features or data at time of purchase; and lowering the cost of updating a remote device. In turn, manufacturers may also benefit, because they are able to decouple the hardware development timelines from software development timelines, realize re-occurring revenues, and offer their customers a dynamic product that is less quickly obsolete.


Various objects, features, aspects and advantages of the present invention will become more apparent from the following detailed description of preferred embodiments of the invention, along with the accompanying drawings in which like numerals represent like components.




BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 is a schematic showing a basic flow of data.



FIG. 2 is a schematic of an embodiment utilizing a bridge chip.



FIG. 3 is a schematic of a scheduling system and method.




DETAILED DESCRIPTION

Referring first to FIG. 1, a basic flow of data 100 includes a source 120, a network node 130, a regional broadcast station 140, and a remote device 150.


A source 120 may be defined as any entity that provides data to the network node 130 for communication to a remote device 150. While a preferable class of source is a manufacturer or supplier of a remote device, it should be understood that this is not intended to be a limitation. A source may be a user of a remote device, or a third party such as an advertising agency that has no direct relation to the manufacture, distribution, or sale of a remote device. A source may simply be an entity desiring to get information onto the remote device. Among the many contemplated sources are manufacturers, distributors, and retailers of remote devices, advertisers, news services, casinos, automobile dealers, and software companies.


A network node 130 generally consists of a plurality of servers that are preferably Web-based (i.e. coupled to the Internet) and centralized, but may even be distributed. Servers, including RAID drives, may be geographically distributed and mirrored.


Whether a device classifies as a network node 130 generally depends upon functionality. Since scheduling of broadcasts and selecting of frequencies are functions of a network node 130, a device scheduling broadcasts or selecting frequencies is by definition a network node regardless of other factors such as location. For example, a device that selects a frequency at a regional broadcast station is a network node 130. Some additional functions of a network node are: selection of a broadcasting frequency; selection of a regional broadcast station, management of broadcasts; management of data on the servers; management of data at the regional broadcast stations; additional and alternative scheduling at the regional broadcast station; communication of data to regional broadcast stations; encoding of data into radio signals at both the network node and the regional broadcast station; targeting of devices (e.g. by serial number, lot number, location, demographic information, psychographic information, meta data parameter); confirmation and audit (including Yd party audit) of actual RF delivery through a feedback loop; providing detailed reporting; dynamically pricing based on availability or other criteria (e.g. Auctions); interfacing applications for 3'd party software integration; and maintaining a subscriber (source) and consumer (remote device user) web interface. A network node 130 is also responsible for partnering with market leaders (e.g. in the sale of electronics and broadcast of RF signals), and an important related task is the establishment of regional broadcast stations 140 that can cover target markets.



FIG. 1 depicts a preferred flow of data in which data is communicated from a source 120 to a network node 130 to a regional broadcast station 140 to a remote device 150. In addition to data that has been supplied by a source 120, communication(s) to a regional broadcast station also may expressly or impliedly include a frequency and an identification of a regional broadcast station 140. It should be noted that communications also generally include additional information such as header or address information.


Data (not shown) advantageously enters the system as a result of a communication between a source 120 to a network node 130, and this communication is likely an asynchronous communication of digital data over the Internet. In a preferred class of embodiments, a source 120 accesses a network node managed web page (not shown) in order to introduce data. Within a web page a source may order goods and services such as functionality and content. A recent song, newly developed function, and software patches are examples of goods and services that may be ordered on a network node's web page. It should be noted that data corresponding to goods and services ordered may be entered in a web page managed by an entity other than a network node 130 (i.e. a third parry web page), and in fact, a web page may not be needed at all. Although data is likely to eventually arrive at a network node 130, this is not a requirement, since data may be communicated directly from a third party to a regional broadcast station based on a schedule developed by a network node 130.


Preferably, data that flows to a regional broadcast station 140 traverses wired and/or wireless paths of the Internet, and data that flows from a regional broadcast station 140 traverses wireless paths. It is contemplated that data sent to a regional broadcast station 140 is either pre-encoded into RF signals at a network node 130 or is encoded into RF signals at a regional broadcast station 140. Pre-encoding and encoding may include oscillating (i.e. generating sinusoidal signals at a certain frequency and amplitude) and preparing data for communication pursuant to known CDMA, TDMA, GSM, and GPRS technologies. Additionally it is contemplated that more than one broadcast may be utilized in coordination, (a process known as Multiplexing) to disseminate RF encoded data that may be unreasonably large for a single primary or sub-carrier channel to accommodate.


Data typically includes content data, software data, Meta data, and target data, and may also include other types of appropriate information and instructions. More specific exemplary types of data include audio, video, images, advertising, XML, XLS, private and public keys and digital signatures, text, and numeric data. It should be pointed out that data may have a variety of purposes many of which are described in “Summary” above.


A Meta data parameter, preferably stored on a remote device 150 or a device housing a bridge chip (not shown), may be set as a result of a request from a user of the remote device. A value of a Meta data parameter may be used to determine if data is accepted by a remote device 150. For example, a toy that speaks Spanish (and having a Meta data parameter to indicate Spanish) would probably ignore an English language update based on a value of a Meta data parameter. Thus, whether data is accepted or rejected may be a 15function of a Meta data parameter.


An access parameter (not shown) may be used to control whether a remote device 150 receives a broadcast communication. In embodiments that utilize an access parameter, a user may submit a request to set the access parameter, which generally resides on a remote device. Such a request is typically submitted to a network node 130 and/or a source 120. Thus, a broadcast communication may include a unique identifier (e.g. serial number) of a remote device 150, and the remote device 150 may receive the communication as a function of a value of the access parameter. While this example targets a single remote device, no requirement should be inferred that access parameters operate with only a single remote device, and in fact communications may target multiple serial numbers or lot numbers.


Another aspect includes broadcasts that maybe overlapped to increase the probability of a successful communication. For example, a single remote device may be within range of more than one regional broadcast station 140, and therefore, each station within range may issue a “duplicate” transmission. This may be especially helpful should a regional broadcast station 140 go down or have problems with interference.


With respect to a regional broadcast station 140, it is contemplated that such stations are those capable of broadcasting radio signals within AM, FM, TV (NTSC, DTV in N. America, PAL and DVB in some other countries), Cellular/PCS, and Satellite bands. A key function administered by a network node 130, but preferably performed at a regional broadcast station 140, is encoding of the data into RF signals that may be broadcast as radio waves having a broadcast frequency matching the network node selected frequency. An RF generator would likely be employed to encode the data for RF broadcast.


Each regional broadcast station is typically granted a range of RF spectrum (e.g. about 200 KHz for primary FM radio stations). In this example, of this 200 KHz, many stations allocate a substantial amount of this range for the primary channel and reserve enough power for several sub-carrier bands (e.g. 57 kHz RBDS, 76 kHz DARC, 67 kHz, and 92 kHz). It is anticipated that both primary and sub-carrier channels will be utilized to transmit data.


A regional broadcast station 140 likely contracts with a network node 130 to broadcast data. It is preferred that a plurality of regional broadcast stations be contracted such that a substantial geographic area is covered. From among the plurality of regional broadcast stations, a set of available frequencies is compiled. A set of available frequencies generally comprise the frequencies made available by regional broadcast stations for remote broadcasting of data. In addition to a frequency, other information will likely be included in a set of available frequencies. Such data may comprise a regional broadcast station identifier, power (wattage), transmitter location, range, and performance related information.


When a regional broadcast station receives a selected frequency from a network node, an opportunity is generally provided for the selected regional broadcast station to override the selected frequency to an alternate or even to decline to make a broadcast all together. Decisions to select an alternate or decline to broadcast are preferably made automatically by network node software residing at a remote broadcasting station and may be based upon local factors. Some contemplated embodiments also include a provision for manual (i. e. human) intervention with regard to selecting an alternate and declining to broadcast. In any case, decisions made at a regional broadcast station are transmitted back to 5 a network node for inclusion in a scheduling process.


A remote device 150 may be typified by a toy, a home appliance, a consumer entertainment electronic, a gambling device, a telematics related device, an advertisement display, and a smart card. It should be obvious that a plurality of remote devices may exist over a wide geographic area (i. e. thousands of miles). The following is a brief list of some contemplated remote devices:


Toys


Infant/Preschool


Dolls


Vehicle


Male Action


Games/Puzzles


Activities Plush


Ride Ons


Consumer Entertainment Electronics Video


Cassette Recorder (VCR)


Compact Disk (CD) Player

    • Digital Video Disc (DVD) Player


Television (TV)

    • Digital Television (DTV)
    • High Definition Television (HDTV)
    • Personal Video Recorder (PVR)
    • Set Top Box (Cable 1 Satellite)
    • Super Audio CD (SACD) Player
    • Portable Audio Players
    • MP3 Players Video


Games

    • PDA's
    • Laptops
    • Mobile Phones


Smart Card


Universal Card (more than one function)


Bank Card


Credit Card


Coupon Card


Phone Card


Bluetooth Card


802.11a Card


802.11b Card


Any credit card size with any embedded Smart Chip


Telematics Devices


Auto Stereos


Auto Navigational Systems


Auto Computer Systems


Auto Entertainment Systems


Auto Communication Systems


Auto Advertising Systems


Auto Diagnostic Systems


Auto Information Systems


Auto Traffic Systems


Advertisement Displays


Billboard


Bulletins


Posters


Street Furniture


Hotel Displays


Sporting Event Displays


Live Entertainment Venue Displays


Airport Displays


Convenience Store Posters


Mall Displays


Mass Transit Displays


Mobile Ads


Modems


Home Appliances & Systems


Washer & Dryer


Refrigerator


Lighting Systems


Watering Systems


Pool/Spa Systems


Security Systems


Microwave Oven


Air Conditioning Systems


Heating Systems


Telephone Systems


An important aspect of a remote device 150 is a resident (i. e. local) RF receiver. A resident RF receiver should be capable of either scanning for active frequencies or being set for one of a plurality of channels. Preferably a receiver will scan for active frequencies, and in this capacity it is important to understand that the scanner may be limited to frequencies that it has a right to access (i.e. under agreements with regional broadcast stations). As such, it is preferred that an RF receiver is capable of being updated remotely by RF broadcast.


A chipset (e.g. E-PROM chip) residing in the remote device is preferably able to control the RF receiver, parse incoming data, and be capable of triangulation and even 10 control of data dissemination. Of course, a primary function of a chipset is to allow a remote device to gain additional functionality through long-range RF communication. Another aspect of the inventive subject matter includes an ability to transmit short range communications (e.g. 802.11a, 802.11b, and Bluetooth) to enable tracking and confirmation of transmissions, and to rebroadcast transmissions to other remote devices within range.


With reference to a remote device that comprises a smart card, advertising may be communicated to the smart card. One particularly contemplated embodiment includes a smart card that receives coupon information that may be displayed and redeemed at a store by interaction with the smart card. Obviously, a smart card may receive other types of data including an available cash balance.


It is contemplated that confirmation and verification of an RF broadcast may be accomplished using a confirmation server 160 or a plurality of confirmation servers that monitor broadcasts and collect feedback related to broadcasts. Feedback may be reported directly to a network node 130 (via Internet or other means). A confirmation server 160 that receives an appropriate RF broadcast may send RF decoded data to a network node 130, which it in turn compares to broadcast data that was sent via RF. Consequently, a network node 130 may confirm accuracy and/or success of a broadcast both in terms of content and location. Alternatively, a network node may enable 3rdparty auditing.


Another manner of monitoring and collecting feedback includes a confirmation server 160 or collection of servers that receive incoming messages from remote devices 150-156 that are equipped with an ability to transmit data either directly or indirectly back to a network node 130. Transmissions from a remote device may include short range RF communications using bluetooth, 802.11, and GPRS.


Information confirming an RF communication may include an acknowledgement of receipt, a date and time received, as well as other useful information in response to the remote devices receipt of RF data. Failure of a communication may indicate that a remote device is inoperable or no longer within the geographical range of the regional broadcast station.



FIG. 1 may be readily understood by reference to a specific example. Consider a Britney Spears doll that sings and dances as a function of local instructions within the doll. A user purchasing the doll may register with a toy company, service provider (a network node), or third party to receive new songs and dances as they become available. Upon availability, data corresponding to a new song and/or dance maybe sent from the toy manufacturer (or other source) to the network node. The network node, having information pertaining to scheduling and selection, schedules delivery and selects frequencies and regional broadcast stations that reach a majority if not all of the registered Spears dolls. A two step process is preferably used to update registered dolls first, registered dolls are remotely programmed to recognize incoming data; second, data is broadcast in accordance with the schedule and at the selected frequencies. Dolls which have been remotely programmed to receive the data are updated with data corresponding to the new song and dance.


Another aspect of the subject matter is a long range RF to short range RF bridge depicted in FIG. 2. A bridge chip 252 is typically located within a relatively small physical area 250 (e.g. a house or office building) that has remote devices 254-258 within short range proximity. Specifically, a bridge chip 252 may be located within one of a number of electronic devices such as a set top box or computer. In regard to its placement along paths of communication, a bridge chip 252 is preferably located between a regional broadcast station 240 and a remote device 254-258.


In any case, a bridge chip 252 may receive a long range RF communication and convert it for short range dissemination. An embodiment of this aspect may include a bridge chip 252 located within a set top box (not pictured) that communicates to remote devices located throughout a house. Such short range communication may be by radio waves, microwaves, infra red, sound, and other wireless and even wired paths.


An additional related concept involves a bridge chip 252 that receives long range RF signals, and communicates with remote devices via a “hard wired” connection. It is contemplated that remote devices may have ports (i.e. USB port) for connecting directly to a device housing a bridge chip 252.


Scheduling and selection information depicted in FIG. 3 include file size 320, priority 325, distance 330, traffic 335, available spectrum 340, warranties 345, power 350, location 355, throughput 360, path 365, weather 370, and available frequency 375.


Scheduling 310, selection 380, and alternative selection 387 are all typically performed by a network node. Selection is generally a result of scheduling and other factors including alternative selection which is typically performed at a remote broadcasting station 385.


File size 320 refers to a data file. Of course files size maybe optimized by splitting one file into multiple files. Priority 325 refers to importance of a communication which may be related to compensation, contracts and agreements, and warranties.


Distance may have multiple references. Preferably, distance refers to a distance between a regional broadcast station and a remote device, however distance may additionally or alternatively refer to a distance between a network node and a remote device, a distance between a regional broadcast station and a bridge chip, and a distance between a network node and a regional broadcast station.


Traffic 335 typically refers to contention for communication paths which may include Internet and other network paths as well as primary and sub-carrier bands of AM, FM, TV, Satellite, and Cellular. Traffic may also include contention for network resources including those of a network node and a regional broadcast station.


Available spectrum 340 refers to frequencies of the electromagnetic spectrum that have been allocated by the FCC and by regional broadcast stations for use by a network node. Warranties 345 typically are guarantees as to promptness and success of communications. Power 350 refers to wattage of a selected frequency. Location 355 refers to a geographic location, especially in relation to a remote broadcasting station. Throughput 360 may refer a transfer rate for the selected or alternative frequency and path 365. Path 365 will typically be a communication channel. Weather 370 is meteorological condition that may interfere with RF communication. Available frequency 375 is a set frequencies that are available to a network node for use. Available frequencies may include a frequency modulation value, an amplitude modulation value, and an identity of an associated remote broadcasting station.


Selection of a frequency involves assessment of a schedule as well as other factors, particularly those related to current load for a regional broadcast station. Information related to radio frequency communication including specific band ranges may be found at www.fcc.gov and http://www.fcc.gov/oet/fags/freqchart.html.


Thus, specific embodiments and applications of dynamic selection and scheduling of radio frequency communications have been disclosed. It should be apparent, however, to those skilled in the art that many more modifications besides those already described are possible without departing from the inventive concepts herein. The inventive subject matter, therefore, is not to be restricted except in the spirit of the appended claims. Moreover, in interpreting both the specification and the claims, all terms should be interpreted in the broadest possible manner consistent with the context. In particular, the terms “comprises” and “comprising” should be interpreted as referring to elements, components, or steps in a non-exclusive manner, indicating that the referenced elements, components, or steps may be present, or utilized, or combined with other elements, components, or steps that are not expressly referenced.


DETAILED DESCRIPTION OF THE INVENTION

It is to be understood that the figures and descriptions of the present invention have been simplified to illustrate elements that are relevant for a clear understanding of the present invention, while eliminating, for the purposes of clarity, many other elements found in a typical inventory tracking system. Those of ordinary skill in the pertinent art will recognize that other elements are desirable and/or required in order to implement the present invention.


However because such elements are well known in the art, and because they do not facilitate a better understanding of the present invention, a discussion of such elements is not provided herein.



FIG. 1 is a flow diagram illustrating the organization of an inventory tracking system. The organization may include, for example, a hub mechanism, wherein the hub mechanism tracks substantially all inventory present in the system, and a series of spoke mechanisms or modules, wherein each of the spoke mechanisms may operate to dispose of inventory items in the hub in a specific manner.



FIG. 2 is a flow diagram illustrating the flow of materials or items entering the inventory hub of FIG. 1, and operations performed upon those materials. Incoming materials, which may be, for example, materials that may be physically inventoried, may exist on, in computers, or that may be maintained in another location, such as at a client location, and tracked by computer, enter a receiving system in the hub of FIG. 1. Information may be received via computer for remotely inventoried items, or may include receiving containers, or like-physical equipment, which may be physically mapped upon receipt. For example, received containers may be weighted and labeled with the site number, a group number and a job number, by way of non-limiting example only, and further the date received may be indicated. Likewise, for non-physical inventory, the hub system may include the actual physical location, or computing location, of the inventory to be tracked, and/or a tracking number and a date received, by way of non-limiting example only.


Once received, inventory may be audited, for example. Auditing may include sorting and/or inspecting received physical inventory, such as equipment. Auditing may assess the received inventory using client specific, or market value thresholds, for example, with the appropriate processing procedures determined based on the received inventory. Received inventory may be, for example, destroyed, stored, demanufactured, or processed for resale, by way of non-limiting example only.


Once inventory is audited, inventory that falls below resale thresholds, storage thresholds, or items specifically designated for destruction, may proceed to demanufacturing. Demanufacturing may include, for example, the dismantling of hazardous components, such as for recovery, reclamation, and/or proper disposal. Further, following demanufacturing, recoverable or reclaimable materials, such as scrap metals and plastics, may be transferred to an audited end-market, and permitted to be processed within end market facilities tracked by the auditing. Units that pass, and are to be made available for storage or processed for resale, may proceed either to diagnostics, or to storage. Diagnostics may include testing to insure proper functionality of a device, and or to ensure proper security, such as the removal of all identifying information from a computer hard drive. Items that fail the diagnostic stage may proceed to demanufacturing or disposal. Items that pass the diagnostic stage may proceed to staging, where the diagnosed items may be cleared for sale or redeployment. Alternatively, units that pass may proceed to client storage, where equipment or inventory is prepared for storage, and/or stored for reuse, redeployment, or resale.



FIG. 3 is a flow diagram illustrating, with more specificity, an inventory receipt and tracking system as illustrated in FIG. 2. FIG. 3 additionally illustrates a series of two-to-three letter codes that, at each stage of the flow process, track the status of the inventory goods. In an embodiment of the present invention, the two-to-three letter codes may be assigned manually, and may thereby be changed in accordance with a change in inventory status. Further, each of the manually input codes may be appended with a computer generated code, wherein the computer generated code uniquely tracks each item within the inventory. Of note, it will be apparent to those skilled in the art that each of the computer generated, and manually generated, codes may be a series of either letters, numbers or other symbols. In accordance with this tracking system, both off-site and on-site inventory may be disposed of in accordance with instructions determined by a user or controller of the inventory. For example, off-site inventory may be tracked by the present invention, and a controller of the off- site inventory may elect to auction-off certain of the items in the inventory. At that time, the controller of the off-site inventory may change the inventory code manually from one of stored goods to one of goods eligible for auction. The system of the present invention, in accordance with the change in the code by the controller of the off-site inventory, may manual change a manual code associating the randomly generated computer code from one for stored goods to one for auctioned goods, and may, in accordance with this change, post the (desired inventory for auction to the auction spoke of the central hub in FIG. 1.



FIG. 3 illustrates a receiving step and an auditing step, in accordance with FIG. 2. FIG. 3 additionally illustrates that the receiving step may or may not flow to the auditing step. Consequently, in certain circumstances, the auditing step may be shipped in accordance with the present invention, such as instances wherein a previously acceptable certification has been obtained prior to placement of goods into the inventory system of the present invention. The auditing step, when performed, may include, for example, diagnostic testing, data clearing/irritation, such as for security purposes, and component or job component harvesting. Dependant upon the outcome of the auditing, inventory may be destroyed, stored, demanufactured into parts, or processed for resale. If material is designated to be destroyed, it may proceed through a variety of stages, such as Raging, cleaning and/or destruction. Cleaning and destruction may include, for example, demanufacturing, such as breaking a device into components, which components may be reused, stored, or destroyed individually, rather than as part of a whole. If goods are designated as approved in auditing, or parts of a particular inventoried good are approved following demanufacturing of an inventoried item, items may be inventoried in accordance with a series of codes. These codes may include, for example, storage at a client facility, storage at an on-site facility, general storage, storage for a specific purpose, storage for essential parts and purposes, and or storage for research, for example. Further, items approved for sale or resale, either as parts of an initial whole or the whole itself, may pass to inventory sales, which may include, for example, direct sales and/or auction sales.


Goods may flow from inventory, directly from receiving, or from destroyed item demanufacturing, to packing and shipping of those goods for transport outside. In accordance with a pick item, pack item, or ship item request, audit information is inserted to the audit trail of the inventory goods, in accordance with the unique manual and computer generated tracking code generated hereinabove, to allow an auditor to assess precisely where, when, and to whom goods were delivered, packed and/or shipped. Thus, the present invention may allow, in accordance with the unique tracking code, a complete audit trail from the moment goods enter the inventory tracking to the moment goods exit the inventory tracking, whether those goods are on-site or off-site. This audit trail further may include the party from whom each manual instruction was received to engage in the unique activities throughout the tracking process, i.e. those events tracked by the manually input audit code discussed hereinabove.


As illustrated in FIG. 3, inventory pending sale may be tracked by a variety of manual input codes, including whether the inventory is for sale pending redeployment, whether the inventory is in the general inventory merely pending sale or resale, sales received and pending approval, or sellable goods on hold. Items that are sold may additionally receive specific audit codes, such as corresponding to the method of shipping, such as shipped pending payment, shipped C.O.D., shipped FedEx, shipped U.S. mail, or shipped via freight, for example. Further, codes may be included to identify the packing personnel, or the packing methodology, such as wherein goods must be packed, and or shipped, in multiple boxes, on multiple palates, or the like. Further, the audit trail of the present invention allows for tracking of specific circumstances, such as wherein client goods remain stored, but are pending resale or redeployment, such as wherein goods are up for auction, or wherein goods are subject to contract negotiations. To the extent inventoried goods are available on-site, those goods may, for example, be physically marked or tagged with information correspondent to hallmarks of the audit trail, such as by placement of stickers having information thereon, or other trackable, identifiable, readable, scannable, or like-the identifying technologies having information correspondent thereto, as will be apparent to those skilled in the art in light of the disclosure herein, or the scanning of all or parts of the goods themselves, such as of information resident thereon. Such tracking, identifying, reading, scanning, or the like may then have associated therewith a listing in a computer of the hallmarks of the audit trial in accordance with each tracking, identification, scanning, reading, or the like of the particular item.



FIG. 4 is a block diagram illustrating inventory management of sold, inventoried, contained, shipped and/or to be shipped goods. Each item, as illustrated, may be tracked by a tab, wherein the tab may be a physical element placed upon the item, or wherein the tab may be correspondent to a tab within the user interface of the inventory tracking system. For example, as illustrated, certain types of goods may be made available for sale, or may be made available for sale under particular circumstances, such as when a necessary essential part is obtained. Other inventoried items may be made available for redeployment, such as for return to a client.


For example, as illustrated in FIG. 4, a pick list of available inventory may be created. Certain of the inventoried items on the pick list may have entered therefore quoted prices, purchase order numbers, vendors, and/or shipping instructions, or a flag as items picked from the pick list. Other options may be made available for items on the pick list corresponding to sale, redeploying, or storing, as will be apparent to those skilled in the art. Approval may be requested, such as from administrators or third parties, for goods made available for sale, redeployment, or storage, and, upon receipt of the requested approval, the making of the request and receipt of the approval may be entered into the audit trial of the inventoried item. The system may assign, for example, a shipping number, which may be displayed on the item, on forms relating to the item, and/or on packing reports, for example. Dependant upon the issuance and identity of the shipping number, items may be put into shipping containers, where necessary. For example, certain computer assigned shipping numbers, or manually entered shipping codes, may require particular shipping criteria, such as insertion into a box, a drum, a safety wrap, or onto palates, by way of non-limiting example only. The inventory tracking system of the present invention may automatically identify the packing steps, required or desired, for shipping in accordance with the manually entered or computer generated audit code, for example. The handler, or packer, of the goods to be shipped may send the container to shipping, and may enter the action as such into the inventory system. Before shipping the goods out, the goods may be inspected, or may be weighed, such as to assess proper postage, or to assess best shipping methods, prior to shipping. The goods may then be shipped, and entered as such into the audit trail of the inventory tracking system.


Thus, the present invention may provide a computerized interface solution suitable for viewing, and operations upon, inventory, and the destruction, deployment, redeployment, and/or sales of inventory. This inventory interface may be localized, or may be available over a network, such as the internet, an intranet or an extranet, for example. This remote interface may allow for operations on remotely stored inventory, which remotely stored inventory may nonetheless be tracked at the local site through the use of the inventory system of the present invention. Further, for example, the availability of the inventory interface over a remote connection, such as network interface, may allow for interaction by third parties, such as those desiring to contract for the purchase of, or enter into an auction for, inventoried goods.


In an embodiment wherein remote sales, and/or auctions are available, a third party accessing the inventory system of the present invention may have available only certain aspects of the inventory tracking system, such as the criteria of goods desired for purchase.



FIG. 5 is a flow diagram illustrating the interaction of a remote user with the inventory tracking system of the present invention. The remote nature of the inventory tracking server/data base from the SQL server allows the user to request information, sale, and/or redeployment, and may provide security. This security may preclude the remote user from accessing more information than is desired or necessary from the inventory tracking site. For example, a predefined filter component may apply filters relevant to a client and/or a user privilege, as well as to the desired action and/or the desired view of the user.


More specifically, the SQL server which may be used as a database may be any SQL server known to those skilled in the art, such as, but not limited to, an SQL 2000 server. The data base may be populated, and accessible to outside users, via a one way SQL server replication from the internal inventory tracking data base. Replication to the user-accessible server may occur automatically, such as periodically, or, for example, may occur transactionally. Transactional replication may occur upon request for information, and may provide increased security over automated periodic replication. Requested information, such as redeployment requests, may be maintained in a data base and/or table at the user accessible server, and may be replicated back to the internal inventory tracking data base, on an agreed upon schedule, or per transaction.


Security may be provided within the user interface, such as by a client login screen. Such a client login screen may require entry of user name and password for example. After the identifying information is input to the system, the system may assess, or identify, the user.y directly or indirectly identifying the user, a determination may be made as to whether the remote user is a client, such as one that has inventory present, or is a regular user, such as one that may only purchase or bid on auctions. User names and passwords may be set up by the internal data base server, and may be replicated to the remotely accessible data base as part of the replication scheme discussed hereinabove. Access to application information and/or data may be controlled by the client's level of access, as stored in the client login table. Access may be, for example, at a client level, a site level, a group level, or a user level, such as by determination through a security mask placed, upon each individual request, upon the correspondent requesting entry in the client login table. Of note, encrypted login, such as SSL, may be used in order to increase client security.


Multiple views may be provided in the present invention, and the information displayed in each view may be consistent with the requesting user's access level. For example, certain users may be eligible to view all equipment that is available for sale and/or auction. Certain users may be able to view equipment which is available for redeployment. Other users, such as those who have made a purchase, may be able to view equipment which is pending shipment. Still other users, such as those who have made a purchase and viewed a pending shipment, may additionally be able to view shipped items. A job summary may be provided to users having a login. The job summary may provide all information relevant to that user which that user is eligible to see. Further, particular elements within the audit trail may be available to certain users, dependant upon those users'security clearance.


For example, redeployment requests may be made with the present invention. Users may enter a category, an item type, a manufacturer, make, model, and/or a quantity requested. Filtering, or other search mechanisms known to those skilled in the art, may query and check quantity for the availability of the hems requested for redeployment. The recipient of the redeployment may, for example, be selected from a drop down list of known recipients, or a new recipient may be entered by completing a recipient information form. The redeployment request may be submitted, such as by clicking a submit button, which may cause the sending of an e-mail to the internal inventory tracking data base. Such an email may detail that forms have been filled out and a redeployment request has been remotely generated.


Referring now to FIGS. 19-24, there are shown embodiments of screen representations according to an aspect of the present invention. In FIG. 19, for example, there is shown an entry page to an auction site identifying the user and the types of auctions that the user has access to.


Different types of auctions and access may be shown in FIGS. 20 and 21. In FIG. 21_there is shown a screen available to a user with required access to bid on items identified by lots. As may be seen in FIG. 20 various information on the lot is provided to the user, as discussed hereinabove. In FIG. 21, there is shown a screen available to a user with required access to bid on individual items, such as line item auctions, for example. As may be seen in FIG. 21, individual items and the items pertinent information may be identified as a line item on the screen.



FIG. 22 illustrates a screen shot according to an aspect of the present invention. In FIG. 22, there is shown a bid status page configured to allow the user to view various bids, such as on-going and completed bids, and further identify each bid as currently the highest or not, as discussed hereinabove.



FIG. 23 illustrates a screen shot demonstrating the types of information available within the inventory system of the present invention. As is shown in FIG. 23, line items may be identified and further information may be determined corresponding to the particular identified line item.


In FIG. 24, there is shown a logout screen according to an aspect of the present invention. This login screen denotes the required information to access certain levels of the inventory system disclosed herein.



FIG. 6 is a flow diagram illustrating the implementation of an auction module from the inventory hub of FIG. 1. Items may be selected from the system inventory and designated for auction sale. Auction bidders may enter user information to acquire a list of items available for auction, or may be required to enter user information only upon entry of an auction bid. Further, the home page may be accessible to external users and may provide, for example, auction types and/or rules. Upon gaining access to the auction page, open auctions and closed auctions for requested items may be presented. Further, the requested items may be requested utilizing any search engine, as will be apparent to those skilled in the art. Open auctions are those wherein the current and minimum bid required are viewable to the user having that user's security level. Closed auctions are those wherein a current and minimum bid are not viewable to that particular user.


Lot auctions may be available, wherein a bid is required for the entire list of items in a given auction, and wherein one or more of the items are responsive to the users searched for item. Alternatively, line item auctions may be available, wherein a bid is required for each equipment item, or part of a piece of equipment, displayed in a list of equipment items, but wherein the sum of the lists, and/or the sum of the items, and/or the sum of the bids, may make a single auction. Alternatively, in a line item auction, bidders may bid only on the items they wish to purchase.


Referring now to FIG. 7, there is shown a flow diagram illustrating multiple line item or lot auctions, running concurrently. Numerous lot or line item auctions may be available at any given time, and for any given item, and may be viewed by the user from an auction inventory page, for example. Further, items may be searchable not only by item type, but by lot or line item type, for example. In an embodiment, an item number, an item type, manufacturer, a make, and/or a model may serve as the search term, and may be individually filtered, such as for security reasons. Clicking on an item number, which may be, for example, a hyperlink, may cause the display of an item detail page. The item detail page may include, for example, the audit trial of the selected item, or selected portions thereof. A description and/or photograph of the item may be provided to the prospective bidder. The prospective bidder may then submit a bid, or add the item to, for example, a watch list, from the item detail page. The auction start date, end date and end time, along with other auction detail, may be persistently provided, such as at the top of each page of a selected auction or item. A default, or a reserve, price for single or multiple items may be entered at one time. This may allow the bidder to filter for a list of items on which the bidder wishes to bid the same amount, and to have all items updated simultaneously. Check boxes may be used to select all, or individual items, to be set at the default bid amount.


Items may be selected for bid, or bid watch, and a bid status form, unique to each user, may be sent. The bid status form may list all items on which the bidder has submitted bids, the items the bidder is watching, current bid status, and items that have been won, lost, or closed in the course of bid.



FIG. 8 illustrates a flow diagram of a bid status form. The bid status form may have, in an exemplary embodiment, three sections that report on the status of each item on a bid list. For example, the submitted bid section may list all items on which the user has bid. A particular color or signifier, such as a green color, may indicate that the bidder had currently submitted the high bid. A different color or signifier, such as a red color, may indicate that the bidder does not currently have the highest bid in that particular auction. The bidder may then increase the current bid from the submitted bids list, and have that bid update entered into the auction system. The bid watch list section may list all items that the user has selected to watch without actually bidding. The current bid price may be available from the bid watch list section. Further, the bidder may enter a bid from the watch list section. The completed list section may list all items the user has selected to watch without actually bidding. Further, this section may list all completed auctions, including those on which the bidder has bid, and the status of each. A green color, or other color, or other differentiating factor, may signify that the bidder has won that auction. A different color, or a different differentiation, may signify that the bidder has lost that auction.


Referring now to FIG. 9, there is shown a flow diagram of an exemplary client profile options implementing the hub and spoke system of FIG. 1, such as in the auction system of FIGS. 5 through 8. As may be seen in FIG. 9, the client program profile options link various aspects, such as the spokes of FIG. 1, for example, with the client reporting function. As shown in FIG. 9, the program or overall grouping for client reporting may be linked to the client program profile options. Also linked to the client program profile options are the various spokes which may be utilized, such as the IT/Electronic Processing, Lab Equipment Processing, Logistics, storage and warehousing, report/certificate options, IT/electronics redeployment and lab equipment redeployment.


Referring now to FIG. 10, there is shown a flow diagram of the IT/electronic processing module of FIG. 9. As may be seen in FIG. 10, the IT/Electronic Processing may include, by way of non-limiting example only, electronics mixed processing per pound, processing per laptop, per server, per printer, per computer, per monitor, and per PDA. Further, the electronic processing may include accounting for data eradication levels indicative of the processing, such as level 1, 2, or 3. Further, the processing may include accounting for each incoming inventory unit.


Referring now to FIG. 11, there is shown a flow diagram of the Lab Equipment processing module of FIG. 9. As may be seen in FIG. 11, the lab equipment processing may include general processing per hour, decontamination processing per hour, destruction per hour and inventory processing per hour.


Referring now to FIG. 12, there is shown a flow diagram of the Logistics module of FIG. 9. As may be seen in FIG. 12, the logistics module may include shrink wrap per skid, accounting for personnel such as a manager, supervisor or other required personnel. Other setup fees and cost may be itemized such as bin or dolly setup fees, pallet fees, and other necessary charges.


Referring now to FIG. 13, there is shown a flow diagram of the storage and warehousing module of FIG. 9. Such storage and warehousing may include itemization of pallet space per day identified for selected container types and additional general warehousing costs per hour such a labor.


Referring now to FIG. 14, there is shown a flow diagram of the report/certificate options module of FIG. 9. The report certification options may include itemization of all materials inventoried for a job, a storage report, identification of materials or parts identified for redeployment, job summaries, and various certificates.


Referring now to FIG. 15, there is shown a flow diagram of the electronics redeployment module of FIG. 9. As may be seen in FIG. 15, electronics redeployment may be itemized by monitor, printer and computer/laptop in such increments as process, box and pallets.


Referring now to FIG. 16, there is shown a flow diagram of an exemplary lab equipment redeployment module of FIG. 9.


Referring now to FIG. 17, there is shown a flow diagram of the overall grouping for the client reporting of FIG. 9. As may be seen in FIG. 17, the client reporting may include groups such as asset management with resale, standard recycling, destruction services, redeployment services for electronics and/or lab equipment.


Referring now to FIG. 18, there shown a list of potential job summary reports which may be generated by the present invention including demanufactured inventory, redeployment, resale settlement and software audit reports.


In addition, there may be a need or requirement to track and report information regarding data, software, and/or hardware eradication in one program. The present invention may incorporate each of these elements. For example, as discussed above, individual hardware items may be tracked and inventoried. Additionally, software may be identified on a computer system and tracked similarly to the component level tracking of hardware. Further, data components may be tracked.


For example, the registry information on a computer may be tracked. This provides assurances to those involved, such as the original owner of the computer, that data and software are being eradicated such as by disk or disk formatting before sending the computer to the inventory system. The present invention is capable of interrogating the computer system to determine which software applications were sly resident on the machine even after such a disk format. This may provide ownership and separates licenses, such as software licenses, from the hardware in which they reside. This may allow for example, a computer owner to discard a computer system while accounting for the software licenses, thereby permitting the licensed software to be added to another machine without purchasing a new software license.



FIGS. 19-54 are screen shots illustrative of aspects of the present invention. These screen shots illustrate, for example, in FIGS. 19-24, the auction of inventory items, including used inventory items. In FIGS. 25-27, the screen shots illustrate inventory updating, searching, managing and/or appraising. Screen shots of FIGS. 28-39, illustrate, for example, the management of an auction, including the entry and searching of item information, logging in to an auction, searching auction items and bidding, including bid breakdowns and watch items. Screen Shot of FIG. 40 illustrates an exemplary main menu entry screen for entry to the network of the present invention. FIGS. 41-45 illustrate the input of various information items regarding client profiles. FIGS. 46-54 illustrate the entry of various inventory related information, including item and job information and processing.



FIGS. 55 and 56 illustrate the organizational hierarchy used in an exemplary embodiment of the present invention. The figures illustrate the use of suggested bar codes for quick inventory access, and the use of diagnostic testing.



FIGS. 57-62 illustrate the processing of items using item related information in the present invention. FIG. 63 illustrates a logistics and warehouse hierarchy for use in the present invention. The screen shots of FIGS. 64-86 illustrate the tracking of inventory and jobs, including searching, discrete inventory items, containers, and buyers and sellers of items in inventory. FIGS. 64-86 further illustrate the use of the reporting features available through the use of the present invention. FIGS. 87-90 illustrate an exemplary auction interface for use in the present invention.


The disclosure herein is directed to the variations and modifications of the elements and methods of the invention disclosed that will be apparent to those skilled in the art in light of the disclosure herein. Thus, it is intended that the present invention covers the modifications and variations of this invention, provided those modifications and variations come within the scope of the appended claims and the equivalents thereof.

Claims
  • 1. A method of delivering data from a source to a remote device, comprising: a network node, different from the source, developing a schedule for delivery of the data to the remote device based on scheduling parameters including an available RF spectrum of, a plurality of regional broadcast stations; the network node selecting a frequency and a particular one of the plurality of regional broadcast stations from among a set of available frequencies of the plurality of regional broadcast stations; communicating the data and the selected frequency to the particular one of the plurality of regional broadcast stations in accordance with the schedule; and the regional broadcast station broadcasting the data, in accordance with the schedule, via radio waves.
  • 2. The method of claim 1, wherein the selected frequency of the radio waves is within at least one of an FM sub-carrier band, an AM sub-carrier band, a Television sub-carrier band, a satellite band, and a cellular band.
  • 3. The method of claim 1, further comprising: the particular one of the plurality of regional broadcast stations choosing an alternative frequency from among the set of available frequencies, communicating the alternative frequency to the network node, and broadcasting the data at the alternative frequency.
  • 4. The method of claim 1, wherein the remote device comprises a toy.
  • 5. The method of claim 1, wherein the remote device comprises a home appliance.
  • 6. The method of claim 1, wherein the remote device comprises a consumer entertainment electronic.
  • 7. The method of claim 1, wherein the remote device comprises a gambling device.
  • 8. The method of claim 1, wherein the remote device comprises a telematics system within an automobile.
  • 9. The method of claim 1, wherein the remote device comprises an advertisement display.
  • 10. The method of claim 1, wherein the remote device comprises a smart card.
  • 11. The method of claim 10, wherein the data comprises at least one of an advertisement and a coupon, and further comprising redeeming the advertisement and/or coupon by interacting with the smart card.
  • 12. The method of claim 1, wherein the scheduling parameters further comprise at least one of geographic location of the remote device, geographic location of the public broadcasting station, file size of the data, network traffic, priority, compensation, available resources, and terms of a contract.
  • 13. The method of claim 1, wherein the data comprises Meta data.
  • 14. The method of claim 13, wherein the remote device comprises a toy.
  • 15. The method of claim 13, wherein the remote device comprises a home appliance.
  • 16. The method of claim 13, wherein the remote device comprises a consumer entertainment electronic.
  • 17. The method of claim 13, wherein the remote device comprises a gambling device.
  • 18. The method of claim 13, wherein the remote device comprises a telematics system within an automobile.
  • 19. The method of claim 13, wherein the remote device comprises an advertisement display.
  • 20. The method of claim 13, wherein the remote device comprises a smart card.
  • 21. The method of claim 1, further comprising: a user of the remote device submitting a request to set an access parameter; and the remote device receiving the data as a function of the access parameter.
  • 22. The method of claim 13, further comprising: a user of the remote device submitting a request to set the Meta data parameter; and setting the Meta data parameter on the remote device in response to the request.
  • 23. The method of claim 22, further comprising the remote device accepting the data as a function of the Meta data parameter.
  • 24. The method of claim 1, wherein the radio waves have a frequency associated with a cellular phone service supporting GSM, CDMA, and TCDMA.
  • 25. The method of claim 1, further comprising a bridge chip receiving the data from the regional broadcast station and forwarding the data to the remote device.
  • 26. The method of claim 25, further comprising encoding the data in accordance with a bluetooth specification, before the step of forwarding.
  • 27. The method of claim 25, further comprising encoding the data in accordance with at least one of an 802.11a and an 802.11 b specification, before the step of forwarding.
  • 28. The method of claim 1, further comprising the step of reporting feedback associated with delivery of the data.
  • 29. The method of claim 28, further comprising a confirmation server monitoring a broadcast and collecting the feedback.
  • 30. The method of claim 28, wherein the step of reporting feedback further comprises the remote device communicating the feedback directly to the network node.
  • 31. A network node coupled to a public packet switched network and programmed to: develop a schedule for delivery of the data to the remote device, wherein the schedule is based at least in part on scheduling parameters including an available RF spectrum of a plurality of regional broadcast stations; select a frequency and a particular one of the plurality of regional broadcast stations from among a set of available frequencies of the plurality of regional broadcast stations; and communicate the data and the selected frequency to the particular one of the plurality of regional broadcast stations in accordance with the schedule.
  • 32. The remote device of claim 31, wherein the remote device comprises a toy.
  • 33. The remote device of claim 31, wherein the remote device comprises a home appliance.
  • 34. The method of claim 31, wherein the remote device comprises a consumer entertainment electronic.
  • 35. The method of claim 31, wherein the remote device comprises a gambling device.
  • 36. The method of claim 31, wherein the remote device comprises a telematics system within an automobile.
  • 37. The method of claim 31, wherein the remote device comprises an advertisement display.
  • 38. The method of claim 31, wherein the remote device comprises a smart card.
  • 39. A method of patching a software program on a remote device, comprising: a subscriber providing program code to a network node; the network node developing a schedule for the delivery of the program code to the remote device based on scheduling parameters including an available RF spectrum of a regional broadcast station; the network node communicating the data to the regional broadcast station in accordance with the schedule; the regional broadcast station broadcasting the program code, in accordance with the schedule, via radio waves associated with at least one of an FM sub-carrier frequency, an AM sub-carrier frequency, a Television sub-carrier frequency, a satellite frequency, and a cellular frequency; and the remote device recognizing the program code and patching the software program.
  • 40. A remote device having a receiver programmed to accept radio signals broadcast at a frequency selected by a network node, wherein the frequency is within at least one of an FM sub-carrier band, an AM sub-carrier band, a Television sub-carrier band, a satellite band, and a cellular band.
  • 41. The remote device of claim 40 comprising a toy.
  • 42. The remote device of claim 40 comprising a home appliance.
  • 43. The remote device of claim 40 comprising a consumer entertainment electronic.
  • 44. The remote device of claim 40 comprising a gambling device.
  • 45. The remote device of claim 40 comprising a telematics system within an automobile.
  • 46. The remote device of claim 40 comprising an advertisement display.
  • 47. The remote device of claim 40 comprising a smart card.