U.S. patent application number 14/698483 was filed with the patent office on 2015-08-27 for methods and systems for conducting research operations.
The applicant listed for this patent is The Nielsen Company (US), LLC. Invention is credited to Jack C. Crystal, Vijoy K. Gopalakrishnan, Alan R. Neuhauser, Jack K. Zhang.
Application Number | 20150242864 14/698483 |
Document ID | / |
Family ID | 38189118 |
Filed Date | 2015-08-27 |
United States Patent
Application |
20150242864 |
Kind Code |
A1 |
Gopalakrishnan; Vijoy K. ;
et al. |
August 27, 2015 |
Methods and systems for conducting research operations
Abstract
Methods and systems for setting up, promoting, operating,
maintaining and/or terminating a research operation carried out
with the use of a portable user appliance (PUA) are disclosed. An
example method to collect user feedback includes detecting, via a
portable device worn by a user, an external environmental stimulus
fixedly located proximate to a location of the portable device. The
example method includes presenting via the portable device a survey
sent to the portable device from a mobile telecommunication device
carried by the user. The survey requests feedback associated with
the environmental stimulus. The example method also includes
receiving a user response associated with the survey at the
portable device. The example method further includes sending the
user response from the portable device to the mobile
telecommunication device carried by the user.
Inventors: |
Gopalakrishnan; Vijoy K.;
(Richmond, GB) ; Neuhauser; Alan R.; (Silver
Spring, MD) ; Crystal; Jack C.; (Owings Mills,
MD) ; Zhang; Jack K.; (Ijamsville, MD) |
|
Applicant: |
Name |
City |
State |
Country |
Type |
The Nielsen Company (US), LLC |
Schaumburg |
IL |
US |
|
|
Family ID: |
38189118 |
Appl. No.: |
14/698483 |
Filed: |
April 28, 2015 |
Related U.S. Patent Documents
|
|
|
|
|
|
Application
Number |
Filing Date |
Patent Number |
|
|
11643128 |
Dec 20, 2006 |
|
|
|
14698483 |
|
|
|
|
60751825 |
Dec 20, 2005 |
|
|
|
Current U.S.
Class: |
705/7.32 |
Current CPC
Class: |
H04L 67/02 20130101;
G06Q 10/00 20130101; H04B 1/385 20130101; G06Q 30/0201 20130101;
H04W 4/029 20180201; G06Q 30/0208 20130101; G06Q 30/0203 20130101;
H04B 1/3833 20130101 |
International
Class: |
G06Q 30/02 20060101
G06Q030/02; H04B 1/3827 20060101 H04B001/3827; H04W 4/02 20060101
H04W004/02 |
Claims
1. A method to collect user feedback, comprising: detecting, via a
portable device worn by a user, an external environmental stimulus
fixedly located proximate to a location of the portable device;
presenting via the portable device a survey sent to the portable
device from a mobile telecommunication device carried by the user,
the survey requesting feedback associated with the environmental
stimulus; receiving a user response associated with the survey at
the portable device; and sending the user response from the
portable device to the mobile telecommunication device carried by
the user.
2. A method as defined in claim 1, wherein the portable device is
worn around a wrist of the user.
3. A method as defined in claim 1, wherein the portable device is
associated with an article of jewelry, an ornamental article, an
article of clothing, a fob, a wristwatch, a lanyard, a pin, a
clasp, a belt, or a belt buckle.
4. A method as defined in claim 1, wherein the external
environmental stimulus corresponds to at least one of a product, an
advertisement, a billboard, or a commercial establishment.
5. A method as defined in claim 4, wherein the user response is
representative of at least one of an attitude, an awareness, a
preference, or an opinion of the user of the product, the
advertisement, the billboard, or the commercial establishment.
6. A method as defined in claim 4, wherein the external
environmental stimulus is audio media detected via an audio sensor
of the portable device.
7. A method as defined in claim 1, wherein the mobile
telecommunication device is a cellular telephone of the user.
8. A method as defined in claim 1, wherein the portable device and
the mobile telecommunication device are in wireless
communication.
9. A method to collect user feedback, comprising: sending a survey
from a personal mobile telecommunication device carried by a user
to a portable device worn by the user; and receiving at the
personal mobile telecommunication device a user response associated
with the survey from the portable device.
10. A method as defined in claim 9, wherein the portable device is
worn around a wrist of the user.
11. A method as defined in claim 9, wherein the portable device is
associated with a fob, a wristwatch, or a lanyard.
12. A method as defined in claim 9, wherein the user response is
entered by a user via a keypad of the portable device.
13. A method as defined in claim 9, further including collecting
identifying information associated with media detected by the
portable device.
14. A method as defined in claim 13, wherein the identifying
information is at least one of a code or a signature representative
of audio associated with the media.
15. A method as defined in claim 9, further including associating
geographic location information of the portable device with the
user response associated with the survey.
16. A method as defined in claim 9, further including communicating
the user response via the personal mobile telecommunication device
to a research data processing facility.
17. A method to collect user feedback, comprising: receiving
information at a portable device indicative of at least one of an
advertisement or a commercial establishment fixedly located
proximate to a location of the portable device, the portable device
worn on the person of a user; presenting, via the portable device,
a survey sent to the portable device from a mobile telephone
carried by the user, the survey soliciting feedback associated with
the advertisement or the commercial establishment; and
communicating a user response associated with the survey received
at the portable device to the mobile telephone.
18. A method as defined in claim 17, wherein the portable device is
worn around a neck of the user.
19. A method as defined in claim 17, wherein the portable device is
associated with an article of jewelry, an ornamental article, a
pin, or a clasp.
20. A method as defined in claim 17, wherein the portable device is
associated with an article of clothing, a belt, or a belt buckle.
Description
RELATED APPLICATIONS
[0001] This patent arises from a continuation of U.S. patent
application Ser. No. 11/643,128, filed on Dec. 20, 2006, which is a
non-provisional application of U.S. Provisional Pat. App. Ser. No.
60/751,825, filed on Dec. 20, 2005. Both the U.S. patent
application Ser. No. 11/643,128 and U.S. Provisional Pat. App. Ser.
No. 60/751,825 are hereby incorporated by reference in their
entireties.
BACKGROUND
[0002] Collecting data reflecting usage of media is an increasingly
complex task as the variety of media sources and techniques for
presenting media to consumers, and the numbers and types of media
presentation venues, increase over time.
[0003] A convergence of personal communications capabilities and
multimedia options in a single portable device is occurring
presently, such as in a cellular telephone, a personal digital
assistant, and the like. Increasingly, consumers are accessing and
consuming media "on the go" and out-of-home using such portable
devices, and as the quality of media presented by such devices is
improved, it can be expected that such mobile consumption of media
will increase.
[0004] The above trends in media usage, in addition to conventional
in-home consumption demonstrate a need for new techniques for
monitoring exposure to media of various types presented to
consumers in a greater variety of ways than in the past.
[0005] Dedicated portable monitoring devices have been developed
including the hardware and software required to monitor exposure to
audio media. It has been proposed to monitor exposure of consumers
to audio media by incorporating monitoring software for instance in
a cellular telephone, making use of the cellular telephone's
hardware, including its microphone, CPU, memory capacity and
communications capabilities.
BRIEF DESCRIPTION OF THE DRAWINGS
[0006] FIG. 1 is a block diagram of a PUA modified to carry out
research operations;
[0007] FIG. 1A is a functional block diagram for use in explaining
certain examples involving the use of the PUA of FIG. 1;
[0008] FIG. 1B is a block diagram of a system for setting up,
promoting, operating, maintaining and/or terminating research
operations with the use of multiple PUA's, such as that illustrated
in FIG. 1;
[0009] FIG. 2 is a block diagram of a PUA in communication with a
research system;
[0010] FIG. 2A is an exploded view of a PUA with a research data
monitor affixed thereto;
[0011] FIG. 2B is a block diagram illustrating the PUA of FIG. 2A
coupled with the research data monitor thereof;
[0012] FIG. 2C is a block diagram of the research data monitor of
FIGS. 2A and 2B;
[0013] FIG. 2D is a layout diagram of an example of the research
data monitor of FIGS. 2A, 2B and 2C;
[0014] FIG. 2E is a block diagram of a PUA communicating with the
research data monitor of FIGS. 2A, 2B and 2C;
[0015] FIG. 3 is a block diagram of a personal digital assistant
(PDA) modified to carry out research operations;
[0016] FIG. 4 is a block diagram of an external storage device
modified to carry out research operations;
[0017] FIG. 5 illustrates a pen in phantom lines, having a research
data collection system therein which serves to carry out research
operations;
[0018] FIG. 6 is a block diagram of the research data collection
system of FIG. 5;
[0019] FIG. 7A illustrates a relational database between PUA users
and a group of persons receiving communication services pursuant to
a single agreement;
[0020] FIG. 7B illustrates a relational database between PUA users
and demographic data of the PUA users;
[0021] FIG. 8 illustrates an example of a signature extraction
technique; and
[0022] FIG. 9 is a schematic diagram of still further systems and
processes for carrying out research operations with the use of
personal user appliances (PUA's).
DISCLOSURE
[0023] For this application the following terms and definitions
shall apply:
[0024] The term "data" as used herein means any indicia, signals,
marks, symbols, domains, symbol sets, representations, and any
other physical form or forms representing information, whether
permanent or temporary, whether visible, audible, acoustic,
electric, magnetic, electromagnetic or otherwise manifested. The
term "data" as used to represent predetermined information in one
physical form shall be deemed to encompass any and all
representations of corresponding information in a different
physical form or forms.
[0025] The terms "media data" and "media" as used herein mean data
which is widely accessible, whether over-the-air, or via cable,
satellite, network, internetwork (including the Internet), print,
displayed, distributed on storage media, or by any other means or
technique that is humanly perceptible, without regard to the form
or content of such data, and including but not limited to audio,
video, text, images, animations, databases, files, broadcasts,
displays (including but not limited to video displays, posters and
billboards), signs, signals, web pages, print media and streaming
media data.
[0026] The term "presentation data" shall mean media data or
content other than media data to be presented to a user.
[0027] The term "research data" as used herein means data
comprising (1) data concerning usage of media, (2) data concerning
exposure to media, and/or (3) market research data.
[0028] The terms "gather" and "gathering" as used herein include
both directly gathering data with the use of a device as well as
emitting data from a device that causes or enables another device
to gather data.
[0029] The term "research operation" as used herein means an
operation comprising gathering, storing and/or communicating
research data.
[0030] The term "database" as used herein means an organized body
of related data, regardless of the manner in which the data or the
organized body thereof is represented. For example, the organized
body of related data may be in the form of a table, a map, a grid,
a packet, a datagram, a file, an e-mail, a message, a document, a
list or in any other form.
[0031] The term "network" as used herein includes both networks and
internetworks of all kinds, including the Internet, and is not
limited to any particular network or internetwork.
[0032] The terms "first," "second," "primary," and "secondary" are
used herein to distinguish one element, set, data, object, step,
process, function, action or thing from another, and are not used
to designate relative position, arrangement in time or relative
importance, unless otherwise stated explicitly.
[0033] The terms "coupled", "coupled to", and "coupled with" as
used herein each mean a relationship between or among two or more
devices, apparatus, files, circuits, elements, functions,
operations, processes, programs, media, components, networks,
systems, subsystems, and/or means, constituting any one or more of
(a) a connection, whether direct or through one or more other
devices, apparatus, files, circuits, elements, functions,
operations, processes, programs, media, components, networks,
systems, subsystems, or means, (b) a communications relationship,
whether direct or through one or more other devices, apparatus,
files, circuits, elements, functions, operations, processes,
programs, media, components, networks, systems, subsystems, or
means, and/or (c) a functional relationship in which the operation
of any one or more devices, apparatus, files, circuits, elements,
functions, operations, processes, programs, media, components,
networks, systems, subsystems, or means depends, in whole or in
part, on the operation of any one or more others thereof.
[0034] The terms "communicate", and "communicating" as used herein
include both conveying data from a source to a destination, and
delivering data to a communications medium, system, channel,
device, wire, cable, fiber, circuit or link to be conveyed to a
destination, and the term "communication" as used herein means data
so conveyed or delivered. The term "communications` as used herein
includes one or more of a communications medium, system, channel,
device, wire, cable, fiber, circuit and link.
[0035] The term "processor" as used herein means processing
devices, apparatus, programs, circuits, components, systems and
subsystems, whether implemented in hardware, software or both, and
whether or not programmable. The term "processor" as used herein
includes, but is not limited to computers, hardwired circuits,
signal modifying devices and systems, devices and machines for
controlling systems, central processing units, programmable
devices, field programmable gate arrays, application specific
integrated circuits, systems on a chip, systems comprised of
discrete elements and circuits, state machines, virtual machines
and combinations of any of the foregoing.
[0036] The terms "storage" and "data storage" as used herein mean
data storage devices, apparatus, programs, circuits, components,
systems, subsystems and storage media serving to retain data,
whether on a temporary or permanent basis, and to provide such
retained data.
[0037] The terms "panelist," "panel member" and "participant" are
interchangeably used herein to refer to a person who is, knowingly
or unknowingly, participating in a study to gather information,
whether by electronic, survey or other means, about that person's
activity.
[0038] The term "household" as used herein is to be broadly
construed to include family members, a family living at the same
residence, a group of persons related or unrelated to one another
living at the same residence, and a group of persons living within
a common facility (of which the total number of unrelated persons
does not exceed a predetermined number), such as a fraternity
house, an apartment or other similar structure or arrangement.
[0039] The term "portable user appliance" (also referred to herein,
for convenience, by the abbreviation "PUA") as used herein means an
electrical or non-electrical device capable of being carried by or
on the person of a user or capable of being disposed on or in, or
held by, a physical object (e.g., attacha, purse) capable of being
carried by or on the user, and having at least one function of
primary benefit to such user, including without limitation, a
cellular telephone, a personal digital assistant ("PDA"), a
Blackberry device, a radio, a television, a game system (e.g., a
Gameboy.RTM. device), a notebook computer, a laptop computer, a GPS
device, an iPod.RTM. device, a DVD player, a walkie talkie, a
personal communications device, a telematics device, a remote
control device, a wireless headset, a wristwatch, a portable data
storage device (e.g., Thumb.TM. drive), a camera, a recorder, a
keyless entry transmitter device, a ring, a comb, a pen, a pencil,
a notebook, a wallet, a tool, an implement, a pair of glasses, an
article of clothing, a belt, a belt buckle, a fob, an article of
jewelry, an ornamental article, a pair of shoes or other foot
garment (e.g., sandals), a jacket, and a hat, as well as any
devices combining any of the foregoing or their functions.
[0040] The term "activation message" as used herein shall mean data
comprising at least one of (1) an activation command for a PUA for
activating a capability of the PUA to perform a research operation,
(2) activation data for a PUA for enabling and/or providing a
capability of the PUA to perform a research operation, (3) visual
display data for a PUA including a message soliciting participation
of a user of the PUA in a research operation, (4) activation
request data for a PUA requesting activation, enablement or
installation of a capability thereof to perform a research
operation, (5) a message for a user of a PUA requesting an action
thereof to activate, enable and/or install a capability of the PUA
to perform a research operation, and/or providing instructions for
participating in a research operation automatically by means of a
PUA, (6) a message for a user of a PUA providing or offering to
provide a benefit to the user in exchange for the user's
participation in a research operation, and (7) a message to a PUA
and/or a user of a PUA requesting communication of a participation
message in response.
[0041] The term "maintenance message" as used herein shall mean
data comprising at least one of (1) a test command for a PUA to
control an operation thereof to test its operational status or
ability to perform a research operation, (2) test data for a PUA to
establish, enable or provide a capability thereof to test its
operational status or ability to perform a research operation, (3)
a message requesting a response from a user of a PUA identifying
such user, and/or providing demographic or other user-specific data
of the user, (4) a message requesting system data of the PUA, and
(5) a command or request for a PUA to perform a research
operation.
[0042] The term "termination message" as used herein shall mean
data comprising at least one of: (1) a deactivation message for a
PUA to deactivate a capability thereof to perform a research
operation; (2) a deactivation message for a user of a PUA
instructing them to deactivate a capability of the PUA to perform a
research operation; and (3) providing a benefit to a person as a
final consideration for the person's previous participation in a
research operation, or notifying the person that such a benefit
will be or has been provided.
[0043] The term "participation message" as used herein shall mean
data comprising at least one of (1) research data gathered
automatically by a PUA, (2) a message from a PUA indicating an
operational status or ability thereof to perform a research
operation, or providing results of a test of such operational
status or ability, (3) a message from a user of a PUA concerning
participation of the user in a research operation by means of a
PUA, or ancillary to such participation, such as concerning a
benefit provided to the user for such participation or indicating
activation or deactivation of an ability of a PUA to perform a
research operation, (4) a message from a user of a PUA identifying
such user and/or providing demographic and/or other user-specific
data of the user, (5) a message providing system data of the PUA,
(6) a message from a benefit provider concerning a benefit provided
or to be provided to a user of a PUA for participation in a
research operation, such as a message indicating receipt of a
benefit request or a termination message requesting a benefit, and
(7) a message from a PUA indicating receipt thereby of an
activation message, a maintenance message or a termination
message.
[0044] An example method for setting up, promoting, operating,
maintaining and/or terminating a research operation carried out
automatically with the use of a PUA, comprises communicating a
message to a PUA and/or to a user of a PUA comprising at least one
of instructions for participating in a research operation carried
out automatically by means of the PUA, a message for the user of
the PUA providing or offering to provide a benefit to the user in
exchange for the user's participation in a research operation, a
message requesting a response from the user identifying the user,
and a command or a request for the PUA to automatically gather,
store and/or communicate research data; and receiving a
participation message from at least one of the PUA, the user of the
PUA and the benefit provider.
[0045] An example method for setting up, promoting, operating,
maintaining and/or terminating a research operation carried out
automatically with the use of a PUA, comprises communicating at
least one of an activation message, a maintenance message and a
termination message to a PUA, to a user of a PUA and/or to a
benefit provider; and receiving a participation message from at
least one of the PUA, the user of the PUA and the benefit provider;
and wherein the participation message comprises at least one of a
message from the PUA indicating an operational status or ability
thereof to carry out a research operation, a message from the PUA
indicating an availability thereof to carry out a research
operation, and a message from the user of the PUA identifying the
user.
[0046] An example method for setting up, promoting, operating,
maintaining and/or terminating a research operation carried out
automatically with the use of a PUA, comprises communicating at
least one of an activation message, a maintenance message and a
termination message to a PUA, to a user of a PUA and/or to a
benefit provider; and receiving a participation message from at
least one of the PUA, the user of the PUA and the benefit provider;
and further comprising communicating a termination message to at
least one of the PUA and a benefit provider.
[0047] An example method of gathering research data, comprises
receiving a message from a user's PUA including research data and
identification data identifying the user's PUA; and storing the
research data, together with an identification of the user's PUA
from which it was received.
[0048] An example method of recruiting a person to participate in a
research operation, comprises communicating a recruitment message
as media data to a plurality of PUA users to solicit participation
in the research operation; and receiving a participation message
from a PUA of a user who received the recruitment message.
[0049] An example method of recruiting persons within a population
to participate in a research operation, comprises obtaining a list
of cellular telephone numbers of persons within a population;
communicating a message addressed to at least some telephone
numbers in the cellular telephone number list soliciting
participation of persons in a research operation; and communicating
a message to cellular telephones corresponding to the at least some
telephone numbers to initiate, provide or enable a capability of
the cellular telephones to carry out a research operation.
[0050] An example method of recruiting PUA users within a
population to participate in a research operation, comprises
communicating a recruitment message to PUA's of PUA users within a
population to solicit participation in the research operation; and
if a response to the recruitment message is received from a PUA
user indicating an unwillingness to participate in the research
operation or if no response thereto is received, storing negative
data indicating a failure to recruit the PUA user to participate in
the research operation and subsequently communicating a further
recruitment message to the PUA user to solicit participation in the
research operation.
[0051] An example method of administering surveys to persons for
gathering research data, comprises communicating a first survey
including a first number of questions to a person; receiving a
response to the first survey from the person; based on the
response, selecting a second survey including a second number of
survey questions, the second number of survey questions being fewer
than the first number of survey questions; and communicating the
second survey to the participant.
[0052] An example method of terminating participation of a person
in a research operation carried out by means of a PUA used by the
person, comprises at least one of: (1) communicating a deactivation
message to the PUA used by the person to deactivate a capability
thereof to carry out a research operation; (2) communicating a
deactivation message to the person instructing them to deactivate a
capability of the PUA to carry out a research operation; and (3)
providing a benefit to the person as a final consideration for the
person's previous participation in the research operation.
[0053] An example method of operating a PUA in the course of
setting up, operating, maintaining and/or terminating a research
operation carried out automatically with the use of the PUA,
comprises receiving a maintenance message in a PUA including at
least one of a message requesting a response from the user
identifying the user and a command or request to the PUA to
automatically gather, store and/or communicate research data; and
communicating a participation message from the PUA.
[0054] An example method of operating a PUA in the course of
setting up, operating, maintaining and/or terminating a research
operation carried out automatically with the use of the PUA,
comprises receiving a termination message in a PUA; and
communicating a participation message from the PUA.
[0055] An example method of terminating participation of a person
in a research operation by means of a PUA used by the person,
comprises at least one of: (1) receiving a deactivation message in
the PUA used by the person to deactivate a capability thereof to
carry out a research operation; and (2) inputting a deactivation
command in the PUA instructing it to deactivate a capability
thereof to carry out a research operation.
[0056] An example method of recruiting a user of a PUA to
participate in a research operation, comprises communicating a
participation message from the PUA of the user relating to
participation in a research operation; and communicating, in
response to a message from the user, an initiation message to the
PUA of the user to initiate, enable or establish a capability of
the PUA to carry out a research operation; further comprising
communicating at least one of a data collection type to the PUA of
the user specifying a type of data to collect by means of the PUA,
calibration data to the PUA for use in calibrating an operation of
the PUA and destination data to the PUA specifying a destination
for research data gathered or received by the PUA.
[0057] An example method of terminating participation of a PUA user
in a research operation by means of a PUA of the user, comprises
receiving a deactivation message in the PUA comprising data for
deactivating at least one function of the PUA to carry out a
research operation, without deactivating at least one additional
function of the PUA to carry out a research operation; and
providing a control operable by the PUA user to deactivate the at
least one additional function of the PUA.
[0058] An example method of initiating participation of a PUA user
in a research operation using multiple PUA's, comprises assigning
user identification data to the user; associating the user
identification data with data identifying multiple PUA's used by
the user; and at least one of (1) activating or enabling each of
the multiple PUA's to carry out a research operation, and (2)
receiving research data from plural ones of the multiple PUA's.
[0059] Numerous types of research operations are possible,
including, without limitation, television and radio program
audience measurement; exposure to advertising in various media,
such as television, radio, print and outdoor advertising, among
others; consumer spending habits; consumer shopping habits
including the particular retail stores and other locations visited
during shopping and recreational activities; travel patterns, such
as the particular routes taken between home and work, and other
locations; consumer attitudes, awareness and preferences; and so
on. For the desired type of media and/or market research operation
to be conducted, particular activity of individuals is monitored,
or data concerning their attitudes, awareness and/or preferences is
gathered. In certain examples research data relating to two or more
of the foregoing are gathered, while in others only one kind of
such data is gathered.
[0060] Various monitoring techniques are suitable. For example,
television viewing or radio listening habits, including exposure to
commercials therein, are monitored utilizing a variety of
techniques. In certain techniques, acoustic energy to which an
individual is exposed is monitored to produce data which identifies
or characterizes a program, song, station, channel, commercial,
etc. that is being watched or listened to by the individual. Where
audio media includes ancillary codes that provide such information,
suitable decoding techniques are employed to detect the encoded
information, such as those disclosed in U.S. Pat. No. 5,450,490 and
No. 5,764,763 to Jensen, et al., U.S. Pat. No. 5,579,124 to Aijala,
et al., U.S. Pat. Nos. 5,574,962, 5,581,800 and 5,787,334 to
Fardeau, et al., U.S. Pat. No. 6,871,180 to Neuhauser, et al., U.S.
Pat. No. 6,862,355 to Kolessar, et al., U.S. Pat. No. 6,845,360 to
Jensen, et al., U.S. Pat. No. 5,319,735 to Preuss et al., U.S. Pat.
No. 5,687,191 to Lee, et al., U.S. Pat. No. 6,175,627 to Petrovich
et al., U.S. Pat. No. 5,828,325 to Wolosewicz et al., U.S. Pat. No.
6,154,484 to Lee et al., U.S. Pat. No. 5,945,932 to Smith et al.,
US 2001/0053190 to Srinivasan, US 2003/0110485 to Lu, et al., U.S.
Pat. No. 5,737,025 to Dougherty, et al., US 2004/0170381 to
Srinivasan, and WO 06/14362 to Srinivasan, et al., all of which
hereby are incorporated by reference herein.
[0061] Examples of techniques for encoding ancillary codes in
audio, and for reading such codes, are provided in Bender, et al.,
"Techniques for Data Hiding", IBM Systems Journal, Vol. 35, Nos. 3
& 4, 1996, which is incorporated herein in its entirety.
Bender, et al. disclose a technique for encoding audio termed
"phase encoding" in which segments of the audio are transformed to
the frequency domain, for example, by a discrete Fourier transform
(DFT), so that phase data is produced for each segment. Then the
phase data is modified to encode a code symbol, such as one bit.
Processing of the phase encoded audio to read the code is carried
out by synchronizing with the data sequence, and detecting the
phase encoded data using the known values of the segment length,
the DFT points and the data interval.
[0062] Bender, et al. also describe spread spectrum encoding and
decoding, of which multiple examples are disclosed in the
above-cited Aijala, et al. U.S. Pat. No. 5,579,124.
[0063] Still another audio encoding and decoding technique
described by Bender, et al. is echo data hiding in which data is
embedded in a host audio signal by introducing an echo. Symbol
states are represented by the values of the echo delays, and they
are read by any appropriate processing that serves to evaluate the
lengths and/or presence of the encoded delays.
[0064] A further technique, or category of techniques, termed
"amplitude modulation" is described in R. Walker, "Audio
Watermarking", BBC Research and Development, 2004. In this category
fall techniques that modify the envelope of the audio signal, for
example by notching or otherwise modifying brief portions of the
signal, or by subjecting the envelope to longer term modifications.
Processing the audio to read the code can be achieved by detecting
the transitions representing a notch or other modifications, or by
accumulation or integration over a time period comparable to the
duration of an encoded symbol, or by another suitable
technique.
[0065] Another category of techniques identified by Walker involves
transforming the audio from the time domain to some transform
domain, such as a frequency domain, and then encoding by adding
data or otherwise modifying the transformed audio. The domain
transformation can be carried out by a Fourier, DCT, Hadamard,
Wavelet or other transformation, or by digital or analog filtering.
Encoding can be achieved by adding a modulated carrier or other
data (such as noise, noise-like data or other symbols in the
transform domain) or by modifying the transformed audio, such as by
notching or altering one or more frequency bands, bins or
combinations of bins, or by combining these methods. Still other
related techniques modify the frequency distribution of the audio
data in the transform domain to encode. Psychoacoustic masking can
be employed to render the codes inaudible or to reduce their
prominence. Processing to read ancillary codes in audio data
encoded by techniques within this category typically involves
transforming the encoded audio to the transform domain and
detecting the additions or other modifications representing the
codes.
[0066] A still further category of techniques identified by Walker
involves modifying audio data encoded for compression (whether
lossy or lossless) or other purpose, such as audio data encoded in
an MP3 format or other MPEG audio format, AC-3, DTS, ATRAC, WMA,
RealAudio, Ogg Vorbis, APT X100, FLAC, Shorten, Monkey's Audio, or
other. Encoding involves modifications to the encoded audio data,
such as modifications to coding coefficients and/or to predefined
decision thresholds. Processing the audio to read the code is
carried out by detecting such modifications using knowledge of
predefined audio encoding parameters.
[0067] It will be appreciated that various known encoding
techniques may be employed, either alone or in combination with the
above-described techniques. Such known encoding techniques include,
but are not limited to FSK, PSK (such as BPSK), amplitude
modulation, frequency modulation and phase modulation.
[0068] In some cases a signature is extracted from transduced media
data for identification by matching with reference signatures of
known media data. Suitable techniques for this purpose include
those disclosed in U.S. Pat. No. 5,612,729 to Ellis, et al. and in
U.S. Pat. No. 4,739,398 to Thomas, et al., each of which is
assigned to the assignee of the present application and both of
which are incorporated herein by reference in their entireties.
[0069] Still other suitable techniques are the subject of U.S. Pat.
No. 2,662,168 to Scherbatskoy, U.S. Pat. No. 3,919,479 to Moon, et
al., U.S. Pat. No. 4,697,209 to Kiewit, et al., U.S. Pat. No.
4,677,466 to Lert, et al., U.S. Pat. No. 5,512,933 to Wheatley, et
al., U.S. Pat. No. 4,955,070 to Welsh, et al., U.S. Pat. No.
4,918,730 to Schulze, U.S. Pat. No. 4,843,562 to Kenyon, et al.,
U.S. Pat. No. 4,450,551 to Kenyon, et al., U.S. Pat. No. 4,230,990
to Lert, et al., U.S. Pat. No. 5,594,934 to Lu, et al., European
Published Patent Application EP 0887958 to Bichsel and PCT
publication WO91/11062 to Young, et al., all of which are
incorporated herein by reference in their entireties.
[0070] An advantageous signature extraction technique transforms
audio data within a predetermined frequency range to the frequency
domain by a transform function, such as an FFT. The FFT data from
an even number of frequency bands (for example, eight, ten, sixteen
or thirty two frequency bands) spanning the predetermined frequency
range are used two bands at a time during successive time
intervals. FIG. 8 provides an example of how pairs of the bands are
selected during successive time intervals where the total number of
bands used is equal to ten. The selected bands are indicated by an
"X".
[0071] When each band is selected, the energy values of the FFT
bins within such band and such time interval are processed to form
one bit of the signature. If there are ten FFT's for each interval
of the audio signal, for example, the values of all bins of such
band within the first five FFT's are summed to form a value "A" and
the values of all bins of such band within the last five FFT's are
summed to form a value "B". In the case of a received broadcast
audio signal, the value A is formed from portions of the audio
signal that were broadcast prior to those used to form the value
B.
[0072] To form a bit of the signature, the values A and B are
compared. If B is greater than A, the bit is assigned a value "1"
and if A is greater than or equal to B, the bit is assigned a value
of "0". Thus, during each time interval, two bits of the signature
are produced.
[0073] One advantageous technique carries out either or both of
code detection and signature extraction remotely from the location
where the research data is gathered, as disclosed in US Published
Patent Application 2003/0005430 published Jan. 2, 2003 to Ronald S.
Kolessar, which is assigned to the assignee of the present
application and is hereby incorporated herein by reference in its
entirety.
[0074] If location tracking or exposure to outdoor advertising is
carried out, then various techniques for doing so are employed.
Suitable techniques for location tracking or monitoring exposure to
outdoor advertising are disclosed in U.S. Pat. No. 6,958,710 in the
names of Jack K. Zhang, Jack C. Crystal, and James M. Jensen,
issued Oct. 25, 2005, and US Published Patent Application
2005/0035857 A1 published Feb. 17, 2005 in the names of Jack K.
Zhang, Jack C. Crystal, James M. Jensen and Eugene L. Flanagan III,
filed Aug. 13, 2003, all of which are assigned to the assignee of
the present application and hereby incorporated by reference herein
in their entireties.
[0075] Where usage of publications, such as periodicals, books, and
magazines, is monitored, suitable techniques for doing so are
employed, such as those disclosed in U.S. patent application Ser.
No. 11/084,481 in the names of James M. Jensen, Jack C. Crystal,
Alan R. Neuhauser, Jack Zhang, Daniel W. Pugh, Douglas J. Visnius,
and Eugene L. Flanagan III, filed Mar. 18, 2005, which is assigned
to the assignee of the present application and hereby incorporated
by reference herein in its entirety.
[0076] In addition to those types of research data mentioned above
and the various techniques identified for gathering such types of
data, other types of research data may be gathered and other types
of techniques may be employed. For example, research data relating
to consumer purchasing conduct, consumer product return conduct,
exposure of consumers to products and presence and/or proximity to
commercial establishments may be gathered, and various techniques
for doing so may be employed. Suitable techniques for gathering
data concerning presence and/or proximity to commercial
establishments are disclosed in US Published Patent Application
2005/0200476 A1 published Sep. 15, 2005 in the names of David
Patrick Forr, James M. Jensen, and Eugene L. Flanagan III, filed
Mar. 15, 2004, and in US Published Patent Application 2005/0243784
A1 published Nov. 3, 2005 in the names of Joan Fitzgerald, Jack
Crystal, Alan Neuhauser, James M. Jensen, David Patrick Forr, and
Eugene L. Flanagan III, filed Mar. 29, 2005. Suitable techniques
for gathering data concerning exposure of consumers to products are
disclosed in US Published Patent Application 2005/0203798 A1
published Sep. 15, 2005 in the names of James M. Jensen and Eugene
L. Flanagan III, filed Mar. 15, 2004.
[0077] Moreover, techniques involving the active participation of
the panel members may be used in research operations. For example,
surveys may be employed where a panel member is asked questions
utilizing the panel member's PUA after recruitment. Thus, it is to
be understood that both the exemplary types of research data to be
gathered discussed herein and the exemplary manners of gathering
research data as discussed herein are illustrative and that other
types of research data may be gathered and that other techniques
for gathering research data may be employed.
[0078] Various PUA's already have capabilities sufficient to enable
the implementation of the desired monitoring technique or
techniques to be employed during the research operation. As an
example, cellular telephones have microphones which convert
acoustic energy into audio data. Various cellular telephones
further have processing and storage capability.
[0079] In certain examples, various existing PUA's are modified
merely by software and/or minor hardware changes to carry out a
research operation. In certain other examples, PUA's are redesigned
and substantially reconstructed for this purpose. In certain
examples the PUA is coupled with a separate research data gathering
system and provides operations ancillary or complementary
thereto.
[0080] In certain examples, the PUA itself is operative to gather
research data. In certain examples, the PUA emits data that causes
another device to gather research data. Such examples include
various examples disclosed in U.S. Pat. No. 6,958,710 and in U.S.
patent application Ser. No. 11/084,481, referenced above. In
certain examples, the PUA is operative both to gather research data
and to emit data that causes another device to gather research
data.
[0081] FIG. 1 is a block diagram of a PUA 20 (such as a cellular
telephone or other data processing and communicating device)
modified to carry out a research operation. The PUA 20 comprises a
processor 30 that is operative to exercise overall control and to
process audio and other data for transmission or reception and
communications 40 coupled to the processor 30 and operative under
the control of processor 30 to perform those functions required for
establishing and maintaining a two-way wireless communication link
with a PUA network. In certain examples, processor 30 also is
operative to execute applications ancillary or unrelated to the
conduct of PUA communications, such as applications serving to
download audio and/or video data to be reproduced by PUA 20, e-mail
clients and applications enabling the user to play games using the
PUA 20. In certain examples, processor 30 comprises two or more
processing devices, such as a first processing device (such as a
digital signal processor) that processes audio, and a second
processing device that exercises overall control over operation of
the PUA 20. In certain examples, processor 30 employs a single
processing device. In certain examples, some or all of the
functions of processor 30 are implemented by hardwired
circuitry.
[0082] PUA 20 further comprises storage 50 coupled with processor
30 and operative to store data as needed. In certain examples,
storage 50 comprises a single storage device, while in others it
comprises multiple storage devices. In certain examples, a single
device implements certain functions of both processor 30 and
storage 50.
[0083] In addition, PUA 20 comprises a microphone 60 coupled with
processor 30 to transduce the user's voice to an electrical signal
which it supplies to processor 30 for encoding, and a speaker
and/or earphone 70 coupled with processor 30 to transduce received
audio from processor 30 to an acoustic output to be heard by the
user. PUA 20 also includes a user input 80 coupled with processor
30, such as a keypad, to enter telephone numbers and other control
data, as well as a display 90 coupled with processor 30 to provide
data visually to the user under the control of processor 30.
[0084] In certain examples, the PUA 20 provides additional
functions and/or comprises additional elements. In certain ones of
such examples, the PUA 20 provides e-mail, text messaging and/or
web access through its wireless communications capabilities,
providing access to media and other content. For example, Internet
access by the PUA 20 enables access to video and/or audio content
that can be reproduced by the cellular telephone for the user, such
as songs, video on demand, video clips and streaming media. In
certain examples, storage 50 stores software providing audio and/or
video downloading and reproducing functionality, such as iPod.RTM.
software, enabling the user to reproduce audio and/or video content
downloaded from a source, such as a personal computer via
communications 40 or through direct Internet access via
communications 40.
[0085] To enable PUA 20 to gather research data, namely, data
indicating exposure to audio such as programs, music and
advertisements, in certain examples research software is installed
in storage 50 to control processor 30 to gather such data and
communicate it via communications 40 to a research organization.
The research software in certain examples also controls processor
30 to store the data for subsequent communication.
[0086] In certain examples, the research software controls the
processor 30 to decode ancillary codes in the transduced audio from
microphone 60 using one or more of the known techniques identified
hereinabove, and then to store and/or communicate the decoded data
for use as research data indicating encoded audio to which the user
was exposed. In certain examples, the research software controls
the processor 30 to extract signatures from the transduced audio
from microphone 60 using one or more of the known techniques
identified hereinabove, and then to store and/or communicate the
extracted signature data for use as research data to be matched
with reference signatures representing known audio to detect the
audio to which the user was exposed. In certain examples, the
research software both decodes ancillary codes in the transduced
audio and extracts signatures therefrom for identifying the audio
to which the user was exposed. In certain examples, the research
software controls the processor 30 to store samples of the
transduced audio, either in compressed or uncompressed form for
subsequent processing either to decode ancillary codes therein or
to extract signatures therefrom. In certain ones of these examples,
the compressed or uncompressed audio is communicated to a remote
processor for decoding and/or signature extraction.
[0087] Where the PUA 20 possesses functionality to download and/or
reproduce presentation data, in certain examples, research data
concerning the usage and/or exposure to such presentation data as
well as audio data received acoustically by microphone 60, is
gathered by PUA 20 in accordance with the technique illustrated by
the functional block diagram of FIG. 1A. Storage 50 of FIG. 1
implements an audio buffer 54 for audio data gathered with the use
of microphone 60. In certain ones of these examples storage 50
implements a buffer 56 for presentation data downloaded and/or
reproduced by PUA 20 to which the user is exposed via speaker
and/or earphone 70 or display 90, or by means of a device coupled
with PUA 20 to receive the data therefrom to present it to a user.
In some of such examples, the reproduced data is obtained from
downloaded data, such as songs, web pages or audio/video data
(e.g., movies, television programs, video clips). In some of such
examples, the reproduced data is provided from a device such as a
broadcast or satellite radio receiver of the PUA 20 (not shown for
purposes of simplicity and clarity). In certain ones of these
examples storage 50 implements a buffer 56 for metadata of
presentation data reproduced by PUA 20 to which the user is exposed
via speaker and/or earphone 70 or display 90, or by means of a
device coupled with PUA 20 to receive the data therefrom to present
it to a user. Such metadata can be, for example, a URL from which
the presentation data was obtained, channel tuning data, program
identification data, an identification of a prerecorded file from
which the data was reproduced, or any data that identifies and/or
characterizes the presentation data, or a source thereof. Where
buffer 56 stores audio data, buffers 54 and 56 store their audio
data (either in the time domain or the frequency domain)
independently of one another. Where buffer 56 stores metadata of
audio data, buffer 54 stores its audio data (either in the time
domain or the frequency domain) and buffer 56 stores its metadata,
each independently of the other.
[0088] Processor 30 separately produces research data 58 from the
contents of each of buffers 54 and 56 which it stores in storage
50. In certain ones of these examples, one or both of buffers 54
and 56 is/are implemented as circular buffers storing a
predetermined amount of audio data representing a most recent time
interval thereof as received by microphone 60 and/or reproduced by
speaker and/or earphone 70, or downloaded by PUA 20 for
reproduction by a different device coupled with PUA 20. Processor
30 extracts signatures and/or decodes ancillary codes in the
buffered audio data to produce research data. Where metadata is
received in buffer 56, in certain examples the metadata is used, in
whole or in part, as research data 58, or processed to produce
research data 58. The research data is thus gathered representing
exposure to and/or usage of audio data by the user where audio data
is received in acoustic form by the PUA 20 and where presentation
data is received in non-acoustic form (for example, as a cellular
telephone communication, as an electrical signal via a cable from a
personal computer or other device, as a broadcast or satellite
signal or otherwise).
[0089] In certain examples, the PUA 20 is provided with a research
data source 96 coupled by a wired or wireless coupling with
processor 30 for use in gathering further or alternative research
data to be communicated to a research organization. In certain ones
of these examples, the research data source 96 comprises a location
data producing device or function providing data indicating a
location of the PUA 20. Various devices appropriate for use as
source 96 include a satellite location signal receiver, a
terrestrial location signal receiver, a wireless networking device
that receives location data from a network, an inertial location
monitoring device and a location data producing service provided by
a PUA service provider. In certain examples, research data source
96 comprises a device or function for monitoring exposure to print
media, for determining whether the user is at home or out of home,
for monitoring exposure to products, exposure to displays (such as
outdoor advertising), presence within or near commercial
establishments, or for gathering research data (such as consumer
attitude, preference or opinion data) through the administration of
a survey to the user of the PUA 20. In certain examples, research
data source 96 comprises one or more devices for receiving, sensing
or detecting data useful in implementing one or more of the
foregoing functions, other research data gathering functions and/or
for producing data ancillary to functions of gathering, storing
and/or communicating research data, such as data indicating whether
the panelist has complied with predetermined rules governing the
activity or an extent of such compliance. Such devices include, but
are not limited to, motion detectors, accelerometers, temperature
detectors, proximity detectors, satellite positioning signal
receivers, RFID readers, RF receivers, wireless networking
transceivers, wireless device coupling transceivers, pressure
detectors, deformation detectors, electric field sensors, magnetic
field sensors, optical sensors, electrodes, and the like.
[0090] FIG. 1B is a block diagram of a system 100 for setting up,
promoting, operating, maintaining and/or terminating research
operations with the use of multiple cellular telephones or other
PUA's having communications capabilities, such as that illustrated
in FIG. 1. For these purposes, the system 100 operates under the
control of a processor 110 to communicate messages to the PUA 20,
and receive communications therefrom, by means of communications
120 coupled with processor 110 and with PUA 20. In certain
examples, some messages are sent and received for conducting tests.
In certain examples, communications 120 is coupled with PUA 20 via
a cellular telephone network. In certain examples, communications
120 is coupled with PUA 20 via the Internet or other network via a
host or device (e.g., a telephone terminal or connection) able to
communicate via such a network coupled with PUA 20, such as a
personal computer, or via a wireless link or cable coupling the PUA
20 with such a network so that the PUA 20 functions as a host or
device communicating on the network.
[0091] Instructions for operating processor 110 as well as research
data received by the system 100 are stored in storage 130 coupled
with processor 110. An input device or devices 140 coupled with
processor 110 enable a user of the system 100 to enter commands
and/or data such as system commands (for example, a system startup
command or a command to enter a system maintenance mode), research
data and/or software updates or other modifications. In certain
examples, some commands are sent for conducting tests. System 100
in certain examples is maintained by a research organization. In
certain examples, system 100 is maintained by another entity acting
for or on behalf such a research organization. The operation of
system 100 in cooperation with PUA 20 to set up, promote, operate,
maintain and/or terminate research operations, is further described
hereinbelow.
[0092] In order to identify PUA users for random sampling to
establish a panel of such users for gathering research data, in
certain examples one or more lists of subscribers are obtained from
PUA service providers and the users are contacted at random to
recruit them to participate on the panel. In certain instances,
publicly available records may be sufficient to identify the users.
Public records include telephone number and address directories,
e-mail directories, and various governmental filings, among other
records. Other public and non-public information, such as warranty
records (e.g., from completed warranty cards), and retail store
records containing purchaser information, may be utilized. In
certain other examples, the identities of the owners and/or users
of the PUA's to be employed are not ascertainable and thus are
obtained from the users themselves. In certain examples,
combinations of the foregoing user identification methods are
used.
[0093] In certain examples, PUA users are recruited through a
communication using a means other than their PUA's, such as by
mail, e-mail, a call to a landline telephone number or by personal
contact, while in certain examples, a widely disseminated
solicitation is used, such as an advertisement or notice in one or
more types of media. In certain examples, PUA users are contacted
by system 100 of FIG. 2 or by other means via their PUA's, such as
PUA 20, by supplying an appropriate communication which causes the
PUA to provide a predetermined audible and/or visual message to the
user providing a request for participation as a panel member. With
reference again to FIG. 1, in certain ones of such examples, the
communication comprises a live, synthesized or recorded voice call
to the PUA 20 either from system 100 or by other means, while in
certain ones of such examples, the communication comprises a visual
message from system 100 to PUA 20 and provided thereby to the user
via display 90. Such a visual message may be an e-mail, a text
message, a web page or the like. In certain ones of such examples,
the PUA 20 is provided to the user with software operative to
control the PUA to communicate the message in audible and/or visual
form to the user, with or without receipt of an activation message
in the PUA to initiate the communication of the audible and/or
visual message to the user. In certain ones of such examples, the
visual display message is operative to control the PUA 20 to
display an interactive control enabling the user to communicate an
acceptance of the request to participate in the panel to the system
100. Such control may be a form, an e-mail address, a telephone
number or the like and in certain examples, requests demographic
information of the user and/or provides instructions for
participating in a research operation by means of the user's
cellular telephone.
[0094] In certain examples, multiple messages are communicated to
users to recruit them. In certain ones of such examples, a first
recruitment message is communicated containing data to indicate to
the user that participants are being recruited and requesting the
user to consider participating. Subsequently, a second recruitment
message is communicated to the user containing data directly
requesting the user's participation. In some implementations the
first message is communicated by system 100 as an automatically
generated message, while in others it is a widely disseminated
message. In some implementations the first message contains data
indicating that a benefit will be provided to the user for such
participation or agreement to participate, as an incentive for the
user to agree to participate. This gives the user an opportunity to
consider the desirability of receiving the benefit before receiving
the second message soliciting his/her participation, and thus
serves as a pre-recruitment tool.
[0095] In order to encourage participation in such research
operation, in certain examples the recruitment message provides or
offers to provide a benefit to the user in exchange for the user's
participation or agreement or willingness to participate in a
research operation. In certain ones of such examples, the benefit
is provided in response to a message from the user, via the PUA 20,
indicating a willingness or agreement to participate in the
research operation, and in certain cases a message is communicated
by system 100 to PUA 20 indicating that the benefit is being
provided, such as a cash benefit, a credit or a service, and a
corresponding instruction for provision of the service is
communicated by system 100 to an appropriate benefit provider. In
certain ones of such examples, the offered benefit comprises a
service provided by means of the PUA, such as voice, text message
and/or e-mail communication services, other Internet services
and/or access to certain applications (e.g., games or personal
information management software), content or media data (such as
ring tones, images, audio/video data, or songs). In certain ones of
such examples, the offered benefit comprises cash or a credit, or a
service provided apart from the use of the PUA. In certain ones of
such examples, an offer is made to provide a PUA comprising a
research data gathering system and/or a service provided by means
of a PUA for a person's use conditioned on the person's
participation in the research operation. Activation of the PUA to
provide services to the user can be conditioned on such
participation. In certain ones of such examples, the recruitment
message is communicated to the PUA with an offer to provide a
service with the use of the PUA or to activate such a service, such
as voice or other data communication services or access to content
such as audio or video content. The provision of the service is
initiated or the service is activated in certain ones of such
examples by communicating a benefit provision message to at least
one of the cellular telephone and a service provider.
[0096] In certain examples, the PUA 20 as provided to the user
stores software enabling it to gather, store and/or communicate
research data, such as codes and/or signatures indicating exposure
to audio media. In certain ones of such examples, the software is
inoperative to carry out at least one of such gathering, storing or
communicating functions until activated, by an action of the user
(such as a command to the PUA entered by the user input 80 of the
microphone 60, or data entered by the user indicating agreement to
participate in the research operation) and/or by means of a
communication received by the PUA from system 100. In certain ones
of such examples, the software is enabled when the PUA is provided
to the user.
[0097] In certain examples, the PUA 20 as provided to the user,
while capable of gathering, storing and/or communicating research
data when appropriate software runs on its processor 30, lacks some
or all of such appropriate software. In certain ones of such
examples, the PUA 20 is enabled to gather, store and/or communicate
research data by downloading the required software from system 100.
In certain ones of such examples, in response to a message
expressing agreement to participate in a research data gathering,
storage and/or communication activity or a different message from
which such agreement can be inferred (such as a download request),
the PUA 20 downloads the required software from system 100, as well
as media data or other content (such as ring tones, images,
audio/video data, or songs), games and/or other user software,
provided as an incentive for such participation. The content and/or
software can be sent from system 100 or from a different source. In
certain ones of such examples, the user installs the software in
the PUA 20 from external storage, such as a personal computer or
external storage device, using a wireless communications link, a
cable or an interface.
[0098] Various ways of responding to the recruitment message are
provided in a variety of examples. In certain examples, the user
responds to a recruitment message by communicating a message to
system 100 or other destination in response via the PUA 20, either
in the form of a voice call, a form containing the message, an
e-mail, text message or the like, indicating a willingness or
agreement to participate in the proposed research operation using
the PUA. In certain examples, the responsive message is
communicated by a different means, such as by a voice call using a
different telephone, by mail, e-mail, a form provided by a web
page, an in-person communication or the like. However the
responsive message is communicated, in certain examples it includes
demographic data and/or data that conveys other personal or
household attributes to be stored in system 100. In certain
examples, such data is communicated by a different message. In
certain examples, a message is communicated from the PUA 20 in
response to the recruitment message from which the user's
willingness to participate can be inferred, such as a message to
system 100 that conveys research data gathered by the PUA 20 where
it is necessary for the user to activate its capability to gather,
store and/or communicate research data or a message to system 100
requesting a download of software or other data required to
provide, activate or enable the cellular telephone's capabilities
to gather, store and/or communicate research data.
[0099] Where the user responds to a widely disseminated
solicitation, such as an advertisement, a notice, a documentary
solicitation provided with the PUA or the like, the responsive
message can be communicated as described hereinabove. In certain
examples, a response to a widely disseminated solicitation takes a
different form or includes different content, such as a request
communicated to system 100 for download of software or other data
required to initiate, install or activate the operation of the PUA
to automatically gather, store and/or communicate research data,
and/or a communication of research data from the PUA to system 100
from which the user's willingness to participate can be
inferred
[0100] In certain examples, the PUA activates, installs and/or
enables functionality to gather, store and/or communicate research
data in response to or conditioned upon, the user's affirmative
response to the recruitment message. In certain ones of such
examples, an action of the user to produce, enter or communicate
such an affirmative response using the PUA 20 activates such
functionality implemented by software running on processor 30. In
certain ones of such examples, such action of the user causes PUA
20 to request a download of software and/or data for installing,
activating or enabling such functionality. In certain ones of such
examples, such action of the user causes PUA 20 to install software
provided with the recruitment message to implement such
functionality, or else to make use of other data in or accompanying
the recruitment message to implement such functionality.
[0101] Where the user responds to a widely disseminated
solicitation, such as an advertisement, a notice, a documentary
solicitation provided with the PUA or the like, the responsive
message can be communicated as described hereinabove. In certain
examples, a response to a widely disseminated solicitation takes a
different form or includes different content, such as a request
communicated to system 100 for download of software or other data
required to initiate, install or activate the operation of the PUA
to automatically gather, store and/or communicate research data,
and/or a communication of research data from the PUA to system 100
from which the user's willingness to participate can be
inferred.
[0102] Data indicating the recruitment of the user and indicating
an identity of the PUA to be used in the research operation to
gather, store and/or communicate research data by means of the PUA
is stored in storage 130 of system 100 based on the responsive
message. Research data gathered by means of such PUA is stored in
association with data identifying the PUA.
[0103] It is desired to successfully recruit a substantial
proportion of the users contacted. Where no response to a
recruitment message is received or a response is received but
indicates an unwillingness to participate, in certain examples
negative data indicating a failure to recruit the user to
participate in the research operation is stored in system 100 and
subsequently a further recruitment message is communicated to the
user to solicit participation in the research operation. The reason
for failing to successfully recruit the user can be time-dependent.
For example, the user might not have the PUA turned on during a
time of day when the recruitment message is communicated, or the
user might not be receptive to such a message at the time of day
that the message is first sent. In certain ones of such examples,
system 100 stores the time when the unsuccessful message was
communicated and the further recruitment message is communicated
under the control of system 100 at a time differing from the time
at which the previous message was communicated. In certain ones of
such examples, a content of a negative response from the user is
employed as a basis for communicating the further recruitment
message.
[0104] In certain examples, the recruitment message includes survey
questions requesting the user to provide demographic or other data
concerning the user or the user's household. Where fewer than all
of the survey questions are answered, in certain examples, a
further message is communicated to the user including a survey
having fewer questions than the previous, uncompleted survey. In
certain ones of such examples, the number of survey questions of
the first message that were answered is used by system 100 to
determine the number of questions included in the subsequent
message. For example, if the user only answered three of eight
questions contained in the first message, the subsequent message
might include three or fewer questions to improve the likelihood
that all will be answered by the user in a responsive message.
[0105] In certain examples, a response to the recruitment message
is communicated by the PUA with or without any action by the user.
In certain ones of such examples, the response comprises a message
from the PUA indicating an operational status or ability thereof to
gather, store and/or communicate research data and/or a message
from the PUA indicating receipt of the recruitment message.
[0106] Where it is necessary to activate a capability of the PUA to
automatically carry out a research operation, in response to the
message from the user indicating a willingness to participate, in
certain examples an activation message is communicated by system
100 to the PUA with a command or request to effect such activation.
In certain examples, the activation message includes activation
data to activate such capability, with or without an accompanying
activation command. In certain ones of such examples, the
activation data comprises a telephone number, a network address
(such as an IP address, domain name, MAC address, or the like), a
communication protocol or other data useful for communicating the
research data gathered by means of the PUA. In certain ones of such
examples, the activation data comprises software for running on the
processor 30 of the PUA 20 to control, carry out and/or enable a
research operation thereby. In certain examples, the activation
message is communicated to the user, via PUA 20 or otherwise, by
system 100 or by other means, and requests an action thereof to
activate, enable and/or install a capability of the PUA to carry
out a research operation and/or provides instructions for
participating in a research operation automatically by means of the
PUA 20.
[0107] In response to the message from the user indicating a
willingness to participate, in certain examples a message is
communicated by system 100 or by other means (for example, a live,
synthesized or stored voice call, or in documentary form) to the
user via the PUA or by other means providing instructions for
participating in the research operation to gather, store and/or
communicate research data automatically by means of the PUA. Where
the user is offered an incentive to participate, such as cash,
credit or a service, in certain examples, a message is communicated
by system 100 in response to the message from the user to a
provider of such incentive, such as a service provider, retailer or
financial institution to instruct that the incentive be provided.
In certain examples where the benefit comprises a service provided
by means of the PUA, in response to the message from the user
indicating a willingness to participate, system 100 communicates a
message to the user and/or to the PUA enabling the PUA to provide
the service or enabling the user to make use of the PUA to obtain
the service. In certain ones of such examples, the service
comprises a provision of media data or of content that is not
widely available and a message is communicated by the system 100 or
by a different source for such content in response to a message
from system 100, to the PUA and/or the user comprising such media
data or content and/or data enabling the user to access the media
data or content by means of the PUA or otherwise.
[0108] In certain examples, an activation message is communicated
to the PUA 20 by system 100 without regard to prior receipt of a
participation message from the PUA or its user. In certain ones of
such examples, the activation message comprises a request to the
PUA 20 for data indicating an operational status thereof to gather,
store and/or communicate research data and/or system data for the
PUA, such as an identification thereof and/or data concerning its
operating system that enables selection of appropriate software to
run on the processor 30 thereof, and in response the PUA
communicates the requested data to the system 100. A response to
this message in certain ones of these examples can be used to build
a database of potential panelists from whom such panelists may be
recruited at random. It can also be employed as a means of
determining one or more appropriate times to contact the user with
a recruitment message. In certain ones of such examples, the
activation message communicated by system 100 comprises a request
to the PUA 20 or its user for research data gathered automatically
by the PUA. This is useful where, for example, the user has
previously entered data in the PUA indicating a willingness to
participate in such a research operation, but where such data has
not been communicated from the PUA. In certain ones of such
examples, the activation message from system 100 comprises a
request to the PUA for a response comprising a receipt for the
activation message. A request of this kind can be used to determine
that the PUA is operational. This is useful, for example, to build
a database of potential panelists to be contacted subsequently or
where no further data concerning the PUA or its user is required.
In certain ones of such examples, the activation message comprises
a message communicated from system 100 to PUA 20 comprising
activation request data for the PUA 20 requesting activation of a
capability thereof to gather, store and/or communicate research
data to system 100 or elsewhere, or else requesting an action of
the user to activate such capability. In certain ones of such
examples, the PUA 20 responds (with or without any prior action by
the user to effect such activation) by communicating one or more
messages to system 100 comprising research data gathered
automatically by the PUA 20, indicating an operational status or
ability thereof to gather, store and/or communicate research data,
indicating receipt by PUA 20 of the activation message and/or data
from the user indicating a willingness or agreement to participate
in the research operation.
[0109] With or without any prior communications between the system
100 and the PUA 20, the activation message in certain examples
comprises instructions for participating in a research operation by
means of the PUA 20. In certain ones of such examples, the PUA
responds (with or without a prior action by the user that enables
such response) by communicating a message to system 100 comprising
at least one of research data gathered automatically by the PUA 20,
a message from the PUA 20 indicating an operational status or
ability thereof to gather, store and/or communicate research data,
a message from the user of the PUA 20 concerning participation of
the user in a research operation by means of the PUA, a message
from the user of the PUA identifying such user and/or the PUA, and
a message from the PUA indicating receipt thereby of the message
from system 100. In some cases the message from PUA 20 to system
100 comprises data indicating a willingness or agreement of the
user to participate in the research operation, which can be in the
form of visual display data.
[0110] At the time of initiating the user's participation as a
member of a panel, and/or from time to time, in certain examples a
maintenance message is communicated by system 100 to the PUA 20
and/or a research data gathering system coupled therewith (as
described herein below) for one or more purposes. In certain ones
of such examples, a message is communicated by system 100 to the
PUA 20 and/or the research data gathering system for testing its
ability to gather, store and/or communicate research data as
presently configured or as it may be configured using software
and/or hardware to interact with the PUA's or the research data
gathering system's pre-existing software and/or hardware. In
certain examples, the message is communicated by a third party,
such as a cellular telephone service provider. Such message
comprises a test command to control a test operation of the PUA
and/or the research data gathering system, test data for use in
conducting such a test operation, such as by processing the test
data in the processor 30, and/or test software to run on processor
30 or a processor of the research data gathering system to control
it to carry out a test operation, and which in some cases is stored
in storage 50 for subsequent use. That is, the test data thus
provided to the PUA and/or the research data gathering system
serves to establish, enable or provide a capability thereof to test
its ability to carry out a research operation. Accordingly, in
certain examples, test software and/or test data is stored in the
PUA 20 and/or the research data gathering system when it is
acquired by the user, or stored therein at a subsequent time, such
as a part of software downloaded to or otherwise stored in PUA 20,
with or without an action of the user. In certain ones of such
examples, the PUA 20 communicates a message to system 100 in
response indicating receipt of the maintenance message. Data
providing results of the test operation is communicated from the
PUA 20 to system 100, in certain ones of such examples, directly
from PUA 20 and/or from a third party service provider.
[0111] In certain examples, such a test is conducted in response to
a predetermined event, such as the occurrence of an operational
condition of the PUA and/or the research data gathering system
indicating a desirability of testing its operational capabilities,
or the occurrence of a predetermined time. In certain examples,
such a test is conducted in response to receipt of a recruitment
message, communication of a response to the recruitment message or
a message requesting that a test be carried out, or at the time of
installation, activation or enablement of functionality in PUA 20
to gather, store and/or communicate research data. In certain
examples, such a test is carried out when the production of data
indicates faulty operation or inoperative state. In certain
examples, the test results are communicated to a processing
facility.
[0112] In certain examples, the operation of a clock of the PUA 20
(not shown for purposes of simplicity and clarity) is tested to
determine an offset in its clock rate from a standard. In certain
ones of such examples, where the PUA implements a research data
gathering operation with the use of a function for converting
time-domain data (such as time-domain audio data) to
frequency-domain data, the maintenance message from system 100
comprises time-domain test data having a predetermined frequency
content, such as audio data having a single frequency component.
The output of the function is data indicating a single frequency
and any deviation of that single frequency from the predetermined
frequency of the audio data will reveal any offset of the PUA's
clock from the standard. The test results can be used either by
system 100 or by PUA 20 to compensate for any such offset or else
to disqualify the PUA for use in the research operation.
[0113] In certain examples, a maintenance message is communicated
to the PUA 20 by system 100 requesting a response therefrom
identifying the user. This is useful to confirm that the PUA is
being used by the panelist/user or by another, such as another
member of the panelist's household. In certain ones of such
examples, the requested response comprises a voice message
including identifying data, such as a screen name or other alias of
the user that is known to system 100. In certain ones of such
examples, the requested response is a voice signature gathered by
software running on processor 30 or extracted from a responsive
voice message from PUA 20 by processor 110 of system 100. In
certain examples, the requested response comprises a text message,
an e-mail or a response conveyed by means of a form.
[0114] In certain ones of such examples, the response is requested
from the user by means of an audible or visual user identification
request message and requires an action of the user before it is
communicated. In certain ones of such examples, the requested
response is communicated by the PUA 20 automatically in response to
a user identification request message and without the need for the
user's participation. In some of such examples, the processor 30
runs software that automatically extracts a voiceprint for a
current user of the PUA which is sent as the responsive message. In
some of such examples, the user is asked or required to enter user
identification data in the PUA 20 when turning on the cellular
telephone, and/or from time to time, and the user identification
data is stored by storage 50 pending receipt of a user
identification request message. The PUA 20 responds to the user
identification request message from system 100 by communicating the
user identification data to system 100. In certain examples, PUA 20
stores current user identification data and communicates it to
system 100 without the need for any message from system 100
requesting such identification data. Such communications are made
in response to the occurrence of a condition, such as storage of
current user identification data in storage 50, passage of time,
occurrence of a predetermined time, application of power to the
PUA, detection of movement of the PUA or use of the PUA.
[0115] In certain examples, data identifying the PUA 20 and the
user is communicated from the PUA 20 or otherwise by the user and
is stored by system 100 in storage 130 prior to communicating the
maintenance message to enable a determination that the user of the
PUA is the panelist. When the response to the maintenance message
is communicated by the PUA 20 and received by system 100, it is
compared with the previously stored data to determine the user's
identity.
[0116] In certain examples, a maintenance message is communicated
by system 100 to the PUA 20 requesting demographic or other
user-specific data or household data. This is useful to update such
information from time to time, or to follow up an initial request
for such information that did not prompt a complete response. In
certain ones of such examples, then, a prior message is
communicated from the PUA or otherwise from the user to system 100
to convey demographic or other user-specific data or household data
to be stored in storage 130.
[0117] In certain examples, the maintenance message communicated by
system 100 comprises a request for system data concerning the PUA
20. Such data is useful, for example, to determine whether research
data software running in the PUA needs to be updated and, if so,
which updates to provide. It is useful also to determine whether
the functions and/or capabilities of the PUA 20 have changed, such
as by installation of software from a third party, or whether the
PUA 20 has been replaced by the user. In certain ones of such
examples, the system data is requested from the user, while in
others the system data is requested directly from the PUA 20 by
system 100 without the need to involve the user.
[0118] In certain examples, the maintenance message comprises a
command or request communicated by system 100 for the PUA to carry
out a research operation. This is useful where, for example, it is
desired to modify the type, quality or extent of the research data
gathered or stored by means of the PUA, or else to reactivate a
data gathering, storage and/or communication function of the PUA
that had previously been disabled or otherwise been made
unavailable (for example, where a modification of its software
disabled such function or the PUA had been replaced with a new
PUA). It is also useful for managing communications of research
data from the PUA, so that they occur at times or under conditions
determined by system 100, or else to provide an address for
communicating such data. In certain ones of such examples, the PUA
responds to the maintenance message by communicating research data
to system 100 and/or by communicating an acknowledgement to system
100 that it has received the maintenance message and/or carried out
a requested operation. In certain ones of such examples, the system
100 stores data identifying the PUA 20 and its user/panelist before
communicating the maintenance message. In certain ones of such
examples, the PUA responds to the maintenance message by
communicating a message to system 100 indicating an ability and/or
availability thereof to carry out a research operation.
[0119] When a user's participation in the panel is terminated, in
certain examples a termination message is communicated by system
100 to the user's PUA for one or more purposes. In certain
examples, the PUA 20 responds by communicating a message to system
100 indicating that it has received the termination message. In
certain ones of such examples, the termination message comprises a
deactivation message to the PUA 20 to deactivate a research
operation or an ability to carry it out, either automatically
without any action of the user, or else instructing the user to
deactivate such function. Of these examples, in certain ones the
termination message also comprises data for producing a message to
the user, conveyed either visually or audibly, notifying the user
than such research operation has been deactivated. Of these
examples, if the research operation is deactivated, in certain ones
the PUA 20 subsequently communicates a responsive message to the
system 100 to indicate that the research operation has been
deactivated. Of these examples, in certain cases, the deactivation
message deactivates one data gathering, storage and/or
communication function, but permits another to continue in
operation while providing a control to the user enabling the user
to deactivate the function that continues in operation, and in
certain ones of these examples, the provision of the control is
conditioned on deactivation of the one function by the user and/or
receipt of the deactivation message in the PUA. Where the
termination message comprises a deactivation message directed to
the user, and the user is promised a credit or other benefit as an
incentive, in certain cases the provision of the credit or other
benefit is conditioned on deactivation of the one function by the
user.
[0120] In response to such a deactivation message, in certain
examples the PUA 20 communicates a message to system 100 reporting
that the function has been deactivated and/or a message
acknowledging receipt of the deactivation message. In response to
such a deactivation message, in certain examples, the user inputs a
deactivation command in the PUA 20 instructing it to deactivate a
capability thereof to gather, store and/or communicate research
data.
[0121] In certain examples where the user is promised a credit or
other benefit for participation as an incentive, the termination
message comprises a message communicated by system 100 to a third
party credit facility or other benefit provider instructing that a
final benefit be provided to the user. In certain ones of these
examples, a corresponding notice is communicated by system 100 to
the user, via the PUA 20 or otherwise.
[0122] FIG. 2 illustrates PUA 20 coupled by its communications 40
with communications 210 of a research system 200 comprising a
microphone 220, a processor 230 coupled with microphone 220 and
with communications 210 by a wired or wireless link. Research
system 200 in certain examples comprises storage 240 coupled with
processor 230. In certain examples, communications 40 is operative
to communicate data to a research data processing facility. In
certain examples, communications 40 is further operative to
communicate data with the research system 200. Such communications
between the PUA 20 and research system 200 may be triggered by, for
example, either (1) the elapse of a predetermined interval of time,
(2) production of a communications request or query by either the
PUA 20 or the research system 200, (3) the storage of a
predetermined amount of data by either PUA 20 and/or research
system 200, (4) proximity of PUA 20 and the research system 200, or
(5) any combination of (1)-(4). In certain examples, communications
40 of PUA 20 comprises a transceiver configured to communicate
using a Bluetooth protocol, ZigBee.TM. protocol, wireless LAN
protocol, or via an infrared data link, inductive link or the like,
for enabling communications with the research system 200 as well as
with a network, network host or other device to communicate data to
a research data processing facility. In certain examples,
communications 40 of PUA 20 comprises a first transceiver
configured to communicate with research system 200 and a second
transceiver (such as a cellular telephone transceiver) configured
to communicate with the research data processing facility.
[0123] In certain examples research system 200 is housed separately
from PUA 20 and is physically separated therefrom, but both are
carried on the person of a panelist. In certain examples, research
system 200 is housed separately from PUA 20 but is either (1)
affixed to an exterior surface thereof, (2) carried by or in a
common container or carriage device with PUA 20, (3) carried by or
in a cover of PUA 20 (such as a decorative "skin"), or (4) arranged
to contain PUA 20. In certain examples, PUA 20 and research system
200 are contained by a common housing.
[0124] In certain ones of such examples, processor 230 of research
system 200 serves to read ancillary codes and/or extract signatures
from audio data transduced by the microphone 220. Certain ones of
these examples communicate the ancillary codes that have been read
and/or the signatures that have been extracted to the PUA 20 by
communications 210 for storage and/or communication from the
PUA.
[0125] In certain ones of these examples, storage 240 serves to
store the ancillary codes and/or signatures for subsequent
communication to the PUA 20.
[0126] In certain ones of such examples, research system 200 serves
to store audio data transduced by the microphone 220 in storage
240, and subsequently communicates the audio data to PUA 20 via
communications 210. PUA 20 processes the audio data as described
hereinabove to produce research data therefrom.
[0127] In certain ones of such examples, research system 200
receives audio data from PUA 20 via communications 210 and
processor 230 serves to produce research data from the audio data
which either is stored in storage 240 and subsequently communicated
to PUA 20 by communications 210 or communicated thereby without
prior storage in research system 200.
[0128] In certain ones of such examples, processor 230 of research
system 200 receives presentation data and/or metadata of the
presentation data from PUA 20 via communications 210 and processes
the presentation data and/or metadata to produce research data
therefrom. Such presentation data and metadata is received by PUA
20 in a form other than acoustic data such as electrical or
electromagnetic data. Research system 200 either stores such
research data in storage 240 and subsequently communicates it to
PUA 20 by communications 210, or communicates the research data to
PUA 20 by communications 210 without prior storage in research
system 200.
[0129] In certain examples of research system 200, processor 230
adds a time and/or date stamp to research data, media data,
presentation data or metadata of one of the foregoing received,
produced, stored or communicated thereby.
[0130] In certain ones of such examples, research system 200
receives audio data, presentation data and/or metadata of one of
the foregoing from PUA 20 via communications 210 and stores the
received data in storage 240. Subsequently, system 200 reads the
stored data from storage 240 and communicates it to PUA 20 which
either processes it to produce research data therefrom or
communicates it to a processing facility for producing research
data. Communication of the research data from the PUA 20 affords a
number of advantages. At least a first advantage includes being
able to provide a user a research system of smaller size and lower
weight since (1) it need not itself comprise hardware enabling
communication of the research data to the processing facility, (2)
a smaller power source, commonly a battery, thus decreasing the
size and weight of the research system may be used for operation
thereof, and (3) less data storage capacity is necessary in the
research system given the opportunity for frequent communication of
research data between the PUA 20 and the research system 200. At
least a second advantage includes an opportunity for increased
frequency of reporting of the research data to the research data
processing facility since the PUA 20 is readily available for the
communication thereof.
[0131] In certain ones of the foregoing examples, PUA 20 gathers
media data research data from media data received thereby in
non-acoustic form and/or metadata of such media data. PUA 20 either
stores such media data research data and later communicates it to a
research organization via communications 40, or communicates it
without first storing it. In certain ones of such examples, PUA 20
receives audio data research data from system 200 produced thereby
from audio data, and communicates the audio data research data to a
research organization via communications 40. In certain ones of
such examples, PUA 20 combines the audio data research data and the
media data research data for communication to a research
organization via communications 40.
[0132] FIG. 2A illustrates a research data monitor 72 affixed to an
outer surface 21 of a PUA 20A, wherein the monitor 72 is operative
in certain examples to gather research data and communicate it to
PUA 20A which in turn communicates the research data to the system
100 of FIG. 1B. PUA 20A is illustrated in the block diagram of FIG.
2B. In certain examples, monitor 72 implements one or more of the
research operations described above in connection with FIG. 2. As
shown in FIG. 2B, PUA 20A comprises the same elements as PUA 20 of
FIG. 1, except that research data source 96 is omitted from the
example of FIG. 2B.
[0133] Research data monitor 72 is illustrated in the block diagram
of FIG. 2C. The research data monitor 72 comprises a processor 74
that is operative to exercise overall control of the monitor 72 and
to process data for transmission or reception and communications 82
coupled to the processor 74 and operative under the control of
processor 74 to perform those functions required for conducting
communications with PUA 20A. In certain examples, processor 74
comprises two or more processing devices, such as a first
processing device (such as a digital signal processor) that
processes research data, such as audio data, and a second
processing device that exercises overall control over operation of
the monitor 72. In certain examples, processor 74 employs a single
processing device. In certain examples, some or all of the
functions of processor 74 are implemented by software, while in
other examples, the functions of processor 74 are implemented in
hardwired circuitry without the use of software.
[0134] In certain examples, communications 82 establishes and
maintains a wireless communication link with communications 40 of
PUA 20A, using a Bluetooth.TM. protocol, a ZigBee.TM. protocol, an
inductive link, a capacitive link, an RF link, infrared link, or
otherwise. In certain examples, communications 82 communicates with
communications 40 using a wired link, such as a USB interface, a
Firewire.RTM. interface, a connection to a plug or jack of the PUA
20A or an internal connection to PUA 20A.
[0135] Research data monitor 72 further comprises a research data
source 76 coupled with processor 74. In certain examples, research
data monitor 72 comprises a microphone that serves to transduce
acoustic energy for processing by processor 74 to produce research
data. In certain examples, research data source 76 comprises a
keypad that enables the user to input data, such as channel or
station data, user identification data or another kind of research
data. In certain examples, monitor 72 comprises an RF receiver
and/or infrared radiation detector. In certain examples, monitor 72
comprises a location data producing device or function providing
data indicating a location of the monitor 72. Various devices
appropriate for use as research data source 76 include a satellite
location signal receiver, a terrestrial location signal receiver, a
wireless networking device that receives location data from a
network, an inertial location monitoring device and a location data
producing service provided by a PUA service provider. In certain
examples, monitor 76 comprises a device or function for monitoring
exposure to print media, for determining whether the user is at
home or out of home, for monitoring exposure to products, exposure
to displays (such as outdoor advertising), presence within or near
commercial establishments, or for gathering research data (such as
consumer attitude, preference or opinion data) through the
administration of a survey to the user of the PUA 20A. In certain
examples, monitor 76 comprises one or more devices for receiving,
sensing or detecting data useful in implementing one or more of the
foregoing functions, other research data gathering functions and/or
for producing data ancillary to functions of gathering, storing
and/or communicating research data, such as data indicating whether
the panelist has complied with predetermined rules governing the
activity or an extent of such compliance. Such devices include, but
are not limited to, motion detectors, accelerometers, temperature
detectors, proximity detectors, satellite positioning signal
receivers, RFID readers, RF receivers, wireless networking
transceivers, wireless device coupling transceivers, pressure
detectors, deformation detectors, electric field sensors, magnetic
field sensors, optical sensors, electrodes, and the like.
[0136] Monitor 72 further comprises storage 78 coupled with
processor 74 and operative to store data as needed. In certain
examples, storage 78 comprises a single storage device, while in
others it comprises multiple storage devices. In certain examples,
a single device implements certain functions of both processor 74
and storage 78.
[0137] FIG. 2D illustrates an example of research data monitor 72
fabricated on a substrate 83, such as a printed circuit board or a
flexible substrate comprising paper, plastic or the like, on which
certain elements of monitor 72 are printed on substrate 83. Power
source 86 comprises a battery (either rechargeable or
non-rechargeable) or a charge storage device such as a capacitor,
printed on substrate 83. In the example of FIG. 2D, communications
82 comprises an RF transceiver, such as a Bluetooth.TM.
transceiver, a ZigBee.TM. transceiver or other RF transceiver. An
antenna 92 is printed on substrate 83 and coupled with
communications 82. It will be appreciated that monitor 72 can be
fabricated to have a very thin profile and very low weight, so that
it may be affixed to the enclosure of a cellular telephone, a PDA
or other PUA that is carried on the person of a participant,
without adding substantially to its size or weight. In certain
examples, the monitor 72 is carried by a cover for the PUA (such as
a decorative "skin"). In certain examples, monitor 72 is housed in
or carried by a device separate from the PUA and adapted to be
carried with the person of a panelist who carries the PUA.
[0138] FIG. 2E is a block diagram of a PUA comprising a personal
communication device adapted to be carried on the person of a
participant (such as a PDA, Blackberry.RTM. device, pager, notebook
computer, walkie talkie, or the like) having a processor 94, and
communications 95, user data source 96 and storage 97 coupled with
processor 94. A research data gathering device 72, adapted to be
carried on the person of a participant, is operative to gather
research data and communicate the same wirelessly to communications
95 of the personal communication device for subsequent
communication by the personal communication device to a research
data processing facility. In certain examples, the research data
gathering device 72 is separate from the personal communication
device, so that it is carried by the participant separately
therefrom. In certain ones of such examples, the device 72 is
contained in a PUA such as an article of jewelry, an article of
clothing, a fob, a wristwatch or other PUA. In certain ones of such
examples, the device 72 is contained in its own enclosure and is
carried on a lanyard to be worn about the participant's neck or
provided with a pin, clasp or belt clip for attachment to an
article of the participant's clothing.
[0139] FIG. 3 is a block diagram of a personal digital assistant
(PDA) 300 modified to gather research data. The PDA comprises a
processor 310 that is operative to exercise overall control and to
process data for, among other purposes, transmission or reception
by the PDA and communications 320 coupled to the processor 310 and
operative under the control of processor 310 to perform those
functions required for establishing and maintaining two-way
communications over a network (not shown for purposes of simplicity
and clarity).
[0140] In certain examples, processor 310 comprises two or more
processing devices, such as a first processing device that
exercises overall control over operation of the PDA 300 and a
second processing device that performs certain more specific
operations such as digital signal processing. In certain examples,
processor 310 employs a single processing device. In certain
examples, some or all of the functions of processor 310 are
implemented by hardwired circuitry.
[0141] PDA 300 further comprises storage 330 coupled with processor
310 and operative to store software that runs on processor 310, as
well as temporary data as needed. In certain examples, storage 330
comprises a single storage device, while in others it comprises
multiple storage devices. In certain examples, a single device
implements certain functions of both processor 310 and storage
330.
[0142] PDA 300 also includes a user input 340 coupled with
processor 310, such as a keypad, to enter commands and data, as
well as a display 350 coupled with processor 310 to provide data
visually to the user under the control of processor 310.
[0143] In certain examples, the PDA 300 provides additional
functions and/or comprises additional elements. In certain
examples, PDA 300 provides cellular telephone functionality, and
comprises a microphone 370, as well as an ability of communications
320 to communicate wirelessly with a cell of a cellular telephone
network, to enable its operation as a cellular telephone. Where PDA
300 possesses cellular telephone functionality, in certain examples
PDA 300 is employed to gather, store and/or communicate research
data, such as by storing appropriate research software in storage
330 to run on processor 310 and communicating with system 100 to
set up, promote, operate, maintain and/or terminate a research
operation using PDA 300.
[0144] In certain examples, communications 320 of PDA 300 provides
wireless communications via Bluetooth protocol, ZigBee.TM.
protocol, wireless LAN protocol, infrared data link, inductive link
or the like, to a network, network host or other device, and/or
through a cable to such a network, network host or other device. In
such examples, PDA 300 is employed to gather, store and/or
communicate research data, such as by storing appropriate research
software in storage 330 to run on processor 310 and communicating
with system 100 (either through a wireless link or through a
connection, such as a cable) to set up, promote, operate, maintain
and/or terminate a research operation using PDA 300.
[0145] In certain examples, the PDA is provided with a research
data source 360 coupled by a wired or wireless coupling with
processor 310 for use in gathering further or alternative research
data to be communicated to a research organization. In certain ones
of these examples, the research data source 360 comprises a
location data producing device or function providing data
indicating a location of the PDA 300. Various devices appropriate
for use as source 360 include a satellite location signal receiver,
a terrestrial location signal receiver, a wireless networking
device that receives location data from a network, an inertial
location monitoring device and a location data producing service
provided by a cellular telephone service provider. In certain ones
of these examples, research data source 360 comprises a device or
function for monitoring exposure to print media, for determining
whether the user is at home or out of home, for monitoring exposure
to products, exposure to displays (such as outdoor advertising),
presence within or near commercial establishments, or for gathering
research data (such as consumer attitude, preference or opinion
data) through the administration of a survey to the user of the PDA
300. In certain ones of these examples, research data source 360
comprises one or more devices for receiving, sensing or detecting
data useful in implementing one or more of the foregoing functions,
other research data gathering functions and/or for producing data
ancillary to functions of gathering, storing and/or communicating
research data, such as data indicating whether the panelist has
complied with predetermined rules governing the activity or an
extent of such compliance. Such devices include, but are not
limited to, motion detectors, accelerometers, temperature
detectors, proximity detectors, satellite positioning signal
receivers, RFID readers, RF receivers, wireless networking
transceivers, wireless device coupling transceivers, pressure
detectors, deformation detectors, electric field sensors, magnetic
field sensors, optical sensors, electrodes, and the like.
[0146] In addition, PDA 300 comprises a microphone 370 coupled with
processor 310 to transduce the user's voice to an electrical signal
which it supplies to processor 310 for encoding, and a speaker
and/or earphone 380 coupled with processor 310 to transduce
received audio from processor 310 to an acoustic output to be heard
by the user. PDA 300 also includes a user input 340 coupled with
processor 310, such as a keypad, to enter telephone numbers and
other control data, as well as a display 350 coupled with processor
310 to provide data visually to the user under the control of
processor 310.
[0147] In addition, PDA 300 comprises a personal communication
device adapted to be carried on the person of a participant having
a processor 310, and communications 320, and storage 330 coupled
with processor 310. A research data source 360, adapted to be
carried on the person of a participant, is operative to gather
research data and communicate the same wirelessly to communications
320 of the personal communication device for subsequent
communication by the personal communication device to a research
data processing facility. In certain examples, research data source
360 comprises a microphone for receiving ambient acoustic energy
and producing a corresponding electrical signal that is processed
either by research data source 360 to read ancillary codes therein
or extract signatures therefrom, or is instead processed for doing
so by processor 310. In certain examples, the research data source
360 is separate from the personal communication device, so that it
is carried by the participant separately therefrom. In certain ones
of such examples, the research data source 360 is contained in a
PUA such as an article of jewelry, an article of clothing, a fob, a
wristwatch or other PUA. In certain ones of such examples, the
research data source 360 is contained in its own enclosure and is
carried on a lanyard to be worn about the participant's neck or
provided with a pin, clasp or belt clip for attachment to an
article of the participant's clothing.
[0148] FIG. 4 is a block diagram of an external storage device 400,
such as a portable storage drive, modified to gather research data.
A storage 430, such as a flash memory, serves to store data for use
by the user as well as research data. Access to storage 430 is
controlled by a processor 410. In certain examples, storage 430 is
partitioned into a portion used to store user data and a further
portion used to store research data (as well as research software,
if necessary, to run on processor 410). In certain examples,
processor 410 dynamically partitions storage 430 into sections as
needed so that each stores either user data or research data
(and/or research software). Storage device 400 also comprises
communications 420 coupled with processor 410 to receive data to be
written in storage 430 and to communicate data read from storage
430. Communications 420 in certain examples communicates data by
means of a connection, such as a USB interface, while in others
communicates its data wirelessly, for example, by means of a
Bluetooth protocol, wireless LAN protocol, infrared data link,
inductive link or the like.
[0149] Storage device 400 also comprises a research data source 440
that provides research data to be stored in storage 430 and
communicated to system 100 via communications 420. In certain
examples, research data source 440 comprises an acoustic
transducer, such as a microphone, and processing (not shown for
purposes of simplicity and clarity) to produce audio data in
compressed or uncompressed form to be stored in storage 430 under
the control of processor 410. In certain examples, ancillary codes
in the audio data are decoded by processing in research data source
440 and/or signatures are extracted from the audio data thereby to
be stored in storage 430. In certain examples other or additional
types of research data are gathered by source 440, such as those
described hereinabove.
[0150] In certain examples, storage device 400 employs external
power to write and read user data via communications 420, as in the
case of a USB interface. In such examples, research data source 440
includes a power source (not shown for purposes of simplicity and
clarity), such as a rechargeable battery, to provide power for
operating research data source 440 and writing research data to the
storage 430 while storage device 400 is not coupled to a source of
external power.
[0151] In certain examples, communications between storage device
400 and system 100 of the kind described above in connection with
PUA 20, are conducted without involving the user, so that a user
input and display are not required. In certain examples, such
communications are carried out by coupling storage device 400 with
a networked host, such as a personal computer, cellular telephone
or PDA to communicate with system 100. Of these examples, in some
cases a user input and display of the networked host are used to
carry out communications involving user interaction. In these
cases, benefits for participating in a research operation to
gather, store and/or communicate research data that require the
user to carry the storage device 400 on his or her person, can be
provided via the networked host or otherwise.
[0152] FIG. 5 illustrates a pen 500 in phantom lines. A research
data collection system 510 is contained within pen 500 and serves
to gather research data of audio data to which a user carrying the
pen is exposed. FIG. 6 is a block diagram of research data
collection system 510.
[0153] With reference both to FIGS. 5 and 6, the research data
collection system 510 includes a research data source 520 and a
processor 530. The research data source 520 is coupled with
processor 530 to provide research data therefrom or data from which
research data may be produced. In certain examples, research data
source 520 comprises a microphone operative to transduce acoustic
energy to which a user of the pen 500 is exposed while carrying the
pen to produce audio data. In such examples, processor 530 either
stores the audio data or a compressed version thereof as research
data in a storage 540 of the system 510 coupled with the processor
530, or extracts research data therefrom, such as data represented
by an ancillary code of the audio data and/or a signature of the
audio data which it stores in storage 540.
[0154] In certain examples, processor 530 comprises two or more
processing devices, such as a first processing device that
exercises overall control over operation of the system 510 and a
second processing device that performs certain more specific
operations such as digital signal processing. In certain examples,
processor 530 employs a single processing device. In certain
examples, some or all of the functions of processor 530 are
implemented by hardwired circuitry. In certain examples, storage
540 comprises a single storage device, while in others it comprises
multiple storage devices. In certain examples, a single device
implements certain functions of both processor 530 and storage
540.
[0155] System 510 of pen 500 also includes communications 550
coupled with processor 530 to communicate stored research data to
system 100 of FIG. 1B, as well as to receive communications
therefrom and communicate other types of communications thereto of
the kind described hereinabove for setting up, promoting,
operating, maintaining and/or terminating a research operation with
the use of the pen 500. In certain examples, communications 550
serves to establish a wireless communications link with a host or
device on a network to conduct such communications, while in
certain examples, system 510 serves as a host or device on a
network for conducting such communications. In certain examples,
communications 550 communicates with system 100 via a separate PUA
having the ability to communicate with system 100. In certain ones
of such examples communications 550 establishes a wireless link
with the separate PUA according to a Bluetooth.TM. or ZigBee.TM.
communications standard.
[0156] System 510 of pen 500 further includes compliance detection
560 that operates to detect data useful in determining whether the
user is in compliance with rules governing the research operation.
In certain examples, compliance detection 560 comprises a motion
detector, a temperature sensor and/or a proximity detector and is
coupled with processor 530 to provide its data thereto. Processor
530 processes such data to determine whether the pen is being
carried by the user at prescribed times. System 510 also includes a
compliance indicator 570 coupled with processor 530 which processor
530 controls to provide to the user an indication whether the user
is in compliance with rules for the research operation concerning
carriage of the pen. In certain examples, the indicator 570
comprises a light, such as an LED, that provides a visual
indication of compliance or non-compliance under the control of
processor 530. In certain examples, the indicator 570 comprises an
audio transducer that produces sound under the control of processor
530 to indicate such compliance or non-compliance. Additional
disclosures of compliance determination and indication techniques
suitable for use in the various examples disclosed herein are
provided by U.S. Pat. No. 5,483,276 to Brooks, et al., assigned to
the assignee of the present application and incorporated herein by
reference in its entirety.
[0157] In certain examples, system 510 is powered by a rechargeable
battery (not shown for purposes of simplicity and clarity). In such
examples, recharging terminals 580 are provided for connecting
system 510 to an external source of power for recharging such
battery. In certain ones of such examples, the pen 500 is placed in
a cradle of a base station (not shown for purposes of simplicity
and clarity) where the terminals 580 contact terminals of the base
station where recharging power is supplied. Appropriate base
stations for this purpose are disclosed in U.S. Pat. No. 5,483,276,
referenced above.
[0158] FIG. 7A illustrates an exemplary table of a relational
database storing data associating individual PUA users with a group
of persons receiving communication services pursuant to a single
agreement with a communication service provider. The relational
database is stored in storage 130 of FIG. 2 under the control of
processor 110. Processor 110 stores data identifying each of a
plurality of PUA users in the table of FIG. 7A to associate such
data with data 700 identifying a group agreement governing the
provision of communication services to a group of persons. For
example, the group agreement may comprise a family plan with a
cellular telephone service provider. The exemplary table of FIG. 7A
associates data identifying four individual users (USER #3456. USER
#3457, USER #3458, and USER #3459) with a particular group
agreement 700. In certain examples, the association of data
indicates which particular user in the group is using a particular
PUA. In certain examples, the data identifying the PUA user
comprises a screen name adopted by the PUA user.
[0159] FIG. 7B illustrates a further exemplary table of the
relational database of FIG. 7A that stores data associating
demographic data of the four PUA users with data identifying with
each respective user, that is, 3456, 3457, 3458 and 3459. Processor
110 stores data in the table of FIG. 7B to associate demographic
data of the PUA user with the data identifying the PUA user. For
example, user #3456 corresponds to demographic data 710 which
identifies the user as a female of age 40. Likewise, user #3457
corresponds to demographic data 720, user #3458 corresponds to
demographic data 730, and user #3459 corresponds to demographic
data 740. The demographic data may comprise information relating to
sex, age, occupation, salary, etc. In certain examples, the
association of data may indicate the demographic data of the
particular user of the particular PUA.
[0160] In certain examples, a message is communicated from system
100 of FIG. 2 to each respective PUA user requesting the
demographic data of such user and a message containing the
demographic data is received by system 100 from the respective PUA
user in response. In certain ones of such examples, such messages
are communicated to and from the user's PUA. In certain ones of
these examples, a message is communicated to the respective PUA
user in response to a message from the PUA user indicating an
interest in participating in the research operation.
[0161] Still further examples are disclosed hereinbelow in
connection with FIG. 9, where in certain examples multiple
different types of PUA's are employed in one or more research data
collection activities and/or panels, under the control of one or
more managing processors.
[0162] For purposes of convenience, the functionality of a PUA that
enables a research operation is referred to herein sometimes as a
"secondary function" of the PUA. As understand herein, a PUA's
"primary function" is the function for which the PUA was purchased,
leased, used or obtained by the user. The primary function of a PUA
may be complex or simple.
[0163] The managing processor 600 supplies a communication, via a
suitable communication network, to each PUA 610 that is selected
and capable of implementing a designated secondary function. This
communication is shown schematically as "Communication A" in FIG.
9. Each receiving PUA 610 responds to Communication A to supply,
either audibly or visually, an inquiry to the PUA user asking the
PUA user if he/she would like to participate in a research
operation as a panelist. Various forms of visual communications are
possible, including text messages, graphic messages, e-mails, etc.
An audible message may also be employed for various types of PUA's.
For example, for a PUA that comprises a CD player, a personal audio
player or similar device, and which is capable of receiving
external communications, in certain examples the PUA responds to
Communication A to provide an audible message to the user (e.g.,
via attached headphones). Text messages or e-mails, inter alia, are
appropriate for PDA's, notebook computers and the like.
[0164] PUA users are provided an opportunity to respond to
Communication A and may respond by accepting the offer to
participate in the research operation, by declining the offer, or
by not responding to the offer. In certain instances, a request for
more information may be provided and/or an opportunity to defer the
response, such as "ask me again tomorrow." The PUA user's response
is represented as Communication B in FIG. 9. If the user accepts
the offer to participate, then the managing processor 600 includes
the user as a panel member.
[0165] In certain examples, incentives to participate are offered.
Various incentives, depending on the example, include benefits
related to use of the PUA, such as PUA-supplied services, award
points or credits (e.g., free cellular telephone use, free play
time for a game device PUA). Certain incentives do not relate to
use of the PUA, such as award points or award dollars applicable
for use or purchases at retail stores, Internet sites and other
locations. Other incentives include free software or unique content
available only to panelists.
[0166] In certain examples employing incentives, benefits accrue
during the period in which a PUA user remains a panel member. In
other examples, benefits accrue during periods of time the PUA
gathers research data, thus encouraging use and/or carrying around
of the PUA. In further examples, benefits accrue when research data
is received by the managing processor 600.
[0167] After a PUA user's acceptance to participate in a research
panel (via Communication B), managing processor 600 supplies a
communication that "initializes" the PUA or requests an action of
the user to do so. This communication is represented as
Communication C in FIG. 9.
[0168] For those examples mentioned herein in which the PUA has the
capability, without further modification, to implement a designated
secondary function, initialization entails instructing or otherwise
controlling the PUA to implement the secondary function or
requesting that the user do so. For example, for particular
cellular telephone PUA's that are capable of converting acoustic
energy into audio data, storing that data and later supplying that
data to a called or calling party, the cellular telephone is
instructed to gather the audio data and to supply periodically the
gathered audio data or research data derived therefrom or
concerning such audio data to managing processor 600. Where it
receives audio data, the managing processor 600 in turn extracts
from the audio data relevant identification information to
ascertain the particular media (e.g., station, channel, song,
television/radio program, commercial, etc.) to which the PUA user
was exposed.
[0169] As another example, a PDA capable of emitting a suitable
identification signal is "initiated" to cause the PDA to
periodically emit the identification signal (e.g., once per minute)
during a research operation that seeks to gather data relating to
consumer exposure to billboards. In this example, various
billboards are equipped with electronic devices that receive the
emitted identification signals. Hence, the PDA is controlled to
carry out a secondary function that enables the implementation of a
technique described in U.S. Pat. No. 6,958,710, referenced
above.
[0170] In certain examples, the manufacturer of the PUA
pre-installs and/or equips the PUA with appropriate software and/or
hardware to carry out one or more particular secondary functions.
In certain other examples, the manufactured PUA is later adapted
(e.g., by another entity) to enable it to carry out a secondary
function. Other entities include retailers, wholesalers, research
data gathering entities, service provides and other parties. In yet
other examples, software is downloaded to the PUA to enable it to
carry out a secondary function prior to inviting the PUA user to
participate in the research panel.
[0171] For those examples mentioned herein in which the PUA is
modifiable to implement a secondary function, then PUA
initialization (in response to Communication C) entails, in certain
examples, downloading software to the PUA during recruitment of a
panel member to enable the recruited panel member's PUA to carry
out the secondary function. For example, a cellular telephone may
be programmable to decode information conveyed by an ancillary code
in audio data (as set forth in various patents and applications
referenced above) and then to supply the extracted information to
managing processor 600. Initialization of such a PUA in certain
examples entails downloading and installing suitable software and
then executing that software to implement the secondary
function.
[0172] As another example, a notebook computer having the
capability to receive wireless transmissions, such as by means of a
wireless network card, a Bluetooth transceiver or the like, is
programmed during initialization to periodically ascertain its
current location (and thus the location of the PUA user) based on
data received from the wireless network and to compare the
ascertained location with a plural number of locations of interest
that have been downloaded and stored within the notebook computer's
storage. Each of the downloaded locations of interest may be a
geographic location of a billboard, a retail store or other venue
about which research data is being gathered. During implementation
of this secondary function, the notebook computer ascertains when
the PUA user is in the vicinity of (e.g., able to see) one of the
stored venues of interest, and creates a record of the activity and
later transmits to the managing processor the created records. This
process and variations thereof are disclosed in US Published Patent
Application 2005/0243784, referenced above.
[0173] For those examples mentioned above in which the PUA is
modifiable with the PUA user's assistance to carry out a designated
secondary function, certain examples entail instructing the PUA
user to take his/her PUA to a designated service center that will
retrofit the PUA with appropriate software and/or hardware
modifications to enable it to implement the designated secondary
function. In other examples, the PUA user performs the
modification, such as by coupling the PUA to a computer for the
transfer and installation of suitable code into the PUA. The code
may be supplied to the PUA user's computer in various manners, such
as by e-mail, downloading from an Internet site, from a CD-ROM
mailed to or other otherwise obtained by the PUA user (e.g., at a
retail establishment or entertainment facility) or other
method.
[0174] After the PUA is initialized in the various examples
described herein, various additional communications between the PUA
and managing processor 600 are carried out. In certain examples,
software/hardware tests or self-tests are executed to verify proper
operation of the PUA. In certain examples, third parties, such as
service providers, provide and receive various communications to
and from the PUA to verify proper operation of the secondary
function. In various examples, software tests and/or self-tests
occur prior to PUA initialization. In various examples, PUA
calibration is carried out. In certain examples calibration
includes clock calibration and/or location calibration.
[0175] Communications from managing processor 600 to the PUA may
further include one or more parameters in certain examples.
Parameters include, without limitation, (1) what to track; (2)
when/where to track; (3) amount/type of data to gather; (4) type of
processing, if any, of the gathered data; and (5) where/when and
manner of sending the raw or processed data. None, some or all of
these parameters may be preprogrammed within the PUA or be
communicated to the PUA during or after initialization. These
parameters are further described below.
[0176] What to Track: What to track refers to the specific
secondary function to be implemented by the PUA. Various examples
of what to track are provided above and are disclosed in the
various patents and patent applications mentioned herein. These
examples are not exhaustive. Tracking may also entail not gathering
data, but rather supplying a signal to enable other devices to
gather research data.
[0177] When/Where to Track: The PUA may be programmed to implement
the secondary function continuously or periodically. Conservation
of battery life, limited data storage, limited bandwidth and other
reasons may play a role in the extent (e.g., frequency and/or
duration) of implementation of the secondary function. Frequency
and/or duration of implementation of the secondary function also
may differ on a day by day basis. In certain examples, the PUA is
programmed to implement the secondary function only in designated
locations, if appropriate (e.g., certain geographic locations, only
when certain signals are received by the PUA).
[0178] Amount/Type of Data to Gather: The PUA may be programmed to
collect more data or less data and/or different types of data.
Various examples of gathering different amounts of data are
provided in US Published Patent Application 2005/0243784,
previously referenced.
[0179] Type of Processing of Collected Data: The PUA may be
programmed to store raw data or to process the raw data in
accordance with various processing algorithms.
[0180] Where/When/Manner of Sending Data: When the secondary
function entails gathering of research data by the PUA, the
location of the destination to supply the gathered research data is
provided. Various PUA's (e.g., cellular telephone PUA's) are
capable of supplying data to a called telephone number and, in such
cases, the telephone number to call is supplied. In certain other
types of PUA's, data is sent via e-mail or other kind of database,
in which cases, the e-mail address to send the gathered research
data is supplied. In certain other types of PUA's, the PUA's employ
a docking station, often utilized to recharge batteries within the
PUA's. Certain docking stations can be modified to communicate with
the docked PUA and to supply the gathered research data to a
particular destination (e.g., by telephoning the destination).
Suitable techniques for transferring data utilizing a docking
station are disclosed in U.S. Pat. No. 5,483,276 to Brooks, et al,
assigned to the assignee of the present application and hereby
incorporated herein in its entirety. When the gathered data is sent
(e.g., daily, hourly, when storage capacity used reaches a certain
level) also may be programmable or may be manually determined
(e.g., each time the PUA is placed in the docking station).
[0181] After a PUA user has accepted participation in a panel,
initialization of the PUA, and various other communications are
carried out, as herein described, the PUA implements the designated
secondary function. As discussed herein, various secondary
functions employ gathering of either raw or processed research
data. Other secondary functions discussed herein entail
transmitting data by the PUA to enable other devices, not carried
by the PUA user, to gather research data.
[0182] In certain examples, the PUA implements two secondary
functions, a first of which entails gathering by the PUA of
research data and a second which entails transmitting data by the
PUA to enable other electronic devices to gather research data. In
certain examples, the PUA implements two secondary functions, both
of which entail the PUA gathering research data. In yet other
examples, the PUA implements two secondary functions both of which
entail transmitting information to enable other devices to gather
research data. In yet other examples, more than two secondary
functions are implemented.
[0183] A PUA may implement multiple secondary functions for
purposes of gathering data for one or more studies. In certain
examples, a PUA user participates in multiple panels each making
use of the PUA (or a single panel seeking to gather two different
types of research data). In certain examples, a PUA user is invited
to join a second panel after having already joined a first panel.
Thus, each of the various research operations described herein may
occur multiple and at different times. For example, while a PUA is
gathering research data pertaining to user exposure to audio
content (e.g., the secondary function entails converting acoustic
energy to audio data, and decoding the audio data to extract the
research data therefrom), the same PUA user is invited to
participate in another study (or an extension of the same study)
pertaining to consumer exposure to billboards (e.g., wherein the
secondary function for the second study entails the PUA emitting an
identification signal that is received by electronic devices
disposed in the vicinities of particular billboards). In this
example, the PUA has a first secondary function of gathering
research data and a second secondary function that enables other
electronic devices to gather research data. There are numerous
techniques for gathering various types of research data (some of
these techniques are disclosed in the patents and patent
applications identified herein) and, thus, a large number of
combinations of techniques may be employed utilizing particular
types of PUA's.
[0184] When a user's participation in a panel is terminated, the
managing processor 600 provides a communication to the user's PUA
to initiate or control the PUA to discontinue its implementation of
a designated secondary function. In certain examples, the PUA user
is informed of the termination via the PUA's interface with the
user. In certain examples, the user is notified by other means,
such as by mail, telephone, e-mail or other communication.
[0185] In certain examples, the PUA automatically terminates its
implementation of the secondary function at a predetermined time.
The predetermined time is communicated from the managing processor
to the PUA prior to termination, either during initialization of
the PUA as a parameter or while the PUA is gathering research data,
or another time.
[0186] In certain examples, the PUA is pre-programmed during
initialization or other time to self-terminate implementation of
the secondary function if a designated rule is not complied with by
the user or if a designated event occurs. For example, a panel
membership rule may require the PUA user to carry the PUA around
for at least eight (8) hours per day and for at least five (5) days
each week during the panel study. If the PUA user does not comply
with this rule, in certain examples the user's PUA automatically
discontinues the secondary function and thus no longer gathers,
stores and/or communicates research data. During subsequent
communications between the PUA and the managing processor, the
managing processor removes the PUA user from the list of active
panel members for the particular study being carried out. In
certain examples, the PUA is programmed to provide the user with
warnings or reminders of rules and requirements of the study,
and/or violations thereof to prevent, or at least minimize,
non-compliance.
[0187] In certain examples, the PUA is programmed to periodically
perform self-tests to verify proper operability of the secondary
function.
[0188] In certain examples, the PUA user is afforded the
opportunity to discontinue his/her membership in a panel. PUA user
communication with the managing processor via the PUA may be
possible to terminate membership. In other variations, the PUA user
may terminate membership via other communication means, such as by
telephone, e-mail, etc.
[0189] Upon the termination of the user's membership in a panel, in
certain examples the PUA discontinues implementation of a
designated secondary function. In certain ones of such examples,
software previously downloaded is uninstalled or otherwise removed
from the PUA, or deactivated.
[0190] In various examples described herein, the identity of the
PUA user or data suitable for identifying the user is obtained
using various public and possibly non-public resources and
databases. User identity includes at least a unique identifier for
the user, and preferably address and other demographic information,
including occupation, age, gender and other data useful for media
and/or market research purposes. In certain examples, user
identification information is obtained from the user via the user's
PUA. For example, in a notebook computer PUA or a cellular
telephone PUA, the user is prompted to provide identification
information during recruitment of the user into the panel. In other
examples, the PUA user is requested to provide identification
information through means other than via the PUA. For example, in
certain examples the PUA user is prompted during recruitment to
access a website, complete and mail a form or place a telephone
call in order to provide requested identification information. In
certain examples, the PUA user becomes a member of the panel only
after required identification information is supplied.
[0191] In certain examples described herein, a user is deemed to
own, lease or otherwise possess a PUA for a sufficiently large
period of time so that a particular PUA is deemed to be associated
with a particular user for the entire period of the study being
conducted. In certain other examples, a particular PUA is not
associated with a single user for the entire period of the study,
but rather is associated with multiple users. In certain instances,
the multiple users are members of the same household. A cellular
telephone or laptop computer sometimes is utilized at different
times by different members of a household. Other types of PUA's are
utilized by multiple individuals who are not part of the same
household. Various examples are provided below.
[0192] In examples where a PUA is known to have multiple users, the
PUA is programmed or otherwise controlled to ascertain or assist in
ascertaining the identity of a user at a given instance, period of
time or from time to time. In certain examples, user identification
is provided subsequent to use, via communications between the user
and the managing processor through other means, such as by e-mail,
website access, telephone, in-person contact, or other technique.
In certain examples, user identification information is supplied in
advance of use of the PUA. In certain examples, a user identifies
his/her termination of usage of the PUA.
[0193] In certain examples described herein, the identification of
a PUA user is not known during the gathering of research data
pertaining to that user. In various examples, the PUA user has
authorized participation in the panel prior to the PUA's gathering
of research data. In certain other examples, research data is
gathered by a PUA (whether used by a single user or by multiple
users) without prior authorization by the PUA user or users. After
use, a particular user may voluntarily supply or be motivated via
an incentive to supply, identification information to the managing
processor (e.g., utilizing the Internet), at which point the
previously obtained research data is associated with an identified
person.
[0194] In certain examples, incentives to participate are offered.
Various incentives, depending on the example, include benefits
related to use of the PUA, such as PUA-supplied services, award
points or credits (e.g., free cellular telephone use, free play
time for a game device PUA). Certain incentives do not relate to
use of the PUA, such as award points or award dollars applicable
for use or purchases at retail stores, Internet sites and other
locations. Other incentives include free software or unique content
available only to panelists.
[0195] In certain examples employing incentives, benefits accrue
during the period in which a PUA user remains a panel member. In
other examples, benefits accrue during periods of time the PUA
gathers research data, thus encouraging use and/or carrying around
of the PUA. In further examples, benefits accrue when research data
is received by the managing processor 600.
[0196] Various illustrative PUA's are presented herein, such as
cellular telephones, PDAs, portable storage devices, pens, and
notebook computers. As previously discussed, however, many
different types of devices, electronic and non-electronic, may be
employed as a PUA in accordance with various examples described
herein. For example, a belt buckle, ring, watch, shoe, etc., may be
retrofitted with technology that implements a designated secondary
function to enable the gathering of research data. Thus, the scope
hereof is not limited to devices that have technical features or
technical capabilities as their primary or only function.
[0197] In general, the examples described herein employ PUA's for
the purpose of carrying out research operations, which are also the
kinds of devices or articles that individuals have already freely
chosen to use or carry for other purposes beneficial to them.
Hence, recruited panel members are not burdened with the task of
carrying around a device that they would otherwise not carry
around. Moreover, in many examples, implementation of the research
operation by the user's PUA is transparent to the user.
[0198] Although various examples have been described with reference
to a particular arrangement of parts, features and the like, these
are not intended to exhaust all possible arrangements or features,
and indeed many other examples, modifications and variations will
be ascertainable to those of skill in the art.
* * * * *