Media exposure and verification utilizing inductive coupling

ABSTRACT

A computer-implemented system and method for establishing media data exposure, where a media device, such as a computer, radio, television and the like, receive media data and produces research data from it. The research data may be based on computer-based or computer network-based characteristics, ancillary codes or audio signatures. As the research data is being produced, an inductive coupling is sought for nearby portable computer devices. Once a portable computing device inductively couples to the media device, information is transferred, allowing a system to determine and/or verify that specific users were exposed to particular media data.

TECHNICAL FIELD

The present disclosure is directed to processor-based audience analytics. More specifically, the disclosure describes systems and methods for utilizing inductive coupling to perform audience measurement where inductive coupling is utilized to measure and verify user exposure to media data.

BACKGROUND INFORMATION

Interest in measuring media data exposure has been growing in recent years, with many seeking to determine the numbers and types of individuals that are exposed to or consume media data. The terms “media data” and “media” as used herein mean data which is widely accessible, whether over-the-air, or via cable, satellite, network, internetwork (including the Internet), displayed, distributed on storage media, or by any other means or technique that is humanly perceptible, without regard to the form or content of such data, and including but not limited to audio, video, audio/video, text, images, animations, databases, broadcasts, displays (including but not limited to video displays), web pages and streaming media. To date, a number of improvements have been made for counting aggregate numbers of users that may have been exposed to media data.

However, one area where improvements are needed is the accuracy of media exposure tracking. While aggregate numbers are useful in determining total user exposure to media data, these aggregate numbers do not have sufficient information linking individual users to media data and occasionally have inconsistencies and/or inaccuracies. Recent advances in inductive coupling technologies make this platform attractive for use in identifying users. What is needed are methods, systems and apparatuses for utilizing inductive couple in conjunction with media exposure data to produce research data that accurately identifies and characterizes devices, and their accompanying users. The term “research data” as used herein means data comprising (1) data concerning usage of media data, (2) data concerning exposure to media data, and/or (3) market research data.

SUMMARY

Accordingly, apparatuses, systems and methods are disclosed for computer-implemented techniques for establishing media data exposure for a computer processing device or other device capable of receiving media data where media data is received in is verified with a plurality of portable computing devices utilizing inductive coupling. In one embodiment, a computer-implemented method for processing media data exposure is disclosed for receiving media data in a computer processing device; producing research data relating to the media data; detecting if a portable computing device is inductively coupled to the computer processing device; receiving information from the portable computing device via an inductive connection if it is detected that a portable computing device is coupled; and associating the information to the research data.

Under another embodiment, a processor-implemented method for processing media data exposure is disclosed for receiving media data in a portable device configured to communicate via an inductive connection; generating research data, based on the media data, in the portable device; and receiving further data via the inductive connection from a media device that reproduced the media data, wherein the further data is associated with the research data. Under yet another embodiment, a processor-implemented method for processing media data exposure is disclosed receiving a plurality of research data relating to a plurality of media data presented on a plurality of devices; receiving portable computing device data relating to information received by each of a plurality of devices via an inductive connection with a respective plurality of portable computing devices; associating the portable computing device data with the plurality of research data; and generating a media exposure report based on the association.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example and not limitation in the figures of the accompanying drawings, in which like references indicate similar elements and in which:

FIG. 1 illustrates an exemplary system under one embodiment, where media data is provided from a network to a processing device in the vicinity of a plurality of portable devices;

FIG. 2 illustrates a graphic representation of inductive coupling data transfers under a plurality of different configurations;

FIG. 3 illustrates an exemplary load modulation circuit for an inductively coupled transponder;

FIG. 4 illustrates an exemplary graphic representation of subcarriers for data transmitted on a inductively coupled carrier signal;

FIG. 5 illustrates an exemplary backscatter transponder under another exemplary embodiment;

FIG. 6 illustrates an exemplary device configured to perform inductive coupling with an external reader or tag; and

FIG. 7 is an exemplary flowchart for associating users to media data to provide research data having linked inductive coupling characteristics.

DETAILED DESCRIPTION

FIG. 1 illustrates an exemplary system 100 that comprises a computer processing device 101 and a plurality of portable computing devices (102-104) that are in the vicinity of processing device 101. In this example, processing device 101 is illustrated as a personal computer, while portable computing devices 102-104 are illustrated as cell phones. It is understood by those skilled in the art that other similar devices may be used as well. For example, processing device 101 may also be a laptop, a computer tablet, a set-top box, a media player, a network-enabled television or DVD player, and the like. Portable computing devices 102-104 may also be laptops, PDAs, tablet computers, Personal People Meters™ (PPMs), wireless telephone, etc.

Under a preferred embodiment, computer processing device 101 connects to content source 109 via network 110 to obtain media data. The terms “media data” and “media” as used herein mean data which is widely accessible, whether over-the-air, or via cable, satellite, network, internetwork (including the Internet), displayed, distributed on storage media, or by any other means or technique that is humanly perceptible, without regard to the form or content of such data, and including but not limited to audio, video, audio/video, text, images, animations, databases, broadcasts, displays (including but not limited to video displays), web pages, computer files and streaming media. As media is received on computer processing device 101, analytics software residing on computer processing device 101 (possibly communicating with collection server 108) collects information relating to media data received from content source 109, and additionally may collect data relating to network 110.

Data relating to the media data may include a “cookie”, also known as an HTTP cookie, which can provide state information (memory of previous events) from a user's browser and return the state information to a collecting site, which may be the content source 109 or collection server 108, or both. The state information can be used for identification of a user session, authentication, user's preferences, shopping cart contents, or anything else that can be accomplished through storing text data on the user's computer. When setting a cookie, transfer of content such as Web pages follows the HyperText Transfer Protocol (HTTP). Regardless of cookies, browsers request a page from web servers by sending a HTTP request. The server replies by sending the requested page preceded by a similar packet of text, called “HTTP response”. This packet may contain lines requesting the browser to store cookies. The server sends lines of Set-Cookie only if the server wishes the browser to store cookies. Set-Cookie is a directive for the browser to store the cookie and send it back in future requests to the server (subject to expiration time or other cookie attributes), if the browser supports cookies and cookies are enabled. The value of a cookie can be modified by sending a new Set-Cookie: name=newvalue line in response of a page request. The browser then replaces the old value with the new one. Cookies can also be set by JavaScript or similar scripts running within the browser. In JavaScript, the object document.cookie is used for this purpose.

Various cookie attributes can be used: a cookie domain, a path, expiration time or maximum age, “secure” flag and “HTTPOnly” flag. Cookie attributes may be used by browsers to determine when to delete a cookie, block a cookie or whether to send a cookie (name-value pair) to the collection site 121 or content site 125. With regard to specific “cookies”, a session cookie may be used, which typically only lasts for the duration of users using the website. A web browser normally deletes session cookies when it quits. A session cookie is created when no expires directive is provided when the cookie is created. In another embodiment, a persistent cookie (or “tracking cookie”, “in-memory cookie”) may be used, which may outlast user sessions. If a persistent cookie has its Max-Age set to 1 year, then, within the year, the initial value set in that cookie would be sent back to a server every time a user visited that server. This could be used to record information such as how the user initially came to the website. Also, a secure cookie may be used when a browser is visiting a server via HTTPS, ensuring that the cookie is always encrypted when transmitting from client to server. An HTTPOnly may also be used. On a supported browser, an HTTPOnly session cookie may be used for communicating HTTP (or HTTPS) requests, thus restricting access from other, non-HTTP APIs (such as JavaScript). This feature may be advantageously applied to session-management cookies.

Under another embodiment, one or more remote servers may be responsible for collecting research data on media data exposure, particularly for Internet-related media data. This embodiment is particularly advantageous when remote media data exposure techniques are used to produce research data. One technique, referred to as “logfile analysis,” reads the logfiles in which a web server records all its transactions. A second technique, referred to as “page tagging,” uses JavaScript on each page to notify a third-party server when a page is rendered by a web browser. Both collect data that can be processed to produce web traffic reports together with the Bluetooth signal characteristics. In certain cases, collecting web site data using a third-party data collection server (or even an in-house data collection server) requires an additional DNS look-up by the user's computer to determine the IP address of the collection server. As an alternative to logfile analysis and page tagging, “call backs” to the server from the rendered page may be used to produce research data. In this case, when the page is rendered on the web browser, a portion of Ajax code calls to the server (XMLHttpRequest) and passes information about the client that can then be aggregated.

Referring back to the example of FIG. 1, media data is received on processing device 101. Portable computing device 103, however, is receiving media data in the form of a radio broadcast 105 audibly reproduced on radio 106. In this embodiment, device 103 is equipped with specially designed software that allows it to produce research data relating to the broadcast. The term “research data” as used herein means data comprising (1) data concerning usage of media data, (2) data concerning exposure to media data, and/or (3) market research data. Under one embodiment, research data comprises ancillary codes detected from the audio signal in broadcast 105. The ancillary codes may be encoded and detected using any of the techniques found in U.S. Pat. No. 5,450,490 and U.S. Pat. No. 5,764,763 (Jensen et al.) in which information is represented by a multiple-frequency code signal which is incorporated into an audio signal based upon the masking ability of the audio signal. Additional examples include U.S. Pat. No. 6,871,180 (Neuhauser et al.) and U.S. Pat. No. 6,845,360 (Jensen et al.), where numerous messages represented by multiple frequency code signals are incorporated to produce and encoded audio signal. Each of the above-mentioned patents is incorporated by reference in its entirety herein. When the ancillary codes are detected in device 103, they may be transmitted to collection server 108 for further processing and identification for the purposes of producing research data.

In another embodiment, the research data comprises audio signatures (also known as audio “fingerprints”) that are generated in portable user device 103. The audio signatures are comprised of features extracted from the audio itself using a time-frequency analysis, mainly performed through Fourier transforms or alternately wavelet transforms. In the latter case, a combination of Fast-Fourier Transformation (FFT) and Discrete Cosine Transformation (DCT) may be used. Examples of suitable audio fingerprint configurations are disclosed in U.S. Pat. No. 5,436,653 (Ellis, et al.), WO Patent Publication No. 02/11123, titled “System and Methods for Recognizing Sound and Music Signals In High Noise and Distortion” and WO Patent Publication No. 03/091990, titled “Robust and Invariant Audio Pattern Matching.” Each of these documents is incorporated by reference in its entirety herein. When audio signatures are formed in portable computing device 103, they may be transmitted to collection server 108 for further processing and matching to identify the broadcast for the purposes of producing research data.

Portable computing device 104 receives media data from television 107. Under one embodiment, television 107 receives media data in the form of broadcast television via terrestrial means, satellite, cable, etc. Portable computing device 104 produces research data based on the audio component of the television broadcast, using ancillary codes and/or audio signatures, similar to portable computing device 103. Under another embodiment, television 107 is a “smart” television, meaning that the device is either a television set with integrated internet capabilities or a set-top box for television that offers more advanced computing ability and connectivity than a contemporary basic television set. Smart televisions may be thought of as an information appliance or a computer system integrated within a television set unit. As such, a smart television may allow the user to install and run more advanced applications or plugins/addons based on a specific platform. In this example, media data exposure occurs similar to computer processing device 101, described above.

Each of the portable processing devices 102-104 are equipped with inductive transponders and/or interrogators (or “readers”). Likewise, computer processing device 101, radio 106 and television 107 are similarly equipped with inductive transponders and/or readers. When portable processing devices come in close proximity to a respective device (101, 106, 107), the devices inductively couple (102→101, 103→106, 104→107) and are capable of communicating data with each other. Under one embodiment, portable computing devices 102-104 are also capable of coupling and communicating with each other. The transponders may be passive transponders, meaning that they do not have their own power supply and therefore all power required for the operation must be drawn from the (electrical/magnetic) field of the reader, or may be active transponders, meaning that they incorporate a battery, which supplies all or part of the power for operation. The devices may be configured to operate using different transmission frequencies, which communicate in low frequency (LF; 30-300 kHz), high frequency (HF)/radio frequency (RF) (3-30 MHz) and ultra-high frequency (UHF; 300 MHz-3 GHz)/microwave (>3 GHz). They may be further configured to communicate in remote-coupling ranges (0-1 m), and/or long-ranges (>1 m).

In constructing the transponders for the devices of FIG. 1, a separate transponder coil may be fabricated to function as an antenna together with a transponder chip, where the chip contains an RF interface, antenna tuning capacitor, RF-to-DC rectifier system, digital control and EEPROM memory, and data modulation circuits. The transponder coil may be bonded to the transponder chip in the conventional manner Alternately, the coil may be integrated onto the chip (“coil-on-chip”). This may be done using a special microgalvanic process that can take place on a normal CMOS wafer. The coil is placed directly onto the isolator of the silicon chip in the form of a planar (single layer) spiral arrangement and contacted to the circuit by means of conventional openings in the passivation layer. The conductor track widths achieved may be in the range of 5-10 μm with a layer thickness of 15-30 μm. A final passivation onto a polyamide base is performed to guarantee the mechanical loading capacity of the contactless memory module based upon coil-on-chip technology.

The transponders/readers used for FIG. 1 may be configured to transmit data using full-duplex, half-duplex and/or sequential communications. The transponders used in FIG. 1 preferably use an electronic microchip as the data-carrying device. This has a data storage capacity of between a few bytes and more than 100 kilobytes. To read from or write to the data-carrying device it must be possible to transfer data between the reader and the transponder and then back from the transponder to the reader. This transfer takes place according to a plurality of configurations: full-duplex, half-duplex and sequential. In FIG. 2, an illustration is provided representing full-duplex (FULL), half-duplex (HALF) and sequential (SEQ) communication over time. Data transfer from the reader to the transponder is termed down-link, while data transfer from the transponder to the reader is termed up-link.

In the full-duplex procedure (200) the data transfer 200A from the transponder to the reader (up-link 200C) takes place at the same time as the data transfer from the reader to the transponder (down-link 200B). This includes configurations in which data is transmitted from the transponder at a fraction of the frequency of the reader, i.e. a subharmonic, or at a completely independent, i.e. an anharmonic, frequency. In half-duplex communication (210) the data transfer from the transponder to the reader alternates with data transfer from the reader to the transponder (210B, 210C). At frequencies below 30MHz this is most often used with a load modulation procedure, either with or without a subcarrier. For both full-duplex and half-duplex communication, the transfer of energy from the reader to the transponder is continuous, i.e. it is independent of the direction of data flow. In sequential communication (SEQ 220), on the other hand, the transfer of energy from the transponder to the reader takes place for a limited period of time only. Data transfer from the transponder to the reader (220C) occurs in the pauses between the power supply to the transponder (220B). The data transfer may be accomplished utilizing amplitude shift keying (ASK), frequency shift keying (FSK) and/or phase shift keying (PSK). Under a preferred embodiment, ASK is used due to the simplicity of demodulation.

As is known in the art, inductive coupling is based upon a transformer-type coupling between the primary coil in the reader and the secondary coil in the transponder. This is true when the distance between the coils does not exceed (λ/2π) 0.16λ, so that the transponder is located in the near field of the transmitter antenna. If a resonant transponder (i.e. a transponder with a self-resonant frequency corresponding with the transmission frequency of the reader) is placed within the magnetic alternating field of the reader's antenna, the transponder draws energy from the magnetic field. The resulting feedback of the transponder on the reader's antenna can be represented as transformed impedance in the antenna coil of the reader. Switching a load resistor on and off at the transponder's antenna therefore brings about a change in the impedance, and thus voltage changes at the reader's antenna. This has the effect of an amplitude modulation of the voltage at the reader's antenna coil by the remote transponder. If the timing with which the load resistor is switched on and off is controlled by data, this data can be transferred from the transponder to the reader. This type of data transfer is referred to load modulation.

FIG. 3 illustrates an exemplary circuit for a transponder using load modulation with a subcarrier. The circuit is advantageous for an operating frequency of 13.56 MHz and is capable of generating a subcarrier of 212 kHz. The voltage induced at antenna coil L1 by the magnetic alternating field (H) of a reader is rectified using the bridge rectifier (D1-D4) and after additional smoothing (C1) is available to the circuit as supply voltage. The parallel regulator prevents the supply voltage from being subject to an uncontrolled increase when the transponder approaches a reader antenna. To reclaim the data at the reader, voltage tapped at the reader's antenna is rectified. This represents the demodulation of an amplitude modulated signal. Part of the high frequency antenna voltage (13.56 MHz) travels to the frequency divider's timing input (CLK) via the protective resistor (R1) and provides the transponder with the basis for the generation of an internal clocking signal. After division, a subcarrier clocking signal of 212 kHz is available at output 311 of IC 310. The subcarrier clocking signal, controlled by a serial data flow at the data input (DATA), is passed to the switch T1. If there is a logical “high” signal at the data input (DATA), then the subcarrier clocking signal is passed to switch T1. Load resistor R2 is then switched on and off in time with the subcarrier frequency. Optionally in the circuit depicted, the transponder resonant circuit can be brought into resonance with the capacitor C1 at 13.56 MHz. The range of the transponder can be significantly increased in this manner.

FIG. 4 illustrates load modulation where two sidebands (400A, 400B) are represented by modulation products utilizing load modulations with a subcarrier. These modulation sidebands can be separated from the significantly stronger signal of the reader by bandpass filtering. After amplification, the subcarrier signal can be advantageously demodulated. As can be seen from FIG. 4, sidebands 400A, 400B are created at a distance of the subcarrier frequency f_(S) around the transmission frequency of the reader, where f_(T) represents a carrier signal of the reader, measured at the antenna coil. Information is carried in the sidebands of the two subcarrier sidebands, which are created by the modulation of the subcarrier. Load modulation with subcarriers is preferably performed in the frequency range 13.56 MHz, using subcarrier frequencies of 212 kHz, 424 kHz (see ISO/IEC 15 693) and 848 kHz (see ISO/IEC 14443).

FIG. 5 illustrates a circuit under another embodiment utilizing a long-range transponder, which allows inductively coupled communication to extend to distances exceeding one meter. The circuit may be operated at the UHF frequencies (e.g., 868 MHz, 915 MHz) and at microwave frequencies 2.5 and 5.8 GHz. The short wavelengths of these frequency ranges facilitate the construction of antennas with far smaller dimensions and greater efficiency than would be possible using frequency ranges below 30 MHz. Utilizing dipole antennas (513) Power P1 is emitted from the reader's (502) antenna, a proportion of which reaches the transponder's (501) antenna. The power P1′ is supplied to the antenna connections as RF voltage and after rectification by the diodes D1 and D2 can be used as turn-on voltage for the deactivation or activation of the power saving ‘power down’ mode. Preferably, the diodes used are low-barrier Schottky diodes, which have a particularly low threshold voltage. The voltage obtained may also be sufficient to serve as a power supply for short ranges. If the transponder moves out of range of a reader, then the chip automatically switches over to the power-saving ‘power down’ mode. In this state the power consumption is a few μA at most. The chip is not reactivated until a sufficiently strong signal is received in the read range of a reader, whereupon it switches back to normal operation. The battery of an active transponder does not normally provide power for the transmission of data between transponder and reader, but supplies power to the microchip. Data transmission between transponder (501) and reader (502) relies upon the power of the electromagnetic field emitted by the reader under normal operation.

A proportion of the incoming power P1′ is reflected by the antenna (513) and returned as power P2. The reflection characteristics of the antenna can be influenced by altering the load connected to the antenna. In order to transmit data from the transponder to the reader, a load resistor RL connected in parallel with the antenna is switched on and off in time (T) with the data stream to be transmitted. The amplitude of the power P2 reflected from transponder 501 can thus be modulated (backscatter). Power P2 reflected from the transponder is radiated into free space, where a proportion of it is picked up by the reader's antenna (513). The reflected signal travels into the antenna connection of the reader in the backwards direction and can be decoupled using a directional coupler 511 and transferred to the receiver (RX) input of reader 502. The forward signal of the transmitter TX, which is normally multiple times stronger by (e.g., 10×), is to a large degree suppressed by directional coupler 511.

Under another embodiment, inductive coupling may take place using near-field communication (NFC) which is a wireless data interface similar to infrared or Bluetooth. Data transmission between two NFC interfaces uses high-frequency magnetic alternating fields preferably in the frequency range of 13.56 MHz. A typical maximum communication range for NFC data transmission is 20 cm because the respective communication counterpart is located in the near-field of the transmitter antenna. The NFC interface has a transmitter and a receiver that are alternately connected to an antenna, preferably designed as a large-surface coil or conductor loop. During communication, the individual NFC interfaces can take on different functions, i.e. that of an NFC initiator (master device) or an NFC target (slave device). Communication is typically started by the NFC initiator.

NFC communication distinguishes between two different operational modes, referred to as an “active” and “passive” mode. In order to transmit data between two NFC interfaces in active mode, at first one of the NFC interfaces activates its transmitter and thus works as the NFC initiator. The high-frequency current that flows in the antenna induces an alternating magnetic field that spreads around the antenna loop. Part of the induced magnetic field moves through the antenna loop of the other NFC interface which is located close by. A voltage is induced in the antenna loop and can be detected by the receiver of the other NFC interface. If the NFC interface receives signals and the corresponding commands of an NFC initiator, this NFC interface automatically adopts the roll of an NFC target.

For data transmission between the NFC interfaces, the amplitude of the emitted magnetic alternating field is modulated (ASK modulation), similar to the data transmission between an RFID reader and transponder. The transmission direction is reversed in order to send data from the NFC target to the NFC initiator. This means that the NFC target activates the transmitter and the NFC initiator switches to receiving mode. Both NFC interfaces alternately induce magnetic fields where data is transmitted from transmitter to receiver only. In the passive mode, the NFC initiator also induces a magnetic alternating field for transmitting data to the NFC target. The field's amplitude is modulated in line with the pulse of the data to be transmitted (ASK modulation). However, after having transmitted a data block, the field is not interrupted, but continues to be emitted in an unmodulated way. The NFC target now is able to transmit data to the NFC initiator by generating a load modulation. The load modulation method is also known from RFID systems.

Using this method for NFC interfaces provides a number of advantages and for practical operation. The different roles of the two NFC interfaces within the NFC communication can be negotiated and changed at any time. An NFC interface with a weak power supply, e.g. with a low-capacity battery, can negotiate and adopt the role of the NFC target in order to save power by transmitting data via load modulation. The NFC interface that is the target is also able to establish, in addition to other NFC interfaces, the communication to compatible passive transponders (e.g. according to ISO/IEC 14443) that the NFC target supplies with power and that, via load modulation, can transmit data to the NFC interface. This option enables electronic devices equipped with NFC interfaces, such as NFC mobile phones, to read and write on different transponders. As the NFC interface in this case behaves similar to an RFID reader, this option is also called ‘reader mode’ or ‘reader-emulation mode’.

If an NFC interface is located close to a compatible RFID reader (e.g. according to ISO/IEC 14443), the NFC reader is also able to communicate with a reader. Here, the NFC interface adopts the roll of an NFC target and can transmit data to the reader using load modulation. This option enables RFID readers to exchange data with an electronic device with NFC interface, such as NFC mobile phones, allowing the electronic device to behave like a contactless smart card. Additionally, an NFC device can communicate in a peer-to-peer mode (ISO 18092), allowing two NFC-enable devices to establish a bi-directional connection to exchange data. To establish a connection, a client (NFC peer-to-peer initiator) searches for a host (NFC peer-to-peer target) to set up a connection. Then, the NFC Data Exchange Format (NDEF) is used to transmit the data.

Turning to FIG. 6, an exemplary portable computing device 600 is illustrated having media measurement and inductive coupling capabilities. Microphone 612 is configured to capture ambient audio, where digital signal processor/decoder 608 is configured to detect ancillary codes and/or signatures with the assistance of application processor 601. The detected codes and/or signatures are then stored in memory 607. RF unit is capable of receiving voice and/or data communication, while baseband processor 610 manages all the radio functions which may include Wi-Fi and/or Bluetooth, and may be configured with its own RAM and firmware (not shown). Induction controller 609 may comprise a host interface, a microprocessor, a contactless UART (universal asynchronous receiver transmitter), and handles data control from antenna 613, which further communicates with external reader/tag 615. SIM card 605 may contain data about the device and the user, and may further store applications for controller 609. Controller applications may also reside in a secure area in memory 607. Under one embodiment, communications between controller 609 and SIM 605 occur via single wire protocol (SWP).

Inductive coupler module 606 controls transmission of application data (APDU, described in ISO/IEC 1443-4), and, under another embodiment, may be incorporated into application processor 601, and/or also may be integrated with antenna 613 in a “smart card” type configuration. Coupler module 606 and SIM card 605 communicate with application processor 601 preferably utilizing APDUs. Transmitted APDU can contain any desired data, such as command and response. The structure of this protocol is described further in ISO/IEC 7816-3. Application processor 601 comprises a Java virtual machine (JVM), which is a virtual machine capable of executing Java bytecode from Java applications 604. Typically, source code is compiled to Java bytecode, which is verified, interpreted or JIT-compiled for the native architecture of device 600. The Java APIs and JVM together make up the Java Runtime Environment. JVM 606 communicates with APIs 603, which may contain APIs for contactless communication (JSR-257), security and trust services (JSR-177), and others known in the art.

Turning to FIG. 7, an exemplary process is described for associating inductively-coupled portable computing devices (e.g., 102-104) to exposed media data. At the start 705, media data is received 706 in a device (101, 106, 107) that may be in proximity to a portable computing device. The receipt of media data may be initiated via the start of a web session, detection of ancillary code(s), and/or audio signature formation, wherein research data is collected 707 for any of the aforementioned formats. In step 708 the device receiving media data detects whether a portable computing device is inductively coupled. If so, the portable computing device transfers data 709 indicating its presence, and may transfer additional data pertaining to the device and/or user. This data is then time stamped and stored. When a predetermined amount of time has lapsed, or if media data is no longer being received, or if different media data is received, the produced research data is processed together with the data received from the inductive coupling to link the device (user) with the research data, which is ultimately used (e.g., in collection server 108) to determine and/or confirm that a specific user was present when media data was received.

If, in step 708, it was determined that no device was inductively coupled, research data continues to be generated in 711. The process continues where, if further media data is being received, research data continues to be produced 711. If, no further media data is being received (or, if a predetermined period of time has expired, indicating the end of a session), a message is presented 713 indicating that the media data is ended. Under a preferred embodiment, message 713 contains a request to inductively couple. This embodiment is particularly advantageous when a portable computing device is inadvertently left outside the communication range of a device presenting media data. In 714, detection is made to see if a device inductively couples after the message. If no device is coupled, the process ends 715 and the research data is sent for further processing and for the generation of media exposure reports. If, however a device inductively couples at this point, the research data gets associated with the coupled device. Under one embodiment, the coupled device receives full research data credit for being exposed to the media throughout the entire media session. under another embodiment, the coupled device receives partial research data credit for the research session; the partial credit may be based on a predetermined time period, or may comprise a predetermined fraction (e.g., 50%). Such a configuration provides great flexibility for researchers to measure and credit media data exposure for the purposes of producing research data reports.

There is additional flexibility in presenting message 713. In embodiments where computer processor devices are used, the message may be a text message, image, video, audio, etc. presented on the device, instructing the user to inductively couple. Similarly, televisions, set-top boxes, media boxes and the like could present messages similarly to computer processing devices. In embodiments where a radio presents media data, the radio may be equipped with communications software allowing it to communicate the coupling message wirelessly (e.g., Wi-Fi, Bluetooth) to a portable computing device. Under another embodiment, the inductive coupling message may be triggered on the portable computing device via ancillary code embedded in the audio. When the ancillary code containing a message command is detected on a portable computing device, where the device automatically executed messaging software to presents the message on the device.

Furthermore, devices 102-104 may transmit research data and/or media data-related information to each other in a peer-to-peer fashion. The information may include data generated and/or received via inductive coupling. This configuration is particularly advantageous when multiple portable computing devices are part of a household, and household media exposure (in addition to individual exposure) is being monitored.

While at least one example embodiment has been presented in the foregoing detailed description, it should be appreciated that a vast number of variations exist. It should also be appreciated that the example embodiment or embodiments described herein are not intended to limit the scope, applicability, or configuration of the invention in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient and edifying road map for implementing the described embodiment or embodiments. It should be understood that various changes can be made in the function and arrangement of elements without departing from the scope of the invention and the legal equivalents thereof. 

What is claimed is:
 1. A computer-implemented method for processing media data exposure, comprising the steps of: receiving media data in a computer processing device; producing research data relating to the media data; detecting if a portable computing device is inductively coupled to the computer processing device; receiving information from the portable computing device via an inductive connection if it is detected that a portable computing device is coupled; and associating the information to the research data.
 2. The computer-implemented method of claim 1, wherein the media data comprises one of a web page, audio, video, text and images.
 3. The computer-implemented method of claim 1, wherein the research data comprises one of a cookie, a logfile, a page tag, ancillary code detected from an audio portion of the media data and an audio signature generated from the audio portion of the media data.
 4. The computer-implemented method of claim 1, wherein, if the detecting step determines that no portable computing device is inductively coupled, the computer processing device continues to produce research data until one of (a) a predetermined amount of time has expired, (b) media data is no longer being received, and (c) a different media data is being received in the computer processing device, at which time the computer processing device presents a message requesting inductive coupling.
 5. The computer-implemented method of claim 1, wherein the information from the portable computing device is received via a load modulated signal.
 6. The computer-implemented method of claim 5, wherein the information from the portable computing device is received using one of full-duplex, half-duplex and sequential communication.
 7. The computer-implemented method of claim 1, wherein the information received from the portable computing device via the inductive connection comprises information relating to the portable computing device.
 8. A processor-implemented method for processing media data exposure, comprising the steps of: receiving media data in a portable device configured to communicate via an inductive connection; generating research data, based on the media data, in the portable device; receiving further data via the inductive connection from a media device that reproduced the media data, wherein the further data is associated with the research data.
 9. The processor-implemented method of claim 8, wherein the research data comprises one of ancillary codes detected from an audio portion of the media data and audio signatures generated from the audio portion of the media data.
 10. The processor-implemented method of claim 8, wherein the further data received via the inductive connection comprises information relating to the media device.
 11. The processor-implemented method of claim 8, wherein the further information is received via a load modulated signal.
 12. The processor-implemented method of claim 9, wherein the further information is received using one of full-duplex, half-duplex and sequential communication.
 13. The processor-implemented method of claim 8, wherein the further data is associated with the research data for a predetermined period of time.
 14. The processor-implemented method of claim 8, wherein the portable computing device is one of a cell phone, PDA, tablet computer, Personal People Meter, and wireless telephone.
 15. A processor-implemented method for processing media data exposure, comprising the steps of: receiving a plurality of research data relating to a plurality of media data presented on a plurality of devices; receiving portable computing device data relating to information received by each of a plurality of devices via an inductive connection with a respective plurality of portable computing devices; associating the portable computing device data with the plurality of research data; and generating a media exposure report based on the association.
 16. The processor-implemented method of claim 15, wherein the media data comprises at least one of web pages, audio, video, text and images.
 17. The processor-implemented method of claim 15, wherein the research data comprises one of a cookie, a logfile, a page tag, ancillary code detected from an audio portion of the media data and an audio signature generated from the audio portion of the media data.
 18. The processor-implemented method of claim 15, wherein each of the portable computing device data is received from a load modulated signal.
 19. The processor-implemented method of claim 18, wherein the portable computing device data is received using one of full-duplex, half-duplex and sequential communication.
 20. The processor-implemented method of claim 15, wherein the portable computing device data comprises information relating to each of the portable computing devices. 