摘要:
Apparatus, system and method for performing an action such as accessing supplementary data and/or executing software on a device capable of receiving multimedia are disclosed. After multimedia is received, a monitoring code is detected and a signature is extracted in response thereto from an audio portion of the multimedia. The ancillary code includes a plurality of code symbols arranged in a plurality of layers in a predetermined time period, and the signature is extracted from features of the audio of the multimedia. Supplementary data is accessed and/or software is executed using the detected code and/or signature.
摘要:
Apparatus, system and method for accessing supplementary data on a device capable of receiving multimedia are disclosed. After multimedia is received, ancillary code is detected from an audio portion of the multimedia. The ancillary code includes a plurality of code symbols arranged in a plurality of layers in a predetermined time period, wherein data associated with the supplementary data is arranged in at least one of the plurality of layers. Supplementary data is accessed using the data associated with the supplementary data.
摘要:
Systems and methods are disclosed for securely transferring research data relating to media exposure data, such as radio, television, streaming media and the Internet. A plurality of portable computing devices seek and bond to a collector via Bluetooth in a specific area, such as a household. The collector authenticates itself with each of the portable computing devices and vice versa where the collector arranges a secure research data transfer session with each respective device using exchanged authentication files. As each secure session is made, each portable computing device transmits stored research data during the session.
摘要:
Systems and methods are disclosed for securely transferring research data relating to media exposure data, such as radio, television, streaming media and the Internet. A plurality of portable computing devices seek and bond to a collector via Bluetooth in a specific area, such as a household. The collector authenticates itself with each of the portable computing devices and vice versa where the collector arranges a secure research data transfer session with each respective device using exchanged authentication files. As each secure session is made, each portable computing device transmits stored research data during the session.