The present invention generally relates to computer systems and methods for dialoguing with persons of interest on a variety of topics, including a product, service or brand.
Historically, survey research was a one-way conversation with the respondent simply answering a set of questions pertaining to a topic. Likewise, non-survey (e.g., marketing, etc.) communications were also one-way communications with one entity (the company/organization) sending messages to a second entity (the consumer). Comparatively, in-person human conversation is a give-and-take, back and forth activity between two parties. There is a need for automated systems and methods that mimic the give-and-take, back-and-forth of natural conversation.
In one form, a system for use by a client to obtain information from persons of interest is provided. The system includes a person of interest (POI) database of facts relating to each POI of the client, and a lifecycle database of various lifecycles of a plurality of POIs, a plurality of products and a plurality of services. Each lifecycle is defined by and includes one or more facts. The system also includes an intervention fragments database of fragments of communication content elements. An intervention (e.g., involvement) engine includes computer executable instructions stored on a tangible, non-transitory memory device and executed by a processor. The instructions evaluate the facts in the POI database and the lifecycles in the lifecycle database to identify fragments in the intervention fragments database to form a customized, individualized communication (e.g., intervention) to be provided to a specific POI, which customized, individualized communication is related to the facts of the POI and the lifecycle(s) which relate to the POI. A schedule engine selectively initiates a point in time to provide the customized individualized communication to the specific POI based on the evaluation by the intervention engine.
A computer executable method executable by a processor for use by a client to obtain information from persons of interest is also provided.
In one form, systems, methods and computer executable instructions generate customized, individualized communications (e.g., intervention) to persons based on data relating to a person of interest (POI) available to a client instituting the communications, based on previous data provided by the POI in response to other contacts, based on product/services data of products/services purchased or used by the POI, and based on personal data from transactions relating to the POI and/or products or services connected to the POI. The communications are based on such data within the context of marketing intervention parameters (e.g., involvement parameters) suggested by such data.
The system automates an ongoing, individualized dialogue between two parties (e.g., the POI and the client). The system analyzes known information about persons of interest, identifies each person of interest according to certain criteria, and distributes individualized communications to each person of interest. The communication distributed may include a combination of survey and marketing (or other) content, and each recipient will receive an individualized communication. The system combines both survey content and other content into a single, customized communication
The communication building mechanism represents an advancement in survey research. Historically, survey research questionnaires were crafted to answer a point-in-time set of questions about a product, service, brand, etc. A list of potential respondents (called the sample list) would all receive the same questionnaire. The questionnaire may include variable content but the variability would be limited (if A=1, answer question 5, etc.) and parsed out to groups of respondents. The systems and methods serve up an individualized survey communication based on a plurality of data points tested against a plurality of business rules instructions executed the system that direct the inclusion and ordering of survey content. Rather than having intelligence within the survey itself—the decision of what has to be included in a communication to a person of interest is determined before the communication is sent to the person of interest.
In addition, the systems and methods continuously monitor to maintain an ongoing relationship with each individual person of interest. This is achieved through facts. Facts are any piece of information available to the systems and methods about the relationship of a person of interest and the surrounding environment of the client instituting the communications. This could be for example a purchase or service event. It could also be a birthday, or change in the family status. Facts are used to maintain lifecycles that depict the reality of the person of interest and therefore the context of the relationship between the person of interest and the client instituting the communications. Additional facts and other changes in the person of interest's data initiate a process that cycles through all known customer data to pinpoint changes in the state of the person's history data and then recalculates (e.g., determines) and updates the person's lifecycles based on these changes. Lifecycles represent the relationships between the person of interest, supplier, product, and sales or service provider.
Through the use of so-called trigger rules, lifecycle assignments and facts about the person of interest combine to define the intervention fragments (e.g., involvement fragments) to be contained in future interventions with the person of interest. Interventions consist of one or more intervention fragments, and based on intervention assembler rules, are assembled and scheduled for future contact.
The systems and methods run autonomously without input from external sources. This is possible because the feedback provided by persons of interest can be used to generate future interventions and so can run for an indefinite period of time. At each processing point, the system will review all known data about a person of interest, match the person's data to the lifecycle facts and then match the lifecycle facts to the intervention fragments. Intervention fragments are then evaluated against configured business rules, selected for inclusion and ordered into an individualized communication (e.g., intervention) for each person of interest. The system is designed to collect feedback and send messages as dictated by the known information and will continue to do so until the person's data no longer meets the guidelines for any of the lifecycles and intervention fragments (e.g., the relevant lifecycles have been terminated).
The following description refers to systems and methods (e.g., processes). As used herein, systems include the methods implemented by the systems and methods include systems which implement the methods. Most methods are implemented by computer executable instructions. For convenience, the methods are not always described in the context of computer executable instructions. It is contemplated that any and all methods herein are implemented by such instructions. The systems and methods relate to communications instituted by a client with a person of interest. Communications include but are not limited to questionnaires, surveys, marketing contacts, phone contacts and other interactions with a person of interest. For exemplary purposes, the following description illustrates the systems and methods in the context of questionnaires and survey. It is contemplated that such references to questionnaires and surveys are exemplary and that any communication or interaction may replace the questionnaires and surveys noted herein, without departing from the scope of the systems and methods of the invention.
During each processing cycle:
After the Intervention passes the Watchdog Processing, it is queued up and ready to be distributed.
For the distribution of the interventions, the Intervention Schedule Control passes scheduled interventions to the Intervention Control Data where it is processed further by the Intervention Steering and Sample Control.
All the previous steps are managed in processing cycles. The cycles are configured to run at specific times based on the requirements of the system owner. There are also some instances where process cycles are triggered by external events, for example, a processing cycle may be initiated by the receipt of new data from an external system which updates the Customer History Data.
If the intervention includes a request to the person of interest for feedback, any data collected by the system is returned to the Customer History Data Management module.
Depending on the implementation, systems and method employ some or all of the following components:
The purposes of these components are detailed in the following sections below.
Business rules are part of the business rules framework applied the systems and methods, depending on implementation. The rules include some or all of:
The purposes of these rules are detailed in the following sections below.
Systems and methods described herein combine multiple types of data about each person of interest. Standard data types include one or more of the following.
Personal Contact Data: name, address, phone numbers, email addresses, contact preference selections, demographics, etc.
Product Data: Sales and transaction histories pertaining to person of interest and their purchase of products or services from the sponsoring company. Data points could include date of purchase/use, location of purchase/use, descriptions of purchase/use, etc.
Financial Data: Transactions, revenue, profitability and other financial data pertaining to each person's purchase of products or services from the sponsoring company. For example, an insurance company installation may also note what types of discounts have been provided to the person of interest (e.g., multi-vehicle discounts, safe driver discounts, etc.).
Relationship Data Summarizes the relationship between each person of interest and the supplier, product, and sales or service provider. For example, relationship data could indicate that the person of interest is a frequent customer of a certain hotel and certain hotel brand. The relationship data could also indicate a depth of relationship, such as a reward status level (e.g., Platinum flyer).
Attitudinal Data: Known attitudes possessed by the person of interest. Sources may include prior responses to survey questions, either coming from external systems or internal from the systems and methods.
All of the above types of data could originate from a variety of systems already deployed (externally generated). For example, an automotive dealer's customer relationship system may provide personal contact data, product data and relationship data. The dealer's financial reporting system may store transactional financial data and the corporation's customer database may store the attitudinal data. The systems and methods would receive data from each of these separate systems via an API or file transfer.
The systems also house a plurality of data elements that originate from within the system. Personal Contact Data, Relationship Data, and Attitudinal Data could originate from within the systems and methods. Once a person of interest provides an input (i.e., by answering a survey question), those answers are stored and added to the consumer database. The Customer History Data Management function may be configured to adjust for specific project needs by adjusting or adding so called plugins based on the project needs. An example of specific project or client needs could be a validation algorithm that is not commonly available which needs to validate serialized data provided by the client. The validation algorithm may be implemented for a specific project using a plugin which is specially constructed for the client's needs.
For each lifecycle rule 202, we define what initiating fact signals (see
The Lifecycle Creator 203 cycles through all Customer History Data to detect all “facts” for a specific person of interest. If an initiating “fact” is detected within the Customer History Data, the system will create the defined lifecycle for that person if it does not already exist. In the same way, facts within the Customer History Data are also analyzed to see whether they modify or enrich the lifecycle or terminate the lifecycle.
The Intervention Trigger Rule Processor 206 cycles through the lifecycle assignments and other customer data, housed in the Customer History Data Module in order to prescribe a disorganized list of Intervention fragments appropriate for distribution to each person of interest.
For example, if Intervention A and B cannot be combined, an Intervention Assembler Rule would dictate which of the two Intervention fragments would be included. The Intervention Assembler Rules database also includes rules directing the order of Intervention fragments. For example, if a communication is to include Intervention fragments A, C and G, an Intervention Assembler Rule may indicate that A is always first and a second Intervention Assembler Rule may indicate that G always occurs before C.
The Intervention Assembler reviews the disorganized list of Intervention fragments produced by the Intervention Trigger Rule Processor against the configured Intervention Assembler Rules. The Intervention Assembler then sorts, eliminates conflicts and orders the Intervention fragments into so-called Interventions. Finally the interventions are scheduled for processing at a future point in time.
All scheduled interventions and the related data for final processing are stored in the Intervention Schedule Data. This does not represent a final state as through the processing of the next steps (210 and 211) the individual fragments in an intervention may be modified again.
The Watchdog Processor 211 reviews the Interventions that are scheduled against the configured Watchdog Rules. Intervention fragments are eliminated as needed to conform to the Watchdog Rules.
The Intervention Schedule Control 301 is activated at pre-defined times to process the Intervention Schedule Data. All data marked as ready to be processed will be prepared for transfer to an external system. The external system can be a data collection system like Online Survey, a Call Center, a 1-2-1 Agency, etc. depending on the type of intervention and distribution method for the intervention.
The main focus of the preparation for transfer to an external system is to gather all necessary customer information data 302 needed for processing in the external system. This includes the applicable customer data as well as the physical intervention data needed by the external system. Once a transfer (intervention export 303) has been completed all interventions are placed into a wait status pending feedback from the external system.
Answers gathered from persons of interest from the external system can result in three possible statuses. The most obvious and desired is that the Intervention has been completed. The second is that the Intervention is still in progress. The third state is that the intervention has timed out, meaning it cannot be processed or accepted anymore and will be classified as incomplete.
All answers gathered from persons of interest are finally stored in the customer history data by an intervention import 304. As already described, updates to the customer history data reinitiate the calculation process described here again based on the feedback provided.
In the above mentioned processes, it has frequently been mentioned that interventions are planned for a future planning period 701 in time. This is required to limit the number of calculations required, and the time needed to perform them. This parameter sets the time period in days. For example, two weeks would be 14 days, six months would be 180 days, etc.
Before the final processing of an intervention, it may be desired to provide manual control to the system user, enabling the system user to manually remove interventions, or parts of interventions (fragments), from the process. This is done with a flag out function 702. This parameter defines the number of days before an intervention will be carried out and will be shown in the manual flag out function.
It is necessary to stabilize the calculation process to ensure that there is not constant movement, which in turn prevents interventions. This parameter sets the number of days (blocking period 703) before an intervention will take place so that it remains frozen and is not able to be changed anymore.
In the ordering of the intervention fragments into assembled interventions, multiple calculations are done to ensure that the best performing interventions are created. These calculations can potentially be never-ending so a maximum count can be defined by an overkill interactions maximum count 704 to prevent endless calculation loops.
This system is unique in the combination and uses of the data in order to create personalized, individualized surveys and communications (called Interventions). In existing systems, one or two pieces of data might be combined in order to create limited, segmented communications. In this system, many more data pieces are combined in unique combinations to create an individualized approach. Example embodiment: Great Hotel Company uses the system to create an ongoing dialogue with its customers/guests. For example, the Customer Data History module has the following data “facts” about a certain person of interest:
Great Hotel Company (i.e., the client instituting the communications) deploys the system and method in order to create an ongoing dialogue with its customers, including John Stone. The system includes a plurality of rules governing the assignment of lifecycles to each person of interest, such as John Stone. Each rule uses one or more data facts to assign persons to lifecycles. For example:
Each lifecycle is connected to certain Intervention Fragments. Intervention Fragments are prescribed automatically based on a combination of Lifecycle assignments and other “facts” known about the individual. For example, the following Intervention Fragments are prescribed for John Stone based on his lifecycle assignments and other facts:
A 5-question survey to learn why the individual has stopped staying at the St. Louis Anytime Hotel location is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger rules:
A 3-question survey to learn how Anytime Hotel Company compares to its two largest rivals is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger rules:
A coupon for a free executive breakfast buffet at any Anytime Hotel location is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger Rules:
A monthly email about being a “Road Warrior” is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger Rules:
The above four Intervention Fragments are identified as appropriate for John Stone. The disorganized list of Intervention Fragments is evaluated by the Assembler Processor and matched to Assembler Rules. Assembler Rules dictate that:
The Intervention Assembler Processor removes Intervention Fragment No. 3 from the generated list for John Stone and orders the remaining Intervention Fragments appropriately (Intervention Fragment No. 1 appears first, followed by Intervention Fragment No. 2, followed by Intervention Fragment No. 4). The ordered and prioritized list of Intervention Fragments is published as a finished Intervention.
The finished Intervention is reviewed by the system's Watchdog Rules processor, which matches the Intervention content against a set of configured business rules. One of the system's Watchdog Rules states that only 1,000 total Great Hotel Company Customers should answer Intervention No. 2. The system has received data from 747 completed surveys, so Intervention No. 2 for John Stone is permitted, as it conforms to the system's Watchdog Rules.
The Intervention for John Stone is finalized, scheduled and distributed via email.
Three days later, John Stone answers the 5-question survey about Anytime Hotel in St. Louis and the following new data points are received and stored by the Customer Data History module:
Upon receipt of the new information, the system cycles through all known facts about John Stone and reviews the data facts about John Stone against the lifecycle rules. The lifecycle rules processor identifies John Stone as being a member of the following lifecycles:
Each lifecycle is associated with certain Intervention Fragments. John Stone's lifecycle assignments result in the following list of Intervention Fragments being prescribed for him:
A 5-question survey to learn why the individual has stopped staying at the St. Louis Anytime Hotel location is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger rules:
A 3-question survey to learn how Anytime Hotel Company compares to its two largest rivals is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger rules:
A coupon for a free executive breakfast buffet at any Anytime Hotel location is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger Rules:
A monthly email about being a “Road Warrior” is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger Rules:
A Free Night Stay coupon for use at any Anytime Hotel location, customized to family travelers is prescribed. This is prescribed because John Stone's customer “facts” meet the following Intervention Trigger Rules:
The Assembler Rules dictate the inclusion and ordering of Intervention Fragments. Rules dictate that:
Given the above rules, the Assembler Rule Processor sorts, eliminates as needed and orders the communication for sending to the person of interest. John Stone's communication is revised to include only Intervention Fragments 5, 1, 2 and 4. The Intervention Fragments are re-ordered with 5 appearing first, followed by 1, 2 and 4.
The Watchdog Processor according to the Watchdog Rules revises the Intervention. Watchdog Rules dictate that persons only receive Intervention No. 1 once within 30 days and never again if the person of interest provides answers. Watchdog Rules dictate that persons only receive Intervention No. 2 once within 30 days and never again if the person of interest provides answers. Watchdog Rules dictate that persons of interest only receive Intervention NO. 4 once within 30 days. Given these watchdog rules, Interventions No. 1, 2 and 4 are eliminated from the communication.
The communication is revised to include only Intervention Fragment 5 and readied for distribution to John Stone.
Over time, the system will continue to build upon itself by adding new purchase or other customer history information. Each time a new data point is received; the system is re-initiated and begins again the processing: reviewing the person's data, matching lifecycles to the persons, matching intervention/fragments to the lifecycles, assembling the interventions, scheduling the intervention, and finalizing the communication.
This system is unique in the combination and uses of the data in order to create personalized, individualized surveys and communications (called Interventions). In existing systems, one or two pieces of data might be combined in order to create limited, segmented communications. In this system, many more data pieces are combined in unique combinations to create an individualized approach. In an example embodiment, Great Automotive uses the system to create an ongoing dialogue with people who complete a follow-up form on their web site, which indicates an interest in purchasing one of Great Automotive's vehicles. The Customer Data History module has the following data “facts” about a certain person of interest:
Name: Jane Stone
Female
Age 61
Completed a web form indicating:
Great Automotive deploys the systems and methods herein in order to create an ongoing dialogue with its customers, including Jane Stone. The system includes a plurality of rules governing the assignment of lifecycles to each person of interest, such as Jane Stone. Each rule uses one or more data facts to assign persons to lifecycles. For example:
Each lifecycle is associated with certain Intervention Fragments. Jane Stone's lifecycle assignments result in the following list of Intervention Fragments being prescribed for her:
A 6-question survey to learn more about Jane Stone's interest in The Hero is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
A 2-question survey to learn how Jane Stone would like to be contacted in the future by Great Automotive at 123 Main Street is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
A coupon for Free Washing/Detailing/Waxing of Stetson vehicles at Great Automotive at 123 Main Street is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
A 5-question survey to learn about the use and satisfaction with the Stetson is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
The Assembler Rules dictate the inclusion and ordering of Intervention Fragments. Rules dictate that:
Given the above rules, the Assembler Rule Processor sorts, eliminates as needed and orders the communication for sending to the person of interest. Jane Stone's communication is revised to include only Intervention Fragments 1, 2 and 3. The Intervention Fragments are ordered as 1, 2 and 3.
The Watchdog Processor according to the Watchdog Rules reviews the Intervention. Watchdog Rules dictate that persons only receive Intervention No. 1 once within 30 days and never again if the person of interest provides answers. Watchdog Rules dictate that persons only receive Intervention No. 2 once within 30 days and never again if the person of interest provides answers. Watchdog Rules dictate that persons of interest only receive Intervention No. 3 once within 30 days. Given that this is the first communication sent to Jane Stone, all of the Intervention Fragments conform to the Watchdog Rules. The communication is, thus, readied for distribution to Jane Stone.
The next day (12 hours after the communication was distributed), the Customer History Module recognizes the receipt of new data about Jane Stone. The following new facts are available:
Upon receipt of the new data, the system automatically reviews the totality of data in order to assign Jane Stone to the configured Lifecycle Categories. The system identifies Jane Stone as being part of the following Lifecycles:
Each lifecycle is associated with certain Intervention Fragments. Jane Stone's lifecycle assignments result in the following list of Intervention Fragments being prescribed for her:
A coupon for Free Washing/Detailing/Waxing of Stetson vehicles at Great Automotive at 123 Main Street is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
A 5-question survey to learn about the use and satisfaction with the Stetson is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
Email marketing message comparing how The Hero model compares to other models in its class on Towing Capacity is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
Email marketing message comparing how The Hero model compares to other models in its class on Gas Mileage is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
Email marketing message comparing how The Hero model compares to other models in its class on child safety features is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
Phone call from dealership sales person to schedule a test drive of the Hero is prescribed. This is prescribed because Jane Stone's customer “facts” meet the following Intervention Trigger rules:
The Assembler Rules dictate the inclusion and ordering of Intervention Fragments. Rules dictate that:
Given the above rules, the Assembler Rule Processor sorts, eliminates as needed and orders the communication for sending to the person of interest. Intervention No. 6 is separated from the others and scheduled for separate processing, as this one is a phone call vs. an email communication.
The Watchdog Processor reviews the finalized Interventions. These conform to all existing Watchdog Rules and are scheduled for distribution.
The Abstract and summary are provided to help the reader quickly ascertain the nature of the technical disclosure. They are submitted with the understanding that they will not be used to interpret or limit the scope or meaning of the claims. The summary is provided to introduce a selection of concepts in simplified form that are further described in the Detailed Description. The summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used as an aid in determining the claimed subject matter.
For purposes of illustration, programs and other executable program components, such as the operating system, are illustrated herein as discrete blocks. It is recognized, however, that such programs and components reside at various times in different storage components of a computing device, and are executed by a data processor(s) of the device.
Although described in connection with an exemplary computing system environment, embodiments of the aspects of the invention are operational with numerous other general purpose or special purpose computing system environments or configurations. The computing system environment is not intended to suggest any limitation as to the scope of use or functionality of any aspect of the invention. Moreover, the computing system environment should not be interpreted as having any dependency or requirement relating to any one or combination of components illustrated in the exemplary operating environment. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with aspects of the invention include, but are not limited to, personal computers, server computers, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, mobile telephones, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
Embodiments of the aspects of the invention may be described in the general context of data and/or processor-executable instructions, such as program modules, stored one or more tangible, non-transitory storage media and executed by one or more processors or other devices. Generally, program modules include, but are not limited to, routines, programs, objects, components, and data structures that perform particular tasks or implement particular abstract data types. Aspects of the invention may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote storage media including memory storage devices.
In operation, processors, computers and/or servers may execute the processor-executable instructions (e.g., software, firmware, and/or hardware) such as those illustrated herein to implement aspects of the invention.
Embodiments of the aspects of the invention may be implemented with processor-executable instructions. The processor-executable instructions may be organized into one or more processor-executable components or modules on a tangible processor readable storage medium. Aspects of the invention may be implemented with any number and organization of such components or modules. For example, aspects of the invention are not limited to the specific processor-executable instructions or the specific components or modules illustrated in the figures and described herein. Other embodiments of the aspects of the invention may include different processor-executable instructions or components having more or less functionality than illustrated and described herein.
The order of execution or performance of the operations in embodiments of the aspects of the invention illustrated and described herein is not essential, unless otherwise specified. That is, the operations may be performed in any order, unless otherwise specified, and embodiments of the aspects of the invention may include additional or fewer operations than those disclosed herein. For example, it is contemplated that executing or performing a particular operation before, contemporaneously with, or after another operation is within the scope of aspects of the invention.
When introducing elements of aspects of the invention or the embodiments thereof, the articles “a,” “an,” “the,” and “said” are intended to mean that there are one or more of the elements. The terms “comprising,” “including,” and “having” are intended to be inclusive and mean that there may be additional elements other than the listed elements.
In view of the above, it will be seen that several advantages of the aspects of the invention are achieved and other advantageous results attained.
Not all of the depicted components illustrated or described may be required. In addition, some implementations and embodiments may include additional components. Variations in the arrangement and type of the components may be made without departing from the spirit or scope of the claims as set forth herein. Additional, different or fewer components may be provided and components may be combined. Alternatively or in addition, a component may be implemented by several components.
The above description illustrates the aspects of the invention by way of example and not by way of limitation. This description enables one skilled in the art to make and use the aspects of the invention, and describes several embodiments, adaptations, variations, alternatives and uses of the aspects of the invention, including what is presently believed to be the best mode of carrying out the aspects of the invention. Additionally, it is to be understood that the aspects of the invention is not limited in its application to the details of construction and the arrangement of components set forth in the following description or illustrated in the drawings. The aspects of the invention are capable of other embodiments and of being practiced or carried out in various ways. Also, it will be understood that the phraseology and terminology used herein is for the purpose of description and should not be regarded as limiting.
Having described aspects of the invention in detail, it will be apparent that modifications and variations are possible without departing from the scope of aspects of the invention as defined in the appended claims. It is contemplated that various changes could be made in the above constructions, products, and methods without departing from the scope of aspects of the invention. In the preceding specification, various preferred embodiments have been described with reference to the accompanying drawings. It will, however, be evident that various modifications and changes may be made thereto, and additional embodiments may be implemented, without departing from the broader scope of the aspects of the invention as set forth in the claims that follow. The specification and drawings are accordingly to be regarded in an illustrative rather than restrictive sense.
This application is a nonprovisional patent application which claims the benefit of U.S. Provisional Patent Application Ser. No. 61/790,240 filed Mar. 15, 2013, the entire disclosure of which is incorporated by reference.
Number | Date | Country | |
---|---|---|---|
61790240 | Mar 2013 | US |