Patents by Inventor Thomas Sandholm

Thomas Sandholm has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Patent number: 10395278
    Abstract: Mobile device detecting and engaging are described. A server can determine that a mobile device has connected with a wireless network at a physical location. The server can provide a captive portal of the wireless network to the mobile device to receive contact information for the mobile device. The server can then provide a message including information related to the physical location to the mobile device using the contact information.
    Type: Grant
    Filed: February 7, 2017
    Date of Patent: August 27, 2019
    Assignee: BlueFox, Inc.
    Inventors: Hang Ung, Guillaume Tenant de la Tour, Jerome Lejeune, Jan Willem Korver, Thomas Sandholm
  • Publication number: 20190172096
    Abstract: Disclosed is a technique for passively monitoring the number of guests in a rental property. Mobile device broadcasts intended for connecting the device to a wireless network contain information about that device. This information includes unique identifiers such as MAC addresses. Detecting these broadcasts and filtering out those devices that are expected enables a property owner to have a semi-accurate number of guests within their property without actually being at the property, or visibly observing the guests in an obtrusive fashion. Guests are able to enjoy themselves in privacy and the property owner is able to monitor the safety of their property.
    Type: Application
    Filed: January 16, 2019
    Publication date: June 6, 2019
    Inventors: Guillaume Tenant de la Tour, Thomas Sandholm, Philippe René Morin, Thibault de Lacheze-Murel, Jan Willem Korver, Paul-Ambroise Augustin Duquenne, Jerome Lejeune, Amanda Mills, Thuong Ho, Hang Ung
  • Publication number: 20190121569
    Abstract: Disclosed herein is a technique to improve the processing of people counting systems. The technique involves ingesting raw people counting data into a time-series database sorted by point of origin and recorded by end visit time. That raw data is periodically summarized and then written to a relational database. Queries of the relational database for total visitor count over a period of time are modified by approximations of the raw data for particular classes of visitors. Examples of visitor classes include recurring visitors and pedestrians vs. people in cars.
    Type: Application
    Filed: October 24, 2017
    Publication date: April 25, 2019
    Inventors: Thomas Sandholm, Hang Ung
  • Publication number: 20190026492
    Abstract: Disclosed herein is a technique to mask personally identifying information (PII) in a people counting system. A sensor that capable of identifying individual mobile devices, such as smart phones, counts people in a given area. Once identified, information that identifies given mobile devices is hashed. The hashed data is used with a filter to determine recurrence of individuals without actually storing any information specifically about those individuals. In order to determine the count of people externally from the sensor, the hashed data is analyzed for cardinality.
    Type: Application
    Filed: November 3, 2017
    Publication date: January 24, 2019
    Inventors: Thomas Sandholm, Hang Ung, Philippe René Morin
  • Publication number: 20190028849
    Abstract: Disclosed herein is a technique to improve the processing of people counting systems. The technique involves the use of a system that counts the local number of wireless/mobile devices via machine identifiers. When the counting device scrapes the machine identifier from a mobile device, the identifier is hashed using a one-way hash function. The hash code corresponds to a bit location on a bitmap. The location in the bitmap is checked. If the bit is already marked full, the mobile device has been previously detected, if the pixel location is empty, this is a new device. Thus, a single bit represents each machine identifier. The number of unique people in a monitored location is the number of full bits in the bitmap.
    Type: Application
    Filed: May 24, 2018
    Publication date: January 24, 2019
    Inventors: Thomas Sandholm, Hang Ung, Philippe René Morin
  • Publication number: 20170148063
    Abstract: Mobile device detecting and engaging are described. A server can determine that a mobile device has connected with a wireless network at a physical location. The server can provide a captive portal of the wireless network to the mobile device to receive contact information for the mobile device. The server can then provide a message including information related to the physical location to the mobile device using the contact information.
    Type: Application
    Filed: February 7, 2017
    Publication date: May 25, 2017
    Inventors: Hang Ung, Guillaume Tenant de la Tour, Jerome Lejeune, Jan Willem Korver, Thomas Sandholm
  • Publication number: 20160321567
    Abstract: Examples associated with projection device access are disclosed. One example includes receiving a reservation request of a meeting space for a specified time space. The meeting space has a projection device. A secret key is generated based on the reservation and the secret key is provided to the user. A screen sharing module is also provided to the user. The screen sharing module connects to the projection device using the key, and controls the projection device to project an image into the meeting space. The image is received from a device executing the screen sharing module.
    Type: Application
    Filed: April 30, 2015
    Publication date: November 3, 2016
    Inventors: Thomas Sandholm, Anupriya Ankolekar
  • Publication number: 20140143032
    Abstract: A system and method of procuring an advertising inventory over a communications network may include establishing a set of nodes defined by desired component attributes of inventory for an advertiser for an ad campaign. The established set of nodes may be stored. Valuation of nodes having unknown price and volume parameters may be estimated. The set of nodes may be explored to determine estimated price and volume parameters for the nodes. The set of nodes may be exploited for the ad campaign, where the exploitation may be inclusive of at least one extrapolated node having an estimated valuation. Results of the exploited set of nodes for the ad campaign may be generated.
    Type: Application
    Filed: October 29, 2013
    Publication date: May 22, 2014
    Applicant: RARE CROWDS, INC.
    Inventors: G. Scott Tomlin, Eric Picard, Patrick Yannul, Richard Arneson, Ratha Grimes, Benjamin Woodall, Thomas Sandholm
  • Publication number: 20120124039
    Abstract: A respective submission is received from each of multiple recommending client network nodes (12, 14). Each of the submissions includes respective recommendation information in association with a respective online document identifier identifying a respective online document and a respective geographic location identifier identifying a respective geographic location. For each of multiple of the received submissions, the recommendation information and the online document identifier are indexed in association with the geographic location identifier. In response to receipt of location information from a searching client network node (12, 14), ones of the online document identifiers that are associated with respective ones of the geographic location identifiers that correspond to the received location information are ascertained. The ascertained ones of the online document identifiers are ranked based on the recommendation information respectively associated with the online document identifiers.
    Type: Application
    Filed: August 11, 2009
    Publication date: May 17, 2012
    Inventors: Thomas Sandholm, Bernardo Huberman