Patents by Inventor Jonathan Christensen
Jonathan Christensen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20240117553Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.Type: ApplicationFiled: December 18, 2023Publication date: April 11, 2024Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
-
Patent number: 11920274Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.Type: GrantFiled: October 8, 2020Date of Patent: March 5, 2024Assignee: Clarified Inc.Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
-
Publication number: 20240072265Abstract: A fuel cell electrode protective layer forming method is disclosed. The method includes forming primary defects in a carbon-based protective layer material via a formation step. The primary defects are configured to transport fuel cell products and/or reactants representing a transported portion of a total fuel cell products and/or reactants. The difference between the total fuel cell products and/or reactants and the transported portion is an untransported portion. The method further includes activating secondary defects in the carbon-based protective layer material via an activation step. The secondary defects are configured to transport a portion of the untransported portion of the total fuel cell reactants and/or products. The activation step is different than the formation step.Type: ApplicationFiled: August 24, 2022Publication date: February 29, 2024Inventors: Soo KIM, Jonathan MAILOA, Christina JOHNSTON, Charles TUFFILE, Jake CHRISTENSEN
-
Publication number: 20210108351Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.Type: ApplicationFiled: October 8, 2020Publication date: April 15, 2021Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
-
Patent number: 9787631Abstract: A unified communication framework in which multiple users communicate using multiple modes. Conversations are kept consistent across users' devices. A backend maintains the true and authoritative version of the conversation within the communication framework.Type: GrantFiled: June 21, 2014Date of Patent: October 10, 2017Assignee: Wire Swiss GmbHInventors: Priidu Zilmer, Angel Sergio Palomo Pascual, Oliver Reitalu, Alan Duric, Bjørn Nordbø, Robert Kortenoeven, Håkon Bø, Tyson Chihaya, Michael Bevin, Tymofii Zadorozhny of Serhii, Panayiotis Lipiridis, Dusan Stevanovic, Tiago Manuel Ventura Loureiro, Jonathan Christensen
-
Publication number: 20150039706Abstract: A unified communication framework in which multiple users communicate using multiple modes. Conversations are kept consistent across users' devices. A backend maintains the true and authoritative version of the conversation within the communication framework.Type: ApplicationFiled: June 21, 2014Publication date: February 5, 2015Inventors: Priidu Zilmer, Angel Sergio Pascual Palomo, Oliver Reitalu, Alan Duric, Bjørn Nordbø, Robert Kortenoeven, Håkon Bø, Tyson Chihaya, Michael Bevin, Tim Zadorozhny, Panayiotis Lipiridis, Dusan Stevanovic, Tiago Loureiro, Jonathan Christensen
-
Patent number: 7899867Abstract: Techniques for processing instant messages (IM) received from entities destined for IM clients are provided. An IM module is used to receive the instant messages and process them. In one embodiment, the IM module may be used to determine if a message is spam (or spim) or not. The IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM. The challenge IM is an IM that is sent to the sender of the IM that necessitates a challenge. If a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the intended recipient IM client. Additionally, a method for processing buddy list events using an IM module is provided.Type: GrantFiled: January 7, 2005Date of Patent: March 1, 2011Assignee: FaceTime Communications, Inc,Inventors: Alex Sherstinsky, Joseph Petviashvili, Eric Young, Jonathan Christensen
-
Patent number: 7809829Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: GrantFiled: October 27, 2008Date of Patent: October 5, 2010Assignee: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Publication number: 20100074108Abstract: A method is provided for virtually partitioning policy space of traffic control equipment of a computer network. An operation is performed for creating a plurality of policy lists each including at least one policy. Each policy list is configured for influencing flow of a respective portion of traffic in a prescribed manner through the traffic control equipment. An operation is performed for assigning a unique identifier to each policy list and an operation is performed for assigning each portion of the traffic the unique identifier of one of the policy lists. Thereafter, an operation is performed for establishing within the policy space an association between each portion of the traffic and one of the policy lists dependent upon matching the assigned identifiers thereof whereby the flow of each portion of the traffic through the traffic control equipment is influenced by the associated policy list.Type: ApplicationFiled: September 25, 2008Publication date: March 25, 2010Inventors: Joseph Olakangil, Steve Clawson, Jonathan Christensen
-
Patent number: 7673004Abstract: Techniques for enabling secure communications between IM modules are provided. An IM is received from a first IM client for a second IM client at a first IM module. It is determined if the second IM client can receive IMs through a second IM module that is capable of receiving secure communications from the first IM module. If the second IM module is capable of receiving secure communications from the first IM module, an encrypted IM is sent from the first IM module to the second IM client. The encrypted IM is received at the second IM module, which decrypts the IM and sends the decrypted IM to the second IM client.Type: GrantFiled: January 7, 2005Date of Patent: March 2, 2010Assignee: Face Time Communications, Inc.Inventors: Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, Jonathan Christensen
-
Publication number: 20090161544Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: ApplicationFiled: October 27, 2008Publication date: June 25, 2009Applicant: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Patent number: 7447768Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: GrantFiled: January 19, 2006Date of Patent: November 4, 2008Assignee: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
-
Publication number: 20060277288Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.Type: ApplicationFiled: January 19, 2006Publication date: December 7, 2006Applicant: FaceTime Communications, Inc.Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu