Patents by Inventor Jonathan Christensen

Jonathan Christensen has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240117553
    Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.
    Type: Application
    Filed: December 18, 2023
    Publication date: April 11, 2024
    Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
  • Patent number: 11920274
    Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.
    Type: Grant
    Filed: October 8, 2020
    Date of Patent: March 5, 2024
    Assignee: Clarified Inc.
    Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
  • Publication number: 20240072265
    Abstract: A fuel cell electrode protective layer forming method is disclosed. The method includes forming primary defects in a carbon-based protective layer material via a formation step. The primary defects are configured to transport fuel cell products and/or reactants representing a transported portion of a total fuel cell products and/or reactants. The difference between the total fuel cell products and/or reactants and the transported portion is an untransported portion. The method further includes activating secondary defects in the carbon-based protective layer material via an activation step. The secondary defects are configured to transport a portion of the untransported portion of the total fuel cell reactants and/or products. The activation step is different than the formation step.
    Type: Application
    Filed: August 24, 2022
    Publication date: February 29, 2024
    Inventors: Soo KIM, Jonathan MAILOA, Christina JOHNSTON, Charles TUFFILE, Jake CHRISTENSEN
  • Publication number: 20210108351
    Abstract: Methods, system and apparatus for the controlling laundry machines in a laundry facility. A user device receives a list of machines for a laundry facility and displays them on a machine control user interface. The user may then make a selection of a machine, a selection of an operation type and a selection of one or more operational parameters associated with the selected operation type. The selection of the operation type and the one or more operational parameters may be made on the user device or on the selected machine. The machine control user interface may then display the user selections, an estimated duration and a cost. The estimated duration and cost may be based on the selected machine, selected operation type and the one or more selected operational parameters.
    Type: Application
    Filed: October 8, 2020
    Publication date: April 15, 2021
    Inventors: Tristan Scott Patterson, Jonathan Christensen, Stuart Sonatina
  • Patent number: 9787631
    Abstract: A unified communication framework in which multiple users communicate using multiple modes. Conversations are kept consistent across users' devices. A backend maintains the true and authoritative version of the conversation within the communication framework.
    Type: Grant
    Filed: June 21, 2014
    Date of Patent: October 10, 2017
    Assignee: Wire Swiss GmbH
    Inventors: Priidu Zilmer, Angel Sergio Palomo Pascual, Oliver Reitalu, Alan Duric, Bjørn Nordbø, Robert Kortenoeven, Håkon Bø, Tyson Chihaya, Michael Bevin, Tymofii Zadorozhny of Serhii, Panayiotis Lipiridis, Dusan Stevanovic, Tiago Manuel Ventura Loureiro, Jonathan Christensen
  • Publication number: 20150039706
    Abstract: A unified communication framework in which multiple users communicate using multiple modes. Conversations are kept consistent across users' devices. A backend maintains the true and authoritative version of the conversation within the communication framework.
    Type: Application
    Filed: June 21, 2014
    Publication date: February 5, 2015
    Inventors: Priidu Zilmer, Angel Sergio Pascual Palomo, Oliver Reitalu, Alan Duric, Bjørn Nordbø, Robert Kortenoeven, Håkon Bø, Tyson Chihaya, Michael Bevin, Tim Zadorozhny, Panayiotis Lipiridis, Dusan Stevanovic, Tiago Loureiro, Jonathan Christensen
  • Patent number: 7899867
    Abstract: Techniques for processing instant messages (IM) received from entities destined for IM clients are provided. An IM module is used to receive the instant messages and process them. In one embodiment, the IM module may be used to determine if a message is spam (or spim) or not. The IM module receives an instant message for the IM client and determines if a challenge message should be sent to the sender of the IM. The challenge IM is an IM that is sent to the sender of the IM that necessitates a challenge. If a response to the IM challenge is received at the IM module, it is determined if the response satisfies an answer required by the challenge IM. If the response satisfies the answer, the IM received may be forwarded to the intended recipient IM client. Additionally, a method for processing buddy list events using an IM module is provided.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 1, 2011
    Assignee: FaceTime Communications, Inc,
    Inventors: Alex Sherstinsky, Joseph Petviashvili, Eric Young, Jonathan Christensen
  • Patent number: 7809829
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: October 27, 2008
    Date of Patent: October 5, 2010
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Publication number: 20100074108
    Abstract: A method is provided for virtually partitioning policy space of traffic control equipment of a computer network. An operation is performed for creating a plurality of policy lists each including at least one policy. Each policy list is configured for influencing flow of a respective portion of traffic in a prescribed manner through the traffic control equipment. An operation is performed for assigning a unique identifier to each policy list and an operation is performed for assigning each portion of the traffic the unique identifier of one of the policy lists. Thereafter, an operation is performed for establishing within the policy space an association between each portion of the traffic and one of the policy lists dependent upon matching the assigned identifiers thereof whereby the flow of each portion of the traffic through the traffic control equipment is influenced by the associated policy list.
    Type: Application
    Filed: September 25, 2008
    Publication date: March 25, 2010
    Inventors: Joseph Olakangil, Steve Clawson, Jonathan Christensen
  • Patent number: 7673004
    Abstract: Techniques for enabling secure communications between IM modules are provided. An IM is received from a first IM client for a second IM client at a first IM module. It is determined if the second IM client can receive IMs through a second IM module that is capable of receiving secure communications from the first IM module. If the second IM module is capable of receiving secure communications from the first IM module, an encrypted IM is sent from the first IM module to the second IM client. The encrypted IM is received at the second IM module, which decrypts the IM and sends the decrypted IM to the second IM client.
    Type: Grant
    Filed: January 7, 2005
    Date of Patent: March 2, 2010
    Assignee: Face Time Communications, Inc.
    Inventors: Alex Sherstinsky, Joseph Petviashvili, Eugene Mandel, Jonathan Christensen
  • Publication number: 20090161544
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: October 27, 2008
    Publication date: June 25, 2009
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Patent number: 7447768
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Grant
    Filed: January 19, 2006
    Date of Patent: November 4, 2008
    Assignee: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu
  • Publication number: 20060277288
    Abstract: Network flows are identified by analyzing network traffic and network host information. The network host information may be collected by network host monitors associated with network hosts. Network traffic and network host information are evaluated against network flow profiles to identify network flows. If a network flows are identified with high certainty and are associated with previously identified network applications, then network flow policies can be applied to the network flows to block, throttle, accelerate, enhance, or transform the network flows. If a network flow is identified with lesser certainty or is not associated with a previously identified network application, then a new network flow profile can be created from further analysis of network traffic information, network host information, and possibly additional network host information collected to enhance the analysis.
    Type: Application
    Filed: January 19, 2006
    Publication date: December 7, 2006
    Applicant: FaceTime Communications, Inc.
    Inventors: Scott Kelly, Eugene Mandel, Joseph Petviashvili, Jonathan Christensen, Srini Gurrapu