Patents by Inventor Joel Lathrop

Joel Lathrop has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240085309
    Abstract: The application is directed to methods and devices for estimating corrosion of a material. One of the methods includes obtaining data regarding corrosion. The data is obtained from various sources, such as but not limited to sensors and observational data. The data is then trained to provide for a more complete data set. The trained data is then used to estimate the expected amount of corrosion for a given situation.
    Type: Application
    Filed: September 13, 2022
    Publication date: March 14, 2024
    Inventors: Richard Joel Thompson, Tyler Benjamin Smith, Nam Hoang Nguyen, Jason Robert Lathrop, Kristen Smith Williams, Hsien-Lin Huang, Wilbur Harrison Barwick
  • Patent number: 8813228
    Abstract: Threat intelligence is collected from a variety of different sources. The threat intelligence information is aggregated, normalized, filtered and scored to identify threats to an information network. Threats are categorized by type, maliciousness and confidence level. Threats are reported to network administrators in a plurality of threat feeds, including for example malicious domains, malicious IP addresses, malicious e-mail addresses, malicious URLs and malicious software files.
    Type: Grant
    Filed: June 29, 2012
    Date of Patent: August 19, 2014
    Assignee: Deloitte Development LLC
    Inventors: Joseph C. Magee, Alison M. Andrews, Mark W. Nicholson, Jonathon Lance James, Henry C. Li, Christopher L. Stevenson, Joel Lathrop
  • Publication number: 20140007238
    Abstract: Threat intelligence is collected from a variety of different sources. The threat intelligence information is aggregated, normalized, filtered and scored to identify threats to an information network. Threats are categorized by type, maliciousness and confidence level. Threats are reported to network administrators in a plurality of threat feeds, including for example malicious domains, malicious IP addresses, malicious e-mail addresses, malicious URLs and malicious software files.
    Type: Application
    Filed: June 29, 2012
    Publication date: January 2, 2014
    Inventors: Joseph C. Magee, Alison M. Andrews, Mark W. Nicholson, Jonathon Lance James, Henry C. Li, Christopher L. Stevenson, Joel Lathrop