Patents by Inventor Thomas Veasey

Thomas Veasey has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240131286
    Abstract: A cuffed tracheal tube has a shaft (10) with an inner component (30) having an inflation lumen (23) extending along a rib (33) along the outside of the component. The rib (33) terminates a short distance rearwardly of the patient end (14) of the inner component. The inflation lumen (23) is closed by an outer layer (51) applied over the inner component (30) and covering the patient end of the rib. Two closely spaced openings (54) through the rib (33) are spaced in the inflatable region of a silicone sealing cuff (13) secured around the patient end of the shaft.
    Type: Application
    Filed: February 21, 2022
    Publication date: April 25, 2024
    Applicant: SMITHS MEDICAL INTERNATIONAL LIMITED
    Inventors: Laura Beth Morton, Ayesha Bint-E-Siddiq, Neil Steven Veasey, Christopher John Woosnam, Andrew Thomas Jeffrey
  • Patent number: 11783046
    Abstract: Anomaly detection in computing environments is disclosed herein. An example method includes receiving an unstructured input stream of data instances from the computing environment, the unstructured input stream being time stamped; categorizing the data instances of the unstructured input stream of data instances, the data instances comprising at least one principle value and a set of categorical attributes determined through machine learning; generating anomaly scores for each of the data instances collected over a period of time; and detecting a change in the categorical attribute that is indicative of an anomaly.
    Type: Grant
    Filed: December 27, 2017
    Date of Patent: October 10, 2023
    Assignee: Elasticsearch B.V.
    Inventors: Stephen Dodson, Thomas Veasey, David Mark Roberts
  • Patent number: 11621969
    Abstract: Clustering and outlier detection in anomaly and causation detection for computing environments is disclosed. An example method includes receiving an input stream having data instances, each of the data instances having multi-dimensional attribute sets, identifying any of outliers and singularities in the data instances, extracting the outliers and singularities, grouping two or more of the data instances into one or more groups based on correspondence between the multi-dimensional attribute sets and a clustering type, and displaying the grouped data instances that are not extracted in a plurality of clustering maps on an interactive graphical user interface, wherein each of the plurality of clustering maps is based on a unique clustering type.
    Type: Grant
    Filed: December 28, 2017
    Date of Patent: April 4, 2023
    Assignee: ELASTICSEARCH B.V.
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20220327409
    Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.
    Type: Application
    Filed: June 23, 2022
    Publication date: October 13, 2022
    Inventors: Stephen Dodson, Thomas Veasey
  • Patent number: 11386343
    Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.
    Type: Grant
    Filed: May 9, 2017
    Date of Patent: July 12, 2022
    Assignee: Elasticsearch B.V.
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20210194910
    Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over time intervals; detecting a change in the anomaly scores over the time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.
    Type: Application
    Filed: March 4, 2021
    Publication date: June 24, 2021
    Inventors: Stephen Dodson, Thomas Veasey
  • Patent number: 10986110
    Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over continuous time intervals; detecting a change in the anomaly scores over the continuous time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the continuous time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.
    Type: Grant
    Filed: April 26, 2017
    Date of Patent: April 20, 2021
    Assignee: Elasticsearch B.V.
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20190197413
    Abstract: Forecasting resource allocation is disclosed. An example method includes receiving operating data from a resource; applying periodicity tests to the received operating data using a plurality of sketches of time series of prior operating data, the periodicity tests generating periodic components; applying regression models to the received operating data, the regression models collectively generating a trend component, each regression model being applied over a different time scale of a plurality of time scales; computing a trend model using the periodic components and a trend component; determining a random process describing the historical evolution of the trend model; and calculating and providing a mean prediction, an upper bound, and a lower bound for resource utilization at a future time using the trend model and a predicted distribution.
    Type: Application
    Filed: December 27, 2017
    Publication date: June 27, 2019
    Inventors: Thomas Veasey, Stephen Dodson
  • Publication number: 20180330257
    Abstract: Real time detection of cyber threats using behavioral analytics is disclosed. An example method includes obtaining, in real time, attributes for an entity within a population of entities, the attributes being indicative of entity behavior; building an entity probability model using the attributes and associated values collected over a period of time; and establishing a control portion of the entity probability model associated with a portion of the period of time. The example method includes comparing any of the entity attribute values and the entity probability model for other portions of the period of time to the control portion to identify one or more anomalous differences, and executing a remediation action based thereon. Some embodiments include determining a set comprising the anomalous differences and additional anomalous differences for the entity or the entity's peer group, and calculating the set's overall probability to determine if the entity is malicious.
    Type: Application
    Filed: May 9, 2017
    Publication date: November 15, 2018
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20180316707
    Abstract: Clustering and outlier detection in anomaly and causation detection for computing environments is disclosed. An example method includes receiving an input stream having data instances, each of the data instances having multi-dimensional attribute sets, identifying any of outliers and singularities in the data instances, extracting the outliers and singularities, grouping two or more of the data instances into one or more groups based on correspondence between the multi-dimensional attribute sets and a clustering type, and displaying the grouped data instances that are not extracted in a plurality of clustering maps on an interactive graphical user interface, wherein each of the plurality of clustering maps is based on a unique clustering type.
    Type: Application
    Filed: December 28, 2017
    Publication date: November 1, 2018
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20180314965
    Abstract: Anomaly and causation detection in computing environments are disclosed. An example method includes receiving an input stream of data instances for a time series, each of the data instances being time stamped and including at least one principle value and a set of categorical attributes; generating anomaly scores for each of the data instances over continuous time intervals; detecting a change in the anomaly scores over the continuous time intervals for the data instances; and identifying which of the set of categorical attributes of the data instances caused the change in the anomaly scores using a counterfactual analysis. The counterfactual analysis may comprise removing a portion of the data instances; regenerating the anomaly scores for each of the remaining data instances over the continuous time intervals; and if the anomaly scores are improved, identifying the portion as a cause of anomalous activity. Recommendations to remediate the cause may be generated.
    Type: Application
    Filed: April 26, 2017
    Publication date: November 1, 2018
    Inventors: Stephen Dodson, Thomas Veasey
  • Publication number: 20180314835
    Abstract: Anomaly detection in computing environments is disclosed herein. An example method includes receiving an unstructured input stream of data instances from the computing environment, the unstructured input stream being time stamped; categorizing the data instances of the unstructured input stream of data instances, the data instances comprising at least one principle value and a set of categorical attributes determined through machine learning; generating anomaly scores for each of the data instances collected over a period of time; and detecting a change in the categorical attribute that is indicative of an anomaly.
    Type: Application
    Filed: December 27, 2017
    Publication date: November 1, 2018
    Inventors: Stephen Dodson, Thomas Veasey, David Mark Roberts