Patents by Inventor Michael Halcrow
Michael Halcrow has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).
-
Publication number: 20250094205Abstract: A method including monitoring, using a standard level of auditing, one or more processes of a VM and, based on monitoring the process(es), detecting aberrant behavior indicating that an attack against the VM is imminent. Based on detecting aberrant behavior indicating that the attack is imminent, the method includes monitoring, using a heightened level of auditing, the process(es), the heightened level of auditing generating log data representative of memory accesses performed by the VM, and notifying a user of the VM that the imminent attack is detected. During the attack against the VM, maintaining the monitoring of the process(es) using the heightened level of auditing, the method includes determining that the attack has concluded and, based on determining that the attack has concluded, processing the log data to determine an action performed by the detected attack; and monitoring, using the standard level of auditing, the process(es).Type: ApplicationFiled: December 1, 2024Publication date: March 20, 2025Applicant: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Patent number: 12182604Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.Type: GrantFiled: October 21, 2022Date of Patent: December 31, 2024Assignee: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Publication number: 20240403229Abstract: A cloud implementation of a persisted storage device, such as a disk, is provided. The implementation supports a variety of features and protocols, in full analogy with a physical storage device such as a disk drive. The present disclosure provides for implementing standard eDrive protocols in the cloud by designing internal disk storage, referred to as a “system area,” in a virtual disk instance that the virtual disk can potentially utilize for a multitude of disk features. This internal storage can be used to implement eDrive protocols, which use the system area to maintain the necessary internal virtual disk state.Type: ApplicationFiled: May 6, 2024Publication date: December 5, 2024Inventors: Joseph Richey, Michael Halcrow, Sergey Karamov
-
Patent number: 11977492Abstract: A cloud implementation of a persisted storage device, such as a disk, is provided. The implementation supports a variety of features and protocols, in full analogy with a physical storage device such as a disk drive. The present disclosure provides for implementing standard eDrive protocols in the cloud by designing internal disk storage, referred to as a “system area,” in a virtual disk instance that the virtual disk can potentially utilize for a multitude of disk features. This internal storage can be used to implement eDrive protocols, which use the system area to maintain the necessary internal virtual disk state.Type: GrantFiled: May 22, 2023Date of Patent: May 7, 2024Assignee: Google LLCInventors: Joseph Richey, Michael Halcrow, Sergey Karamov
-
Publication number: 20230385205Abstract: A cloud implementation of a persisted storage device, such as a disk, is provided. The implementation supports a variety of features and protocols, in full analogy with a physical storage device such as a disk drive. The present disclosure provides for implementing standard eDrive protocols in the cloud by designing internal disk storage, referred to as a “system area,” in a virtual disk instance that the virtual disk can potentially utilize for a multitude of disk features. This internal storage can be used to implement eDrive protocols, which use the system area to maintain the necessary internal virtual disk state.Type: ApplicationFiled: May 22, 2023Publication date: November 30, 2023Inventors: Joseph Richey, Michael Halcrow, Sergey Karamov
-
Patent number: 11829470Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.Type: GrantFiled: September 21, 2022Date of Patent: November 28, 2023Assignee: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Patent number: 11693792Abstract: A cloud implementation of a persisted storage device, such as a disk, is provided. The implementation supports a variety of features and protocols, in full analogy with a physical storage device such as a disk drive. The present disclosure provides for implementing standard eDrive protocols in the cloud by designing internal disk storage, referred to as a “system area,” in a virtual disk instance that the virtual disk can potentially utilize for a multitude of disk features. This internal storage can be used to implement eDrive protocols, which use the system area to maintain the necessary internal virtual disk state.Type: GrantFiled: January 4, 2018Date of Patent: July 4, 2023Assignee: Google LLCInventors: Joseph Richey, Michael Halcrow, Sergey Karamov
-
Publication number: 20230056426Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.Type: ApplicationFiled: October 21, 2022Publication date: February 23, 2023Applicant: Google LLCInventors: Michael Halcrow, Thomas Gamier
-
Publication number: 20230028056Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.Type: ApplicationFiled: September 21, 2022Publication date: January 26, 2023Inventors: Michael Halcrow, Thomas Garnier
-
Patent number: 11494216Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.Type: GrantFiled: August 16, 2019Date of Patent: November 8, 2022Assignee: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Patent number: 11481487Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.Type: GrantFiled: July 8, 2019Date of Patent: October 25, 2022Assignee: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Publication number: 20210049031Abstract: A method for capturing VM resources for forensics includes receiving an indication of compromise (IoC). The indication of compromise indicates an attack is imminent against a virtual machine. The method also includes, in response to receiving the IoC and before the attack begins, snapshotting a memory state of memory used by the virtual machine and increasing a level of auditing of the virtual machine from a standard level of auditing to a heightened level of auditing. The heightened level of auditing generates data representative of all accesses to the memory used by the virtual machine. After the attack against the virtual machine has begun, the method includes maintaining the heightened level of auditing for a threshold period of time, notifying a user of the virtual machine of the indication of compromise, and storing the data in memory external to the virtual machine.Type: ApplicationFiled: August 16, 2019Publication date: February 18, 2021Applicant: Google LLCInventors: Michael Halcrow, Thomas Garnier
-
Publication number: 20210012000Abstract: The technology provides for a threat detection system. In this regard, the system may be configured to output file states of a multi-layer file system. For instance, the system may determine, based on the file states for a file, one or more layers of the multi-layer file system in which one or more objects corresponding to the file can be found. Based on the one or more objects corresponding to the file, the system may detect a potential threat. The system may then take an action in response to the potential threat.Type: ApplicationFiled: July 8, 2019Publication date: January 14, 2021Inventors: Michael Halcrow, Thomas Garnier
-
Publication number: 20190205267Abstract: A cloud implementation of a persisted storage device, such as a disk, is provided. The implementation supports a variety of features and protocols, in full analogy with a physical storage device such as a disk drive. The present disclosure provides for implementing standard eDrive protocols in the cloud by designing internal disk storage, referred to as a “system area,” in a virtual disk instance that the virtual disk can potentially utilize for a multitude of disk features. This internal storage can be used to implement eDrive protocols, which use the system area to maintain the necessary internal virtual disk state.Type: ApplicationFiled: January 4, 2018Publication date: July 4, 2019Inventors: Joseph Richey, Michael Halcrow, Sergey Karamov
-
Patent number: 10164955Abstract: A method of operating a distributed storage system includes receiving, at data processing hardware of the distributed storage system, a customer-supplied encryption key from a customer device (i.e., a client). The customer-supplied encryption key is associated with wrapped persistent encryption keys for encrypted resources of the distributed storage system. The wrapped persistent encryption keys are stored on one or more non-volatile memory hosts of the distributed storage system. The method also includes unwrapping, by the data processing hardware, a wrapped persistent encryption key that corresponds to a requested encrypted resource using the customer-supplied encryption key. The unwrapped persistent encryption key is configured to decrypt the requested encrypted resource. The method further includes decrypting, by the data processing hardware, the requested encrypted resource using the corresponding unwrapped persistent encryption key.Type: GrantFiled: May 25, 2016Date of Patent: December 25, 2018Assignee: Google LLCInventors: Michael Halcrow, Timothy Dierks
-
Patent number: 9639708Abstract: An electronic device implements a method of encrypting directories of a file system. A processor receives a request to access a directory entry of a file system, and identifies a user who is logged into the electronic device. The processor determines whether the user has access to a directory encryption key associated with the directory entry and, if not, identifies an encrypted file name stored in the directory entry, and determines whether the encrypted file name complies with one or more naming rules. If the encrypted file name does not comply with one or more naming rules, the processor applies one or more functions to a file name associated with the encrypted file name to generate an encoded encrypted file name that complies with the one or more naming rules, and causes the encoded encrypted file name to be displayed as a representation of the directory entry.Type: GrantFiled: August 18, 2015Date of Patent: May 2, 2017Assignee: GOOGLE INC.Inventors: Uday Ramesh Savagaonkar, Michael Halcrow, Theodore Yue Tak Ts'o, Ildar Muslukhov
-
Publication number: 20170053125Abstract: An electronic device implements a method of encrypting directories of a file system. A processor receives a request to access a directory entry of a file system, and identifies a user who is logged into the electronic device. The processor determines whether the user has access to a directory encryption key associated with the directory entry and, if not, identifies an encrypted file name stored in the directory entry, and determines whether the encrypted file name complies with one or more naming rules. If the encrypted file name does not comply with one or more naming rules, the processor applies one or more functions to a file name associated with the encrypted file name to generate an encoded encrypted file name that complies with the one or more naming rules, and causes the encoded encrypted file name to be displayed as a representation of the directory entry.Type: ApplicationFiled: August 18, 2015Publication date: February 23, 2017Inventors: Uday Ramesh Savagaonkar, Michael Halcrow, Theodore Yue Tak Ts'o, Ildar Muslukhov
-
Publication number: 20070167173Abstract: A method, system, and computer program product for efficiently generating a substantially accurate list of available hotspots in geographic locations. A computer system configured with a hotspot location utility operates as a Provider. The Provider receives from a mobile device a hotspot operability/ayailability transmission (HOT), which includes an identification of a currently operating and available hotspot. The Provider concurrently receives a current GPS coordinate of the device transmitting the HOT. Then, the provider stores the HOT and associated GPS coordinate within a hotspot locator database. When the Provider later receives a request from a user searching for hotpots within a particular geographic location, the Provider determines which acceptable entries of the multiple entries are in geographic locations in proximity to the particular geographic location and then provides an output of the acceptable entries to the user.Type: ApplicationFiled: January 19, 2006Publication date: July 19, 2007Inventors: Michael Halcrow, Dustin Kirkland
-
Publication number: 20070167174Abstract: A WIFI-enabled and GPS-enabled user device executes a hotspot location utility, which enables the device to detect WIFI hotspots and update a locally-stored hotspot location database (LHLD) containing geographically-mapped hotspots. When a hotspot is detected, the device accesses the hotspot, retrieves identification information and usage terms from the hotspot, and measures performance metrics of the hotspot. The utility stores the identified hotspot with the current GPS coordinate as an entry within the LHLD. When a user later desires to locate hotspots within a particular geographic location, the user enters the physical address of the location, and hotspots with matching (or proximate) GPS coordinates of the entered address are presented to the user. The user may specify certain preferences for usage terms, performance metrics, and location criteria, and the utility filters all geographic hits and returns only hotspots in the geographic location that also satisfy these preferences.Type: ApplicationFiled: January 19, 2006Publication date: July 19, 2007Inventors: Michael Halcrow, Dustin Kirkland
-
Publication number: 20070016964Abstract: Safe deposit boxes, services, and methods for physically secure data storage are provided that include securing a network-enabled computer within a safe deposit box, receiving, in the network-enabled computer, data transmitted from a remote computer coupled for data communications with the network-enabled computer; and storing the data in the memory of the network-enabled computer. Securing a network-enabled computer within a safe deposit box may be carried out by providing a locked safe deposit box having the networked enabled computer stored within. Securing a network-enabled computer within a safe deposit box may be carried out by providing a lockable safe deposit box having the networked enabled computer integrated within.Type: ApplicationFiled: July 14, 2005Publication date: January 18, 2007Inventors: Michael Halcrow, Dustin Kirkland