Patents by Inventor Michelle Morgan Socher

Michelle Morgan Socher has filed for patents to protect the following inventions. This listing includes patent applications that are pending as well as patents that have already been granted by the United States Patent and Trademark Office (USPTO).

  • Publication number: 20240291638
    Abstract: A method includes obtaining a key status for a first cryptographic key. The first cryptographic key is used to encrypt replicated data of a first replication instance. The method also includes determining, based on the key status, that the first cryptographic key is inaccessible which causes the first replication instance to be unavailable. In response to determining that the first cryptographic key is inaccessible, the method includes scheduling a second replication instance to be unavailable after a threshold amount of time has passed. The second replication instance includes replicated data encrypted by a second cryptographic key that is accessible. After the threshold amount of time has passed and when the first cryptographic key is still inaccessible, the method includes setting the second replication instance as unavailable.
    Type: Application
    Filed: May 2, 2024
    Publication date: August 29, 2024
    Applicant: Google LLC
    Inventors: Bonan Liu, Ramesh Rathan Dharan, Michelle Morgan Socher, Shuen Wen Si, Anwesha Das
  • Patent number: 12010218
    Abstract: A method includes obtaining a key status for a first cryptographic key. The first cryptographic key is used to encrypt replicated data of a first replication instance. The method also includes determining, based on the key status, that the first cryptographic key is inaccessible which causes the first replication instance to be unavailable. In response to determining that the first cryptographic key is inaccessible, the method includes scheduling a second replication instance to be unavailable after a threshold amount of time has passed. The second replication instance includes replicated data encrypted by a second cryptographic key that is accessible. After the threshold amount of time has passed and when the first cryptographic key is still inaccessible, the method includes setting the second replication instance as unavailable.
    Type: Grant
    Filed: October 29, 2021
    Date of Patent: June 11, 2024
    Assignee: Google LLC
    Inventors: Bonan Liu, Ramesh Rathan Dharan, Michelle Morgan Socher, Shuen Wen Si, Anwesha Das
  • Publication number: 20230134253
    Abstract: A method includes obtaining a key status for a first cryptographic key. The first cryptographic key is used to encrypt replicated data of a first replication instance. The method also includes determining, based on the key status, that the first cryptographic key is inaccessible which causes the first replication instance to be unavailable. In response to determining that the first cryptographic key is inaccessible, the method includes scheduling a second replication instance to be unavailable after a threshold amount of time has passed. The second replication instance includes replicated data encrypted by a second cryptographic key that is accessible. After the threshold amount of time has passed and when the first cryptographic key is still inaccessible, the method includes setting the second replication instance as unavailable.
    Type: Application
    Filed: October 29, 2021
    Publication date: May 4, 2023
    Applicant: Google LLC
    Inventors: Bonan Liu, Ramesh Rathan Dharan, Michelle Morgan Socher, Kevin Si, Anwesha Das