The patent badge is an abbreviated version of the USPTO patent document. The patent badge does contain a link to the full patent document.

The patent badge is an abbreviated version of the USPTO patent document. The patent badge covers the following: Patent number, Date patent was issued, Date patent was filed, Title of the patent, Applicant, Inventor, Assignee, Attorney firm, Primary examiner, Assistant examiner, CPCs, and Abstract. The patent badge does contain a link to the full patent document (in Adobe Acrobat format, aka pdf). To download or print any patent click here.

Date of Patent:
Jul. 01, 2025

Filed:

Sep. 12, 2022
Applicant:

Dell Products L.p., Round Rock, TX (US);

Inventors:

Charles W. Kaufman, Redmond, WA (US);

Xuan Tang, Hopkinton, MA (US);

George Papadopoulos, Franklin, MA (US);

Vasu Subramanian, Chapel Hill, NC (US);

Jamie Pocas, Milford, MA (US);

Naizhong Chiu, Newton, MA (US);

Gregory W. Lazar, Upton, MA (US);

Assignee:

Dell Products L.P., Round Rock, TX (US);

Attorney:
Primary Examiner:
Int. Cl.
CPC ...
G06F 12/14 (2006.01); G06F 9/455 (2018.01); G06F 21/60 (2013.01); H04L 9/08 (2006.01);
U.S. Cl.
CPC ...
G06F 12/1408 (2013.01); G06F 9/45558 (2013.01); G06F 21/602 (2013.01); H04L 9/0822 (2013.01); G06F 2009/45583 (2013.01); G06F 2212/1052 (2013.01);
Abstract

Techniques for providing increased support for deduplication and compression of encrypted storage volumes. The techniques include receiving, at a storage virtual machine (VM), a data encryption key (DEK) associated with encrypted volume data, in which the DEK is wrapped in a key encryption key (KEK). The techniques include receiving, at the storage VM from a client virtual machine (VM), a write request specifying the encrypted volume data. The techniques include obtaining, by the storage VM, the KEK from a key management system (KMS) embedded on the storage VM. The techniques include unwrapping, by the storage VM, the DEK using the KEK, and decrypting, by an IO decryptor hosted by the storage VM, the encrypted volume data using the DEK. The techniques include performing, by the storage VM, data reduction operations on the decrypted volume data, and storing, by the storage VM, the data-reduced volume data on a storage array.


Find Patent Forward Citations

Loading…