US 11,983,281 B2
Using INQ to optimize end-to-end encryption management with backup appliances
Jehuda Shemer, Kfra Saba (IL); Arieh Don, Newton (MA); and Krishna Deepak Nuthakki, Bangalore (IN)
Assigned to EMC IP HOLDING COMPANY LLC, Hopkinton, MA (US)
Filed by EMC IP Holding Company LLC, Hopkinton, MA (US)
Filed on Jun. 9, 2021, as Appl. No. 17/343,532.
Prior Publication US 2022/0398326 A1, Dec. 15, 2022
Int. Cl. G06F 21/60 (2013.01); G06F 11/14 (2006.01); H04L 9/08 (2006.01)
CPC G06F 21/602 (2013.01) [G06F 11/1453 (2013.01); G06F 11/1469 (2013.01); H04L 9/0894 (2013.01); G06F 2201/84 (2013.01)] 16 Claims
OG exemplary drawing
 
1. A method, comprising:
receiving, by a backup appliance, a dataset for backup from a volume of a storage array;
performing, by the backup appliance, an inquiry to determine if end-to-end encryption is enabled for the volume of the storage array;
receiving, by the backup appliance, confirmation from the storage array that end-to-end encryption is enabled for the volume; and
based on the confirmation that end-to-end encryption is enabled for the volume, storing the dataset in a backup volume without performing encryption, compression, or deduplication, of the dataset prior to storing the dataset in the backup volume.