US 12,407,506 B2
Rekeying end-to-end efficient encryption with security chaining
Lejin Du, Kanata (CA); Oleksandr Babiychuk, Ottawa (CA); Alykhan Nathoo, Ottawa (CA); John T. Fitzgerald, Falmouth, MA (US); Michael E. Specht, Conway, NH (US); Seema G. Pai, Shrewsbury, MA (US); and Joann J. Kent, Auburn, MA (US)
Assigned to Dell Products, L.P., Round Rock, TX (US)
Filed by Dell Products, L.P., Round Rock, TX (US)
Filed on Jul. 29, 2022, as Appl. No. 17/816,217.
Prior Publication US 2024/0048374 A1, Feb. 8, 2024
Int. Cl. H04L 9/08 (2006.01); H04L 9/14 (2006.01)
CPC H04L 9/0891 (2013.01) [H04L 9/14 (2013.01)] 20 Claims
OG exemplary drawing
 
1. A method for rekeying an information handling system network end-to-end efficient encryption with security chaining, the method comprising:
locking an encrypted data volume, wherein a currently used and active metadata key slot is in use, thereby preventing reading from, and writing to, the encrypted data volume by applications;
writing, by a data source information handling system, new metadata in a trailer of an encrypted data block of the encrypted data volume using a key slot different than the currently used and active metadata key slot;
sending, out-of-band by the data source information handling system, an out-of-data control signal to change the key slot in use for the encrypted data volume to the key slot different than the currently used and active metadata key slot; and
unlocking, by the data source information handling system, the encrypted data volume, enabling writing and/or reading user data by the data source information handling system, encryption and decryption in all information handling system end-to-end efficient encryption data connection segment interfaces.