CONFIDENTIAL
STEP 1 / 8
File Ingestion
NCS-Compliant · Zero-Knowledge · Multi-Vault · Patent-Safe

Enterprise File Encryption
Orchestration Platform

A compliance-first cryptographic engine for regulated enterprises — built for Saudi Arabia's NCA National Cryptographic Standards, designed to operate where existing key vaults cannot.

Author: Syedyasiraswath ASKAR BASHA · aswathsyed@gmail.com
ProVault Solutions — Technical Brief v1.0 Complete concept document including architecture, patent analysis, and NCS compliance mapping
⬇ Download Document
1

Core Concept — What ProVault Solves

Every regulated enterprise today uses a key vault — HashiCorp Vault, AWS KMS, or Azure Key Vault. These systems manage keys well, but they do not enforce how files are encrypted, how metadata is isolated, or how compliance is proven at audit time. This gap is where ProVault operates.

ProVault is a file-level encryption orchestration layer that sits above your existing key management infrastructure. It does not replace your vault — it integrates with it and adds what is missing: structured file chunking, envelope encryption, metadata isolation across separate vaults, zero-downtime key rotation, and native enforcement of Saudi NCA National Cryptographic Standards (NCS).

One Core Engine. Four Deployment Surfaces. Zero duplicated cryptographic logic. ProVault delivers the same cryptographic guarantees whether deployed as a Spring Boot JAR, a standalone microservice, an SDK, or a storage plugin.

2

How It Works — 8 Core Steps

Encryption Path

  • Step 1 — File Ingestion: Application submits any file type via REST or SDK. A transit proxy optionally intercepts the file transparently — no code change required in the application layer.
  • Step 2 — Chunking: The file is split into configurable fixed-size blocks (4 MB to 64 MB). Each chunk receives a UUID and positional index, enabling parallel processing and partial retrieval.
  • Step 3 — Integrity Hashing: A SHA-256 (or SHA-3) hash is computed per chunk before encryption. This pre-encryption hash is stored in the Metadata Vault and verified on every decryption to detect tampering.
  • Step 4 — Envelope Encryption: A unique Data Encryption Key (DEK) is generated per file. Each chunk is encrypted using AES-256-GCM (AEAD) with a unique IV. The DEK is then wrapped by the Key Encryption Key (KEK) held in the external vault — only the encrypted DEK is ever stored.
  • Step 5 — Key Wrapping: The wrapped DEK is sent to the Key Vault (HashiCorp / AWS KMS / Azure Key Vault). The plaintext DEK is destroyed immediately after use. KEK wrapping uses RSA-4096 or ECC BrainpoolP384r1 per NCS Advanced level requirements.
  • Step 6 — Metadata Isolation: A separate Metadata Vault receives the chunk map, vault routing addresses, key version used, algorithm identifiers, and integrity hashes — all encrypted independently. No single vault can reconstruct the file.
  • Step 7 — Distributed Storage: Encrypted chunks are written to the configured storage backends: S3-compatible, Azure Blob, GCP, relational DB BLOB, MongoDB GridFS, or any custom adapter. Multi-vault distribution is optional.
  • Step 8 — Audit Log: Every operation — encrypt, decrypt, rotate, policy violation — is immutably logged with timestamps, identity, and cryptographic proof. Audit logs are exported for NCS compliance reporting.

Decryption Path (Reverse)

  • Authorized identity is verified (JWT / mTLS / RBAC). Metadata Vault is queried for the chunk map and vault locations. Key Vault unwraps the DEK using the correct KEK version. Chunks are fetched in parallel, decrypted, integrity-verified against pre-encryption hashes, and reassembled in order.
3

Existing Patents — Analysis & Differentiation

Several patents exist in the domain of file encryption, key management, and cloud storage security. ProVault's design deliberately combines mechanisms in a way that does not fall within the claims of any single existing patent, while the combination itself forms novel, patentable subject matter.

Patent / Prior ArtCore ClaimProVault Differentiation
US10,146,962 (IBM)
Key Rotation
Re-encrypting stored ciphertext during key rotation, requiring file-level rewrite on rotation events. ProVault performs DEK-wrapper-only rotation — the underlying ciphertext is never rewritten. Only the encrypted DEK envelope is updated, achieving zero-downtime rotation without the patented rewrite approach.
US9,537,651 (Microsoft)
Envelope Encryption
Envelope model for cloud data where DEK is stored co-located with the encrypted file object. ProVault uses vault-separated DEK storage — the encrypted DEK is stored exclusively in the Key Vault, physically and logically isolated from the data storage layer. Co-location is explicitly prohibited in our architecture.
US10,904,234 (Amazon)
Multi-Region Key
Key replication across geographic regions for disaster recovery. ProVault's multi-vault model distributes chunks across vaults, not keys. Key replication is delegated entirely to the external KMS. Our novelty is the chunk-distribution and metadata isolation model, not key geography.
EP3,264,713 (Thales)
HSM + Application
Application-layer encryption with hardware HSM integration for financial services. ProVault's pluggable KeyProvider interface treats HSM as one of several interchangeable backends. Our orchestration layer is HSM-agnostic and regulation-parameterizable — specifically parameterized for NCS, which Thales's patent does not address.
US10,367,637 (Google)
Chunk-Level Encryption
Dividing data into shards and encrypting each with independent keys within a single storage system. ProVault uses a single DEK per file across all chunks (not one key per chunk), combined with cross-vault chunk distribution. The metadata isolation vault is an architecturally distinct element absent from this patent's claims.

ProVault's patentable novelty lies in the combination of: (1) DEK-wrapper-only key rotation without ciphertext rewrite; (2) three-vault isolation architecture (Data / Metadata / Key); (3) multi-vault chunk distribution with a separately encrypted metadata map; and (4) regulation-parameterizable compliance enforcement — all within a single orchestration engine. No existing patent claims this combination.

4

Saudi NCA National Cryptographic Standards (NCS) — Role in ProVault

The Kingdom of Saudi Arabia's National Cybersecurity Authority (NCA) published the National Cryptographic Standards (NCS-1:2020) to define mandatory cryptographic requirements for all entities operating in regulated sectors — including banking, government, healthcare, and critical infrastructure.

How NCS shapes ProVault's design

  • Algorithm Enforcement: NCS mandates AES-256 for symmetric encryption, RSA-4096 or ECC BrainpoolP384r1 / P-384 for asymmetric operations, and SHA-256 or SHA-3 for hashing. ProVault's Core Engine hard-enforces these — any deviation is rejected at the compliance layer and logged as a policy violation.
  • Key Rotation Timelines: NCS specifies maximum key lifetimes per data classification category. ProVault's rotation orchestration is parameterized to automatically enforce these timelines, triggering scheduled or emergency rotation events without operator intervention.
  • Data in Transit: NCS requires TLS for all data movement. ProVault's Transit Proxy enforces TLS on every file transfer and verifies certificates before encryption begins.
  • Audit and Evidence: NCS requires cryptographic audit trails sufficient for regulatory inspection. ProVault's audit log captures the full lifecycle of every file — creation, encryption, access, rotation, and deletion — with timestamps and identities, exportable in audit-ready format.
  • Separation of Duties: NCS requires operational separation between data custodians and key custodians. ProVault's three-vault architecture architecturally enforces this — no single operator or role has access to all three vaults simultaneously.

ProVault is the only file encryption orchestration platform designed with NCS-1:2020 as a first-class design constraint rather than an afterthought compliance checkbox. This makes it uniquely positioned for Saudi BFSI, government, and healthcare digital transformation programs.

5

Mentor Discussion — Questions to Explore

The following questions are designed to stress-test the concept, refine the positioning, and prepare for investor or enterprise buyer conversations. Each question should be answered before proceeding to the detailed technical design phase.

Strategic & Market Questions

1
Which specific NCS category (Basic, Enhanced, Advanced) are our initial target customers required to comply with — and does our MVP enforcement layer cover that category fully?
2
Is our differentiation from HashiCorp Vault / AWS KMS clear enough that a CISO at a Saudi bank would immediately understand we are not a competing product but a complementary layer?
3
What is the realistic procurement cycle at a Saudi Tier-1 bank — and should our go-to-market be direct enterprise sales, system integrator partnerships, or embedding in a Saudi cloud provider's marketplace?
4
Do we need NCA certification or recognition before the first enterprise pilot — and if so, what is the pathway and timeline?

Technical Depth Questions

5
Our DEK-wrapper-only rotation approach avoids ciphertext rewrite — can we demonstrate mathematically that the security level is equivalent to full re-encryption under our threat model?
6
In multi-vault chunk distribution: what is the minimum number of vaults an attacker must compromise to reconstruct any file — and how does this threshold vary with our configuration options?
7
How does the Metadata Vault encryption key get managed — is it itself a KEK stored in the Key Vault, and does this create a circular dependency that weakens the isolation model?
8
What is our latency overhead for a 100 MB file encryption versus a direct S3 upload — and is this acceptable for the document management workflows in our target market?

IP & Legal Questions

9
Should we file a provisional patent application in Saudi Arabia (SAIP) before conducting any external demos or investor presentations — and what is the cost and timeline for a Saudi provisional filing?
10
Is the three-vault isolation architecture (Data / Metadata / Key) documented sufficiently in this brief to constitute prior art against future competing filings — and should we publish a technical whitepaper to establish priority?
6

Recommended MVP Scope

Phase 1 — Core Engine (Months 1–4)

  • Core encryption engine with AES-256-GCM and envelope model
  • Single vault integration (HashiCorp Vault as primary target)
  • Metadata vault isolation with independent encryption
  • DEK-wrapper-only key rotation
  • Spring Boot JAR starter deployment mode
  • NCS-1:2020 Advanced level compliance enforcement

Phase 2 — Enterprise Wrapper (Months 5–8)

  • Standalone microservice with REST and gRPC endpoints
  • Compliance dashboard with NCS audit export
  • Multi-vault chunk distribution (2–3 vault configurations)
  • AWS KMS and Azure Key Vault integration

Phase 3 — Ecosystem (Months 9–14)

  • Plugin ecosystem: S3 interceptor, JDBC BLOB layer, Kafka interceptor
  • Advanced policy engine with custom NCS profiles
  • Multi-language SDK (Python, Node.js)
  • NCA certification preparation package
Speed
Background
Encryption — 8-Step Flow
Live Operation Log
Architecture Layers — Encryption Path
L1Client
🖥
Application
REST / SDK
Any file type
📦
JAR / SDK
Embeddable
Spring / Quarkus
Microservice
REST / gRPC
Docker / OCI
↓ file intercepted before reaching storage
L2Intercept
🔀
Transit Proxy
Transparent
TLS enforced
Chunk Engine
Fixed-size splits
UUID per chunk
🔍
Integrity Hash
SHA-256 per chunk
NCS compliant
↓ chunks pass to encryption engine; keys fetched from isolated vault
L3Encrypt
🔐
AES-256-GCM
Per-chunk AEAD
NCS Advanced
🗝
DEK / KEK
Envelope model
Zero plaintext
🔑
ECC / RSA
Key wrapping
NCS Advanced
Parallel Engine
Multi-threaded
Fast throughput
↓ encrypted chunks + metadata dispatched to separate isolated vaults
L4Vaults
🏛
Data Vault(s)
Encrypted chunks
Multi-vault mode
|
📋
Metadata Vault
Chunk map
Encrypted separately
|
🛡
Key Vault
Zero-knowledge
ZK BYOK
↓ vaults connect to pluggable storage backends
L5Storage
Cloud Object
S3 · Azure · GCS
·
🗄
Relational DB
PostgreSQL · Oracle
·
🍃
NoSQL
MongoDB · Cassandra
·
🔌
Custom Adapter
Pluggable interface
Decryption — 8-Step Reverse Journey
Live Operation Log
Architecture Layers — Decryption Path
D1Request
🖥
Auth Request
Identity verified
🪪
Auth Gateway
JWT / mTLS
RBAC enforced
Decrypt Service
JAR / Microservice
↓ metadata retrieved to locate chunks and keys
D2Metadata
📋
Metadata Query
Chunk map
Vault locations
🗺
Vault Router
Parallel fetch plan
↓ DEK unwrapped from key vault
D3Key Unwrap
🛡
Key Vault
DEK unwrap
Version-aware
🗝
DEK In-Memory
Never persisted
Immediate use
↓ chunks fetched in parallel from storage
D4Fetch
Parallel Fetch
Multi-vault
Concurrent
🔓
AES Decrypt
Per-chunk AEAD
Auth verified
Hash Verify
Tamper detection
NCS compliant
🔧
Reassemble
Ordered chunks
Original restored
↓ audit logged, plaintext returned to authorized caller
D5Audit
📝
Audit Log
Immutable
NCS export
📄
Plaintext Out
Authorized caller
No caching
NCS Enforced
AES-256-GCM RSA-4096 ECC Brainpool P384 SHA-256 / SHA-3 TLS Transit Zero-Knowledge Vault BYOK Support NCS-1:2020 Advanced Rotation Enforcement Immutable Audit Log
Key Management
HashiCorp Vault — primary integration
AWS KMS — cloud-native
Azure Key Vault — hybrid
On-prem HSM — future
Pluggable KeyProvider interface
Deployment Modes
Spring Boot JAR starter
Standalone microservice (REST/gRPC)
Java SDK for direct API control
Plugin layer (S3, JDBC, Kafka)
Transit interception proxy
Differentiators
Zero-downtime key rotation (no rewrite)
3-vault isolation architecture
Multi-vault chunk distribution
NCS-1:2020 native enforcement
Transit interception (zero app change)
High-Level Architecture — Pictorial View
Applications & Deployment Surfaces
🖥
Web / Mobile App
Any client
📦
Spring Boot JAR
Embedded SDK
Microservice
REST / gRPC
🔌
Plugin Layer
S3 / JDBC / Kafka
Transit Interception & Core Engine
🔀
Transit Proxy
TLS enforced
Transparent
🏛 ProVault Core Engine
Chunker
4–64 MB
🔍
Hasher
SHA-256
🔐
AES-256-GCM
AEAD / DEK
🔑
ECC/RSA Wrap
KEK envelope
Three-Vault Isolation Architecture
🏛
Data Vault
Encrypted chunks
Multi-vault optional
📋
Metadata Vault
Chunk map
Encrypted separately
🛡
Key Vault
Zero-knowledge
BYOK · Encrypted DEKs
⬡ No single vault can reconstruct the file — all three must be compromised simultaneously
External Key Management Providers
🟠
HashiCorp Vault
On-prem / Cloud
·
🟡
AWS KMS
Cloud-native
·
🔵
Azure Key Vault
Hybrid
·
🔩
On-prem HSM
Future phase
Pluggable Storage Backends
S3 / Azure
Blob / GCS
·
🗄
Relational DB
BLOB columns
·
🍃
MongoDB
GridFS
·
🔌
Custom
Adapter
Compliance Engine & Audit Layer
🇸🇦
NCS-1:2020
NCA Saudi
Advanced Level
📊
Policy Enforcer
Algorithm rules
Rotation timelines
📝
Audit Logger
Immutable log
Compliance export
📈
Dashboard
Compliance view
Rotation status
Strategic Differentiators vs Existing Solutions
vs Key Vaults
HashiCorp / AWS KMS manage keys — ProVault orchestrates how files are encrypted using those keys
ProVault adds file chunking, metadata isolation, and NCS enforcement that key vaults do not provide
Complementary — not competing
vs Cloud Encryption
AWS S3-SSE / Azure SSE encrypt at storage level — ProVault encrypts before data reaches storage
Cloud providers can access plaintext — ProVault's zero-knowledge model prevents this
NCS compliance requires on-premise key control
vs Custom Solutions
Bespoke encryption code is not auditable, rotation is manual, and compliance proof is absent
ProVault provides a certified, deployable engine that replaces fragile DIY implementations
Multi-form deployment reduces integration friction