A compliance-first cryptographic engine for regulated enterprises — built for Saudi Arabia's NCA National Cryptographic Standards, designed to operate where existing key vaults cannot.
Every regulated enterprise today uses a key vault — HashiCorp Vault, AWS KMS, or Azure Key Vault. These systems manage keys well, but they do not enforce how files are encrypted, how metadata is isolated, or how compliance is proven at audit time. This gap is where ProVault operates.
ProVault is a file-level encryption orchestration layer that sits above your existing key management infrastructure. It does not replace your vault — it integrates with it and adds what is missing: structured file chunking, envelope encryption, metadata isolation across separate vaults, zero-downtime key rotation, and native enforcement of Saudi NCA National Cryptographic Standards (NCS).
One Core Engine. Four Deployment Surfaces. Zero duplicated cryptographic logic. ProVault delivers the same cryptographic guarantees whether deployed as a Spring Boot JAR, a standalone microservice, an SDK, or a storage plugin.
Several patents exist in the domain of file encryption, key management, and cloud storage security. ProVault's design deliberately combines mechanisms in a way that does not fall within the claims of any single existing patent, while the combination itself forms novel, patentable subject matter.
| Patent / Prior Art | Core Claim | ProVault Differentiation |
|---|---|---|
| US10,146,962 (IBM) Key Rotation |
Re-encrypting stored ciphertext during key rotation, requiring file-level rewrite on rotation events. | ProVault performs DEK-wrapper-only rotation — the underlying ciphertext is never rewritten. Only the encrypted DEK envelope is updated, achieving zero-downtime rotation without the patented rewrite approach. |
| US9,537,651 (Microsoft) Envelope Encryption |
Envelope model for cloud data where DEK is stored co-located with the encrypted file object. | ProVault uses vault-separated DEK storage — the encrypted DEK is stored exclusively in the Key Vault, physically and logically isolated from the data storage layer. Co-location is explicitly prohibited in our architecture. |
| US10,904,234 (Amazon) Multi-Region Key |
Key replication across geographic regions for disaster recovery. | ProVault's multi-vault model distributes chunks across vaults, not keys. Key replication is delegated entirely to the external KMS. Our novelty is the chunk-distribution and metadata isolation model, not key geography. |
| EP3,264,713 (Thales) HSM + Application |
Application-layer encryption with hardware HSM integration for financial services. | ProVault's pluggable KeyProvider interface treats HSM as one of several interchangeable backends. Our orchestration layer is HSM-agnostic and regulation-parameterizable — specifically parameterized for NCS, which Thales's patent does not address. |
| US10,367,637 (Google) Chunk-Level Encryption |
Dividing data into shards and encrypting each with independent keys within a single storage system. | ProVault uses a single DEK per file across all chunks (not one key per chunk), combined with cross-vault chunk distribution. The metadata isolation vault is an architecturally distinct element absent from this patent's claims. |
ProVault's patentable novelty lies in the combination of: (1) DEK-wrapper-only key rotation without ciphertext rewrite; (2) three-vault isolation architecture (Data / Metadata / Key); (3) multi-vault chunk distribution with a separately encrypted metadata map; and (4) regulation-parameterizable compliance enforcement — all within a single orchestration engine. No existing patent claims this combination.
The Kingdom of Saudi Arabia's National Cybersecurity Authority (NCA) published the National Cryptographic Standards (NCS-1:2020) to define mandatory cryptographic requirements for all entities operating in regulated sectors — including banking, government, healthcare, and critical infrastructure.
ProVault is the only file encryption orchestration platform designed with NCS-1:2020 as a first-class design constraint rather than an afterthought compliance checkbox. This makes it uniquely positioned for Saudi BFSI, government, and healthcare digital transformation programs.
The following questions are designed to stress-test the concept, refine the positioning, and prepare for investor or enterprise buyer conversations. Each question should be answered before proceeding to the detailed technical design phase.