01
Vendor sends sensitive text to the gateway.
02
Gateway verifies signature and enforces zone rules.
03
Sidecar replaces sensitive values with labels and stores mappings.
04
Vendor output is safe — only labels leave the trust boundary.
05
Internal requests restoration (audited + authorized).
06
Sidecar restores originals and returns to internal systems.