-
New Data&Security technologies are emerging one after another!
Create new business value with Fujitsu Data&Security technology!You can conduct proof-of-concept experiments for new ecosystem-type business models using Fujitsu latest Data&Security technology. Each technology is provided as an API, with documentation, use cases, and technical support available.

Easy to try!
What you can do with Fujitsu Data&Security technology
-
- Quickly conduct PoC (Proof of Concept)
with the latest Data&Security technology. - Achieve a reliable autonomous distributed data collaboration system and start proof-of-concept experiments smoothly.
- Quickly conduct PoC (Proof of Concept)
-
- No need to prepare a Data&Security
technology environment. - You can start considering PoC right now using the API on the cloud.
- No need to prepare a Data&Security
-
- Experts provide technical support.
- Even with complex technologies, Data & Security technology experts will work alongside you to consider how to use them.
Customer challenges
-
Problem01
I don't know which Data&Security technology is best for solving the problem. -
Problem02
I have a service idea for a new Data&Security technology, but developing a PoC from scratch is time-consuming and expensive. -
Problem03
I want to combine various technologies to concretize my business idea.
Partner Case Studies:
Your Special Experience: NFT Use Case Examples
Kanazawa Institute of Technology
- Issuing unique NFTs leveraging Fujitsu's digital trust technology
-
- Problem
- It is difficult to maintain a continuous relationship with visitors only through one-time event attendance.
- Effect
- Owning an NFT allows you to store special experiences and create a flow to attract new customers through sharing on SNS and transferring NFTs.

Circulation of Learning Information: Data e-TRUST Use Case Examples
Kwansei Gakuin University
- Trusted data exchange system of learning information for human resource development(Fujitsu Japan Limited)
-
- Problem
- Companies recruiting talents need reliable data on learning information and possessed skills. On the other hand, there is no mechanism for students to easily digitally distribute and control the disclosure of their possessed skills.
- Effect
- Universities can certify possessed skills, and companies can verify them. Skill data can be disclosed with the consent of individual students.

Cross-border Securities Settlement: ConnectionChain Use Case Examples
Asian Development Bank
- The effectiveness of Fujitsu's "ConnectionChain" technology for cross-border securities settlement demonstrated in Asian Development Bank’s field trials
-
- Problem
- Cross-border securities transactions incur increased transaction costs and settlement times due to the large number of financial institutions involved as intermediaries.
- Effect
- By connecting blockchain-based financial systems experimentally constructed by multiple players through "ConnectionChain," cross-border securities settlement becomes easier.

Demonstrate the newly created value using Data & Security technologies.
Example of the PoC process:
-
- STEP 1
- Inquire via the web.
-
- STEP 2
- Receive an explanation of the technical overview and PoC from the person in charge
-
- STEP 3
- Sign the contract (NDA, MoU)
-
- STEP 4
- Plan a PoC while receiving support such as technical explanations and advice on applying technology to use cases as needed
-
- STEP 5
- Agree to the terms of use of the Fujitsu Research Portal and develop a PoC system using the API
Please try Fujitsu's Data & Security technologies.
Sign up for an account to use the APIs and web applications.