Fujitsu Data e-TRUST

Manage the data exchange trail in a tamper-proof format with Fujitsu Data e-TRUST, which uses Fujitsu's unique IDentitY eXchange (IDYX) technology, Chain Data Lineage (CDL), to track the origin and ownership of circulating data with proof of genuineness.

IDentity eXchange (IDYX) is our technology that ensures that utilized data includes correct information and has not been tampered with. IDYX enables the issuance and use of various electronic certificates for digital information, protecting the genuineness of information exchanged in digital transactions.

Chain Data Lineage (CDL) is our technology which enables the centralized management of transactions and activity histories between individuals or corporations using hash chain registry technology. In addition to preserving transaction history in a tamper-proof format, CDL can connect and manage a series of activities that occur during a transaction between individuals/corporations.

The Fujitsu Data e-TRUST feature, Fujitsu's trust service that provides these technologies as API, is available for trial.

Editing Fujitsu Data e-TRUST Account Information

Please update Fujitsu Data e-TRUST account information from the "Fujitsu Data e-TRUST attributes" page according to "How to Edit Fujitsu Data e-TRUST Account Information" .

Documents

Data e-TRUST Instructions and Features

Fujitsu Data e-TRUST Instructions and Features [PDF]

Instructions/explanations of features for Fujitsu Data e-TRUST.

Editing Data e-TRUST Account Information

Editing Fujitsu Data e-TRUST Account Information [PDF]

Manual for editing account information necessary for Fujitsu Data e-TRUST.

Data e-TRUST Message List

Fujitsu Data e-TRUST Message List [PDF]

List of main error messages that occur on Fujitsu Data e-TRUST and how to handle them.

Not for corporate use

Notice regarding Fujitsu Data e-TRUST provided on the Fujitsu Research Portal

The features of Fujitsu Data e-TRUST provided on this Fujitsu Research Portal may differ in some specifications from the services provided (for a fee) on Fujitsu CaaS Data e-TRUST. The main differences are as follows. However, it is not guaranteed that the differences are limited to these.

  • There are differences in non-functional aspects such as availability, performance, scalability, and operability.

  • The client notification feature is not available on the Fujitsu Research Portal.

  • The service operator role is not available on the Fujitsu Research Portal.

corporate PoC

At Fujitsu, you can conduct a proof of concept (PoC) for a new autonomous decentralized business model using the latest Web3 technology.
If you are interested in PoC, please apply from the following corporate PoC inquiry form.

PoC inquiry form