Data & Security
At Fujitsu, our mission to research and develop next-generation data circulation and utilization technologies is driven by the proliferation of the next-generation internet and generative AI. In addition, we focus on the advanced security technologies required to address the rising number of associated threats and risks. As a result, we are now actively pioneering the development of "Data x Security x AI" technologies that directly support growth and safety in society and businesses, leading the way in social implementation to the benefit of everyone.
Learn moreAvailable for trial use
Hot technology
About Trustable Internet
The concept of a Trustable Internet represents a new approach to simplify the verification of the authenticity of data on the Internet. Within this approach, the originator or a third party can add background information as authenticity proof of the original data and verify data by adding an "Endorsement Layer" to the Internet layers that is shared with the users. This configuration can be implemented without impacting the existing Internet, and allows Internet users to use the Internet and applications as usual, and, if necessary, obtain necessary information to verify the authenticity of data and information.
Digital Trust
Transparent Trust Transfer (Tr3)
Ensure authentic, tamper-proof workflows involving the exchange of data within and between organizations with even offline verification.
Fujitsu Data e-TRUST
Manage data transaction records in a tamper-proof manner, in addition to securing proof of the origin, ownership, and authenticity of circulating data.
ConnectionChain
Link various digital asset transaction processes by connecting multiple blockchains, enabling the entire process to be executed automatically as a single transaction.
Trustable Internet
Technology for combating disinformation in the digital world by linking Internet information with third-party evidence.
Federated SNS
Securely connect different organizations and activate communication with the support of AI chatbots to match user and organizational personalities.
AI Security
Security Audit Automation by AI
Automatically identify system security risks from design documents and other sources, and propose effective measures by using AI, leading to secure system development.
Request for trial use
Continuous Authentication (Fujitsu Kozuchi)
Multi-Camera Tracking
This technology enables real-time tracking of the same person with multiple different cameras.
Create new business value with Fujitsu digital trust technology?
How about considering a PoC (proof of concept) using digital trust technology? Each technology is provided as an API with documents, use cases and technical support is available.
For more detail