Fujitsu Data and Security Technologies

What if people lost trust in digital technology?

It’s not an impossible scenario and so how do you overcome the issue of digital security in an increasingly borderless world?

The rising wave of cyberattacks, data breaches, fake news, and ID fraud is already straining people’s trust in data and the online world. Our physical social infrastructure, such as power networks, is at risk of cyberattack too, undermining trust even further. And these issues are only going to multiply as borders blur between people, physical objects, and digital entities in the metaverse and digital twins.

Looked at through this lens, cybersecurity takes on a fundamental role in a digital society. Finding cyber security solutions to these and future threats, and helping create trust in everything, is a key part of Fujitsu’s mission.

The Fujitsu approach to Data and Security

Our approach recognizes that conventional, centralized modes of operating in business and society are changing. These are evolving into open, distributed network structures, such as new mobility services, API economy in finance and retail, and distributed power networks.

To ensure we can trust everything connected to physical and digital spaces, Fujitsu has developed a self-sovereign and decentralized digital identity technology. This is a key enabler of the borderless world. We also provide privacy-related and identity technologies, including multi-biometric authentication and privacy protection. And we are working with customers to provide autonomous distributed trust technology that allows end-to-end traceability across connected ecosystems.

New trust technologies for the borderless world

To address emerging challenges, Fujitsu is focused on developing data trust technologies that ensure the authenticity of data to facilitate information exchange.

For example, our new Data e-TRUST Service creates secure data exchange across industries using Fujitsu’s IDentitY eXchange (IDYX) and Chain Data Lineage (CDL) technologies. We have also developed transparent Trust Transfer Technology that prevents tampering with business data exchanged between private and public organizations, ensuring authenticity. And in gaming, we have partnered with leading software companies to create a new digital signature solution for digital data rights management, enabling secure distribution and sales of digital data in the metaverse and gaming worlds.

We are also strengthening the security of the networks and AI systems underpinning our social infrastructure. And developing - backed by cyber security consulting and services through the Fujitsu Uvance brand of Hybrid IT solutions - trust technologies that ensure access to people, systems and devices across physical and digital spaces.

For example, as sustainability becomes a global imperative, our ConnectionChain technology could connect multiple blockchains to allow the free flow-through of tokens, enabling end-to-end traceability across connected ecosystems.

Fujitsu blockchain technology is rebuilding trust across ecosystems and supply chains

Fujitsu Track and Trust blockchain technology brings a trusted point of validation across production, supply, distribution, and sales networks. It creates a seal of authenticity with a transparent and tamper-proof way of tracing, tracking, and verifying an item’s credentials throughout its journey and lifespan. Track and Trust provides the supply chain traceability needed to improve operating efficiencies and costs, from the procurement of raw materials to logistics and beyond – enabling a less wasteful and more efficient supply chain.

We are also using blockchain technology to enable organizations to build traceability across their global supply chains and transparent trading platforms for rice and water, helping to create a truly regenerative society. Check out our customer stories on RiceX and Botanical Water Technologies for more details.

While blockchain is not a universal solution to security and trust challenges, the decentralization of authority that lies at the heart of this technology is going to be crucial. It holds the promise of a new era where identity and data - and access to both - is enabled by “self-sovereign” technologies that restore control to people and rebuild trust in the digital world.