Skip to content

Home

Fujitsu Data e-TRUST
We deliver the "trust" that has been desired in the digital space – guaranteeing data authenticity and enabling free and secure data exchange – through our proprietary technology.

Fujitsu Data e-TRUST Use Cases

An image of a woman feeling safe/secure.
Data e-TRUST, which instills "trust" in data, is already being utilized in various fields.Examples include ensuring the reliability of personal career and skill information in talent matching; managing transaction records in supply chains in a tamper-proof manner; and maintaining confidentiality while sharing only necessary information by finely controlling access rights even after data distribution.
For details, please see our case studies.

Experience the Latest Information Now

An image of a man smiling while using his smartphone.
This page allows you to try out some of the Data e-TRUST APIs.
Please make use of these features, including data access control, electronic certificate issuance, and tamper-proof record management, to solve your business challenges and generate new ideas.

API Click here to try the API

Learn about the Commercial Version

Realizing the safe, secure, and free exchange of data

Fujitsu Computing as a Service Data e-TRUST : Learn more here. > https://www.fujitsu.com/global/services/caas/data-e-trust/

Technical Overview

This site’s Data e-TRUST allows you to easily try out "Fujitsu Computing as a Service Data e-TRUST”, which is our product and incorporates Fujitsu Laboratories' technologies IDYX(1) and CDL(2) technologies developed at Fujitsu Laboratories. It provides a suite of trust functions for secure and reliable data exchange.

For example, it is suitable for situations where:

  • You are unsure if a product's capabilities meet your needs based solely on marketing materials.
  • You are in the planning stages and lack budget but need to verify feasibility.

In such cases, we can collaborate on small-scale proof-of-concept (PoC) experiments. After this trial, seamless transition to larger scale/more detailed PoCs or full service development using Data e-TRUST product version is possible through collaboration with our product division.

(1)IDentitY eXchange: Fujitsu technology guaranteeing the authenticity and integrity of data.
(
2)Chain Data Lineage: Fujitsu technology enabling centralized management of transaction and activity histories between individuals and organizations using hash chain ledger technology.

[Important Note]:

The functionality of Fujitsu Data e-TRUST provided on this Fujitsu Research Portal may differ slightly from the (paid) service offered in Fujitsu CaaS Data e-TRUST. Key differences are listed below, but this list is not exhaustive.

  • Differences exist in non-functional aspects such as availability, performance/scalability, and operability.
  • Client notification functionality is unavailable on the Fujitsu Research Portal.
  • Service administrator roles are unavailable on the Fujitsu Research Portal.
  • The "App Development API" (access using subscription keys) is only available on the Fujitsu Research Portal and not in the Fujitsu CaaS Data e-TRUST service.

Target Industry/Users

  • Education/Human Resources (skill certification)
  • Manufacturing (value chain management)
  • Media (content rights management, secondary use, digital signatures)

Challenges in Target Industry and Operations

  • Users need to share data across multiple individuals, companies, and organizations for supply chain management, etc. However, data disclosure/non-disclosure policies vary greatly which leads to complexity.
  • They also need to ensure the authenticity of shared data.
  • Media (content rights management, secondary use, digital signatures)

Technical Challenges

  • Securely managing data for each individual/company/organization while implementing granular access control for sharing necessary information.
  • A mechanism for third-party verification of data authenticity across various data types exchanged between individuals, companies, and organizations.
  • Managing and easily visualizing the series of activities that occur between individuals, companies, and organizations during transactions.

Solutions

Fujitsu Data e-TRUST utilizes three key technologies: IDYX (IDentitY eXchange), CDL (Chain Data Lineage), and distributed database integration, to achieve the following:

  • Securely manage data for each company and control data sharing between companies.
  • Enable the electronic certification, distribution, and utilization of various types of information.
  • Manage transaction records in a tamper-proof manner.

Fujitsu Data e-TRUST's Key Technologies

Fujitsu's Technological Advantage

Fujitsu Data e-TRUST allows individuals and companies to retain control over their data while enabling consent management and access control.

Fujitsu Data e-TRUST feature comparison

The benefits of Fujitsu Data e-TRUST

  1. Trusted Data Hub: Enables data collaboration across individuals, organizations, and enterprises, providing governance features such as individual/organizational consent and access control.
  2. Digital Proof: Provides various digital certificates for authenticating individuals, organizations, and enterprises.
  3. Digital Footprint: Manages and links the traces of transactions and activities exchanged between individuals, organizations, and enterprises, visualizing the value chain and customer journey.

Use Cases

Fujitsu Data e-TRUST usage seane

Case studies

Nagase & Co., Ltd.(Press Release: October 2022 https://www.fujitsu.com/global/about/resources/news/press-releases/2022/1017-01.html )

[Challenges]

  • Analog document management across companies takes time and effort.
  • The lack of organized management for the sending, receiving, and storage of chemical documents can increase the accidents and the risk of regulatory violation.

[Solution]

  • Nagase & Co., Ltd.’s Chemical Document Management SaaS “DocuValue” changes analog business-to-business procedures to DX (digital transformation)!
  • By using Fujitsu Data e-TRUST as a data distribution platform, information regarding business relationships will be kept confidential, with only authorized personnel having access to information required as the evidence!!

A figure demonstrating a case study of Nagase & Co., Ltd.

Kwansei Gakuin University(Reference: https://www.nttdata-strategy.com/assets/pdf/info/trusted_webR3_koubo/saitaku_doc03.pdf )

[Challenges]

  • Authenticity/Credibility of digital information of personal career and possessed skills is needed to realize talent matching for companies.
  • There is no mechanism to control the digital distribution and disclosure of individual learning information and skills by users.

[Solution]

  • Universities will prove students learning information and skills, while companies will be able to verify it, resulting in improvement of the credibility of data!
  • Digitally distributed student learning information and skills data can be disclosed and controlled with the consent of individual students!

A figure demonstrating a case study of Kwansei Gakuin University

Teikoku Databank (Press Release: November 2022, https://pr.fujitsu.com/jp/news/2022/11/9.html )

[Challenge]

Although digital signatures or passwords can verify the authenticity of a digital document created by individuals, they do not inherently prove the document's origin from a specific company or organization.

[Solution]

  • Fujitsu Data e-TRUST operates on the backend of the file sharing service BOX and provides Electronic seal in cooperation with corporate authentication data of Teikoku Databank.
  • Electronic seal enables safe and secure delivery of digital documents by verifying corporate authentication data of the issuing company by the receiving company.

A figure demonstrating a case study of Teikoku Databank

Technical Trial

Press releases

Documents

Document Title Explanation
Fujitsu Data e-TRUST Instructions and Features This document describes the features of Fujitsu Data e-TRUST.Everyone involved with Fujitsu Data e-TRUST should read this manual first.
Editing Fujitsu Data eTRUST Account Information This document explains how to edit account information for Fujitsu Data e-TRUST.
Fujitsu Data e-TRUST message collection This document describes the messages and workaround for the most common errors that occur with Fujitsu Data e-TRUST.If you encounter an error not described in this manual, contact your system administrator.

API Click here to try the Web API