THANK YOU FOR SUBSCRIBING
Fujitsu Leverages Blockchain Security Technologies to Strengthen Enterprise Data Security
Fujitsu develops blockchain-based security technologies to safely and securely handle confidential data between multiple organizations.

By
Apac CIOOutlook | Wednesday, October 26, 2016
Stay ahead of the industry with exclusive feature stories on the top companies, expert insights and the latest news delivered straight to your inbox. Subscribe today.
SUNNYVALE, CA: Fujitsu pronounces the development of blockchain-based security technologies: a transaction restriction technology based on pre-established policies to restrict trading and a document encryption technology, which allows only relevant parties who hold multiple distributed keys to securely access the information recorded in the blockchain. This development aims to safely and securely handle confidential data between multiple organizations. Fujitsu uses the technology to form the latest platform for linking information.
Transaction Restriction Technology
The transaction restriction technology prevents the misuse or abuse of keys, enabling safer use of the blockchain. It can restrict transactions based on pre-established policies providing a new framework thatties policies to keys used in activities such as capital transfers. The technology prohibits initiated transactions which violate policy requirements from getting added to the blockchain as a result of verification failures at multiple computers participating in the blockchain. It prevents the misuse or abuse of keys based on preset policies for secure blockchain operations.
Document Encryption Technology
The document encryption technology creates a workflow where documents are acknowledged by collective decision making or between specified organizations, or where they can be restored when keys are lost. Fujitsu has also applied a secret sharing-based key management system to document encryption, where different portions of a key are held by multiple users. This enables to generate a key once a specified number of pieces have been gathered. The latest technology has the ability to control the accessibility of contract documents, blocking the confidential portions of the contracts to ordinary users. It helps find solutions to lost keys, or to create a workflow that requires acknowledgement from multiple managers when making collective decisions involving large transaction amounts.