Non-server hyper-secure storage supporting enterprise confidential information management with web3 infrastructure

Utilizing the confidential distribution technology of web3, we provide a hyper secure storage network that can be used to prove data falsification and to share data in closed networks.

It is also possible to incorporate it into an existing company system and use data in cooperation with other companies.

An innovative solution that combines the conventional data cooperation and storage method that combines the world's most advanced technology.

組織の課題をデータで解決

Solutions

  • Using tther companies and overseas servers remains worry about safety.

    We would like to prevent leakage of internal confidential information due to cyber attacks and the risk of illegal use of data.

  • It cannot be determined even if important data is corrected or falsified.

    We would like to be able to grasp the data that is preserved and managed not to be incorrectly modified or tampered.

  • There is no data tracking function and we would lile to add it to the existing system.

    We would like to add functions that can track the data distribution process to the in -house system and increase convenience.

Features of furehako®

Gathering the world's most advanced technology.web3 distributed hyper security storage utilizing confidential distribution technology

Data safety management Data sharing

furehako® is a next -generation confidential distribution hyper security storage that can safely upload, download, and share data. Various data, such as videos, images and documents, can be used by effectively utilizing empty storage capacity between companies and organizations, to manage confidential information and prevent information leakage at the same time.

※What is confidential distribution?
Technology for fragmentation and encryption of files.

With a data -specific ID, it prevents falsification at the shared destination

Data safety managementData proof

In furehako®, using the hash value, which is an encrypted technology, you can confirm that the uploaded data is unique, has not been edited or tampered, and prove the truth of the data.

※Because different hash values are generated if data is modified in even one location.

Utilization as a platform for data tracking

Data safety managementData tracking

It can be recorded on a blockchain or smart contract as a platform for tracking data. Data can be tracked in traceability, supply chain and various other fields. It can be highly effective in preventing unauthorized data distribution and protecting the rights of original data creators.

Other useful features that take advantage of decentralized management are also available.

  • Available without internet environment

    If you connect the user with a closed P2P network, you can share data without going through a public Internet. Data does not leak out of the network even in the same company.

  • Strong data leakage measures

    Uploaded data is fragmented and encrypted and diversified by our own algorithms. Therefore, it realizes strong data leakage security.

  • Strong against cyber attacks

    In the unlikely event of a cyber attack, there is no theoretical server down. Since the processing is inherited by different nodes of the system, the service can be used continuously. This is a unique feature of "distributed management".

  • 100% Japan domestic storage for high security.

    furehako® can be stored only in the store or related parties, so it can manage data without using overseas servers and networks.

  • Together with data censorship security

    The saved data is managed in a non -centralized right, and the security management and data storage permissions are given only to the user. Since the external server is not used, there is no unreasonable data censorship by an external service provider.

  • Cooperation with public blockchain

    You can record information on the public blockchain and upgrade it as a more tamperable and more truthful information sharing service. Please feel free to contact us about development and implementation.

Storage service plan

Basic usage fee

1TB 24,000Yen ~ Initial costs Separate quote

Option Plan A

24 hours a day, 365 days a year.

Implement a mechanism to ensure data availability

Availability upgrade

Separate quote

※Please contact us for the capacity

Option Plan B

Large -capacity data can be saved

Implement a mechanism to store data permanently (integrity).

Complete upgrade

Separate quote

※Please contact us for the capacity

You can use the options according to your wishes.
Please feel free to contact us regarding the introduction.

In addition, with furehako®your system can

be customized & be white-labeled!

Can be incorporated into existing systems

furehako® can be freely incorporated according to your business flow, existing systems, and applications. We also accept customization to promote business efficiency. It is a service that can be used as a new infrastructure for data sharing.

Can be sold as own brand after customization.

Customized systems can be sold as White Label. By customizing as a white label, you can reduce the cost of developing a system from scratch and how to use the system after introduction, while using the latest technology of web3 and confidential distribution. Incorporate it into your own system and use the latest technology easily.

  • New business development by White Label (OEM) sales
  • Realization of unified platforms with cooperating companies
  • Realization of unified platforms with cooperating companies

Selectable usage environment

Storage service plan

For those who want to operate only with a fixed organization,Or only inside the company or in -house + cooperating company, etc.

  • We would like to make effective use of the storage space in a fixed organization and share data safely and securely.
  • If the storage capacity in the organization is insufficient, the introduction of the NAS can be used to save large capacity.
  • If it is difficult to secure a storage environment in the organization, we can provide an in -house environment that can be used 24 hours a day

White label plan

For those who want to incorporate it into their own systems and services, or those who want to sell as their own products on an OEM basis.

  • We would like to introduce a structure of web3, confidential distribution in our company system.
  • Customizable such as incorporating in -house systems and services, seamless data linkage between systems.
  • It can also be used for safe and secure data cooperation throughout the supply chain, including other companies.

Staff supports well until the introduction.
Please feel free to contact us anytime.

Comparison with existing services

furehako® is a next -generation storage service that covers the weaknesses of existing services

※1、※2: Additional upgrading options plans is required.

Realizes highly safe data management, which is incomparable with existing services.

Leave the construction of a storage service that can be branded in-house to furehako®.

Flow of our service

Our staff can assist you in customizing your existing system to meet your needs.

Examples

furehako® can be used by companies in various sizes and industries.

Supply chain field: Drone company

The entire supply chain is not consistently managed, and information cannot be tracked. Furthermore, the aerial photography data is not linked to the aircraft information, and it cannot be proven when the data was taken with each aircraft.

It can be solved by registering drone aircraft information etc. on furehako® upstream of the supply chain.

Register the drone aircraft information on furehako® and manage the photographed aerial data with the manufacturing number. By generating a hash value, the unique ID and video data of the aircraft number are linked throughout the supply chain, so you can provide safe traceability.

Disaster rescue field

On the front line of the disaster site, information on secondary disasters cannot be shared to rescue operators in real time in real time.

If you have a smartphone or PC storage, you can share data even in an environment where the network cannot be used.

Connect storage between each other with a closed P2P network, go through a proprietary router, provide real -time information to members on the front line, and contribute to protecting the lives of disaster sites by linking on -site status and information on the victims.

Police field

When performing crowded security such as fireworks displays and large events, considerable congestion is expected, so we would like to cooperate with information in a closed network that has high security to prevent the accident accident and strengthen the security network.

Using furehako®, you can share video data taken with drones and security cameras in real time, and immediately call on site members and request an increase in staff.

By building a closed P2P network, it is possible to exchange information on a closed network exclusively for police, allowing data to be shared while maintaining a high level of security.

Field of study

Tales, fabrication, and plagiarism of papers are issues. If there is a mechanism to ensure the truth of the research paper …

furehako®, where a new ID is issued each time the data is modified and processed, can clarify the truth of the dissertation.

You can ensure the truth of the research paper using a mechanism that is converted to different IDs each time data is modified or processed. In addition, the lab will be able to share confidential materials safely and guarantee the truth of the dissertation in the public environment, and realize data sharing platforms that protect the author's vested interests.

FAQ

In the case example, what should I do if there are 1TB of files that we would like to exchange?

Case example: If each individual PC in the company network has only 128 GB of space, and the area you want to (can) use for secret sharing is 10 GB each for 10 people (units), for a total of only 100 GB.

We recommend the introduction of NAS (Network Attached Storage) provided by our company. Since NAS is specialized for data storage, we recommend it for its performance and price. However, we can also accommodate customers by installing a new high-capacity PC according to their budget and situation.

In the case example, if I don't have 1TB of space, how do I download it?

Case example:If each individual PC in the company network has only 128 GB of space, and the area you want to use (or can use) for confidential dispersion is 10 GB each, for 10 people (units), for a total of only 100 GB.

If data is to be downloaded to each PC, it is necessary to increase the capacity of the PC to be used. We will propose a configuration that includes the above NAS according to the actual business use.

If the PCs participating in a node are turned off, can the distributed processed files be used?

It may not be available.

If a PC participating in a node is turned off, that node loses its ability to process files in a distributed manner. Therefore, the file fragments held by that node will be available only when that node is turned on again or another node has the file fragments. However, if you subscribe to the availability option, you can build an environment in which the files are always available.

In the case example, what happens if a file uploaded to a node is deleted?

Case example: In a node with 100 participants, Mr. A shared image X. After that, since image X was a file that should not be shared, he deleted it from the node and his PC. Later, since image X was a file that should not be shared, Mr. A deleted it from the node and his PC. What happens to image X shared by the remaining 99 people?

It will be completely deleted from the node.
However, of course, if someone else (let's say Mr. B) downloads the image to his PC, it cannot be deleted. On the other hand, if Mr. B publishes the image on the Internet, it is possible to confirm that the image X has been leaked by checking the hash value of the image and to seize evidence.

I want to save my data permanently. How can I do this?

The "pinning" of files allows them to be permanently stored.Secret sharing is a mechanism that allows for the generation of files that have not been accessed or used for a long period of time (i.e., newer and more frequently used files are given priority for storage).Therefore, if you want to store files permanently, you need to use the "pinning" setting.Please be assured that we will support you in setting up "pinning" separately.

For more information, please click here.

Free Consultation
Please feel free to contact us

If you have any questions about our services, utilization, or fees
Please feel free to contact us.