@CloudExpo Authors: Yeshim Deniz, Pat Romanski, Elizabeth White, Zakia Bouachraoui, Liz McMillan

News Feed Item

Fujitsu Develops Platform Technology for Secure Application Execution on Smartphones for Business Use

Linking mobile devices to the cloud facilitates the construction of a system that enables business services to be accessed in a mobile environment

Kawasaki, Japan, Aug 31, 2012 - (JCN Newswire) - Fujitsu Laboratories today announced that it has developed platform technology for application execution that enables secure use of internal company services with a smartphone or other mobile device without sacrificing convenience.

Currently there is great interest in using smartphones to access corporate data systems for business, however doing so presents the problem of ensuring security. To address this issue, Fujitsu Laboratories has linked smartphones to the cloud to produce an environment in which a company's internal services can be executed using a smartphone only when they are needed, enabling secure execution of these applications. As a result, internal company services that until now have only been run within a company's network can now be securely accessed inside or outside the company using a smartphone, raising the prospects for improving work efficiency in a variety of situations.

Details about this technology will be announced at the Financial Information Technology 2012 Seminar, held September 6 at Tokyo International Forum.


Human-centric computing seeks to bring about a world in which, by eliminating the barriers between systems and people, convenient services can be accessed without people even being aware of the systems that deliver them. With the advent of smartphones, these needs have only increased. Now the use of smartphones for business is rapidly expanding. As opposed to consumer use, the ability to protect internal company data is essential for business use.

Technological Issues

Given the current situation, companies are either not allowing smartphones to be used for business due to security concerns, or they are allowing them to be used and are forced to endure a vague sense of uneasiness. Specifically, they are facing the following problems:

- Companies have rules against carrying computers off premises, but it is difficult to strictly enforce them in the case of smartphones, which are designed to be carried around.
- There is the risk that confidential business data could be taken, either through a computer virus infection or by hacking through the network.
- There is an increased risk of business data leaks when using outside networks. It would be better to have a closed system that could only be accessed internally on company premises, but then employees would not be able to access internal company services offsite.

About the Newly Developed Technology

To address these issues, Fujitsu Laboratories developed a secure application execution platform that controls smartphones from the cloud to produce an environment that enables secure execution of internal company services.

The technologies underlying the secure application execution platform are described below.

1. Context desktop technology

Fujitsu Laboratories developed context desktop technology that switches screens or manages distributed applications depending upon the situation (see figure 2). For example, if it is detected that the smartphone is carried into the office, the screen will switch to one more appropriate for work. Only when applications are needed are they delivered from the cloud to the smartphone, and they are erased when they are no longer necessary. By controlling the management of applications in this way via the cloud, users can securely carry out operations without endangering the company's environment.

2. Secure execution environment technology

Fujitsu Laboratories also developed secure execution environment technology that enables applications to be securely executed and imposes usage restrictions on, for example, the smartphone's built-in camera or network access (see figure 3). The applications and data are encrypted in advance and delivered to the smartphone. The encrypted data is kept as it is on the smartphone and the decryption is carried it out on the fly. As a result, the decrypted data will not be stored anywhere except in the execution memory. In addition, if necessary, usage restrictions can be imposed on the smartphone's camera or the network, enabling unnecessary operations to be prevented. For example, even if there was malware embedded in an application that was able to read data stored in a memory card and upload it onto a website, this action would be prevented if the smartphone was managed in advance to only be able to access designated websites.

3. Seamless push technology

Fujitsu Laboratories also developed seamless push technology that enables the seamless delivery of applications to smartphones, regardless of whether it is through the company's own network or an external network (see figure 4). For example, if the owner of the smartphone is outside of the company, a notification will be sent requesting that the smartphone first establish a connection with a secure virtual private network (VPN). This is done over a public mobile network, from the cloud to the smartphone. Having received the notification, the smartphone connects with the cloud and the VPN, establishing a secure transmission line, thus allowing company data to be received safely. Rather than restricting the delivery of applications only to smartphones connected to the company's own internal network, this also enables the delivery of applications to smartphones that are connected to public networks outside of the company, enabling users to securely access internal company services.


With this technology, data is automatically protected without users having to consider where they are, and internal company services can be securely delivered and executed in any situation. This will enable advancements in the ways smartphones can be used with company systems in a variety of scenarios without sacrificing the smartphone's functionality.

In healthcare, for example, rather than restricting access to hospital systems to within the hospital, the hospital's internal services could be accessed at the scene of an accident or from inside an ambulance, protecting the data while displaying it on a smartphone, thereby enabling more efficient and precise medical care.

Future Plans

Fujitsu Laboratories is working on packaging this technology to make it easy to build secure systems with the aim of commercializing it in fiscal 2012.

About Fujitsu Laboratories

Founded in 1968 as a wholly owned subsidiary of Fujitsu Limited, Fujitsu Laboratories Limited is one of the premier research centers in the world. With a global network of laboratories in Japan, China, the United States and Europe, the organization conducts a wide range of basic and applied research in the areas of Next-generation Services, Computer Servers, Networks, Electronic Devices and Advanced Materials. For more information, please see: http://jp.fujitsu.com/labs/en.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Over 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE:6702) reported consolidated revenues of 4.5 trillion yen (US$54 billion) for the fiscal year ended March 31, 2012. For more information, please see www.fujitsu.com.

Source: Fujitsu Limited

Fujitsu Limited
Public and Investor Relations

Technical Contacts:

Fujitsu Laboratories Ltd.
Human Centric Computing Laboratories, Smart Platform Lab
E-mail: [email protected]

Copyright 2012 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Every organization is facing their own Digital Transformation as they attempt to stay ahead of the competition, or worse, just keep up. Each new opportunity, whether embracing machine learning, IoT, or a cloud migration, seems to bring new development, deployment, and management models. The results are more diverse and federated computing models than any time in our history.
On-premise or off, you have powerful tools available to maximize the value of your infrastructure and you demand more visibility and operational control. Fortunately, data center management tools keep a vigil on memory contestation, power, thermal consumption, server health, and utilization, allowing better control no matter your cloud's shape. In this session, learn how Intel software tools enable real-time monitoring and precise management to lower operational costs and optimize infrastructure for today even as you're forecasting for tomorrow.
"Calligo is a cloud service provider with data privacy at the heart of what we do. We are a typical Infrastructure as a Service cloud provider but it's been designed around data privacy," explained Julian Box, CEO and co-founder of Calligo, in this SYS-CON.tv interview at 21st Cloud Expo, held Oct 31 – Nov 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA.
Isomorphic Software is the global leader in high-end, web-based business applications. We develop, market, and support the SmartClient & Smart GWT HTML5/Ajax platform, combining the productivity and performance of traditional desktop software with the simplicity and reach of the open web. With staff in 10 timezones, Isomorphic provides a global network of services related to our technology, with offerings ranging from turnkey application development to SLA-backed enterprise support. Leading global enterprises use Isomorphic technology to reduce costs and improve productivity, developing & deploying sophisticated business applications with unprecedented ease and simplicity.
While a hybrid cloud can ease that transition, designing and deploy that hybrid cloud still offers challenges for organizations concerned about lack of available cloud skillsets within their organization. Managed service providers offer a unique opportunity to fill those gaps and get organizations of all sizes on a hybrid cloud that meets their comfort level, while delivering enhanced benefits for cost, efficiency, agility, mobility, and elasticity.