@CloudExpo Authors: Zakia Bouachraoui, Yeshim Deniz, Elizabeth White, Pat Romanski, Roger Strukhoff

News Feed Item

Fujitsu Develops Platform Technology for Secure Application Execution on Smartphones for Business Use

Linking mobile devices to the cloud facilitates the construction of a system that enables business services to be accessed in a mobile environment

Kawasaki, Japan, Aug 31, 2012 - (JCN Newswire) - Fujitsu Laboratories today announced that it has developed platform technology for application execution that enables secure use of internal company services with a smartphone or other mobile device without sacrificing convenience.

Currently there is great interest in using smartphones to access corporate data systems for business, however doing so presents the problem of ensuring security. To address this issue, Fujitsu Laboratories has linked smartphones to the cloud to produce an environment in which a company's internal services can be executed using a smartphone only when they are needed, enabling secure execution of these applications. As a result, internal company services that until now have only been run within a company's network can now be securely accessed inside or outside the company using a smartphone, raising the prospects for improving work efficiency in a variety of situations.

Details about this technology will be announced at the Financial Information Technology 2012 Seminar, held September 6 at Tokyo International Forum.


Human-centric computing seeks to bring about a world in which, by eliminating the barriers between systems and people, convenient services can be accessed without people even being aware of the systems that deliver them. With the advent of smartphones, these needs have only increased. Now the use of smartphones for business is rapidly expanding. As opposed to consumer use, the ability to protect internal company data is essential for business use.

Technological Issues

Given the current situation, companies are either not allowing smartphones to be used for business due to security concerns, or they are allowing them to be used and are forced to endure a vague sense of uneasiness. Specifically, they are facing the following problems:

- Companies have rules against carrying computers off premises, but it is difficult to strictly enforce them in the case of smartphones, which are designed to be carried around.
- There is the risk that confidential business data could be taken, either through a computer virus infection or by hacking through the network.
- There is an increased risk of business data leaks when using outside networks. It would be better to have a closed system that could only be accessed internally on company premises, but then employees would not be able to access internal company services offsite.

About the Newly Developed Technology

To address these issues, Fujitsu Laboratories developed a secure application execution platform that controls smartphones from the cloud to produce an environment that enables secure execution of internal company services.

The technologies underlying the secure application execution platform are described below.

1. Context desktop technology

Fujitsu Laboratories developed context desktop technology that switches screens or manages distributed applications depending upon the situation (see figure 2). For example, if it is detected that the smartphone is carried into the office, the screen will switch to one more appropriate for work. Only when applications are needed are they delivered from the cloud to the smartphone, and they are erased when they are no longer necessary. By controlling the management of applications in this way via the cloud, users can securely carry out operations without endangering the company's environment.

2. Secure execution environment technology

Fujitsu Laboratories also developed secure execution environment technology that enables applications to be securely executed and imposes usage restrictions on, for example, the smartphone's built-in camera or network access (see figure 3). The applications and data are encrypted in advance and delivered to the smartphone. The encrypted data is kept as it is on the smartphone and the decryption is carried it out on the fly. As a result, the decrypted data will not be stored anywhere except in the execution memory. In addition, if necessary, usage restrictions can be imposed on the smartphone's camera or the network, enabling unnecessary operations to be prevented. For example, even if there was malware embedded in an application that was able to read data stored in a memory card and upload it onto a website, this action would be prevented if the smartphone was managed in advance to only be able to access designated websites.

3. Seamless push technology

Fujitsu Laboratories also developed seamless push technology that enables the seamless delivery of applications to smartphones, regardless of whether it is through the company's own network or an external network (see figure 4). For example, if the owner of the smartphone is outside of the company, a notification will be sent requesting that the smartphone first establish a connection with a secure virtual private network (VPN). This is done over a public mobile network, from the cloud to the smartphone. Having received the notification, the smartphone connects with the cloud and the VPN, establishing a secure transmission line, thus allowing company data to be received safely. Rather than restricting the delivery of applications only to smartphones connected to the company's own internal network, this also enables the delivery of applications to smartphones that are connected to public networks outside of the company, enabling users to securely access internal company services.


With this technology, data is automatically protected without users having to consider where they are, and internal company services can be securely delivered and executed in any situation. This will enable advancements in the ways smartphones can be used with company systems in a variety of scenarios without sacrificing the smartphone's functionality.

In healthcare, for example, rather than restricting access to hospital systems to within the hospital, the hospital's internal services could be accessed at the scene of an accident or from inside an ambulance, protecting the data while displaying it on a smartphone, thereby enabling more efficient and precise medical care.

Future Plans

Fujitsu Laboratories is working on packaging this technology to make it easy to build secure systems with the aim of commercializing it in fiscal 2012.

About Fujitsu Laboratories

Founded in 1968 as a wholly owned subsidiary of Fujitsu Limited, Fujitsu Laboratories Limited is one of the premier research centers in the world. With a global network of laboratories in Japan, China, the United States and Europe, the organization conducts a wide range of basic and applied research in the areas of Next-generation Services, Computer Servers, Networks, Electronic Devices and Advanced Materials. For more information, please see: http://jp.fujitsu.com/labs/en.

About Fujitsu Limited

Fujitsu is the leading Japanese information and communication technology (ICT) company offering a full range of technology products, solutions and services. Over 170,000 Fujitsu people support customers in more than 100 countries. We use our experience and the power of ICT to shape the future of society with our customers. Fujitsu Limited (TSE:6702) reported consolidated revenues of 4.5 trillion yen (US$54 billion) for the fiscal year ended March 31, 2012. For more information, please see www.fujitsu.com.

Source: Fujitsu Limited

Fujitsu Limited
Public and Investor Relations

Technical Contacts:

Fujitsu Laboratories Ltd.
Human Centric Computing Laboratories, Smart Platform Lab
E-mail: [email protected]

Copyright 2012 JCN Newswire. All rights reserved. www.japancorp.net

More Stories By JCN Newswire

Copyright 2008 JCN Newswire. All rights reserved. Republication or redistribution of JCN Newswire content is expressly prohibited without the prior written consent of JCN Newswire. JCN Newswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

CloudEXPO Stories
Public clouds dominate IT conversations but the next phase of cloud evolutions are "multi" hybrid cloud environments. The winners in the cloud services industry will be those organizations that understand how to leverage these technologies as complete service solutions for specific customer verticals. In turn, both business and IT actors throughout the enterprise will need to increase their engagement with multi-cloud deployments today while planning a technology strategy that will constitute a significant part of their IT budgets in the very near future. As IoT solutions are growing rapidly, as well as security challenges growing exponentially, without a doubt, the cloud world is about to change for the better. Again.
While more companies are now leveraging the cloud to increase their level of data protection and management, there are still many wondering “why?” The answer: the cloud actually brings substantial advancements to the data protection and management table that simply aren’t possible without it. The easiest advantage to envision? Unlimited scalability. If a data protection tool is properly designed, the capacity should automatically expand to meet any customer’s needs. The second advantage: the cloud is the simplest way to centralize the storage of all secondary data sources while also providing unlimited compute that can be used to gain additional insight and business value from that data. Finally, the ability to do automated Disaster Recovery (DR) without maintaining a DR facility is unquestionably a major value of the cloud, and simply isn’t possible otherwise. Join W. Curtis Preston,...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throughout enterprises of all sizes.
The platform combines the strengths of Singtel's extensive, intelligent network capabilities with Microsoft's cloud expertise to create a unique solution that sets new standards for IoT applications," said Mr Diomedes Kastanis, Head of IoT at Singtel. "Our solution provides speed, transparency and flexibility, paving the way for a more pervasive use of IoT to accelerate enterprises' digitalisation efforts. AI-powered intelligent connectivity over Microsoft Azure will be the fastest connected path for IoT innovators to scale globally, and the smartest path to cross-device synergy in an instrumented, connected world.
As you know, enterprise IT conversation over the past year have often centered upon the open-source Kubernetes container orchestration system. In fact, Kubernetes has emerged as the key technology -- and even primary platform -- of cloud migrations for a wide variety of organizations. Kubernetes is critical to forward-looking enterprises that continue to push their IT infrastructures toward maximum functionality, scalability, and flexibility. As they do so, IT professionals are also embracing the reality of Serverless architectures, which are critical to developing and operating real-time applications and services. Serverless is particularly important as enterprises of all sizes develop and deploy Internet of Things (IoT) initiatives.