GUIDE

About ZENMU

Information leaks cannot be prevented.
This is our understanding.

Recognizing that information leaks are inevitable, ZenmuTech developed ZENMU, enabling users to enjoy security without constant vigilance. We have done this by changing how we regard the notion of preventing information leaks by shifting our focus away from efforts to prevent such leaks.

It only takes a couple of minutes to understand!

In just a few minutes, you can grasp it!
Witness a paradigm shift in security where data becomes meaningless.

Three futures realized with ZENMU

Three futures realized with ZENMU

1
Trust of stakeholders

Using ZENMU to render data meaningless resolves the various issues related to information leaks. Stakeholders gain greater peace of mind as robust security measures are applied to personal and confidential information, reducing human error and strengthening protections. Using ZENMU can also change a company’s security policy.

Trust of stakeholders

Information security
2
Information security is established even if the user pays no attention to it

We have entered an era in which there is greater emphasis on data protection challenges than ever before, such as in terms of acquiring and managing all sorts of customer information and dealing with Big Data generated in the realm of the IoT, which is expected to expand in the future. By rendering the data itself meaningless within the context of information security measures, network security to prevent leaks, hacking, and tampering will become superfluous.

3
Freedom from new security costs

Security measures based on encryption alone theoretically pose a risk that what has been encrypted might end up being deciphered. Security measures based on the notion of protection give rise to an ongoing situation in which countermeasures are implemented each time a new problem arises. ZENMU achieves security without a focus on protection by rendering the data itself meaningless.

Freedom from new security costs

ZENMU’s secret-sharing security

ZENMU’s secret-sharing security

Point. 01
Security that works by rendering the data meaningless in a manner that is conceptually different from conventional encryption

fig1

In conventional cryptography, information can be compromised through the misuse of keys and passwords, as the encrypted data is protected by these elements. ZENMU, on the other hand, uses secret-sharing technology powered by the AONT protocol. By converting and splitting data into meaningless fragments, it ensures that the data remains unreadable if only a single fragment is obtained, and cannot be recovered unless all fragments are reassembled.

Point. 02
Robust security is achieved by storing distributed fragments across multiple locations

fig2

Data can be distributed and stored across various locations, including servers, the cloud, USB flash drives, smartphones, and wearable devices. By installing ZENMU for PCs on computers and tablets, data can be spread across internal hard drives, external storage devices (like smartphones and USB drives), and the cloud, providing robust security and enabling new work styles, such as using computers outside the office.

ZENMU technology

ZENMU technology

Secret sharing
In 1979, Professor Shamir of the famous US-based Weizmann Institute and a co-inventor of the RSA cryptosystem devised a method by which no information related to the original data can be obtained as long as distributed data equal to or greater than a certain number is not used. This method is known as secret sharing. Several sharing methods exist, including XOR (eXclusive-OR) and threshold sharing, and research in this field has been ongoing since its inception.

AONT protocol
The AONT (All-Or-Nothing Transform) protocol is a data conversion protocol that was conceived by MIT’s Dr. Rivest, another co-inventor of the RSA cryptosystem. Certain mathematical operations are applied to the original data to produce output data of approximately the same size as the original data. If all of the bits comprising the output data are available, the original data can be easily recovered. If any part of the output data is missing, however, it becomes impossible to resurrect the original data. ZENMU offers unique solutions by adopting the AONT protocol to reinforce performance, apply it to file systems, and achieve other benefits.

Inquiry
Inquiry

Request documents
Request documents

CONTACT

Inquiries

Feel free to contact us.
Online seminars are also held as needed.