SOLUTION

ZENMU Engine(SDK)

Introducing a new concept: Rendering data meaningless for data protection and authentication purposes.

Providing the benefits of information security to as many users as possible.

ZENMU Engine is provided to be freely used by companies and developers based on their own ideas and to enable as many users as possible to enjoy the benefits of information security as embraced by ZENMU. ZENMU Engine can be used not just to render data meaningless on a file-by-file basis but also for the inputting and outputting of optional data elements.

Examples of ZENMU Engine application

Distributing house and car keys to wearable devices

The system will not unlock unless the distributed data fragments stored both in the house or car and in a wearable device are decrypted.

Control data for all sorts of household appliances are distributed and authenticated.

The risk of tampering is prevented by sending control and authentication data separately in the form of multiple elements of data that have been rendered meaningless.

Reduces communication costs incurred for the collection of data by IoT devices.

Individual data fragments generated by edge devices are continuously collected, while larger distributed data fragments are collected as needed.

For the safe and secure use of public cloud services.

Private domains in the cloud are secured by having each party retain a portion of the data or a distributed access key.

Linking with blockchains

Large files undergo secret sharing and are partially managed with blockchains.

ZENMU Engine lineup

File-by-file secret sharing
This function allows users to perform secret sharing on files and streams and store multiple distributed files at the desired percentages as well as decrypt multiple distributed files to restore original files.
A Windows/Linux version and a Java version are available.

ZENMU Drive
With an image of the virtual drive split into two, distributed file 1 is kept on the SSD/HDD while distributed file 2 is kept in memory. ZENMU Drive offers the following functions: a function that allows you to display and make available (mount) and hide and make unavailable (unmount) the virtual drive; a roll-back function to resolve inconsistencies among distributed files; a function for taking snapshots of (committing) distributed fragments while the virtual drive is mounted; and a function for reverting to the state of the virtual drive either at the point in time at which the virtual drive was most recently unmounted or the point in time at which distributed fragments were most recently committed, whichever is more recent.
Support for Windows 8.1 and Windows 10.

Secret sharing storage system
A virtual drive established on a secret-sharing server undergoes secret sharing and shares (distributed fragments) are stored on network storage. High-speed processing is feasible since only necessary parts of the virtual drive undergo secret sharing. It is perceived as a file system by the user.
Support for Linux.

Secret sharing database
Highly secure without the need to change your existing database system. A user can access the database established on a virtual drive set up on the secret-sharing server as before. The data itself does not exist on the secret-sharing server. Instead, it exists in the form of shares (distributed fragments) on physically different storage servers, such that the real data cannot be accessed without going through the secret-sharing driver.
Support for Linux.

Examples of ZENMU Engine use

Examples of ZENMU Engine use

Method and cost of provision

The method and cost of provision will be studied based on the business model of the solution/service provider using and providing ZENMU Engine. Feel free to contact us for more information.

Inquiry
Inquiry

Request documents
Request documents

CONTACT

Inquiries

Feel free to contact us.
Online seminars are also held as needed.