of “IoT/Big Data” Business
TO BE A COMPANY THAT ENRICHES
PEOPLE’S LIVES THROUGH OUR ADVANCED ID
We see its mission as:
establishing an infrastructure to manage an anonymous data based on the abundant functionalities of next generation cryptography, and provide an IT service platform for delivery an anonymous data by the end user's attribute control with context awareness. The “ID” part of the AMENIDY company name symbolizes this mission.
OUR TECHNOLOGY OVERVIEW
NEXT GENERATION CRYPTOGRAPHIC
TECHNOGY "AMENIDY SUITE"
AMENIDY Suite got “ACT Attribute wrapped Cryptographic Technology” and “AAT Anonymous Authentication Technology” of extending ”Light-weight’ scheme of group signatures technology” by joint R&D with University of Tokyo. ACT features that the identity of a signer can be revealed through the cooperation of particular ‘privileged entities in absolutely necessary circumstances. AAT features anonymous signing and untraceability. AMENIDY Suite realizes it possible to generate crypto-data including attribute data while simultaneously guaranteeing data’s anonymity and has the possibility to solve the privacy problem that occurs in the business domain of “IoT/Big Data”.
AMENIDTY PLATFORM TECHNOLOGY
FOR REALIZING FLOATED BIG DATA
Crypto-Data with AMENIDY Suite will be provided to the user so that it floats on the network by technical cooperation between the AMENIDY Agent embedded in the IoT device and AMENIDY Servant placed on the cloud side. A Web API for building end user services is provided under a cloud service environment consisting of AMENIDY Agent and Servant (AMENIDY Platform Technology). We will provide these as platform technologies so that everyone can freely use Big Data that solves the privacy problem.
DELIVERY AN ANONYMOUS DATA
BY THE END USER'S ATTRIBUTE CONTROL
WITH CONTEXT AWARENESS
By combining AMENIDY Agent / Servant with your favorite event-driven IoT service, you can obtain "Key" for decryption according to your static attribute and dynamic attribute. This key dynamically generates and provides the disclosure part permitted by your attribute from encrypted data while keeping the anonymity of the original data. This "key" is determined by a slowly varying static attribute and a dynamic attribute that changes to one day's activity, and the degree of decryption is determined. Our concept,"Your Crypto-Key will grow with you",means that the degree of release of lock changes according to your growth.
OUR BUSINESS DOMAIN OVERVIEW
For AMENIDY agents IoT devices are attractive targets. Highly highly mobile, such as connected automobiles, smart phones, wearable devices, sensors connected to small computers, robot machines in factories, etc. While anonymity is required, there are many scenes where you want to obtain the level of information you need. Even in the scene where fusion of data of various IoT devices and knowledge is obtained using AI etc., there is a demand for scenes that further improve the quality beyond the conventional uniform input information. IoT devices incorporating AMENIDY Agent will be able to accomplish these by combining with "your growing keys".
SaaS FOR FLOATED
BIG DATA MARKET
With the Web API provided by AMENIDY Servant, it is possible to build cloud services that provide data information using anonymous authentication and attribute encryption. AMENIDY's technology suitable for the IoT era also makes it possible to provide value added data of the huge number of IoT devices to all the people in the cloud computing environment. Since various user-provided services are required, by providing it as a SaaS service, we can integrate with other beneficial cloud services and contribute to expansion of existing services and creation of completely new service. Regarding the Web API, it is implemented step by step according to customer's needs, and it is contacted serially (Spring of 2018).
OUR OWN PRODUCT AND
For building services using anonymous encryption and attribute authentication technology, AMENIDY Suite, Agent / Servant technology enables one-stop from embedded devices to the cloud side. With regard to these technologies, we will provide consulting services that meet customer needs and support PoC to launch products and services. On the other hand, in order to pursue possibility of business application of owned technology, we will develop our own IT service experimentally, and we will earnestly grasp and fix problems early on our own. AMENIDY, which provides "crypto-key will grow witht you", will advance technology development and business development as a company where customer's environmental change is most useful.