service SERVICE


-
IoT solution
We propose solutions using BLE beacons for positioning, flow line management, presence confirmation, etc.
-
IoT solution (thin/small beacon)
FCS1301 (beacon device)
A transmitter that transmits ID information on Bluetooth radio waves. By combining it with a receiver, it is possible to introduce a positioning system at low cost, preventing the loss of things, protecting people's safety, and improving work efficiency.
-
IoT solution (waterproof/dustproof beacon)
timbe (beacon device)
A transmitter that transmits ID information on Bluetooth radio waves. By adopting waterproof and dustproof functions and a strong case, it realizes positioning for the purpose of preventing loss of objects and protecting the safety of people outdoors or in dusty environments.
-
Remote work support tools
LiveOn Wearable
A remote work support tool that combines the web conferencing system "LiveOn" with a wearable device. Managers and workers in remote locations can communicate in real time while sharing video, audio, and documents, enabling them to provide work support, give instructions, and share information "without having to visit the site."
-
Smart glasses cooperation solution
Detects radio waves from BLE beacon devices and automatically displays and plays content such as videos and audio on smart glasses. It effectively conveys messages in a wide range of applications, from danger detection to entertainment in environments where both hands are required, such as in factories and halls.
-
Solution to prevent children from being left behind
cotchi cotchi
An application system that uses BLE beacons to prevent children from being left behind at daycare sites. A beacon is attached to the child, and the radio waves are received by a smartphone held by a staff member. You can confirm that a child is within a certain distance from your smartphone, and at the same time, if a child leaves a certain range, the application will sound an alert, letting you know as soon as possible and preventing the child from disappearing.
-
Location positioning solution
directional receiver
A BLE receiver with directivity enables more efficient positioning from two axes: distance and direction, whether indoors or outdoors.
-
crypto module library
C4CS Lite
With C4CS Lite, you have all the security modules your system needs. We provide a library (set) of security modules necessary for the system, such as encryption (common key/public key), hash functions, secret sharing, pseudo-random number generation, etc.
-
Cryptographic module (ActiveX)
C4Sax
A security module that allows you to easily encrypt data in Windows web applications and web services. Data is encrypted using our proprietary encryption “C4Custom”.
-
Cryptographic module (compatible with multiple OS)
MonoCrypt AES
A cryptographic module that has passed the high security standard "FIPS140-2" and is applicable and compatible with many target operating systems. AES, the US government recommended cipher, can be used as an encryption library.
-
Cryptographic library service for IBMi
Crypt for DB2 (“DB2 for i” only)
A cryptographic library exclusively for the database "DB2 for i" for IBM i. Enables column-by-column data encryption to protect personal information in the database.
-
file security solution
C4U Enterprise
A security product that allows you to easily encrypt files by inserting and removing a dedicated USB key. With a single USB key, you can log on and off to your PC and encrypt files.
-
Encrypted backup tool for IBMi
C4 Back up/400
“C4 Back up/400” is a security product for highly confidential IBM i backups. This highly secure and fast encrypted backup package allows you to encrypt your library without changing IBM i-specific members and files. An English version is also available.
-
Heterogeneous File Encryption Tool
CRYPTO RELAY
Encryption software that enables the exchange of encrypted files between various platforms such as general-purpose machines, UNIX, and Windows.
-
File encryption solution
FP Pro. Series
Advanced security measures with easy operation. Even those who are not familiar with IT can easily encrypt files and prevent leakage of personal and confidential information.
-
Vulnerability diagnosis service
We diagnose vulnerabilities in web applications and networks and implement risk countermeasures such as information leakage from the system.
Achievements left behind
48 years since its establishment.
We have a proven track record because we have focused on what is important.
It has a long track record in both the public and private sectors.
Number of projects per year
500 PJ
Annual number of business partners/customers
200 companies
Maximum number of trading years
47 years
Total number of qualified persons
1,870 people