Company Info.

Eiji Watanabe, Founder & current CEO

Company Profile

Meteora System co.,ltd
Ishida 200 Isehara-city Kanagawa-prefecture Japan 259-1196 (Click here for map)
81 463-96-3615(TEL) 81-463-96-3616(FAX)
Founder: Eiji Watanabe

Background

Meteora System Co.,Ltd. was founded by Eiji Watanabe, the current CEO, on November 30, 1979. Since then, a capital investment was made by AMADA, the worldwide metal processing machinery manufacturer. Meteora-System thus became a part of the AMADA group, supporting its factory automation. However, on 2006 October reset a partnership with the AMADA, we began the second founding, whereas the head office is yet located inside AMADA Co.,Ltd.

Pioneering Legal Security

1. In 1998, Japan Government (MITI) supported 120 million dollars for our activity which theme was “UN/ECE Recommendation No.26 and Legal Security on the Internet”. The project was named 5-5-3 matter. Next year, in September 1999, a joint, worldwide effort was launched by the United Nations body CEFACT and OASIS to produce a global standardized XML framework. The chairman of the U.N Steering Group behind the project called the initiative “good news, especially for small and medium-sized companies”. Since this time, I have ever addressed myself to realize “good news for small and medium-sized companies”.

 
 
Mr. Hans Hansell (central above) who was UN/CEFACT general said; I’m very pleased to receive here you at United Nation’s office in Geneva, and I’d like to stress that the Japanese business community do participates actively in develop of United Nation’s standards for electronic transfer of data.

2. In 2002, we demonstrated in EDICOM2002 & AFACT council “A more civilized Net” which is aimed at deterring cyber terrorists from attacking the Net. We had meeting with Chairman of UN/CEFACT Ray Walker below;

3. A patent related to “A more civilized Net” was established in the year of 2005 below;
(1) United States Patent No. US 6,917,685 B1
(2) European Patent Application No.:99 973 672.1

4. In 2005, the patent above had been implemented to secure VoIP of IN4S and proved to be compatible with AES counter mode (appendix-1), which is indispensable for the real time decryption for VoIP.

5. I had learned, however, there were vital problems, who pays for “A more civilized Net”? i.e., who pays for technology of a deterrence of cyber terrorism? It has strongly motivated me up to date the deterrence of cyber terrorism. That is, a smoke detector or firebox is more realistic solution rather than the deterrence of cyber terrorism. As you know well, current IT infrastructure does not include any method of detecting an intrusion of copied password, i.e., does not include any method of providing an alert against secrecy leak.

6. In 2008, we had arrived at a solution as “the synchronized clock”. This is an application of Japan Patent No.5314240 “Communication channel system”. Really the clock can detect a clone intrusion of keys to LAN. The clock looks like thus;

The left hand side clock above ticks time every 7 seconds. Every movement, every ticking of the long hand cancels a leaked secrecy which leak event occurred at past, and if the copied secrecy tries to invade the firewall system from outside, then the clock stops, as you see in the right hand side, and every time the clone accesses, the long hand is going to ticks tack.
Recently I had a good day to ask a question to a group of ladies as follows. ”Your card or password is a tool to protect your deposit. Is it true? “. “No!”, all ladies shook their heads and so I asked more “what does your card and password do for you?” Let me speak for them, ”A card or password is possible for anyone to withdraw money from my account whenever and wherever he want.” In short, ladies look like such that do not put any trust in banks, I think it may be of lack of legal security.

7. The clock concept had given us a turn of view, that is, a user can get a confirmation whether now is safe or not. In this view I have not ever met any IT leaders who pay attention to this “Confirmation of safety by user”.
On the other hand, IT leader, Mr. Takeo of AMADA, directs his attention to this “an alert against secrecy leak” and he thinks employee cards should have “an alert against secrecy leak”. He is addressing this “alert system” without memorizing password. But, the employee card system meets difficulties to control Windows OS and IE versions and in order to meet the version update he wants API for driving the card system.

General-purpose type block chain

Now in 2016, looking back, I find myself that there is a concept to which I have addressed myself consistently since 1999. That is such a global infrastructure as Chairman of UN/CEFACT Ray Walker called “good news, especially for consumers and small-medium-sized companies”. I know well, however, some annoying problems there. In particular, as long as we assume the existing financial order, the infrastructure above mentioned will be the fairy tale world. However, now, the situation has changed.

Split Knowledge, new crypto

Here is such method as consumers and small-medium-sized enterprises in each country can become the leading role of trading across borders. That method is financial infrastructure on the Internet which allows people in each country for the credit creation for himself.

The block chain of Bitcoin is the chain of timestamp. It is a timestamp of the Newtonian absolute time just like one string. Since it is one string chain, trying to do the credit creation is nonsense. With the general-purpose type block we can do the credit creation. For, the general-purpose type can produce such timestamps as the flow proceed way of time is different each other, relativistic timestamps and with no problem as to the irreversible of the transaction records. It looks like so called Einstein’s relativistic theory. This is the very initiative to open the way to the credit creation, with no precedence of the existing financial order.

 

Appendix-1
Bench mark test of AES counter mode and of one-time keying transform of 352bit using for “A more civilized Net”.

The figure-2 is illustrated by Log–Log scale, where the vertical represents a throughput per second by K byte scale and the horizontal represents unit of input by byte scale, in Pentium2 300Mhz.
The related SIP system is issued from IN4S Co., Ltd.

Eiji Watanabe