Authentication Solutionsのメーカーや取扱い企業、製品情報、参考価格、ランキングをまとめています。
イプロスは、 製造業 BtoB における情報を集めた国内最大級の技術データベースサイトです。

Authentication Solutions - メーカー・企業11社の製品一覧とランキング

更新日: 集計期間:Aug 27, 2025~Sep 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

Authentication Solutionsのメーカー・企業ランキング

更新日: 集計期間:Aug 27, 2025~Sep 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. アイリスオーヤマ BtoB事業本部 Miyagi//others
  2. GeoVision Tokyo//IT/Telecommunications
  3. HOUSEI Tokyo//IT/Telecommunications
  4. Enazeal Aichi//Industrial Electrical Equipment
  5. 5 飛天ジャパン Tokyo//IT/Telecommunications

Authentication Solutionsの製品ランキング

更新日: 集計期間:Aug 27, 2025~Sep 23, 2025
※当サイトの各ページの閲覧回数を元に算出したランキングです。

  1. AI Thermal Camera Face Recognition Solution アイリスオーヤマ BtoB事業本部
  2. [Case Study] Facial Recognition Solution GeoVision
  3. Facial recognition solution 'WelcomID Alcohol Checker' HOUSEI
  4. FR facial recognition solution 'GV-AI FR' GeoVision
  5. 4 Background authentication solution "DZ Security" AnchorZ

Authentication Solutionsの製品一覧

1~15 件を表示 / 全 16 件

表示件数

[Case Study] Facial Recognition Solution

Real-time facial recognition with just the camera! A facial recognition solution that can also perform face detection verification.

We would like to introduce a case study of our "Facial Recognition Solution." The customer's challenge was that they had to put down their belongings and input a key or PIN code. However, by implementing our product, they were able to verify their identity simply by facing the device, allowing for easy and smooth entry and exit. 【Case Study】 ■ Challenge - Had to put down belongings and input a key or PIN code ■ Implementation Effect - Identity verification by simply facing the device - Easy and smooth entry and exit *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

FR facial recognition solution 'GV-AI FR'

The video from the network camera is sent to the server, where face detection and authentication are performed.

"GV-AI FR" is facial recognition software that meets new needs. It sends images from network cameras to a server, where face detection and authentication are performed. 【Features】 ■ Face detection/authentication, age and gender judgment ■ Aggregation of face recognition results ■ Notifications via LINE Notify and external devices (I/O) ■ Welcome screen display ■ Search for authentication results *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

AI Thermal Camera Face Recognition Solution

For offices, medical institutions, public facilities, and event venues! It performs non-contact personal identification and temperature measurement quickly.

Our company has launched an AI thermal camera solution that performs non-contact personal authentication and quickly detects individuals with fever. For facilities that require personal authentication, such as offices and medical institutions, we offer a "face recognition AI thermal camera" that can simultaneously measure personal authentication and fever detection in just 0.2 seconds. * A face recognition-free mode is also available, suitable for clinics and restaurants. For managing entry and exit in large facilities with many visitors, we provide a dome-shaped "AI thermal camera." 【Features of the Face Recognition AI Thermal Camera】 ■ Detection speed of approximately 0.2 seconds ■ Industry-leading face recognition accuracy of 99% ■ High security achieved through dual lenses for 3D modeling (Prevents unauthorized entry using facial photos, etc.) ■ Mandatory mask-wearing mode that allows entry only for individuals wearing masks ■ Six types of attendance modes suitable for attendance management ■ Face recognition-free mode is also available (suitable for clinics and restaurants) * For more details, please refer to the PDF document or feel free to contact us.

  • スクリーンショット 2023-12-26 093734.png
  • スクリーンショット 2023-12-26 093749.png
  • スクリーンショット 2023-12-26 093749.png
  • スクリーンショット 2023-12-26 093802.png
  • スクリーンショット 2023-12-26 093818.png
  • スクリーンショット 2023-12-26 093841.png
  • others

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Background authentication solution "DZ Security"

No need for login or logout! Use the cloud safely and securely with "magical" authentication!

Our company has developed a background authentication solution called 'DZ Security' that requires no IT knowledge and can be used safely by anyone. This advanced solution performs continuous multi-factor authentication in the background of the services being used through multiple "biometric authentications" and associated "supplementary authentications (behavioral)" linked to them. 【Features】 ■ "Ease of use" ■ No IT knowledge required at all ■ If it's the person, that's enough ■ Solutions for GDPR-related issues ■ Solutions for contractual issues ■ Solutions for implementation barriers *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Face recognition solution with temperature measurement function

Centralized management of multiple gates! It is also possible to configure a large-scale system that manages between locations.

We propose a "Face Recognition Solution with Temperature Measurement Function" using a face recognition terminal equipped with a temperature measurement feature. The terminal can be installed in areas without walls using a dedicated mounting pole. It also issues a voice alarm to warn individuals with elevated temperatures and prohibits their passage. 【Terminal Features】 ■ Easy to install ■ Enhanced verification performance ■ Mask detection ■ Various verification methods ■ Long-distance face recognition ■ Temperature measurement *For more details, please download the PDF or feel free to contact us.

  • Personal authentication

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Capy biometric authentication solution

A cloud service that realizes biometric authentication using FIDO.

Our company provides a cloud service that safely implements biometric authentication using an international standard technology for online authentication called FIDO. Implementation can be easily integrated into your currently operating services by simply installing JavaScript or incorporating APIs. Additionally, by using the API, you can link SecurePass with your currently operating websites and smartphone applications, enabling easy biometric authentication. 【Features】 ■ Easy implementation of biometric authentication by simply installing JavaScript ■ Compatible with biometric-enabled Android devices and iOS Touch ID/Face ID ■ Utilizing a cloud environment allows for reduced implementation costs and running expenses ■ No need to install biometric authentication devices as authentication is performed via smartphones ■ Can be used as an SDK, allowing integration from existing smartphone applications *For more details, please download the PDF or contact us.

  • 企業:Capy
  • 価格:Other
  • Other security and surveillance systems
  • Personal authentication
  • Entrance and exit control system

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Facial recognition solution 'WelcomID Alcohol Checker'

Achieve routine in digital operations! Easy and effortless, continuing every day.

We would like to introduce our facial recognition solution, "WelcomID Alcohol Checker." We offer the facial recognition interface terminal "WelcomID" and the alcohol detector "Tanita ALBLOFC-1200." It is possible to export data in a standard Excel format, and with an option for cloud data management, you can manage multiple locations collectively. 【Features】 ■ Digitalize management processes with facial recognition ■ No need to launch a PC or app during inspection ■ Space-saving with no PC required ■ Easy data storage with linked information ■ PC integration for data management *For more details, please refer to the PDF document or feel free to contact us.

  • Other measurement, recording and measuring instruments

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Email audit tool to protect businesses from intellectual property theft due to cyber attacks.

The rapid increase in cyber attacks from abroad! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, could our company be in danger?

Do you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed those viruses in emails sent to large companies. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. Subsequently, similar products are mass-produced in places like China, leading to price competition that makes it impossible for them to generate profits. Furthermore, they may be held responsible for infecting large companies with viruses and could face liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically involves sending emails that impersonate employees of the target company or masquerade as clients to employees of that company. Once someone opens the email, they become infected, and the infection spreads from there. In other words, eliminating the initial "spoofed emails impersonating internal or external individuals" is key to protecting both your company and your clients. So, what should be done to eliminate spoofed emails? ★ We are currently offering explanatory materials. Please check them out via "PDF Download.

  • Virus software

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

On-premises? Cloud? What is the suitable authentication solution?

Ensuring safety! Introducing security solutions in our blog.

This blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Countermeasures against spoofing emails, specifications for email encryption: What is DKIM?

Guarantee of the sender's authenticity and the integrity of the message content using public key cryptography!

On our company website, we introduce measures against spoofing emails and the specifications for email encryption. "DKIM" (DomainKeys Identified Mail) utilizes public key cryptography, where the public key is recorded in DNS, and the MTA signs the email using a private key. This allows the receiving MTA to verify the authenticity of the sender and the integrity of the email content. By setting up the record, the receiving mail server can determine whether the email was sent by a legitimate sender upon receiving it. Please refer to the related links for more information. [Contents] ■ Example of operation ■ If only the DKIM settings are configured, the processing is left to the receiving mail server ■ If the sender wants to control the processing, DMARC settings are necessary ■ Is S/MIME not sufficient? *Detailed information can be viewed through the related links. For more details, please feel free to contact us.

  • Other server related
  • Other security
  • Server monitoring and network management tools

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Case Studies on the Use of Embedded Devices: Face Recognition Spoofing Prevention Solutions

Support for resolving concerns in embedded development with facial recognition! Two case studies included.

In this document, we introduce case studies of embedded development using facial recognition for "spoof prevention features" that contribute to enhanced competitiveness and product value. We present examples of integrating these features into "inspection equipment" to strengthen security functions, and into "ATMs" to enable non-face-to-face identity verification and account opening. Additionally, we explain the "facial recognition spoof prevention solution" that does not require a database or network, which also contributes to enhancing product value. We encourage you to read it. 【Contents】 ■ Changes in the environment surrounding equipment manufacturers ■ What is facial recognition for "identity verification" used by operators utilizing production equipment and measuring instruments? ■ Collection of case studies on embedded development ■ Introduction to NEC's facial recognition spoof prevention solution *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

frontegg SSO/CIAM/authentication solution

Frontegg provides industry-leading customer ID management solutions (SSO/CIAM).

Frontegg is a company that provides a user management platform for B2B SaaS businesses. Founded in 2019, it helps companies quickly integrate user authentication and access management features. Key features include secure authentication and authorization, multi-factor authentication (MFA), passwordless authentication, single sign-on (SSO), user management, and role-based access control (RBAC). This allows users to seamlessly access multiple services, while developers can simplify user creation, management, and access permissions. Additionally, real-time notifications and system integration are streamlined through webhooks and event management. Frontegg eliminates the need for companies to build user management in-house, allowing their development resources to focus on core products. It is utilized by companies such as Datadog, Siemens, and Samsung, and is highly regarded as a solution that combines scalability and security. INNOOV serves as Frontegg's official domestic distributor, providing consulting and implementation support.

  • Other security

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

Why do inspection irregularities occur? An explanation of the reasons and countermeasures.

Explaining the reasons and countermeasures for unauthorized occurrences! How to protect a company's brand and trust: <Face recognition impersonation prevention solution>

When products are shipped without conducting inspections based on UL standards, and quality issues are pointed out, it is viewed as "inspection fraud" by customers and society. Inspection fraud not only lowers the quality of workers but also damages the company's brand and reliability, so companies must make every effort to prevent such fraud from occurring. We explain the basic points of what inspection fraud is, the causes of its occurrence, and countermeasures in the related link's column, so please take a look. Additionally, the catalog introduces use cases for preventing inspection fraud using face recognition spoofing prevention solutions. Please check that as well.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録

What is the purpose of creating a list of qualified individuals? We will also introduce some points to consider when operating it.

Information on qualified personnel that companies should be aware of. A detailed explanation of its purpose! <Face recognition impersonation prevention solution>

If qualified personnel can be managed appropriately, it can lead to improvements in the quality of the products being manufactured. Additionally, by keeping track of qualified personnel, it can prevent unqualified individuals from being involved in critical tasks (such as quality inspection and management operations). We have explained the purpose and management methods for managing qualified personnel in the related link's column, so please take a look. In the catalog, we also introduce initiatives to prevent "quality result tampering" and "inspections by unqualified personnel" using face recognition anti-spoofing solutions. Please check that as well. *For more details, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system
  • Other security and surveillance systems

ブックマークに追加いたしました

ブックマーク一覧

ブックマークを削除いたしました

ブックマーク一覧

これ以上ブックマークできません

会員登録すると、ブックマークできる件数が増えて、ラベルをつけて整理することもできます

無料会員登録