We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication System.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication System Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Authentication System Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. サイバーリンク Tokyo//IT/Telecommunications
  3. クリテックジャパン Tokyo//Trading company/Wholesale
  4. 4 株式会社ハイブリッチ/ビス Tokyo//IT/Telecommunications
  5. 5 Suntex Co., Ltd. Shizuoka//Industrial Electrical Equipment

Authentication System Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. [Security Measures] Online Authentication System Using Encrypted QR Codes
  2. IC card authentication system 'ARCACLAVIS NSAS' 株式会社ハイブリッチ/ビス
  3. AI facial recognition system FaceMe adopted by a major automobile manufacturer. サイバーリンク
  4. 4 Iris recognition system "Ilias EF-45NC" クリテックジャパン
  5. 5 AI facial recognition system "FaceMe" for attendance, entry/exit, login, eKYC. サイバーリンク

Authentication System Product List

136~150 item / All 163 items

Displayed results

Authorized dealer of Wireless-Tag Technology.

Wireless-Tag Technology is a company engaged in the development, research, manufacturing, and sales of IoT and AI.

Wireless-Tag Technology provides wireless communication modules, HMI design solutions, AI core boards, AI facial recognition, and other solutions for the IoT field. We offer ODM/OEM services. Our products include smart home devices, smart lighting, smart appliances, smart access appliances, smart access control, financial self-service terminals, railway transportation, HMI displays, and AI recognition, among others.

  • Other electronic parts
  • Other FPD related

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Methods of phishing scams using Office365

The solution is the adoption of an authentication mechanism! Introducing phishing scam tactics and countermeasures on the blog.

This blog discusses the methods and countermeasures for phishing scams targeting insurance companies using Office 365. From April 15 to 30, 2020, PowerDMARC's security analysts discovered a new wave of phishing emails targeting major insurance companies in the Middle East. When our Security Operations Center tracked the links in these emails, it was found to be a phishing URL aimed at Microsoft Office 365 users. The solution is to adopt an authentication mechanism that checks all emails sent from your own domain and blocks only those sent without permission. As a leading provider of email security solutions, PowerDMARC is committed to raising awareness of the importance of protecting an organization's domain. *For more details, please refer to the related links. *For more information, please check the PDF materials or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Medication Management Guidance Support System 'CO-Pro Version 8'

Vibrant medical scene. Further evolved for comfort, ease, and enhanced functionality.

The "CO-Pro Version 8" is an advanced medication management support system that offers a variety of features to facilitate efficient business operations, user-friendly usability for everyone, and enhanced functionality. Medication history management is presented in a calendar format that allows for easy overview. It manages oral, topical, and injectable medications together. Medication guidance can be switched between general guidance format and POS format on the same screen. Additionally, from the DI management screen, various searches for medications and patients can be conducted, including searching for medications based on the symptoms reported by patients. 【Main Features】 ■ Patient Information Management ■ Medication History Management ■ Medication Guidance ■ Drug Information Management ■ DI Management ■ Pharmaceutical Differentiation, etc. *For more details, please download the PDF or feel free to contact us.

  • Other quality control systems
  • File Management

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Iducter Inc.

Medical DX, and corporate DX, you can leave it to us.

Authentication Solution Taikoban Service Authentication Solution "Taikoban" (Ransomware Countermeasure Personal Authentication System for PC Devices)

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FE-500

Supports multiple face recognition for up to 5 people! The LCD is a 5-inch IPS touchscreen.

We would like to introduce the 'FE-500' that we handle. It features a dual-core CPU, a 2MP dual camera, and runs on LINUX. The functions include face detection, mask detection, and PIN code entry, allowing for multi-face recognition of up to 5 individuals. Additionally, it can perform single/multi detection, with product dimensions of 194mm x 91mm x 30mm, and it is waterproof and dustproof with an IP65 rating. 【Features】 ■ Face + Mask Detection ■ Speed < 1 second (50K 1:N mode) ■ Multi-face recognition (up to 5 individuals) *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

LOCK STAR Web One-Time Authentication System

Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.

You can securely access web applications simply by inserting and removing the USB key. It can be used from small to large scale.

  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I want to prevent impersonation in alcohol checks.

Just by getting close to the screen and blowing, it automatically detects alcohol, measures temperature, and performs facial recognition! Additionally, it can check unregistered faces, allowing data to be saved.

Supports thorough confirmation of alcohol intoxication and improvement of safety awareness with high-precision electrochemical sensors and facial recognition systems. - The electrochemical sensor is highly accurate and speedy, resistant to interference from gases other than alcohol, and can withstand 20,000 uses. - An alarm is triggered in case of abnormal alcohol checks. - Easy installation without the need for construction. The power supply is AC 100V, eliminating the hassle of battery replacement. - Equipped with facial recognition functionality to eliminate fraud completely. - Easily saves the results of alcohol checks and facial photos taken during inspections within the device. - Compatible with both cloud and on-premises solutions. - Data can be printed on a compact printer (optional).

  • Other services
  • Other information systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication in Zero Trust

Achieving a robust security network! Introducing Zero Trust in our blog.

This blog discusses the zero trust approach to user authentication. With the advancement of mobile devices such as laptops and tablets, there is an increasing trend of telecommuting in business scenes away from the office. While there are benefits from this digital transformation, the security risks targeting information, which is a critical asset for companies, are also on the rise. The first barrier to reducing the risk of information leakage from both external and internal sources is the zero trust approach to user authentication. [Content] ■ Zero Trust = Trust no one ■ Zero Trust authentication through Multi-Factor Authentication (MFA) ■ Preventing information leakage due to internal misconduct ■ Low-cost, efficient management is key to improving productivity * For more details, you can view the blog through the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Non-contact × High-speed response] Facial recognition system

Just turn your face, and it's done. Zero-stress identity verification on-site!

It is possible to perform high-precision identity verification without stopping operations, even while wearing a mask. There is no need for contact operations like cards or fingerprints, making it ideal for hygiene management. Furthermore, through customization according to business flows and usage environments, we can achieve "operational designs that fit the site." 【Features】 - High-speed and non-contact identity verification - Hygienic and highly convenient operation - Minimization of authentication failure risks - Flexible design changes according to site configuration *Some features are currently under development, so please contact us for details. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Support for patterned license plates. Would you like to database the vehicles that come to the event?

Database management of vehicle license plate information for store visits. We support everything from entry and exit management to security and marketing.

The vehicle number recognition system SHAVAN3.0 reads the license plate information of vehicles passing through installation points and databases it along with images taken at the time of passage. It allows for vehicle searches and displays of images from the time of passage based on recorded number information, as well as the output of analysis reports such as stay time rankings and monthly visit frequency. This is an evolving vehicle number recognition system that will sequentially support future additions such as alphabetic vehicle type codes, designs with patterns, and newly registered local numbers. * Enrollment in an annual maintenance contract is required.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

【Vehicle Number Recognition System】Are you troubled by unauthorized parking or abandoned vehicles?

Database management of vehicle license plate information for store visits. We support everything from entry and exit management to security and marketing.

The vehicle license plate recognition system SHAVAN 3.0 reads the license plate information of vehicles passing through installation points and compiles it into a database along with images taken at the time of passage. It allows for vehicle searches and displays of images from the time of passage based on recorded license plate information, as well as the output of analysis reports such as stay time rankings and monthly visit frequency. This is an evolving vehicle license plate recognition system that will sequentially support future additions such as alphabetic vehicle type codes, designs with patterns, and newly registered local plates. *Joining an annual maintenance contract is required.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study of Facial Recognition System] Retail

Ensuring peace of mind and safety! Introducing examples of solutions to issues such as store security.

We would like to introduce an example of how the facial recognition system handled by MyStia Co., Ltd. solves challenges in the retail industry. We want to ensure store security. We want to understand the purchasing trends of visitors. As a solution, we have implemented our facial recognition system for entry and exit management, which allows for facial recognition without almost any pause, thanks to advanced facial recognition technology. This prevents impersonation through the borrowing and lending of ID cards, etc. Additionally, by analyzing purchasing behavior through surveillance cameras, we can grasp consumer needs. [Case Summary] ■ Challenges - Ensuring security - Understanding consumer needs ■ Solutions - Strengthening security through suspicious behavior detection - Understanding consumer needs through the analysis of purchasing behavior *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The digital transformation brought by facial recognition technology in the post-COVID era.

Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!

The rapid advancement of society's digital transformation (DX). Among these developments, facial recognition systems have been widely adopted in restaurants, commercial facilities, and hospitals, primarily for the purpose of temperature checks. As of May 8, 2023, Covid-19 has transitioned to a Category 5 infectious disease, and a vibrant Japanese society is gradually returning. In this context, how is our facial recognition tablet device, WelcomID, contributing to solving societal challenges? *For more details on the column, please refer to the related links. For further inquiries, feel free to contact us.*

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Shirutoku Report No. 96 # Weak Wireless Devices That Do Not Require License Applications or Notifications

No application or notification for a license is necessary! We will also introduce the wireless equipment test purchase.

★★Shirutoku Report: Useful Information You Should Know★★ This time, I will talk about weak radio waves. Weak radio waves are wireless signals that emit only extremely weak radio waves, so there are no restrictions on their use or transmission time, and there is no need to apply for or notify a license. However, the electric field strength (the strength of the radio wave) must be lower than the specified level. For more details, please take a look. 【Contents】 ■ What are weak radio waves? ■ Wireless equipment test purchase *For more information, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] IC Card System - Employee-Only Parking Lot for Hospitals

An IC card system has been installed in the hospital employees' exclusive parking lot.

- 60-space employee parking lot - Introduction of a gate system to prevent unauthorized parking in the employee parking lot - Entry is controlled by IC card authentication, and exit is via a free gate - By managing entry and exit through the same gate, equipment and construction costs were kept low

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration