We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication System.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication System Product List and Ranking from 84 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

Authentication System Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

  1. サイバーリンク Tokyo//IT/Telecommunications
  2. 吉川工業 Fukuoka//Other manufacturing
  3. クリテックジャパン Tokyo//Trading company/Wholesale
  4. 4 Spelldata Tokyo//Information and Communications
  5. 5 アイティ・セック Kanagawa//IT/Telecommunications

Authentication System Product ranking

Last Updated: Aggregation Period:Dec 24, 2025~Jan 20, 2026
This ranking is based on the number of page views on our site.

  1. Smarter entry and exit with high-speed authentication from a distance【Y-GATE】 吉川工業
  2. [FaceMe Case Study] Access Management for a Factory with 100,000 Employees Using Facial Recognition サイバーリンク
  3. AI facial recognition system FaceMe adopted by a major automobile manufacturer. サイバーリンク
  4. Methods of phishing scams using Office365 Spelldata
  5. 5 Iris recognition system "Ilias EF-45NC" クリテックジャパン

Authentication System Product List

151~165 item / All 171 items

Displayed results

[Case Study of Facial Recognition System] Retail

Ensuring peace of mind and safety! Introducing examples of solutions to issues such as store security.

We would like to introduce an example of how the facial recognition system handled by MyStia Co., Ltd. solves challenges in the retail industry. We want to ensure store security. We want to understand the purchasing trends of visitors. As a solution, we have implemented our facial recognition system for entry and exit management, which allows for facial recognition without almost any pause, thanks to advanced facial recognition technology. This prevents impersonation through the borrowing and lending of ID cards, etc. Additionally, by analyzing purchasing behavior through surveillance cameras, we can grasp consumer needs. [Case Summary] ■ Challenges - Ensuring security - Understanding consumer needs ■ Solutions - Strengthening security through suspicious behavior detection - Understanding consumer needs through the analysis of purchasing behavior *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The digital transformation brought by facial recognition technology in the post-COVID era.

Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!

The rapid advancement of society's digital transformation (DX). Among these developments, facial recognition systems have been widely adopted in restaurants, commercial facilities, and hospitals, primarily for the purpose of temperature checks. As of May 8, 2023, Covid-19 has transitioned to a Category 5 infectious disease, and a vibrant Japanese society is gradually returning. In this context, how is our facial recognition tablet device, WelcomID, contributing to solving societal challenges? *For more details on the column, please refer to the related links. For further inquiries, feel free to contact us.*

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Visitor authentication reception system "GT-Reception" <Purpose>

A system that recognizes visitors' faces with AI at the office entrance and automatically notifies the reception staff!

Introducing the application of the person authentication reception system "GT-Reception." The main use is to automatically have AI determine who has arrived at the reception, and based on that information and the visitor schedule, the reception staff can provide voice guidance to meeting rooms or reception rooms. This reduces the need for staff to be stationed at the entrance or to go directly to greet visitors, thereby achieving reception labor-saving. [Applications] ■ Automatically determine who has arrived at the reception using AI, and based on that information and the visitor schedule, the reception staff can provide voice guidance to meeting rooms or reception rooms. ■ Reduces the need for staff to be stationed at the entrance or to go directly to greet visitors, thus achieving reception labor-saving. *For more details, please feel free to contact us.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Shirutoku Report No. 96 # Weak Wireless Devices That Do Not Require License Applications or Notifications

No application or notification for a license is necessary! We will also introduce the wireless equipment test purchase.

★★Shirutoku Report: Useful Information You Should Know★★ This time, I will talk about weak radio waves. Weak radio waves are wireless signals that emit only extremely weak radio waves, so there are no restrictions on their use or transmission time, and there is no need to apply for or notify a license. However, the electric field strength (the strength of the radio wave) must be lower than the specified level. For more details, please take a look. 【Contents】 ■ What are weak radio waves? ■ Wireless equipment test purchase *For more information, please refer to the PDF document or feel free to contact us.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study] IC Card System - Employee-Only Parking Lot for Hospitals

An IC card system has been installed in the hospital employees' exclusive parking lot.

- 60-space employee parking lot - Introduction of a gate system to prevent unauthorized parking in the employee parking lot - Entry is controlled by IC card authentication, and exit is via a free gate - By managing entry and exit through the same gate, equipment and construction costs were kept low

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

I want to manage entry and exit and security using facial recognition.

Advanced security through facial recognition - in combination with IC cards, fingerprints, and temperature checks - easy integration with external systems, also serves as digital signage.

This is a security system with a 99.999% facial recognition rate. It can build large-scale systems for up to 100,000 users. It integrates with security gates, automatic doors, elevators, and allows for area restrictions and time-based restrictions. Additionally, it can be used as a system that integrates facial recognition with IC cards and fingerprint authentication devices. - Big Data Analysis It can perform individual analysis based on vast access logs. - Digital Signage Function It can display various guidance information for each facial recognition device.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Accelerating the integration of facial recognition with existing systems.

It is possible to avoid troubles! Introducing the facial recognition system in the blog.

This blog discusses methods to simultaneously enhance security and implement infection control measures. There is an increasing effort to strengthen security by integrating facial recognition with existing systems. Due to its high accuracy in preventing impersonation and its hygienic nature, there are more cases of implementing facial recognition in system integration in response to the spread of viruses. [Content] ■ Strengthening security through impersonation prevention ■ Enabling contactless, walk-through authentication ■ Entire apartment building equipped with facial recognition * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition system that is a perfect fit for your business.

Facial recognition that fits your company's business.

Our facial recognition system can be flexibly customized according to the business flow and requirements of each operational site. It features capabilities not found in template products, such as cloud or on-premises configurations, API integration, UI modifications, and authentication condition settings. It is ideal for companies looking to build a "truly usable system tailored to their specifications." We provide comprehensive support from requirement organization before implementation to design, construction, and maintenance, ensuring reliable assistance until operational establishment. 【Features】 - Flexible customization design according to business flow - Free adaptation of system configuration and integration partners - Modifiable UI for facial recognition and authentication conditions - Reliable system with consistent support from implementation to construction and maintenance *Some features are currently under development, so please contact us for details. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI quickly detects the entry of persons of interest! Easy to track!

The ITA facial recognition application "EX-FACE" utilizes advanced facial recognition technology powered by AI to accurately capture attendees and quickly relay information to the site.

High face recognition rate and operability by AI EX-FACE is a face recognition application that combines a face recognition engine equipped with deep learning algorithms based on over 1 million face data and the video skills unique to camera companies. It reliably and easily supports "if they come, we know" and "if we know, we can track." While refining the functions of our conventional products, it achieves a low price. It is the best recognition application in our company's history.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Immediate notification of VIP customers and persons of interest arriving! The latest vehicle number recognition system.

We will database the license plate information of vehicles visiting the store. We support everything from entry and exit management to security and marketing.

The vehicle number recognition system SHAVAN3.0 reads the license plate information of vehicles passing through designated points and compiles it into a database along with images taken at the time of passage. It allows for searching vehicles based on recorded number information and displaying images from the time of passage, as well as generating analytical reports such as stay time rankings and monthly visit frequency. This is an evolving vehicle number recognition system that will sequentially accommodate future additions such as alphabetic vehicle type codes, designs with patterns, and newly registered local numbers. *Enrollment in an annual maintenance contract is required.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Latest 'Facial Recognition System' from a Security Camera Company Recognizes 30 People Simultaneously

Leveraging the unique video skills of a camera company, we provide reliable and easy support for "you'll understand when you come" and "if you understand, you can follow."

High face recognition rate and operability with AI EX-FACE is a face recognition application that combines a face recognition engine equipped with deep learning algorithms based on over 1 million face data and video skills unique to camera companies. It reliably and easily supports "if you come, we can recognize" and "if we recognize, we can track." While refining the functions of our conventional products, it achieves a low price. It is the best recognition application in our company's history.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information Security] One-Time Password Authentication System

Enhance identity verification with one-time passwords, multi-factor authentication, and multi-step authentication! Reduce the risk of unauthorized access!

Our company provides security solutions to create a safer business environment. Are you struggling with the increasing burden of managing IDs and passwords as users utilize a diverse range of devices, leading to security issues such as password reuse and inadequate updates? With "WisePoint Shibboleth," you can enhance user authentication through one-time passwords, multi-factor authentication, and multi-step authentication, reducing the risk of unauthorized access due to user impersonation. [Background/Challenges] - Diversification of devices used by each user - Increase in applications and services used - Growing burden of managing IDs and passwords - Decreased security due to password reuse and inadequate updates *For more details, please refer to the related link page or feel free to contact us.

  • Other security
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

64-bit CPU iris recognition system 'SmileOkay-iNX'

Further acceleration of authentication speed! Utilize the iris and facial recognition system with a 64-bit CPU for efficient, smooth, and accurate access control and attendance management!

The features of "SmileOkay-i" have been upgraded to achieve even faster and more accurate authentication by adopting a 64-bit CPU and a new authentication algorithm. It is utilized for centralized management of entry and exit information in workplaces with multiple entry and exit gates or in workplaces where employees commute to various locations. Additionally, it helps reduce the complexity of tasks such as time card management and authentication card management in workplaces where personnel frequently change. In particular, iris recognition is effective in food factories with strict hygiene management where faces are covered with hats and masks. 【Features】 ■ Iris recognition & facial recognition ■ High authentication accuracy ■ High-performance software ■ Various applications possible ■ Temperature measurement & mask-wearing assessment ■ Attendance management option *For more details, please refer to the PDF document or feel free to contact us. Demos and rentals are available.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Iris recognition system "SmileOkay-i"

Efficient, smooth, and more accurate attendance management! By using iris and facial recognition systems, verification can be achieved even when hands are occupied or when wearing gloves!

"SmileOkay-i" is an attendance management system that uses iris and facial recognition. Unlike fingerprint and vein recognition systems that have been implemented in offices, hospitals, and factories, it allows for non-contact verification, enabling entry and exit management even when both hands are occupied or when wearing gloves, thus reducing various inefficiencies such as the time lost in removing gloves. This system is particularly effective in environments with strict hygiene management, such as food factories where faces are covered with hats and masks. 【Features】 - No need for keys, IC cards, or time cards; clocking in is possible with just the person's face. - Hygienic due to non-contact (no concerns about virus infections, etc.) - Not affected by the decrease in recognition rates during winter or fluctuations in temperature (body temperature) like vein recognition systems. - Compatible with various iris colors. - Can accommodate sunglasses, glasses, veils, and masks. *Demo units are available for loan! *For more details, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study of Facial Recognition System Implementation] Manufacturing

Ensuring safety with intrusion detection! Introducing examples of solutions for issues such as wanting to implement security measures.

We would like to introduce an example of solving challenges in the manufacturing industry using the facial recognition system handled by Mystia Inc. We want to restrict access to prohibited areas and implement safety and security measures. As a solution, we will introduce our facial recognition system for entry and exit management and surveillance cameras, ensuring safety through intrusion detection in prohibited areas. Additionally, we can determine whether employees are wearing masks, thereby enhancing hygiene management. [Case Overview] ■Challenge - We want to restrict access to prohibited areas and implement safety and security measures. ■Solution - Ensuring safety through intrusion detection in prohibited areas. - Determining whether employees are wearing masks to enhance hygiene management. *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration