We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication System.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication System Product List and Ranking from 80 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

Authentication System Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

  1. null/null
  2. クリテックジャパン Tokyo//Trading company/Wholesale
  3. サイバーリンク Tokyo//IT/Telecommunications
  4. 4 アイティ・セック Kanagawa//IT/Telecommunications
  5. 5 明電システムソリューション Shizuoka//IT/Telecommunications

Authentication System Product ranking

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

  1. [Security Measures] Online Authentication System Using Encrypted QR Codes
  2. IriShield Iris Recognition System クリテックジャパン
  3. Iris recognition system "Ilias EF-45NC" クリテックジャパン
  4. 4 Face recognition system 'NeoFace KAOATO 6.0' アイティ・セック
  5. 5 Ilias EF-45NC 明電システムソリューション

Authentication System Product List

61~90 item / All 165 items

Displayed results

FaceSec Facial Recognition System (Infinity2 Pro)

IoT transformation with EdgeAI smart devices! Achieving digital transformation in offices, factories, and schools with flexible access control.

FaceSec is the only facial recognition manufacturer that develops and provides all hardware, software (OS), and AI algorithms in-house. This facial recognition product is a smart device for access control that realizes the future of IoT, utilized in various scenes around the world across different industries and sectors, thanks to its sophisticated design and exceptional versatility. 【Features】 ■ In-house development of hardware, software, and AI algorithms ■ Offers solutions from standalone use to cloud and on-premises environments according to scale ■ Sophisticated design ■ Supports up to 100,000 registered users ■ Anti-spoofing feature that also supports video ■ "Business authentication" that integrates with user systems ■ Environmental performance rated IP63 ■ Digital signage display ■ Flexible access control: by person, group, time, and day of the week ■ Comprehensive communication features: Wi-Fi (2.4G/5G), Ethernet, Bluetooth/BLE ■ Abundant I/O options: dry contacts, Wiegand In/Out, RS485

  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Towards the realization of facial recognition payment.

Introducing how facial recognition will become rooted in our lives in a column format!

Facial recognition seems to be mainly used in modern society for enhancing security and simplifying procedures. For example, at airports, a boarding process using a facial recognition system called Face Express has been implemented. This system matches the passenger's face with their passport at check-in and registers the information, eliminating the need to present the passport and boarding pass for subsequent procedures. *For more details on the column, you can view it through the related link. Please feel free to contact us for more information.*

  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Image analysis and facial recognition system

CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.

By integrating CIVAMS' video analysis solution with your existing systems, it is possible to significantly accelerate DX (digital transformation) within your company. The cost performance and flexibility for integration with other systems surpass that of other products. We will incorporate CIVAMS as an image analysis system tailored to your needs while accommodating detailed requests.

  • Entrance and exit control system
  • Personal authentication
  • Firewall and intrusion prevention
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is an iris recognition system? Its features and various applications.

[A must-see for those considering or gathering information] We will explain the features and applications of the iris recognition system!

Do you know what an iris recognition system is? We will reintroduce its "mechanism," "features," and "applications of iris recognition." There is also a demo video, so please take a look. *For more details, please check the link.

  • Other security and surveillance systems
  • Other security
  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC card authentication system for identifying PC users and managing attendance time!

"SecureSeed Plus," which enables two-factor authentication using IC cards, allows for accurate identification of PC users and actual attendance times.

We would like to introduce the feature "IC Card Authentication" of SecureSeed Plus. With two-factor authentication using an IC card and password, it is possible to accurately identify individuals using PCs, as well as to accurately grasp actual working hours. It is also possible to forcibly perform lock, log off, and shutdown operations at specified times, which can be utilized for work style reform. 【Solving these concerns】 ■ Unable to determine when and who is using shared PCs ■ Want to enhance not only security but also convenience when logging into PCs and software ■ Want to limit PC usage time to reduce unapproved overtime *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is ARC?

Maintaining SPF and DKIM results even after forwarding! We introduce situations where ARC is helpful in our blog.

ARC (Authenticated Received Chain) is one of the email authentication systems that displays authentication evaluations at each stage when processing emails. In simpler terms, Authenticated Received Chain can be described as a series of verifications of email messages that allows each entity handling the email message to efficiently verify all previously processed entities. ARC, a relatively new protocol published and documented as "Experimental" in RFC8617 in July 2019, enables email validation by the receiving server even when SPF and DKIM have been invalidated by intermediate servers. [Contents] ■ What is ARC (Authenticated Received Chain)? ■ DMARC's ARC ■ How does Authenticated Received Chain help? ■ How does DMARC's ARC work? *For more details, you can view the related links. Please feel free to contact us for more information.

  • Email/Fax transmission
  • Other security
  • Server monitoring and network management tools
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Instant authentication for your company's official app users: "VitaNet Station"

Easily authenticate users of your company's official app to streamline and enhance efficiency at the reception, and securely log in to store terminals.

Our CloudAuth is a completely automated authentication system that combines beacons and Bluetooth LE (BLE), allowing for instant authentication of customers using smartphone apps without any hassle. It automatically tracks who visits which store as soon as they enter. We have now made it possible to use the BLE authentication device as a standalone unit. By simply incorporating the device's ID information as a QR code or barcode into your official smartphone app, you can achieve high-level authentication of app users' login IDs with security suitable for financial transactions. We provide an SDK for integration into your official app. 【Features】 ■ Our patented technology enables genuine authentication using publicly available identification information (ID) and secret authentication information necessary for high-level authentication. ■ There is no on-site operation required due to remote centralized management from the cloud, significantly reducing management costs.

  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI facial recognition system "Face Alert"

Crime prevention and efficiency improvement solved by AI cameras! Enhance security and operational efficiency with a single system.

The AI facial recognition system "Face Alert" is a system that incorporates AI within a camera system to analyze images and detect specific individuals. By sounding an alert or sending notifications to smartphones, administrators can quickly become aware of on-site issues and respond swiftly, making it a useful AI solution for unmanned and labor-saving operations, all available at a low cost. Additionally, we can take care of everything from equipment proposals and sales to installation work and maintenance. Our support does not end with installation; we will continue to provide solid support even after setup. Please feel free to consult us if you encounter any issues after installation. 【Benefits】 ■ Can be linked with rotating lights and smartphone notifications ■ Facial recognition systems can be implemented at a low cost ■ Installation of security cameras and access control systems is also possible ■ Comprehensive support for peace of mind even after installation *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Cameras
  • Surveillance Camera System
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Store-oriented AI facial recognition system "Face Alert"

Real-time notifications of specific individuals visiting the store! Using AI cameras to prevent troublesome customers and enhance services for valued customers.

Trinity's AI facial recognition system for stores, "Face Alert," is an AI camera system that helps improve store operations, marketing, and the quality of customer service in various ways. The AI camera identifies the faces of customers entering the store and can detect in real-time the arrival of customers who require special attention, such as those on a blacklist or VIP customers, triggering a buzzer or siren. This system allows for immediate recognition of customers who have previously caused issues and are on the blacklist, enabling prompt responses that prevent unnecessary troubles and contribute to improved store services. 【Features】 ■ Prevention of unwanted customers from entering ■ Quick response to valued customers ■ Check for unwanted customers via smartphone *For more details, please refer to the related links or feel free to contact us.

  • Surveillance Cameras
  • Surveillance Camera System
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FE-600

Multi-face authentication is possible! The camera is a 2MP dual camera and is waterproof and dustproof with an IP65 rating.

We would like to introduce the 'FE-600' that we handle. Its features include face + mask detection + PIN code, with a face registration capacity of 50,000 users/1 million. The event log and fingerprint template capacity is 5,000. Additionally, it is equipped with features such as multi-face recognition for up to 5 people and an LE sensor used for fingerprint recognition. 【Features】 ■ Face + mask detection ■ Speed < 1 second (50K 1:N mode) ■ Multi-face recognition (up to 5 people) ■ LE sensor used for fingerprint recognition *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FE-500L

The number of registered faces is 3,000 users / 100,000 event logs! Up to 3 people can be authenticated simultaneously.

We would like to introduce the 'FE-500L' that we handle. It has 4GB Flash/1GB RAM memory, a 5-inch touchscreen LCD, and product dimensions of 169mm × 90mm × 30mm. Additionally, it can register up to 3,000 users and 100,000 event logs, featuring face detection, mask detection, and PIN code functionality. 【Features】 ■ Face + Mask Detection ■ Speed < 1 second (3K1: N mode) ■ Multiple Face Recognition (up to 3 people) *For more details, please download the PDF or feel free to contact us.

  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Vehicle Number Authentication Zenes Scan Number Z-SCN6-01

Vehicle number authentication using surveillance cameras (network cameras) in the art entry and exit management system.

The surveillance cameras installed in parking lots of office buildings and apartments can read the license plates of incoming vehicles and automatically open the gate by matching them with the numbers registered in the access control system. - Compatible with general-purpose cameras You can freely select the camera according to the installation location. - Authentication at night is also possible Authentication can be performed even in dark environments at night by using infrared illuminators. - Can also be operated as surveillance cameras As an option, video monitoring and recording via the cloud are possible.

  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DigitalPersona AD

It is a fully integrated authentication enhancement system for Active Directory that can be implemented in a short period of time and is easy to manage, supporting two-factor and multi-factor authentication.

1. It is possible to flexibly combine possession authentication, biometric authentication, and memory authentication. 2. There is also an SSO integrated with Windows authentication, which supports not only SAML/OpenID Connect but also "proxy input," making it possible to implement SSO for some desktop applications that previously could not use SSO. 3. Bulk settings can be configured through Active Directory (AD) group policies, and backups are performed through AD replication. 4. Since it is fully integrated with AD, there is no need for a separate server, allowing for quick implementation. 5. We have prepared an "Extended Login Policy" that automatically adds authentication methods based on the environment, supporting hybrid work.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Iris Authentication System UBio-X Iris

It is an iris recognition system that can authenticate without contact while wearing a mask.

It is an iris recognition system that allows for contactless authentication while wearing a mask. It has a mask detection feature and an optional surface temperature measurement function. It boasts high authentication accuracy by using iris recognition instead of facial recognition while wearing a mask.

  • Company:安田
  • Price:500,000 yen-1 million yen
  • Entrance and exit control system
  • Personal authentication
  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition system 'JVS-AVD01'

We provide a one-stop solution from cameras to recorders, image analysis, and access control systems.

The "JVS-AVD01" is a facial recognition system that detects faces from camera footage and performs matching and notification against pre-registered facial information. By utilizing camera footage for authentication, it enables non-contact and natural authentication compared to physical methods such as keys or cards. Additionally, it can enhance security levels without intimidating users. 【Features】 ■ Standalone face detection, matching, and notification ■ Facial recognition using only the camera ■ Simultaneous authentication of up to 8 people ■ Registration of up to 10,000 individuals ■ Control of door opening and closing *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Surveillance Cameras
  • Surveillance Camera System
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Voice authentication system

Voice authentication system

"Protect your company with your voice! Voice authentication system VoicePassport" This is a biometric authentication system that verifies identity through voice. It analyzes voice to extract feature data, which is registered as an individual's voice model. During authentication, it compares the input voice with the registered voice to determine if it belongs to the registered user. In telephone services and information systems where identity verification is necessary, it simplifies the previously complicated authentication process, enabling essential authentication functions for business using easy-to-use phones or microphones. ■Features - No need for new device investment; achieved with just software and a microphone - Language-independent; allows for global system deployment - Low psychological burden; supports increased customer satisfaction - No worries about forgetting complex passwords or losing cards - Freedom from redundant keyboard and button operations - High compatibility with voice recognition, voice synthesis, and telephony technologies ★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆ For more details, please contact us.

  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication system 'iBAQS-FS'

Authentication solutions that protect users and systems from threats such as unauthorized access.

The "iBAQS-FS" is an authentication system that builds a robust and stable network environment. It thoroughly ensures correct access and prevents the loss of trust due to unauthorized access or information leaks. The system is easy to implement and features a user-friendly management interface, reducing the burden on administrators. 【Features】 ■ Easy operation management ■ Cost-effective construction ■ Flexible authentication methods ■ Establishes a highly reliable authentication network *For more details, please refer to the catalog or feel free to contact us.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fingerprint authentication system "Access Control"

No server is needed, and there's no worry about personal information leaks!

"Access Control" is a fingerprint authentication system that uses biometrics. By using a two-dimensional code, it is possible to authenticate the individual using the two-dimensional code and fingerprint without registering fingerprint data on the device itself. Due to its high security effectiveness, it can be utilized for PC logon security to prevent unauthorized use and information leakage by unauthorized personnel, as well as for access control management in security facilities. 【Features】 ■ Inexpensive ■ No server required ■ High security ■ Utilizes biometrics ■ No need to register fingerprint data on the device itself *For more details, please refer to the catalog or feel free to contact us.

  • File Management
  • Other production and development software and systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition system 'TSF-06'

Authentication possible without stopping while walking! A non-contact, hygienic, and convenient security device.

The "TSF-06" is a non-contact biometric authentication facial recognition system. Equipped with both security and cost-effectiveness, it is utilized in key facilities such as buildings, factories, construction sites, and military units, enabling high-speed registration and recognition even in low-light and backlit environments. Additionally, it can authenticate without stopping while walking, minimizing the recognition rate through AI algorithms. It is IP65 dustproof and waterproof, suitable for both indoor and outdoor use. 【Features】 ■1: N < 0.2S ■AI algorithm ■Backlight interference prevention ■Usable outdoors with IP65 rating ■NVR video recording capability ■7-inch touch panel *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC authentication system "Entrance IC5000"

Easily installable in renovation properties and new builds! Existing equipment can be integrated into the IC authentication system.

The "Entrance IC5000" is an IC authentication system that can be installed in renovated or newly built properties. It can be easily installed in automatic doors, auto-lock electronic locks, elevators, delivery boxes, and more. The registration and deletion of ICs are simple, making operation smooth. We also offer the "Entrance IC5000 Plus," which allows for easy registration and deletion without the need for a PC. 【Features】 ■ Ultra-compact design and control board development make installation easy, reducing construction costs ■ Smooth operation due to easy registration and deletion ■ Simple authentication by just holding up the IC ■ Easy registration of remote controls ■ Simple upload of registration data for cylinder IC locks and management locks *For more details, please refer to the catalog. Feel free to contact us with any inquiries.

  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is your security against intruders in factories and research labs with high traffic fully prepared?

No need to review the recordings of the security cameras! A facial recognition system that automatically records the faces of unauthorized individuals. *There is a video that shows the speed of facial recognition.

It is extremely difficult to remember and manage everyone coming in and out, especially for employees hired for a short period or in large factories and research facilities. Even with security cameras, surveillance cameras, security cards, and manual monitoring checks, it is quite challenging to prevent incidents on the spot. 【Do you have any of the following requests?】 ■ We do not want anyone other than registered individuals to approach the security area. ■ We want to enhance security to ensure there are no suspicious individuals in large research facilities or factories. ■ We want security that can help us avoid troubles before they occur, etc. Even if someone who should not normally be in the security area or factory premises is present, the camera will recognize their face and notify the administrator via phone or email. *For more details, please download the PDF or feel free to contact us. ↓Watch the video to see the speed of the facial recognition system's response!↓

  • Other operation management software
  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Happy Smile Camera (Facial Recognition Entry and Exit Management)

[Exhibiting at the Microsoft Event] Recognizing people's smiles too! Comfortable visualization of entry and exit, attendance, customers, and security with a facial recognition system.

The "Happy Smile Camera (Facial Recognition Entry and Exit Management)" by IC Soft has been selected as a service to be showcased at the Microsoft event "Japan Partner Conference 2018" on August 31! ■ What can be achieved with the "Happy Smile Camera (Facial Recognition Entry and Exit Management)"? 1. Records entry and exit times simply by passing in front of the camera, along with capturing smiles. ⇒ An increase in smiles can lead to improved work efficiency and enhanced trust through greater exposure of the company via job postings. 2. Instantly displays the last visit date and duration of stay by recognizing specific customers. ⇒ By interfacing FaiceID with the currently used customer management system, a more comprehensive customer management can be realized. 3. By linking cameras, locations, and people, it addresses meeting room usage and security measures against unauthorized access in secure areas. ⇒ Visualization within the company leads to increased employee work efficiency and enhanced safety. *For more details, please download the PDF or feel free to contact us. ↓ Watch the video to see the speed of the facial recognition system's response! ↓

  • Other operation management software
  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Gesture-based user authentication system: K23-006

Achieving user authentication using simple gestures.

■Introduction of Aizu University Technology Research is being conducted on a technology that performs user authentication using a device that detects the user's hand movements. Existing technologies require complex gestures for user authentication, which can be inconvenient as users may not be able to remember these gestures. This invention relates to a user authentication system that can perform user authentication using only simple gestures compared to existing technologies by applying a predetermined computation using machine learning. Applications for smart keys and various user authentication systems are anticipated.

  • others
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IriShield Iris Recognition System

IriShield protects important information securely through iris recognition.

IriShield reliably protects important information through iris recognition. Compared to other biometric authentication methods such as fingerprints, veins, and facial recognition, it offers high accuracy, speed, and ease of use. It is resistant to environmental changes, does not change throughout a lifetime, and is immune to impersonation through photos, videos, or contact. With features like "login functionality," "file and folder encryption," and "SSO (Single Sign-On) functionality," it provides the highest level of security and convenience. 【Features】 ● Seamless integration with one-time passwords/password timestamps ● Ultra-compact and lightweight (51.2×92.6×15.1 mm) ● Easy to use! Simply reflect your eye on the device's mirror  → Blue LED lights up at the appropriate distance ● Authentication distance  ◆ MK2120U: 4.7 to 5.3 cm  ◆ MK2121U: 13.5 to 14.5 cm ● Matching speed: 2,000 templates/second *For more details, please download the catalog or feel free to contact us!

  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face detection and face recognition system

With a case catalog! Quickly detect human faces and both eyes from natural images! Utilized in a wide range of fields!

Our company's face detection processing allows for easy face registration using commercially available web cameras. Multiple users can also be easily registered, making it suitable for entry management and other applications. Recognition is possible if the distance between the eyes is 24 pixels or more (32 pixels or more is recommended), and even small faces can be authenticated. 【Features】 ● In speed priority mode, face detection from VGA input images takes about 30ms (depending on minimum detection size) on an Intel Core i7 2.93GHz. ● Easy to port to embedded versions due to high-speed processing and small footprint. ● Detection is based on eye features rather than estimation from face position, allowing for detection even when wearing glasses or masks. For more details, please contact us or download our catalog to view.

  • Software (middle, driver, security, etc.)
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study of RFID Implementation] Support for Work Style Reform Using RFID Tags

By wearing the RFID of the NES or simply attaching it to the car's windshield, you can remotely read the ID and automatically record the clock-in and clock-out times as well as entry and exit times.

By combining employee ID cards or nameplates with RFID tags, or simply by attaching a transparent RFID tag to the windshield, it is possible to remotely read IDs, allowing for automatic recording of clock-in and clock-out times. Employees can pass through without any operation, and logs from the RFID tags can be obtained, making it an optimal solution for collecting data on work style reforms.

  • Company:NES
  • Price:Other
  • IC tag
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Entry and Exit Management Options] Long-distance authentication using employee ID cards

[Patent Pending] Introduction of an authentication case using employee ID cards with the "Entry and Exit Management System"

The "Entry and Exit Management System" utilizing NES original RFID tags enables long-distance authentication using employee ID cards. By simply attaching it to the back of existing employee ID cards or inserting it into ID card holders, long-distance authentication can be achieved while maintaining the original functionality of the employee ID. Additionally, we have also prepared nameplate types that can be worn on the chest, separate from the ID cards. This system has been implemented for entry and exit management in companies such as a certain electric power company and for attendance log management in a certain game manufacturer. Furthermore, by using a dedicated card holder, it can also be utilized for pharmaceutical companies and hospitals. 【Implementation Examples】 ■ For Entry and Exit Management - For a certain electric power company - For a certain heavy industry company ■ For Attendance Log Management - For a certain game manufacturer - For a certain robot manufacturing company, etc. *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:NES
  • Price:Other
  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Reservation System and QR Code Implementation Case Study] Major General Electric Manufacturer

Utilizing a reservation system and QR codes! Achieving significant labor reduction in reception tasks.

At a major comprehensive electronics manufacturer, a significant amount of effort was required for security operations, including visually verifying access passes for employees and designated contractors, and issuing paper-based access passes for visitors by cross-referencing with the reservation system. To address this, a contactless card-based unmanned reception was implemented for employees and designated contractors, while for prospective visitors, it was determined that significant reductions in reception duties could be achieved by sending a "QR code access pass" via email in advance, in conjunction with the existing reservation system. Additionally, for visitors, a system was adopted that allows for QR code authentication from inside the vehicle without needing to reach out, ensuring smooth passage. 【Challenges Before Implementation】 ■ Visually verifying access passes for employees and designated contractors ■ Issuing paper-based access passes for visitors by cross-referencing with the reservation system, requiring significant effort for security operations *For more details, please refer to the PDF document or feel free to contact us.

  • Company:NES
  • Price:Other
  • Other security
  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Keyless startup

Gradually realizing a "keyless" office.

With the spread of IC card-type employee IDs, it seems that the shift away from cylinder keys for entry and exit, such as doors, has progressed significantly. On the other hand, the current situation is that lockers, storage rooms, and cabinets still predominantly operate with cylinder keys. Since our founding, we at Personal have been committed to the concept of "realizing a keyless society." We propose easy and highly convenient security by utilizing various devices, including biometric authentication such as fingerprint recognition, IC card authentication, and QR code authentication, as keys.

  • locker
  • Encryption and authentication
  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform "Entry and Exit Management System"

Centralized management of data on an advanced IoT platform with scalability.

The "Access Control System" is a system that uses a 3D facial recognition system. Our facial recognition device "FacePlus" can authenticate whether or not the user is wearing glasses, and it can also authenticate while wearing a mask as long as the tip of the nose is exposed. It provides ease of use and a high level of security. It can be used for access control (doors, gates), attendance tracking (clocking in, clocking out), integration with alcohol detectors, and integration with thermometers. 【Features】 ■ High authentication accuracy ■ Can distinguish identical twins ■ Fast authentication speed (within 1 second) ■ Resilient to facial changes (weight fluctuations, changes due to injuries, wearing hats, wearing helmets, wearing masks) *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration