We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication System.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication System Product List and Ranking from 84 Manufacturers, Suppliers and Companies | IPROS GMS

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

Authentication System Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

  1. null/null
  2. クリテックジャパン Tokyo//Trading company/Wholesale
  3. サイバーリンク Tokyo//IT/Telecommunications
  4. 4 アイティ・セック Kanagawa//IT/Telecommunications
  5. 5 明電システムソリューション Shizuoka//IT/Telecommunications

Authentication System Product ranking

Last Updated: Aggregation Period:Feb 11, 2026~Mar 10, 2026
This ranking is based on the number of page views on our site.

  1. [Security Measures] Online Authentication System Using Encrypted QR Codes
  2. IriShield Iris Recognition System クリテックジャパン
  3. Iris recognition system "Ilias EF-45NC" クリテックジャパン
  4. 4 Face recognition system 'NeoFace KAOATO 6.0' アイティ・セック
  5. 5 Ilias EF-45NC 明電システムソリューション

Authentication System Product List

91~120 item / All 170 items

Displayed results

Keyless startup

Gradually realizing a "keyless" office.

With the spread of IC card-type employee IDs, it seems that the shift away from cylinder keys for entry and exit, such as doors, has progressed significantly. On the other hand, the current situation is that lockers, storage rooms, and cabinets still predominantly operate with cylinder keys. Since our founding, we at Personal have been committed to the concept of "realizing a keyless society." We propose easy and highly convenient security by utilizing various devices, including biometric authentication such as fingerprint recognition, IC card authentication, and QR code authentication, as keys.

  • locker
  • Encryption and authentication
  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform "Entry and Exit Management System"

Centralized management of data on an advanced IoT platform with scalability.

The "Access Control System" is a system that uses a 3D facial recognition system. Our facial recognition device "FacePlus" can authenticate whether or not the user is wearing glasses, and it can also authenticate while wearing a mask as long as the tip of the nose is exposed. It provides ease of use and a high level of security. It can be used for access control (doors, gates), attendance tracking (clocking in, clocking out), integration with alcohol detectors, and integration with thermometers. 【Features】 ■ High authentication accuracy ■ Can distinguish identical twins ■ Fast authentication speed (within 1 second) ■ Resilient to facial changes (weight fluctuations, changes due to injuries, wearing hats, wearing helmets, wearing masks) *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access control in data centers

High security level and also user-friendly!

The "Access Control Management System" is a system that uses a 3D facial recognition system. In data centers, physical access control and monitoring are necessary to prevent entities (such as people) without legitimate purposes from entering security areas, based on a "spatial structure." Primarily, physical security can be achieved by partitioning the components of this "spatial structure" with walls, but authentication for important rooms can be conducted at the highest level by using an AND condition of "face + card." Our facial recognition device, "FacePlus," can authenticate whether or not the user is wearing glasses, and it can also authenticate while wearing a mask as long as only the tip of the nose is exposed. It offers ease of use and a high level of security. 【Features】 ■ High authentication accuracy ■ Authentication whether or not wearing glasses ■ Resilient to changes in facial appearance (weight fluctuations, changes due to injuries, wearing hats, wearing helmets, wearing masks) *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

3D Facial Recognition System: Utilization in Hospitals and Care Facilities

Achieving authentication speed of under 0.7 seconds! A facial recognition system that can be used in hospitals, nursing homes, and more!

The "3D Facial Recognition System (Door-Mounted)" is a security system suitable for doors that authenticates individuals entering and exiting solely by their faces, while guests can authenticate by holding up a card and taking a photo. This system can also be utilized in hospitals and nursing facilities. It can be used in patient rooms where access restrictions are desired, such as medication storage rooms and supply closets. Unlike traditional biometric recognition systems (such as fingerprint or vein recognition), this non-contact authentication method allows for adaptability to various situations within the facility without the need to place hands on a scanner. 【Features】 - Usable in patient rooms where access restrictions are desired, such as medication storage rooms and supply closets. - No need to place hands on a scanner due to non-contact authentication. - Capable of adapting to various situations within the facility. *For more details, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Work Support System: On-site Verification Authentication System

Enter the authentication code to complete the on-site check and have the control system recognize it!

The "On-site Verification Authentication System" is a system that displays check items and random authentication codes on an operation monitoring display. The control system recognizes the on-site check as complete only after the authentication code is entered. This system has been implemented with the objectives of "preventing the formalization of checks, which had become merely a simple click," "although improvements in equipment are necessary in the future, we want to strengthen checks immediately," and "ensuring that important equipment is visibly marked for on-site verification." 【Background for System Implementation】 ■ Previously, checks were simplified to just clicking "OK" on the check items. ■ We want to introduce answer signals to each device, but many manual valves make immediate implementation difficult due to budget constraints. ■ We want to enhance workers' awareness of their tasks. *For more details, please refer to the PDF document or feel free to contact us.

  • Process Control System
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Elderly care home facial recognition system

The wanderer should report the still images to the caregivers and administrators via email!

The "Elderly Home Face Recognition System" is a system for managing entry and exit at elderly homes, particularly for managing residents and those who tend to wander. Approximately 10 facial photos of wandering residents are taken and registered on a cloud server as electronic images. When passing in front of the authentication cameras and network cameras installed at the entrance and two other locations within the facility, automatic authentication is performed. At that time, a chime sound is emitted to direct the person's face towards the face recognition camera, and when the face recognition detects the individual, it calls out the name of the wandering resident to make them stop. [Prototype Version Completed Features] ■ Alarm output function ■ Motion sensor response web camera recording function ■ Wandering person face recognition camera ■ Email notification function (with still images) ■ Voice output function ■ Various sensor input functions (ammonia, illumination, vibration, etc.) *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Non-contact palm print authentication system "HAND PASSPORT"

Non-contact palm print authentication system using high-speed imaging technology, image matching, and biometrics.

"HAND PASSPORT" automatically detects the palm from images captured at high speed and performs personal identification. It detects the tilt and position of the palm, enabling excellent matching. With no need for a PC, non-contact, and high-speed authentication, it can be used in various situations without being limited to specific installation locations. 【Features】 ■ High-precision biometric authentication system co-developed with Tohoku University ■ Customization to meet customer needs ■ High-speed authentication & rapid registration ■ Equipped with operation guidance ■ Flexibility in increasing or decreasing the number of registered users *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other image-related equipment
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud-based IC Card Authentication Auto Lock System Ver2.0

Centralize electronic lock management in the cloud!

The "Cloud-based IC Card Authentication Auto Lock System Ver2.0" has a high level of security that meets ISMS requirements and can also reduce system asset costs through cloud (SaaS) usage. It is ideal for managing entry and exit history and for automatic management of locking and unlocking. 【Features】 ■ Security measures in the cloud ■ Remote management in the cloud ■ Abundant permission/restriction settings ■ Authentication/unlocking by waving *For more details, please refer to the catalog or feel free to contact us.

  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

『Smart Secure Client+SmartOn』

Reduce the risk of information leakage in remote work! We propose a secure remote environment.

"Smart Secure Client + SmartOn" is a system that ensures authorized employees can reliably use it, providing a secure remote environment where business data is not left on the PC. We have combined two software solutions: "Smart Secure Client," which reduces the risk of information leakage during remote work, and "SmartOn," which ensures security in remote work environments and prevents unauthorized use through enhanced OC authentication. 【Features】 <Smart Secure Client> ■ Security terminal customized according to customer needs ■ Highly portable business model ■ Easy app launch from a customized screen <SmartOn> ■ Reliable identity verification through facial recognition ■ Supports single sign-on ■ Compatible with desktop virtualization *For more details, please refer to the PDF document or feel free to contact us.

  • Other information systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Limited-time construction site! Facial recognition access control system 'Face-Air'

By integrating the new facial recognition device with the cloud, it enables individual authentication and temperature measurement! It can be implemented for a monthly fee.

Japan Rock Service provides a cloud service that utilizes advanced authentication methods to monitor the access management of workers to job sites (entry and exit status) in real-time. By linking the facial data of registered workers in the facial recognition access management system "Face-Air" with the worker IDs in the green site using QR codes, access can thereafter be granted solely through facial recognition, achieving both ease of operation and prevention of impersonation. Our cloud service is integrated with the construction career advancement system promoted by the Ministry of Land, Infrastructure, Transport and Tourism through a representative labor management system. 【Features】 ■ Prevention of impersonation with advanced authentication methods ■ Easy device installation and simple facial registration ■ Supports facial recognition + temperature check + mask check functions *For more details, please refer to the PDF document or feel free to contact us.

  • Area Sensor
  • Safety Sensors
  • Other measurement, recording and measuring instruments
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Access control and security measures can be utilized! Intercom with camera × facial recognition system.

Wouldn't you like to reduce the hassle of security and visitor management? Improve your operations with the 'IX System' for monitoring, crime prevention, and remote communication.

The iPhone's "IX System" is a system that utilizes a high-definition camera-equipped intercom (with calling and communication functions) and a video monitoring and recording system for security cameras, aiding in video analysis and facial recognition. 【Do you have any of these concerns?】 ■ Due to a lack of staff, we want to reduce the burden of managing parent access at childcare facilities... ■ We want to eliminate the risk of staff losing keys... ■ We want to automatically allow entry only for members at a membership-based facility... ■ We want to prevent unauthorized departures in elderly care facilities... and more. The "IX System" can be customized according to needs, including compatibility with other manufacturers' network products through ONVIF support and API disclosure. It is a commercial-grade intercom compatible with IP networks, suitable for a wide range of applications such as commercial facilities, factories, social infrastructure sites, and office buildings. *For more details, please refer to the PDF materials.

  • Entrance and exit control system
  • Other security
  • Other operation management software
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition system using edge AI devices

The learning model is created independently! We will introduce examples of AI solutions for edge devices.

We have built an application system using Deep Learning that operates on a Raspberry Pi 3 as a proposal for AI solutions for edge devices. At Embedded Technology West 2019 / the Kansai Embedded Technology Exhibition, we conducted a demo using a depth measurement camera to simulate FaceID running on embedded devices. Anticipating various future needs and versatility, we created our own learning model from a Deep Learning framework without using existing pre-trained models. This allows for flexible responses to various edge devices. The AI solutions proposed by Bee Co., Ltd. can flexibly accommodate various edge devices. We provide everything from support for the edge devices envisioned by our customers to the selection of devices and idea proposals for services, as well as the embedded technology to control these devices and operational support. *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:Bee
  • Price:Other
  • EAI/ETL/WEB application server
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

World's highest standard AI facial recognition 'FaceWatch'

AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail industry, asset preservation.

World-class AI facial recognition technology evolves internal controls. Features: 1. Access management through facial recognition (integrated with electronic locks and smart locks) 2. Prevention of unauthorized entry (preventing intrusions by former employees and outsiders) 3. Attendance comparison function (automatic reconciliation of attendance records and access logs) 4. Detection of unreported overtime work 5. Integration with AI cameras (enabling more advanced management through integration with AWLBOX) 6. [In development] Employment eligibility verification function for foreign employees

  • Entrance and exit control system
  • Personal authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Entry and Exit School/Commute Face Recognition Confirmation System RealFace Timely

Notifies parents of children's arrival/departure at daycare and kindergarten via LINE or email. It alerts parents to any instances of children being left behind during drop-off and pick-up.

The "RealFace Timely" arrival and departure facial recognition confirmation system notifies designated third parties via LINE or email when individuals arrive or leave the facility. Since facial recognition is directly linked to the individual, it eliminates the possibility of "leaks" or "misrecordings." By simply performing facial recognition during your child's arrival and departure, it ensures accurate record-keeping, thus avoiding human errors that can occur with traditional arrival recording methods and contributing to a reduction in the operational burden on the facility. The accuracy of facial recognition is 99.99% (only one in 10,000 cannot be recognized), and the recognition time is 0.3 seconds, so it does not burden the child. Additionally, notifications via LINE or email include not only arrival/departure alerts but also a facial photo at the time of recognition, allowing you to check the child's complexion and condition. You can choose a configuration where one recognition terminal serves both arrival and departure, or assign one terminal for each, resulting in two terminals. Furthermore, there is an option to add a temperature measurement module.

  • Personal authentication
  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Composite Ecological Certification System IRIS+FACE Recognition

Improved authentication speed with the adoption of AF functionality! Iris recognition + facial recognition system.

"IRIS+FACE Recognition" is a non-contact biometric authentication system. It enables face recognition at distances of over 2 meters and iris recognition at distances of over 1 meter. Being non-contact, it excels in hygiene. Additionally, we offer a PC and USB version that improves authentication speed by adopting an autofocus (AF) function. It can be used for authentication and payment methods (contactless payment) in the financial sector, as well as for securing important document folders. 【Features】 ■ Non-contact biometric authentication system ■ Face recognition at distances of over 2 meters and iris recognition at distances of over 1 meter ■ Improved authentication speed due to the adoption of AF function ■ Excellent hygiene due to non-contact nature ■ Compact iris authentication (for PC and USB) *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OTP authentication system "FOAS" *Free trial version available for loan.

Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.

"FOAS" is a robust OTP authentication system required in the cloud era. It enhances the security level of authentication using one-time password tokens. It strengthens authentication across various information devices such as PCs, tablet PCs, and smartphones. It enables the implementation of high security at a low cost. 【Features】 ■ Easily add strong authentication ■ Compatible with various systems for interoperability ■ Usable regardless of the format of information devices ■ Low implementation cost ■ Easy to switch from other authentication servers compliant with the international standard OATH ■ Custom integration using APIs is possible ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Two-Factor Authentication System 'SecureVisit' *Free Trial Available

Two-factor authentication system using USB keys and one-time password tokens!

"SecureVisit" is a web authentication enhancement solution that achieves higher security than traditional authentication methods through a robust two-factor authentication system utilizing USB keys or one-time password tokens. It can be easily implemented without the need to modify existing web servers. It is suitable for customers managing corporate web services with just an ID and password. 【Features】 ■ Advanced devices that enable two-factor authentication ■ Easy implementation, construction, and operation ■ Low implementation and operational costs ■ Flexible support for large corporations to small and medium-sized enterprises ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • Software (middle, driver, security, etc.)
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Introduction to Face Recognition Module

Providing usable security to our customers! Featuring face recognition modules suitable for embedded development and specifications comparison, etc.

This document introduces the "Face Recognition Module" handled by Hiten Japan Co., Ltd. It is a face recognition module suitable for embedded development in on-premises systems, client PCs, and various equipment fixtures, enclosures, and panels. In addition to face recognition, it can also identify attributes such as age and gender, making it usable in retail and direct marketing applications when integrated into signage, vending machines, self-checkout POS systems, etc. [Contents] ■ Face recognition module suitable for embedded development ■ Product features ■ Comparison of face recognition module specifications ■ Applications and system construction examples for face recognition modules "FA10R" and "FA10M" ■ Applications and system construction examples for face recognition modules "FA51M" and "FA51MC" *For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI facial recognition module suitable for embedded development.

This is a face recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it is also possible to restrict the operations of workers.

The "AI Face Recognition Module" is a product well-suited for embedded development in on-premises systems, client PCs, and various devices' fixtures, enclosures, and panels. It is capable of estimating age, gender, and emotions, making it usable for marketing purposes when integrated into various devices. We offer a rich lineup, including the "FA51M/FA51MC," which can also perform palm recognition and mask detection, so please feel free to contact us. 【Features】 ■ Face Recognition ■ Age Estimation ■ Gender Estimation ■ Emotion Estimation ■ Biometric Verification ■ USB Connection *For more details, please refer to the related links or feel free to contact us.

  • Personal authentication
  • Other embedded systems (software and hardware)
  • Other electronic parts
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Advantages and disadvantages of one-time password authentication.

Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.

This blog discusses the advantages and disadvantages of one-time password authentication. One-time passwords are gaining renewed attention as a system to enhance login authentication security. Unlike traditional ID/password authentication methods, one-time passwords utilize a disposable password that can be used only once, significantly improving the level of security. [Content] - Strengthening authentication with user-friendly one-time passwords - New attack methods targeting one-time passwords - Utilizing multi-factor authentication in the cloud service authentication infrastructure "Azure AD" *For more details, you can view the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Encryption and authentication
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementation of mandatory MFA (Multi-Factor Authentication) for Salesforce.

Authentication enhancement by combining two or more elements! Protecting business and data from security threats.

This blog introduces the "Mandatory Implementation of MFA (Multi-Factor Authentication) for Salesforce." The customer relationship management (CRM) solution "Salesforce" made the use of multi-factor authentication (MFA) mandatory in February 2022. As the threat of unauthorized access continues to rise, the aim is to protect important information of client companies by enhancing security through the combination of two or more factors, rather than relying solely on ID and password. Since two-factor authentication via SMS or email alone cannot meet the requirements of mandatory multi-factor authentication, three authentication methods are recommended. [Contents] ■ Reasons why Salesforce requires MFA (Multi-Factor Authentication) ■ Responding to rapidly changing threats ■ What MFA (Multi-Factor Authentication) methods does Salesforce recommend? *For more details, you can view the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Strengthening security with two-factor authentication.

Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.

Two Factor Authentication (2FA) is a system that uses two elements to authenticate a user. For a long time, authentication using an ID and password has been common, but this is an authentication method based on a single element, "ID + password." In recent years, there have been continuous incidents of account information leaks, and it has been pointed out that authentication based on a single element poses security issues. Two Factor Authentication requires two out of the three elements of authentication to be present for the authentication to be successful, significantly enhancing the strength of the authentication. In this blog, we introduce examples of Two Factor Authentication. Please take a moment to read it. [Contents] ■ What is Two Factor Authentication? ■ Advantages and disadvantages of major authentication methods ■ Why is password authentication problematic? ■ Combining different authentication methods *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Personal authentication
  • Encryption and authentication
  • Other security
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT Secure Authentication Technology "DiXiM Secure Link"

IoT secure authentication technology to prevent "spoofing" in device-to-device communication.

As smart homes and IoT services expand, the risks and concerns related to unauthorized access, impersonation, information leaks, and communication interception are also increasing, making security measures a challenge for companies deploying these services. Generally, authentication using IDs and passwords between devices can sometimes involve simple or default settings, leading to instances of list-based attacks or brute force attacks. "DiXiM Secure Link" introduces an authentication system that uses certificates for device pairing, and further encrypts communication using those certificates, thereby preventing damage from communication interception, tampering, unauthorized access, and impersonation. 【Main Features】 ● Pairing Function This function allows for the pairing of two devices. Certificates are issued within the devices, and by signing and authenticating each other, communication can only occur between authenticated devices. ● Encryption Function This function encrypts communication between devices using the certificates authenticated during pairing. It enables encrypted communication that can only be decrypted by paired devices.

  • Encryption and authentication
  • Software (middle, driver, security, etc.)
  • Embedded Board Computers
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Vehicle Number Authentication System] Would you like to streamline vehicle entry operations?

We support safe and secure facility operations by automating entry permission through capturing license plates with a camera!

Do you have any of the following concerns? ■ Traffic congestion is occurring around the facility, and complaints are being received from the neighborhood. ■ There is no management to ensure that vehicles entering the site are completing their work on time. ■ There is a lack of coordination between the contractors' registration and the security personnel, leading to troubles. ■ Due to unclear clock-in and clock-out times, guidance has been received from the Labor Standards Inspection Office. ■ We want to promote work style reform for truck drivers.

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

MOBOTIX Business Automation & Traceability Improvement Solutions

It is possible to connect with other sensors and collaborate via IP networks!

We propose the automation of operations and improvement of traceability using "MOBOTIX." By incorporating flows such as unlocking the pharmaceutical storage with facial recognition into existing operations, we deliver new value to our customers. 【Features】 ■ Door unlocking via facial recognition for registered individuals only ■ Image data storage and accumulation in Excel format ■ Compatibility with other devices ■ Automatically records time, measurement amount, work images, and worker names when placed on a scale * Worker name requires facial recognition option After hearing about the responsibilities of your staff, we will propose various solutions centered around MOBOTIX that lead to labor-saving and operational efficiency. * For more details, please download the materials or feel free to contact us at the link below. Konica Minolta Japan, Inc. MOBOTIX Inquiry Page: https://bs-offers.konicaminolta.jp/fm-mobotix-contact.html

  • Surveillance Cameras
  • Surveillance Camera System
  • Other measurement, recording and measuring instruments
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

NEC Agricultural Guidance Support System

It is possible to record farming activities, reference information, receive remote guidance, and share information using a smartphone!

The "Agricultural Guidance Support System" is a service that supports production areas and producer organizations working on improving the brand of agricultural products, stabilizing supply, and guiding and training agricultural workers. By using smartphones, it will enable various activities such as recording work and growth, referencing environmental and growth information, remote guidance, and sharing and exchanging information within the production area, all possible at different times and places. 【Features】 ■ Use smartphones for agricultural record-keeping, referencing, remote guidance, and information sharing ■ Guidance and measures tailored to the situation based on growth objectives ■ Analyze and utilize agricultural data accumulated in the production area with "explainable AI" *For more details, please download the PDF or feel free to contact us.

  • project management
  • Other operation management software
  • Authentication System

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration