We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication System.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication System Product List and Ranking from 42 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Authentication System Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. null/null
  2. サイバーリンク Tokyo//IT/Telecommunications
  3. クリテックジャパン Tokyo//Trading company/Wholesale
  4. 4 株式会社ハイブリッチ/ビス Tokyo//IT/Telecommunications
  5. 5 Suntex Co., Ltd. Shizuoka//Industrial Electrical Equipment

Authentication System Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. [Security Measures] Online Authentication System Using Encrypted QR Codes
  2. IC card authentication system 'ARCACLAVIS NSAS' 株式会社ハイブリッチ/ビス
  3. AI facial recognition system FaceMe adopted by a major automobile manufacturer. サイバーリンク
  4. 4 Iris recognition system "Ilias EF-45NC" クリテックジャパン
  5. 5 AI facial recognition system "FaceMe" for attendance, entry/exit, login, eKYC. サイバーリンク

Authentication System Product List

76~90 item / All 163 items

Displayed results

Voice authentication system

Voice authentication system

"Protect your company with your voice! Voice authentication system VoicePassport" This is a biometric authentication system that verifies identity through voice. It analyzes voice to extract feature data, which is registered as an individual's voice model. During authentication, it compares the input voice with the registered voice to determine if it belongs to the registered user. In telephone services and information systems where identity verification is necessary, it simplifies the previously complicated authentication process, enabling essential authentication functions for business using easy-to-use phones or microphones. ■Features - No need for new device investment; achieved with just software and a microphone - Language-independent; allows for global system deployment - Low psychological burden; supports increased customer satisfaction - No worries about forgetting complex passwords or losing cards - Freedom from redundant keyboard and button operations - High compatibility with voice recognition, voice synthesis, and telephony technologies ★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆★☆ For more details, please contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication system 'iBAQS-FS'

Authentication solutions that protect users and systems from threats such as unauthorized access.

The "iBAQS-FS" is an authentication system that builds a robust and stable network environment. It thoroughly ensures correct access and prevents the loss of trust due to unauthorized access or information leaks. The system is easy to implement and features a user-friendly management interface, reducing the burden on administrators. 【Features】 ■ Easy operation management ■ Cost-effective construction ■ Flexible authentication methods ■ Establishes a highly reliable authentication network *For more details, please refer to the catalog or feel free to contact us.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fingerprint authentication system "Access Control"

No server is needed, and there's no worry about personal information leaks!

"Access Control" is a fingerprint authentication system that uses biometrics. By using a two-dimensional code, it is possible to authenticate the individual using the two-dimensional code and fingerprint without registering fingerprint data on the device itself. Due to its high security effectiveness, it can be utilized for PC logon security to prevent unauthorized use and information leakage by unauthorized personnel, as well as for access control management in security facilities. 【Features】 ■ Inexpensive ■ No server required ■ High security ■ Utilizes biometrics ■ No need to register fingerprint data on the device itself *For more details, please refer to the catalog or feel free to contact us.

  • File Management
  • Other production and development software and systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Facial recognition system 'TSF-06'

Authentication possible without stopping while walking! A non-contact, hygienic, and convenient security device.

The "TSF-06" is a non-contact biometric authentication facial recognition system. Equipped with both security and cost-effectiveness, it is utilized in key facilities such as buildings, factories, construction sites, and military units, enabling high-speed registration and recognition even in low-light and backlit environments. Additionally, it can authenticate without stopping while walking, minimizing the recognition rate through AI algorithms. It is IP65 dustproof and waterproof, suitable for both indoor and outdoor use. 【Features】 ■1: N < 0.2S ■AI algorithm ■Backlight interference prevention ■Usable outdoors with IP65 rating ■NVR video recording capability ■7-inch touch panel *For more details, please refer to the PDF document or feel free to contact us.

  • Personal authentication
  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC authentication system "Entrance IC5000"

Easily installable in renovation properties and new builds! Existing equipment can be integrated into the IC authentication system.

The "Entrance IC5000" is an IC authentication system that can be installed in renovated or newly built properties. It can be easily installed in automatic doors, auto-lock electronic locks, elevators, delivery boxes, and more. The registration and deletion of ICs are simple, making operation smooth. We also offer the "Entrance IC5000 Plus," which allows for easy registration and deletion without the need for a PC. 【Features】 ■ Ultra-compact design and control board development make installation easy, reducing construction costs ■ Smooth operation due to easy registration and deletion ■ Simple authentication by just holding up the IC ■ Easy registration of remote controls ■ Simple upload of registration data for cylinder IC locks and management locks *For more details, please refer to the catalog. Feel free to contact us with any inquiries.

  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Is your security against intruders in factories and research labs with high traffic fully prepared?

No need to review the recordings of the security cameras! A facial recognition system that automatically records the faces of unauthorized individuals. *There is a video that shows the speed of facial recognition.

It is extremely difficult to remember and manage everyone coming in and out, especially for employees hired for a short period or in large factories and research facilities. Even with security cameras, surveillance cameras, security cards, and manual monitoring checks, it is quite challenging to prevent incidents on the spot. 【Do you have any of the following requests?】 ■ We do not want anyone other than registered individuals to approach the security area. ■ We want to enhance security to ensure there are no suspicious individuals in large research facilities or factories. ■ We want security that can help us avoid troubles before they occur, etc. Even if someone who should not normally be in the security area or factory premises is present, the camera will recognize their face and notify the administrator via phone or email. *For more details, please download the PDF or feel free to contact us. ↓Watch the video to see the speed of the facial recognition system's response!↓

  • Other operation management software
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Happy Smile Camera (Facial Recognition Entry and Exit Management)

[Exhibiting at the Microsoft Event] Recognizing people's smiles too! Comfortable visualization of entry and exit, attendance, customers, and security with a facial recognition system.

The "Happy Smile Camera (Facial Recognition Entry and Exit Management)" by IC Soft has been selected as a service to be showcased at the Microsoft event "Japan Partner Conference 2018" on August 31! ■ What can be achieved with the "Happy Smile Camera (Facial Recognition Entry and Exit Management)"? 1. Records entry and exit times simply by passing in front of the camera, along with capturing smiles. ⇒ An increase in smiles can lead to improved work efficiency and enhanced trust through greater exposure of the company via job postings. 2. Instantly displays the last visit date and duration of stay by recognizing specific customers. ⇒ By interfacing FaiceID with the currently used customer management system, a more comprehensive customer management can be realized. 3. By linking cameras, locations, and people, it addresses meeting room usage and security measures against unauthorized access in secure areas. ⇒ Visualization within the company leads to increased employee work efficiency and enhanced safety. *For more details, please download the PDF or feel free to contact us. ↓ Watch the video to see the speed of the facial recognition system's response! ↓

  • Other operation management software
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IriShield Iris Recognition System

IriShield protects important information securely through iris recognition.

IriShield reliably protects important information through iris recognition. Compared to other biometric authentication methods such as fingerprints, veins, and facial recognition, it offers high accuracy, speed, and ease of use. It is resistant to environmental changes, does not change throughout a lifetime, and is immune to impersonation through photos, videos, or contact. With features like "login functionality," "file and folder encryption," and "SSO (Single Sign-On) functionality," it provides the highest level of security and convenience. 【Features】 ● Seamless integration with one-time passwords/password timestamps ● Ultra-compact and lightweight (51.2×92.6×15.1 mm) ● Easy to use! Simply reflect your eye on the device's mirror  → Blue LED lights up at the appropriate distance ● Authentication distance  ◆ MK2120U: 4.7 to 5.3 cm  ◆ MK2121U: 13.5 to 14.5 cm ● Matching speed: 2,000 templates/second *For more details, please download the catalog or feel free to contact us!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

CMID Manager V2 (abbreviated as CMV2)

Linking "CMV2" with "Ilias EF-45NC" (iris + facial recognition system) allows for centralized management of entry/exit control and attendance management!

● Developed as dedicated software for the "Ilias EF-45NC" ● Capable of user management, access control, attendance management, and recording various histories * By installing the "Ilias EF-45NC" at both the entrance and exit, a system can be established where users who are not authenticated upon entry will not be authenticated upon exit (anti-passback) ● Quickly check "daily real-time event information" from the main screen (dashboard) ● Distribute and delete users' iris information simultaneously across multiple "Ilias EF-45NC" devices: reduces operational hassle! ● Provided as a "software package" that integrates the above management functions and database: easy to use! ● Compatible with PCs equipped with "Windows 10" or "Windows 11," as well as "Windows Server" ● Licenses are issued individually, so they are only valid on licensed PCs. They cannot be transferred to another PC ● If you have any requests beyond the standard features, please feel free to contact us!

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face detection and face recognition system

With a case catalog! Quickly detect human faces and both eyes from natural images! Utilized in a wide range of fields!

Our company's face detection processing allows for easy face registration using commercially available web cameras. Multiple users can also be easily registered, making it suitable for entry management and other applications. Recognition is possible if the distance between the eyes is 24 pixels or more (32 pixels or more is recommended), and even small faces can be authenticated. 【Features】 ● In speed priority mode, face detection from VGA input images takes about 30ms (depending on minimum detection size) on an Intel Core i7 2.93GHz. ● Easy to port to embedded versions due to high-speed processing and small footprint. ● Detection is based on eye features rather than estimation from face position, allowing for detection even when wearing glasses or masks. For more details, please contact us or download our catalog to view.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Case Study of RFID Implementation] Support for Work Style Reform Using RFID Tags

By wearing the RFID of the NES or simply attaching it to the car's windshield, you can remotely read the ID and automatically record the clock-in and clock-out times as well as entry and exit times.

By combining employee ID cards or nameplates with RFID tags, or simply by attaching a transparent RFID tag to the windshield, it is possible to remotely read IDs, allowing for automatic recording of clock-in and clock-out times. Employees can pass through without any operation, and logs from the RFID tags can be obtained, making it an optimal solution for collecting data on work style reforms.

  • Company:NES
  • Price:Other
  • IC tag

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Entry and Exit Management Options] Long-distance authentication using employee ID cards

[Patent Pending] Introduction of an authentication case using employee ID cards with the "Entry and Exit Management System"

The "Entry and Exit Management System" utilizing NES original RFID tags enables long-distance authentication using employee ID cards. By simply attaching it to the back of existing employee ID cards or inserting it into ID card holders, long-distance authentication can be achieved while maintaining the original functionality of the employee ID. Additionally, we have also prepared nameplate types that can be worn on the chest, separate from the ID cards. This system has been implemented for entry and exit management in companies such as a certain electric power company and for attendance log management in a certain game manufacturer. Furthermore, by using a dedicated card holder, it can also be utilized for pharmaceutical companies and hospitals. 【Implementation Examples】 ■ For Entry and Exit Management - For a certain electric power company - For a certain heavy industry company ■ For Attendance Log Management - For a certain game manufacturer - For a certain robot manufacturing company, etc. *For more details, please refer to the PDF materials or feel free to contact us.

  • Company:NES
  • Price:Other
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Reservation System and QR Code Implementation Case Study] Major General Electric Manufacturer

Utilizing a reservation system and QR codes! Achieving significant labor reduction in reception tasks.

At a major comprehensive electronics manufacturer, a significant amount of effort was required for security operations, including visually verifying access passes for employees and designated contractors, and issuing paper-based access passes for visitors by cross-referencing with the reservation system. To address this, a contactless card-based unmanned reception was implemented for employees and designated contractors, while for prospective visitors, it was determined that significant reductions in reception duties could be achieved by sending a "QR code access pass" via email in advance, in conjunction with the existing reservation system. Additionally, for visitors, a system was adopted that allows for QR code authentication from inside the vehicle without needing to reach out, ensuring smooth passage. 【Challenges Before Implementation】 ■ Visually verifying access passes for employees and designated contractors ■ Issuing paper-based access passes for visitors by cross-referencing with the reservation system, requiring significant effort for security operations *For more details, please refer to the PDF document or feel free to contact us.

  • Company:NES
  • Price:Other
  • Other security
  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Keyless startup

Gradually realizing a "keyless" office.

With the spread of IC card-type employee IDs, it seems that the shift away from cylinder keys for entry and exit, such as doors, has progressed significantly. On the other hand, the current situation is that lockers, storage rooms, and cabinets still predominantly operate with cylinder keys. Since our founding, we at Personal have been committed to the concept of "realizing a keyless society." We propose easy and highly convenient security by utilizing various devices, including biometric authentication such as fingerprint recognition, IC card authentication, and QR code authentication, as keys.

  • locker
  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration