We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication Software Product List and Ranking from 11 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

Authentication Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. グローバル・アドバンス 東京本社 Tokyo//others
  2. リビッグ Kanagawa//software
  3. 日本清華同方ソフトウエア 東京本社 Tokyo//software
  4. ディーオーアイネット Tokyo//IT/Telecommunications
  5. Cytiva Tokyo//others

Authentication Software Product ranking

Last Updated: Aggregation Period:Sep 03, 2025~Sep 30, 2025
This ranking is based on the number of page views on our site.

  1. ThinC-AUTH グローバル・アドバンス 東京本社
  2. No hardware required for Windows 2-factor (OTP) login authentication. リビッグ
  3. Image integrity checker Cytiva
  4. [Remote Function] Two-Factor Authentication Software 'Yubi Plus' 日本情報システム
  5. 4 Adopted in "Weekly Robi 2"! High-speed facial recognition IP Stier EF1 マイスティア イメージプロセッシング事業部

Authentication Software Product List

1~15 item / All 19 items

Displayed results

No hardware required for Windows 2-factor (OTP) login authentication.

[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.

"GAuthLogon" is a Windows login version of the two-factor authentication that has become common in web login authentication. It enables two-factor authentication for Windows login using a smartphone app. The screen switches between username/password authentication and one-time code authentication. Once the username/password authentication is successful, the screen transitions to one-time code authentication. You will enter the code displayed by the smartphone authentication app every 30 seconds. 【Features】 ■ Installation is completed in a matter of seconds. ■ A network connection is not required during operation. ■ Can be used on standalone PCs. ■ Windows login is not possible without GAuthLogon. ■ Two-factor authentication in safe mode. ■ Two-factor authentication for remote computers. * You can also download materials introducing new features. * For more details, please refer to the materials. Feel free to contact us with any inquiries.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Remote Function] Two-Factor Authentication Software 'Yubi Plus'

Lightweight usability, high-level security, and convenient management features! With Yubi Plus, you can have an office anywhere.

"Yubi Plus" is a two-factor authentication software that comes with remote functionality as standard. It enables secure and safe telework without the need to take documents or data outside. All you need is a USB security key to confidently conduct business from home or while on the go. Remote connection is not possible without having all three components: a USB security key, a digital certificate, and two-factor authentication via Yubi Plus. By implementing the Yubi Plus authentication server, you can achieve two-factor authentication login and remote access for Windows PCs using a USB security key. 【Features】 ■ Excellent performance and usability ■ Strong security through multi-factor authentication ■ Prevention of unauthorized access ■ Prevention of data leakage through copy prohibition ■ Management functions *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

ThinC-AUTH

Replace passwords with fingerprint authentication for security! Make your work style reform even more secure with this product!

With the multi-factor authentication realized by "ThinC-AUTH," it is possible to protect against hacking and phishing risks by 99.9%. 81% of data breaches are attributed to stolen passwords or the use of weak passwords. This product supports two-factor and multi-factor authentication and allows access to websites that support WebAuthn/CTAP. If it is a device registered with Azure AD, you can log in from any PC, ensuring high security even when multiple people share a computer. 【Features】 ■ Security ■ Privacy ■ Biometric authentication ■ Multi-factor authentication ■ Windows OS login ■ Azure Active Directory *For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Adopted in "Weekly Robi 2"! High-speed facial recognition IP Stier EF1

Edge authentication, perfect for offline authentication! Fast, secure, compact embedded facial recognition software library.

■Fast High-speed facial recognition is possible in 190ms even with a general-purpose microcontroller operating at a frequency of 400MHz. ■Safe Facial feature data is encrypted, and even if it is leaked, it cannot be reverted to facial images. ■Compact In the case of a processor equipped with ARM(R) Cortex(R), ROM=460KB, RAM=720KB. It can operate on processors equipped with ARM Cortex and PCs running Windows 10. Customization for various microcontrollers and operating systems such as Linux is also available.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Deep Learning Facial Recognition "IP Stier GF1"

Embedded high-speed facial recognition IP Stier EF1, while maintaining high API compatibility, has enhanced the accuracy of facial recognition software [evaluation version available for free].

The "IP Stier GF1" is an AI facial recognition software that utilizes deep learning technology, and it is the third installment in our in-house brand software product "VINIE," focusing on "visualization." It can widely accommodate various customer usage environments (such as hardware, memory size, OS, etc.) and the required product specifications (such as operating speed and accuracy). You can choose suitable facial recognition software from "IP Stier EF1" and this product. Additionally, since we have enhanced compatibility with "IP Stier EF1" and the API (Application Programming Interface), program migration can be carried out smoothly. 【Features】 ■ Wide compatibility with usage environments and required product specifications ■ A demo and evaluation tool that operates on Windows 10 PCs is available ■ It is also possible to compare and evaluate with "IP Stier EF1" using the above tool *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Image Processing Software
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We provide one-stop support from embedded devices to equipment.

We can provide one-stop solutions not only for the development of embedded hardware and software but also for small-lot prototyping and manufacturing at our own factory.

Please feel free to consult us on any style, whether it be software only, hardware only, or both hardware and software. We have hardware engineers who are well-versed in embedded microcontrollers, software engineers who excel at utilizing them to create fast and compact solutions, and system engineers who solve our customers' "troubles" with flexible thinking. Our entire team will support you in bringing your product to market.

  • Other embedded systems (software and hardware)
  • Circuit board design and manufacturing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AimeFace

It is a facial recognition technology boasting 99% accuracy.

AimeFace is a face detection, face recognition, and eKYC (customer recognition) framework developed by AimeSoft. In addition to real-time face recognition and detection, AimeFace also includes a face registration feature that utilizes multimodal AI (patent pending). Furthermore, by combining it with voice recognition and speaker recognition, it is possible to improve the accuracy of customer recognition. We can flexibly accommodate customizations based on individual environments and requests. Please feel free to contact AimeSoft regarding multimodal AI.

  • Image Processing Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Smart Card Authentication "Iltton"

We will solve the issues related to countermeasures for human errors and human threats within the company.

"iLUTon" is a security product that automates password login and screen locking on computers using a dedicated card, enhancing measures against human errors and threats within the company. ◆ Login and Lock with Dedicated Card Instead of manually entering a password, you can log into your computer using a dedicated card. Additionally, manual screen locking is no longer necessary. When you approach the computer while wearing the dedicated card, it automatically logs you in, and when you move away, the screen locks. ◆ Prevention of Human Errors iLUTon automatically executes security measures that are often forgotten, such as remembering and entering complex passwords and locking the screen when stepping away. This helps prevent human mistakes and improves security levels. ◆ Protecting Important Information from "Eavesdropping" and "Unauthorized Operations" While traditional cybersecurity products defend against external attacks, iLUTon reduces the risks of unauthorized operations and eavesdropping by individuals using the computer or outsiders. It protects confidential data such as personnel information, customer information, designs, and blueprints.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] The reason why the facial recognition system FaceMe is world-class.

Designed to maximize authentication accuracy! Also available as a plug-and-play package.

Facial recognition software has not only reduced issues related to false detections by enhancing accuracy, but it has also added numerous powerful new features and improved flexibility. Additionally, many facial recognition software solutions have emerged in the market, with adoption progressing among large corporations and well-known brands. This document explains the reasons why the facial recognition system "FaceMe" is world-class. We invite you to read it. [Contents (partial)] ■ Innovators in facial recognition technology ■ Advantages of FaceMe facial recognition software ■ Extensive facial recognition features of FaceMe ■ Applications of facial recognition across various industries *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Features of Biometric Authentication and the "Impersonation Prevention" Function

"Biometric authentication and facial recognition" and "scenarios of 'impersonation' in facial recognition" are featured!

ID and password are always advised to "not be reused," "not be written down," and "to increase password strength," but it is practically impossible to change and remember passwords for every site and service. Smartphones come equipped with features that allow for automatic management of ID and passwords by registering one's fingerprint or face, which I believe is now an essential function of smartphones. However, how safe is this biometric authentication that is supposed to be "usable only by the individual"? In this document, we will explain the features of biometric authentication and its "anti-spoofing" capabilities. Please take a moment to read it. [Contents (partial)] ■ Biometric authentication is convenient, isn't it? ■ General discussion on biometric authentication and facial recognition ■ Biometric authentication does not actually determine "whether someone is human" ■ Scenarios of "spoofing" in facial recognition *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Arrival of a New Era? The World Focuses on the Potential of ChatGPT

Introducing in a column format the gathered attention, expanding possibilities, and points of concern!

On November 30, 2022, OpenAI, based in San Francisco, released "ChatGPT." In just two months since its launch, it gained 100 million users, continued to grow, and has attracted attention worldwide. This time, we will explore the background of this service, which is said to have brought about the same or even greater shock as when computers were first introduced to the world, and consider the possibilities and concerns surrounding ChatGPT. *For more details on the column, please refer to the related links. Feel free to contact us for more information.*

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is the difference between "DX" and digitalization that you can't ask about now?

The DX Promotion Office will reintroduce what the term "DX" refers to in a column!

First, I would like to start with an explanation of the abbreviation "DX," which is fundamental. In daily life, we come across various English abbreviations, and there are quite a few that include "X." For example, there are "FX" (Foreign Exchange: foreign exchange margin trading) and "CX" (Customer Experience: customer experience). In traditional abbreviations, "X" often represented "ex." Alternatively, in the case of "CXO," which collectively refers to CEO, CFO, etc., the "X" serves as a wildcard that can represent various letters. *For more detailed content of the column, you can view it through the related links. If you have any questions, please feel free to contact us.*

  • Technical and Reference Books

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DX Progress "Hōsei Timeline"

Introducing a timeline of Wakai Fellow's and HOUSEI's journey in a column format!

As a special edition of the DX column, we have created a timeline of the journey of Wakai Fellow and HOUSEI. It is composed of four axes, with the left two axes representing the movements of Wakai Fellow and HOUSEI, and the right two axes reflecting the IT and telecommunications landscape surrounding our company, as well as societal movements. Wakai Fellow has been practicing DX through research since the 1970s, and in future columns, he will also discuss his work from that time. *For detailed content of the column, please refer to the related links. For more information, feel free to contact us.*

  • Technical and Reference Books

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Voiceprint authentication software [Low cost, high security]

Authentication by your own voice, not by entering a password or answering secret questions! Enhanced security!

Voiceprint recognition is a system that uses a microphone installed in a device to recognize a person's voice, determining characteristics such as the frequencies contained in the voice to identify that individual. The security provided by voiceprint identification can match that of other biometric identification technologies (fingerprints, palm shapes, and iris). 【Features】 ■ Voiceprint authentication software → Low cost, high security, high recognition rate ■ Anti-counterfeiting and safety: With dual authentication using a password and voiceprint, the intrusion rate is below 0.5% ■ Usability: Since a password is issued each time, there is no need to remember it ■ Loss and theft prevention: Biometric authentication technology uses one's own voice, resulting in an extremely low risk of loss or theft compared to existing security measures ■ Cost: Utilizes a smartphone, eliminating the need for authentication devices *For more details, please download the PDF or feel free to contact us.

  • Voice Recognition Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication-enabled cryptographic service provider "TruCSP"

Authentication of the individual is required for access to the certificate!

"TruCSP" is a security package designed to prevent information leakage by requiring user authentication when accessing certificates. It consists of a certificate storage provider and a cryptographic service provider that comply with OS standards, and it works in conjunction with various authentication devices provided by DoiNet, adding authentication functionality to access certificates. 【Features】 ■ Compliant with Microsoft CryptoAPI ■ Compliant with Microsoft CryptoSPI ■ Compliant with Microsoft CSP *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration