We have compiled a list of manufacturers, distributors, product information, reference prices, and rankings for Authentication Software.
ipros is IPROS GMS IPROS One of the largest technical database sites in Japan that collects information on.

Authentication Software Product List and Ranking from 10 Manufacturers, Suppliers and Companies

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

Authentication Software Manufacturer, Suppliers and Company Rankings

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. マイスティア イメージプロセッシング事業部 Kumamoto//software
  2. 日本清華同方ソフトウエア 東京本社 Tokyo//software
  3. サイバーリンク Tokyo//IT/Telecommunications
  4. リビッグ Kanagawa//software
  5. 5 ディーオーアイネット Tokyo//IT/Telecommunications

Authentication Software Product ranking

Last Updated: Aggregation Period:Sep 17, 2025~Oct 14, 2025
This ranking is based on the number of page views on our site.

  1. Adopted in "Weekly Robi 2"! High-speed facial recognition IP Stier EF1 マイスティア イメージプロセッシング事業部
  2. [Information] The reason why the facial recognition system FaceMe is world-class. サイバーリンク
  3. Voiceprint authentication software [Low cost, high security] 日本清華同方ソフトウエア 東京本社
  4. No hardware required for Windows 2-factor (OTP) login authentication. リビッグ
  5. 4 Image integrity checker Cytiva

Authentication Software Product List

1~15 item / All 18 items

Displayed results

No hardware required for Windows 2-factor (OTP) login authentication.

[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.

"GAuthLogon" is a Windows login version of the two-factor authentication that has become common in web login authentication. It enables two-factor authentication for Windows login using a smartphone app. The screen switches between username/password authentication and one-time code authentication. Once the username/password authentication is successful, the screen transitions to one-time code authentication. You will enter the code displayed by the smartphone authentication app every 30 seconds. 【Features】 ■ Installation is completed in a matter of seconds. ■ A network connection is not required during operation. ■ Can be used on standalone PCs. ■ Windows login is not possible without GAuthLogon. ■ Two-factor authentication in safe mode. ■ Two-factor authentication for remote computers. * You can also download materials introducing new features. * For more details, please refer to the materials. Feel free to contact us with any inquiries.

  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Image integrity checker

Aren't you concerned about the tampering of raw data from electrophoresis and Western blotting images?

The Image Integrity Checker is a free software for authenticating raw data such as electrophoresis and Western blotting images. It counters the threats of the AI image generation era through raw data authentication using digital fingerprints and issuing certificates for paper submissions. ● Usable with data obtained from Cytiva's Amersham ImageQuant(TM) 800 and Typhoon(TM) series ● Available for free download from the Cytiva website 【Authentication Procedure to Deny Raw Data Tampering】 Step 1: Raw image data with digital fingerprint authentication from ImageQuant 800 / Typhoon Step 2: Authenticate raw data with Image Integrity Checker Step 3: Attach the raw data authentication report when submitting the paper \Currently holding a Western Blotting Image Quiz Campaign!!/ The first 200 applicants will receive a cutlery set! ▼ Apply here https://cytiva.link/iin3h

  • Electrophoresis

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Remote Function] Two-Factor Authentication Software 'Yubi Plus'

Lightweight usability, high-level security, and convenient management features! With Yubi Plus, you can have an office anywhere.

"Yubi Plus" is a two-factor authentication software that comes with remote functionality as standard. It enables secure and safe telework without the need to take documents or data outside. All you need is a USB security key to confidently conduct business from home or while on the go. Remote connection is not possible without having all three components: a USB security key, a digital certificate, and two-factor authentication via Yubi Plus. By implementing the Yubi Plus authentication server, you can achieve two-factor authentication login and remote access for Windows PCs using a USB security key. 【Features】 ■ Excellent performance and usability ■ Strong security through multi-factor authentication ■ Prevention of unauthorized access ■ Prevention of data leakage through copy prohibition ■ Management functions *For more details, please refer to the PDF document or feel free to contact us.

  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Adopted in "Weekly Robi 2"! High-speed facial recognition IP Stier EF1

Edge authentication, perfect for offline authentication! Fast, secure, compact embedded facial recognition software library.

■Fast High-speed facial recognition is possible in 190ms even with a general-purpose microcontroller operating at a frequency of 400MHz. ■Safe Facial feature data is encrypted, and even if it is leaked, it cannot be reverted to facial images. ■Compact In the case of a processor equipped with ARM(R) Cortex(R), ROM=460KB, RAM=720KB. It can operate on processors equipped with ARM Cortex and PCs running Windows 10. Customization for various microcontrollers and operating systems such as Linux is also available.

  • Other security and surveillance systems
  • Software (middle, driver, security, etc.)
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Deep Learning Facial Recognition "IP Stier GF1"

Embedded high-speed facial recognition IP Stier EF1, while maintaining high API compatibility, has enhanced the accuracy of facial recognition software [evaluation version available for free].

The "IP Stier GF1" is an AI facial recognition software that utilizes deep learning technology, and it is the third installment in our in-house brand software product "VINIE," focusing on "visualization." It can widely accommodate various customer usage environments (such as hardware, memory size, OS, etc.) and the required product specifications (such as operating speed and accuracy). You can choose suitable facial recognition software from "IP Stier EF1" and this product. Additionally, since we have enhanced compatibility with "IP Stier EF1" and the API (Application Programming Interface), program migration can be carried out smoothly. 【Features】 ■ Wide compatibility with usage environments and required product specifications ■ A demo and evaluation tool that operates on Windows 10 PCs is available ■ It is also possible to compare and evaluate with "IP Stier EF1" using the above tool *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems
  • Image Processing Software
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AimeFace

It is a facial recognition technology boasting 99% accuracy.

AimeFace is a face detection, face recognition, and eKYC (customer recognition) framework developed by AimeSoft. In addition to real-time face recognition and detection, AimeFace also includes a face registration feature that utilizes multimodal AI (patent pending). Furthermore, by combining it with voice recognition and speaker recognition, it is possible to improve the accuracy of customer recognition. We can flexibly accommodate customizations based on individual environments and requests. Please feel free to contact AimeSoft regarding multimodal AI.

  • Image Processing Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Security Smart Card Authentication "Iltton"

We will solve the issues related to countermeasures for human errors and human threats within the company.

"iLUTon" is a security product that automates password login and screen locking on computers using a dedicated card, enhancing measures against human errors and threats within the company. ◆ Login and Lock with Dedicated Card Instead of manually entering a password, you can log into your computer using a dedicated card. Additionally, manual screen locking is no longer necessary. When you approach the computer while wearing the dedicated card, it automatically logs you in, and when you move away, the screen locks. ◆ Prevention of Human Errors iLUTon automatically executes security measures that are often forgotten, such as remembering and entering complex passwords and locking the screen when stepping away. This helps prevent human mistakes and improves security levels. ◆ Protecting Important Information from "Eavesdropping" and "Unauthorized Operations" While traditional cybersecurity products defend against external attacks, iLUTon reduces the risks of unauthorized operations and eavesdropping by individuals using the computer or outsiders. It protects confidential data such as personnel information, customer information, designs, and blueprints.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] The reason why the facial recognition system FaceMe is world-class.

Designed to maximize authentication accuracy! Also available as a plug-and-play package.

Facial recognition software has not only reduced issues related to false detections by enhancing accuracy, but it has also added numerous powerful new features and improved flexibility. Additionally, many facial recognition software solutions have emerged in the market, with adoption progressing among large corporations and well-known brands. This document explains the reasons why the facial recognition system "FaceMe" is world-class. We invite you to read it. [Contents (partial)] ■ Innovators in facial recognition technology ■ Advantages of FaceMe facial recognition software ■ Extensive facial recognition features of FaceMe ■ Applications of facial recognition across various industries *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Information] Features of Biometric Authentication and the "Impersonation Prevention" Function

"Biometric authentication and facial recognition" and "scenarios of 'impersonation' in facial recognition" are featured!

ID and password are always advised to "not be reused," "not be written down," and "to increase password strength," but it is practically impossible to change and remember passwords for every site and service. Smartphones come equipped with features that allow for automatic management of ID and passwords by registering one's fingerprint or face, which I believe is now an essential function of smartphones. However, how safe is this biometric authentication that is supposed to be "usable only by the individual"? In this document, we will explain the features of biometric authentication and its "anti-spoofing" capabilities. Please take a moment to read it. [Contents (partial)] ■ Biometric authentication is convenient, isn't it? ■ General discussion on biometric authentication and facial recognition ■ Biometric authentication does not actually determine "whether someone is human" ■ Scenarios of "spoofing" in facial recognition *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Voiceprint authentication software [Low cost, high security]

Authentication by your own voice, not by entering a password or answering secret questions! Enhanced security!

Voiceprint recognition is a system that uses a microphone installed in a device to recognize a person's voice, determining characteristics such as the frequencies contained in the voice to identify that individual. The security provided by voiceprint identification can match that of other biometric identification technologies (fingerprints, palm shapes, and iris). 【Features】 ■ Voiceprint authentication software → Low cost, high security, high recognition rate ■ Anti-counterfeiting and safety: With dual authentication using a password and voiceprint, the intrusion rate is below 0.5% ■ Usability: Since a password is issued each time, there is no need to remember it ■ Loss and theft prevention: Biometric authentication technology uses one's own voice, resulting in an extremely low risk of loss or theft compared to existing security measures ■ Cost: Utilizes a smartphone, eliminating the need for authentication devices *For more details, please download the PDF or feel free to contact us.

  • Voice Recognition Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication-enabled cryptographic service provider "TruCSP"

Authentication of the individual is required for access to the certificate!

"TruCSP" is a security package designed to prevent information leakage by requiring user authentication when accessing certificates. It consists of a certificate storage provider and a cryptographic service provider that comply with OS standards, and it works in conjunction with various authentication devices provided by DoiNet, adding authentication functionality to access certificates. 【Features】 ■ Compliant with Microsoft CryptoAPI ■ Compliant with Microsoft CryptoSPI ■ Compliant with Microsoft CSP *For more details, please refer to the catalog or feel free to contact us.

  • Other security
  • Personal authentication
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[Latest Version] A Comprehensive Explanation from the Mechanism of Facial Recognition to Installation Methods

Introducing the mechanisms of facial recognition and methods for optimizing installation! Content that can be understood from the basics is available for free download!

The demand for facial recognition has been increasing in recent years, with many consumers around the world experiencing this technology through unlocking smartphones and making payments, which are essential devices in their daily lives. However, the potential of facial recognition extends beyond its use on smartphones; it is already providing numerous advantages in various industries for applications such as safety, security, and operational efficiency. This document introduces the mechanisms of facial recognition, methods for installation and optimization, specifications and practical use cases to consider from a technical perspective, and future possibilities, in order to utilize facial recognition technology more effectively. [Contents (partial)] ■ What is facial recognition and how to implement it ■ Considerations in building edge devices ■ Edge-based facial recognition: on-premises devices and workstations ■ Other design elements: security, encryption, and privacy *For more details, please refer to the PDF document or feel free to contact us.

  • Other security and surveillance systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

[FaceMe Case Study] Implementation of two-factor authentication using facial recognition in public institutions.

Introducing examples of implementing two-factor authentication using facial recognition in government agencies and local municipalities to enhance login security for computers and systems.

**CyberLink Solutions** ■ A Japanese solution provider (FaceMe partner) has integrated the FaceMe SDK into two-factor authentication login software for government agencies. When public servants access work computers containing confidential information or unlock screens, they can now log in using two-factor authentication that utilizes facial recognition, in addition to account passwords and ID card identification via sensors. ■ Some work computers that allow access through shared accounts and passwords originally lack means to track who the actual user is. However, with the introduction of facial recognition, login records for each user are stored in the backend management system, enabling identity verification and further strengthening the management system for confidential information. *For more details, please refer to the PDF document or feel free to contact us.*

  • Other security and surveillance systems
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We provide one-stop support from embedded devices to equipment.

We can provide one-stop solutions not only for the development of embedded hardware and software but also for small-lot prototyping and manufacturing at our own factory.

Please feel free to consult us on any style, whether it be software only, hardware only, or both hardware and software. We have hardware engineers who are well-versed in embedded microcontrollers, software engineers who excel at utilizing them to create fast and compact solutions, and system engineers who solve our customers' "troubles" with flexible thinking. Our entire team will support you in bringing your product to market.

  • Other embedded systems (software and hardware)
  • Circuit board design and manufacturing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Arrival of a New Era? The World Focuses on the Potential of ChatGPT

Introducing in a column format the gathered attention, expanding possibilities, and points of concern!

On November 30, 2022, OpenAI, based in San Francisco, released "ChatGPT." In just two months since its launch, it gained 100 million users, continued to grow, and has attracted attention worldwide. This time, we will explore the background of this service, which is said to have brought about the same or even greater shock as when computers were first introduced to the world, and consider the possibilities and concerns surrounding ChatGPT. *For more details on the column, please refer to the related links. Feel free to contact us for more information.*

  • Other operation management software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration