1~3 item / All 3 items
Displayed results
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Contact this company
Inquiry Form1~3 item / All 3 items

You can securely access web applications simply by inserting and removing the USB key. It can be used from small to large scale.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
LOCK STAR-PK is a copy protection product that uses a dongle (hardware key) to prevent unauthorized copying of software developed in-house. It has a simple mechanism that prevents software execution unless the LOCK STAR-PK is inserted into the USB port of the PC, thereby preventing unauthorized use. - With built-in cryptographic logic, encryption and decryption can be performed simply by calling a basic function. - The setup utility is provided free of charge during the initial installation. - The product number, encryption key, and data area can be customized by the user. - The data area can be set to 64 bytes. - A link program that directly locks existing executable files (EXE) is standard equipment, and DLL files called from the executable can also be inserted into the protected files, enhancing security through the use of AES encryption logic and code compression. The USB dongle uses lead-free internal components and solder, and the system board is environmentally friendly hardware that does not contain specified hazardous substances.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration
Many local governments (prefectural offices, city halls, boards of education) and small to large general enterprises use it for network separation, internet resilience, telework, and BCP measures. It is a product that meets national security guideline standards.
Added to bookmarks
Bookmarks listBookmark has been removed
Bookmarks listYou can't add any more bookmarks
By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.
Free membership registration