List of Encryption and authentication products
- classification:Encryption and authentication
1~45 item / All 277 items
Achieves high collection efficiency through electrostatic methods. Offers a wide range of products from large to small sizes. Also compatible with water-soluble oil mist.
- air conditioning
Prevent unauthorized copying and support the software business with flexible license management. Software protection and licensing "Code Meter".
- Other security
- Software (middle, driver, security, etc.)
- Encryption and authentication
Invitation to Exhibit at the '2026 YOKOHAMA Automotive Technology Exhibition'
We are pleased to announce that we will be exhibiting at the "Automotive Technology Exhibition 2026 YOKOHAMA," which will be held at Pacifico Yokohama from May 27 (Wednesday) to May 29 (Friday), 2026. We invite you to visit us during this opportunity. < Exhibition Overview > Name: Automotive Technology Exhibition 2026 YOKOHAMA Dates: May 27 (Wednesday) to May 29 (Friday), 2026, 10:00 AM - 5:00 PM Venue: Pacifico Yokohama Exhibition Hall, Booth Number 193 Registration: [Free] Pre-registration required (you can register from the related link) < Exhibited Products > ■ Self-Localization / SLAM Solutions This technology allows mobile entities such as AGVs to map their surrounding environment while moving and estimate their own position. It observes surrounding features, estimates its own position based on that information, and simultaneously generates an environmental map. ■ Integrated Security for Automobiles Protecting from Finished Vehicles to Manufacturing Processes An integrated security solution that covers everything from finished vehicles to the automotive manufacturing process. It protects both in-vehicle and manufacturing environments with whitelist-based defense, quantum-resistant encryption, and licensing.
Next-generation cryptographic library compatible with quantum-resistant cryptography, preparing for the era of quantum computers: 'Quantum Safe Crypto Library'
- Encryption and authentication
- Other security
- Software (middle, driver, security, etc.)
Invitation to Exhibit at the '2026 YOKOHAMA Automotive Technology Exhibition'
We are pleased to announce that we will be exhibiting at the "Automotive Technology Exhibition 2026 YOKOHAMA," which will be held at Pacifico Yokohama from May 27 (Wednesday) to May 29 (Friday), 2026. We invite you to visit us during this opportunity. < Exhibition Overview > Name: Automotive Technology Exhibition 2026 YOKOHAMA Dates: May 27 (Wednesday) to May 29 (Friday), 2026, 10:00 AM - 5:00 PM Venue: Pacifico Yokohama Exhibition Hall, Booth Number 193 Registration: [Free] Pre-registration required (you can register from the related link) < Exhibited Products > ■ Self-Localization / SLAM Solutions This technology allows mobile entities such as AGVs to map their surrounding environment while moving and estimate their own position. It observes surrounding features, estimates its own position based on that information, and simultaneously generates an environmental map. ■ Integrated Security for Automobiles Protecting from Finished Vehicles to Manufacturing Processes An integrated security solution that covers everything from finished vehicles to the automotive manufacturing process. It protects both in-vehicle and manufacturing environments with whitelist-based defense, quantum-resistant encryption, and licensing.
A high-reliability embedded cryptographic library compatible with PQC (post-quantum cryptography) aimed at the era of quantum computers.
- Encryption and authentication
- Other security
- Software (middle, driver, security, etc.)
FIPS-compliant, future-oriented IPsec encrypted communication compatible with post-quantum cryptography.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Other security
"QuickSec IPsec Toolkit," a high-reliability IPsec encryption communication solution compliant with international standards.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Other security
IPsec communication compatible with quantum-resistant cryptography, preparing for the era of quantum computers.
- Encryption and authentication
- Software (middle, driver, security, etc.)
- Other security
Achieve smooth operation with high-speed reading utilizing biometric information!
- Encryption and authentication
By introducing passwordless authentication, we fundamentally prevent phishing attacks!
- Encryption and authentication
Protect your account with FIDO2 authentication equipped with phishing resistance and IP68 design!
- Encryption and authentication
You can also purchase additional features later! You can use the necessary features when you need them.
- Encryption and authentication
Low cost and initial expenses starting from zero yen! Already compatible with many various cloud services.
- Encryption and authentication
Easy login with just a touch!
- Encryption and authentication
We will achieve fraud prevention in the zero-trust era in one package!
- Encryption and authentication
We will introduce a case study that successfully improved convenience while maintaining security in the distribution of e-books for paid members!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a case where we successfully achieved efficient information sharing while maintaining security through the sharing of technical documents with overseas bases!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
Introducing a case study that successfully shared quality-related documents at domestic and international locations while maintaining security efficiently!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
We will introduce a successful case of efficiently sharing technical documents at domestic and international locations while maintaining security!
- Document and Data Management
- Encryption and authentication
- Other security
[Webinar on 12/18] What are the Appropriate Methods to Protect Intellectual Property? - Explaining Technical Options to Achieve Evidence Strength, Tampering Prevention, and Operational Efficiency -
We will hold a webinar on the theme "What are the appropriate methods to protect intellectual property?" This seminar will explain the key points of intellectual property document management to achieve evidential strength, tampering prevention, and operational efficiency. We will also introduce the solution "WWDS Intellectual Property Archive," which automatically clarifies the location of documents and ensures authenticity through timestamps. ■ Date and Time: December 18, 2025 (Thursday) 13:30 - 14:30 ■ Location: Online Webinar (scheduled to be held via Zoom Webinar)
An explanation of the differences compared to FIPS 140-3, which was introduced in 2019!
- Encryption and authentication
Requirements for the cryptographic module defined in the specification document are also included!
- Encryption and authentication
Achieve safe and seamless remittance, investment, and account management on mobile!
- Encryption and authentication
Enhancing both email security and brand power simultaneously.
- Encryption and authentication
Explaining the remote maintenance that the site currently needs for 【added value of the equipment】【reduction of business trips】! Introducing the strengths of three products! Please use this to help wi...
- Remote Control
- Routers, Switches, and Hubs
- Encryption and authentication
Effective for preventing ticket resale! In addition to the information in a standard two-dimensional code, hidden characters can be included.
- 2D Code Reader
- Other security
- Encryption and authentication
[Free trial set available!] A USB dongle for license authentication that protects software and prevents unauthorized copying.
- Encryption and authentication
- Software (middle, driver, security, etc.)
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
A useful tool for protecting and encrypting Python applications that are easily decipherable by third parties due to being interpreted.
- Software (middle, driver, security, etc.)
- Encryption and authentication
- Other image-related equipment
We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.
Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."
USB duplicator equipped with a CD-ROM function that prevents data tampering, deletion, and formatting using a dedicated USB, allowing for data protection.
- Expansion Boards
- Encryption and authentication
- Other operation management software
The most recommended and ideal data destruction device right now is the physical destruction device, Storage Puncher STPN-30.
Methods for data erasure of unnecessary HDDs, SSDs, magnetic tapes, etc. are as follows: 1. Erasure software, 2. Electrical shock to erase magnetic data, 3. Physical destruction Pros and cons: 1. Erasure software Licensing fees are incurred each time data is erased, resulting in significant costs. 2. Electrical shock magnetic erasure Magnetic erasure devices are very heavy, making it difficult to reuse HDDs. It is also cumbersome to check again by re-inserting into a PC after processing. 3. Physical destruction The easiest, fastest, and cheapest method for erasing data on HDDs is to drill holes in the platters. The currently most recommended device is the physical destruction device Storage Puncher STPN30. What’s good about it: 1. Destruction power of up to 12 tons 2. Processing time of about 10 seconds 3. Hydraulic high-power destruction 4. Various destruction tools can be exchanged on one main unit, allowing for the destruction of HDDs, SSDs, and magnetic tapes. This is a world first. 5. Drills four holes in the HDD to destroy the platter 6. Even if the destruction bit is damaged, it can be easily replaced 7. Function to prevent the destruction shaft from coming out after destruction 8. SSDs are bent at 5mm intervals in a wavy pattern to break the circuit board and destroy the IC chips 9. Battery operation is possible even in places without power, enabling on-site work 10. Weight of about 18 kg
Interpretation of the Ministry Ordinance establishing technical standards for electrical appliances (R06.05.31) corresponds to Appendix 12!
- Encryption and authentication
- LED fluorescent lamp