List of Encryption and authentication products

  • classification:Encryption and authentication

46~90 item / All 272 items

Displayed results

We provide manufacturing technology for neutralization, esterification, sulfonation, phosphorylation, polycondensation reactions, powder mixing, emulsification, and dispersion, etc. *We can also handl...

  • Contract manufacturing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
2022-04-14_17h03_20.png

Do you have any concerns about contract manufacturing of various chemical products?

We would like to introduce the contract manufacturing services provided by Riten Chemical Co., Ltd. We are a chemical manufacturer based in Kyoto with 70 years of experience. Since our establishment, we have been developing, manufacturing, and selling various surfactants used in the textile and paper industries. Based on the technology and development capabilities we have cultivated over the years, we accept contract manufacturing of various chemical products, so please feel free to contact us. 【Contract Manufacturing Achievements】 ■ Construction waterproofing agents ■ Plant growth promoters ■ Construction waterproofing materials ■ Greening-related agents ■ Chemicals for the electronics industry ■ Wastewater treatment agents ■ Industrial preservatives ■ Special surfactants... We provide more detailed information through related products and catalogs.

Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!

  • 配管カバー ベルト式 (3).jpeg
  • 断熱保温カバー (3).JPG
  • タンク.JPG
  • A.JPG
  • DSCN0459-1.jpg
  • 配管配線カバー.jpg
  • 参考製品 (2).jpeg
  • シリコン1 (2).jpeg
  • 1 (1).jpeg
  • Glass

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The third option following USB dongles and software licenses. With CodeMeter, three types can be used together!

  • Encryption and authentication
  • Software (middle, driver, security, etc.)

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.

Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."

Amano's authentication service business "e-timing," which uses "time" as its key, provides trust and safety in the IT society.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
e-timing.jpg

Added automatic timestamping function to the intellectual property management system "CyberPatent Topam."

NRI Cyber Patent Co., Ltd. (Headquarters: Chiyoda-ku, Tokyo, President: Seiji Takano, hereinafter referred to as "NRI Cyber Patent") and Amano Secure Japan Co., Ltd. (Headquarters: Yokohama City, Kanagawa Prefecture, President: Aki Moriguchi, hereinafter referred to as "Amano Secure Japan") will integrate the timestamp service "Amano Timestamp Service 3161," provided by Amano Co., Ltd., the parent company of Amano Secure Japan, into NRI Cyber Patent's intellectual property management system "CyberPatent Topam" (hereinafter referred to as "Topam"). This will enable the automatic application of timestamps to files stored in "Topam." - Automatic application of timestamps is now possible. - Management and extension of the validity period of timestamps are made easy. We will introduce this service at the "2018 Patent and Information Fair & Conference," which will be held for three days from November 7 (Wednesday) to November 9 (Friday), 2018, at the Science and Technology Museum in Chiyoda-ku, Tokyo. Event Dates: November 7 (Wednesday) to November 9 (Friday), 2016, 10:00 AM to 5:00 PM Venue: Science and Technology Museum (Tokyo, Kitanomaru Park), 2-1 Kitanomaru Park, Chiyoda-ku, Tokyo URL: http://www.pifc.jp/

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A RADIUS server that allows you to build an advanced authentication system with an easy-to-use setup screen!

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure and safe authentication for shared PCs: Security key - YubiKey.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication Gateway 【Griffas】

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure communication for IoT devices! Safely store certificates and keys in the 'USB Protect Key'.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We will exhibit at Hannover Messe 2025 and showcase technologies that comply with the new EU cyber resilience regulations.

Wibu-Systems will showcase its comprehensive CRA-compliant solutions at the exhibition venue. - Protection of software and data integrity The CodeMeter Protection Suite provides a comprehensive security framework equipped with encryption and obfuscation technologies, integrity checks, anti-debugging features, and tamper resistance mechanisms. - Secure authentication The CodeMeter API features encryption technologies such as symmetric and asymmetric encryption and digital signature procedures, enabling seamless integration with digital products and protection against tampering. - Compliance-oriented licensing CodeMeter License Central is a database-based licensing and entitlement management solution that automates the processes of license creation, distribution, and management. This allows for tracking software usage, managing compliance, and conducting software recalls when necessary. Additionally, the handling of personal information and business data complies with the principle of "data minimization."

Easily set up a system that uses a USB dongle as a license key for authentication on PCs and devices. Compatible with Win/Mac/Linux.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
leader electronics.jpg

Creating new business opportunities for MTF measurement software SFR-Fit with CodeMeter technology.

Wibu-Systems Supports Leader Electronics Co., Ltd.'s Initiatives Wibu-Systems, which provides protection and licensing technology through CodeMeter, has partnered with Leader Electronics Co., Ltd., a specialized manufacturer of electronic measuring instruments in Japan, to support the company's global expansion. With the integration of CodeMeter's protection and licensing technology into the MTF measurement software SFR-Fit developed in MATLAB, new prospects for secure and profitable growth in both domestic and overseas markets are opened. User Case Summary: • Leader Electronics Co., Ltd.'s software "SFR-Fit" generates and displays accurate test charts with various types of cameras. • Aiming to improve its global market share, a new sales strategy has been chosen. • Wibu-Systems supports the protection and licensing of the resolution measurement software "SFR-Fit." • Wibu-Systems' CodeMeter provides robust IP protection and versatile license management features for files generated by the MATLAB compiler.

Effective printing security system for information leakage prevention and personal data protection.

  • Other security
  • Internal Control and Operational Management
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A case of developing a port monitor for card authentication printing of CAD prints using a multifunction printer!

  • Software (middle, driver, security, etc.)
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

An access control system that unlocks electric locks with card authentication and PIN entry, and retrieves access history.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Key Station" is a key management system handled by Seiko Maintenance Co., Ltd.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Share important files securely! Solve security issues like the PPAP problem.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We protect information assets with authentication via IC cards and encryption technology!

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

To set an appropriate password! An explanation of weak passwords and attack methods.

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining examples of dangerous passwords and methods to prevent unauthorized access by third parties!

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The reality of password management in companies! A column explaining the measures that should be taken.

  • Other security
  • Integrated operation management
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A detailed explanation of the importance and key points of password management in a column!

  • Other security
  • Integrated operation management
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining safe password management methods! Also introducing recommended password management tools.

  • Other security
  • Integrated operation management
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introduction to the necessity of access control, its basic functions, and types of control methods!

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

An overview and explanation of single sign-on features! We are comparing major tools.

  • Encryption and authentication
  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.

  • Encryption and authentication
  • Personal authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Explaining the differences between IdP and SP, the flow of the authentication process, and the benefits of IdP!

  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Introducing the features, advantages, disadvantages, and key points to consider when choosing IDaaS!

  • Integrated operation management
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A lineup of various products including Babel Obfuscator Enterprise!

  • Software (middle, driver, security, etc.)
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Google Workspace, Azure, and IdP integration is also possible.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Announcing "AXIOLE v1.20" with enhanced features for the "Shibboleth IdP option."

NetSpring Inc. (Headquarters: Minato-ku, Tokyo, President: Susumu Seibu) will begin offering a new version "AXIOLE v1.20" of its LDAP-based authentication appliance server "AXIOLE," primarily aimed at academic and research institutions, which includes the option feature "AXIOLE IdP Option" compliant with the latest Shibboleth IdP V4. This version upgrade inherits various plugins, including the multi-factor authentication feature already implemented in AXIOLE IdP for Shibboleth IdP V4. The new version will be available for download starting December 24. Users who have previously purchased the IdP Option license will need to upgrade to V1.19 first, and then to V1.20, in order to update to an IdP system compliant with IdP V4. For more details, please check the attached file and related links.

Instantly auto-generate complex passwords with symbols! Achieve a significant increase in security with zero burden.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

An authentication appliance that can be put into operation immediately after installation.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Secure communication for IoT devices! Safely store certificates and keys on a USB dongle.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

The USB dongle "LOCK STAR-PK," which prevents unauthorized copying and use of software, protects the assets of software development manufacturers.

  • Development support tools (ICE, emulators, debuggers, etc.)
  • Software (middle, driver, security, etc.)
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Virtual function-equipped SSL-VPN remote access solution

  • Firewall and intrusion prevention
  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.

Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.

The long-awaited new model "Novel" has been born in the VingCard series of card locks, which have been implemented in over 8 million rooms worldwide!

  • Entrance and exit control system
  • Encryption and authentication
  • Other security

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Novel Exterior.jpg

Introducing the latest model of the VingCard series, "Novel"!

It goes without saying that the VingCard non-contact card lock "Novel" combines the latest security technology with usability and will become the representative model of next-generation card locks for accommodation facilities. Novel captivates guests and hoteliers as a modern, beautiful, and powerful electronic card lock. Mobile access, online integration, and Apple Wallet can also be added quickly when needed. Additionally, Novel is fully committed to environmental protection through the use of sustainable raw materials, lightweight product design, minimized packaging volume, and battery-free options.

Compact design that can be placed anywhere! Enables operation at low cost.

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

For everyone using multiple SaaS, why not manage your "SaaS" in a centralized way?

  • Integrated operation management
  • Other information systems
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Protect your system more safely! The best solution for two-factor authentication.

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

We provide a platform related to personal authentication. How about using it for time rental operations of unmanned stores such as shared offices and fitness clubs?

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

VIC292 securely connects low-power devices such as sensors to the network using TLS.

  • Dedicated IC
  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.

  • Encryption and authentication
  • Personal authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Search for and manage files containing personal information such as My Number and credit card numbers from PCs, file servers, and network drives!

  • Encryption and authentication
  • Data Erasing

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Simple and secure next-generation internal control tool.

  • Encryption and authentication

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Filter

classification
Delivery Time
Location