List of Personal authentication products
- classification:Personal authentication
91~105 item / All 396 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Facial recognition attendance management! Simultaneously capable of temperature measurement, clothing disinfection, and hand sanitization with one device.
- Entrance and exit control system
- Personal authentication
- Other safety and hygiene products
Crytech Japan is a company that provides top-level iris authentication technology.
- Personal authentication
Anyone can easily verify a driver's license! It is effective in preventing and deterring counterfeit driver's licenses.
- Personal authentication
- Other security
Can be installed in various vending machines such as "tobacco vending machines" and "alcohol beverage vending machines"!
- Personal authentication
- Other security
Verify your identity more quickly and accurately. Simply insert your card to easily check for counterfeits and alterations!
- Personal authentication
- Other security
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security