List of Personal authentication products
- classification:Personal authentication
106~120 item / All 396 items
For those who have isolators. Achieving high chemical resistance and workability. Low cost and short delivery times are also possible for glove box and isolator gloves.
- Work gloves
Notice of participation in 'INTERPHEX Week Tokyo' from May 20 (Wednesday) to May 22 (Friday), 2026.
Ito Corporation will be exhibiting at "INTERPHEX Week Tokyo" held at Makuhari Messe. This exhibition is the largest in Japan, showcasing a wide range of products and services related to the research and manufacturing of pharmaceuticals, cosmetics, and regenerative medicine from 25 countries and regions around the world. Pharmaceutical and cosmetic manufacturers, as well as regenerative medicine companies, will be attending from all over the globe. We will be showcasing "Gloves for Glove Boxes/Isolators" manufactured by Tron Power. We look forward to your visit.
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication