List of Personal authentication products
- classification:Personal authentication
61~120 item / All 396 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
Presentation of explanatory materials on JIS and ISO standards. We propose suitable safety barriers from a rich product series! Free rental of demo kits.
- Other safety and hygiene products
Explaining how to "specify as much as possible" the provisions under the Personal Information Protection Act and the purpose of use.
- Personal authentication
Introducing what information is included in personal data and points to consider when obtaining it.
- Personal authentication
Explaining how to obtain and the uses of the My Number Card (Individual Number Card).
- Personal authentication
A detailed introduction to the goals of "realizing a fair and just society," "improving the efficiency of administration," and "enhancing the convenience for citizens."
- Personal authentication
Companies need to establish a system to protect personal information, implement it, and have a mechanism for continuous improvement.
- Personal authentication
★Free materials available! We have summarized the advantages and disadvantages of facial recognition entrance doors, widely adopted in homes, offices, and commercial facilities, in a simple manner tha...
- Other security and surveillance systems
- Personal authentication
[Expert Explanation] A Must-See! We will teach you the advantages and disadvantages of facial recognition entrance doors!
The facial recognition entrance door is an advanced security system that uses each individual's face as a key, replacing traditional keys and cards. We have prepared a document that clearly summarizes the "advantages of facial recognition doors" and "disadvantages of facial recognition doors." It also includes examples of how to implement it in offices and commercial facilities, as well as its applications in accommodation and nursing facilities, so please use it for consideration of implementation and selection of products suitable for your site.
A convenient, safe, and secure society with highly reliable iris authentication.
- Personal authentication
Install the completely non-contact body temperature measurement "thermal sensor" in "Ilias" to prevent users with a body temperature above the set limit from entering!
- Personal authentication
Authentication accuracy rate ≧ 99%! Supports multiple authentication modes such as face, card, and fingerprint recognition. With face recognition, it is non-contact, making it also effective for infec...
- Personal authentication
It is a non-contact biometric authentication system that has obtained a patent for the commercialization of vein authentication technology. To prevent unauthorized use due to "impersonation."
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
The patterns of the iris vary from person to person, and the rate of false recognition is overwhelmingly lower compared to other biometric authentication methods. It's great for access control and enh...
- Personal authentication
- Entrance and exit control system
- Other security and surveillance systems
Analyze camera images in the cloud. It can be used not only for security measures but also for marketing purposes.
- Surveillance Cameras
- Surveillance Camera System
- Personal authentication
Supports temperature detection, fever warning, and mask detection! The color of the surrounding area changes based on verification results.
- Personal authentication
World-class analysis speed! Equipped with numerous features to support smooth entry and exit management!!
- Personal authentication
- Entrance and exit control system
As an example of a nursing care facility, we have listed the equipment being introduced!
- Surveillance Camera System
- Personal authentication
With high-speed person recognition using AI technology, you can instantly know who has arrived!
- Personal authentication
Integration with meeting room reservations and visitor schedules enables smooth voice guidance to the meeting rooms!
- Personal authentication
A system that recognizes visitors' faces with AI at the office entrance and automatically notifies the reception staff!
- Personal authentication
IriShield protects important information securely through iris recognition.
- Personal authentication
Linking "CMV2" with "Ilias EF-45NC" (iris + facial recognition system) allows for centralized management of entry/exit control and attendance management!
- Personal authentication
The probability of being mistaken for someone else is "almost zero" (1 in 10 trillion), achieving ultimate high precision! Furthermore, it realizes an ultra-fast authentication in just "about 0.5 seco...
- Personal authentication
Revolutionary face recognition + mask and temperature detection solution! Easily installable on desks, walls, etc.
- Personal authentication
Achieving high precision (false recognition rate of 1 in 1 trillion) and ultra-fast authentication (approximately 0.5 seconds) through iris recognition!
- Personal authentication
Advanced facial recognition evolved through AI learning! It detects only the target individuals.
- Personal authentication
Introduction to the visualization of facility usage and machine operation status!
- Personal authentication
Consolidate and utilize diverse data from each site with no-code integration!
- Personal authentication
We will thoroughly explain everything from the basics to selection points and case studies!
- Personal authentication
Achieve face recognition and person detection with AI cameras at a low cost and in a short delivery time!
- Personal authentication
Safely retrieve personal information using a vein authentication device and print the necessary information!
- Personal authentication
No need for login or logout! Use the cloud safely and securely with "magical" authentication!
- Personal authentication
Facial recognition attendance management! Simultaneously capable of temperature measurement, clothing disinfection, and hand sanitization with one device.
- Entrance and exit control system
- Personal authentication
- Other safety and hygiene products
Crytech Japan is a company that provides top-level iris authentication technology.
- Personal authentication
Anyone can easily verify a driver's license! It is effective in preventing and deterring counterfeit driver's licenses.
- Personal authentication
- Other security
Can be installed in various vending machines such as "tobacco vending machines" and "alcohol beverage vending machines"!
- Personal authentication
- Other security
Verify your identity more quickly and accurately. Simply insert your card to easily check for counterfeits and alterations!
- Personal authentication
- Other security
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication