List of Personal authentication products
- classification:Personal authentication
46~90 item / All 420 items
We provide manufacturing technology for neutralization, esterification, sulfonation, phosphorylation, polycondensation reactions, powder mixing, emulsification, and dispersion, etc. *We can also handl...
- Contract manufacturing
Do you have any concerns about contract manufacturing of various chemical products?
We would like to introduce the contract manufacturing services provided by Riten Chemical Co., Ltd. We are a chemical manufacturer based in Kyoto with 70 years of experience. Since our establishment, we have been developing, manufacturing, and selling various surfactants used in the textile and paper industries. Based on the technology and development capabilities we have cultivated over the years, we accept contract manufacturing of various chemical products, so please feel free to contact us. 【Contract Manufacturing Achievements】 ■ Construction waterproofing agents ■ Plant growth promoters ■ Construction waterproofing materials ■ Greening-related agents ■ Chemicals for the electronics industry ■ Wastewater treatment agents ■ Industrial preservatives ■ Special surfactants... We provide more detailed information through related products and catalogs.
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
The "Safety-board" allows for remote management of the current "entry and exit records" for work inside the tank, and it is also easy to install on-site.
- IC tag reader/writer
- Entrance and exit control system
- Personal authentication
No more failures! Here’s how to choose a suitable facial recognition system for your own factory.
- Personal authentication
★ High-performance demodulation processing device. Optimal for long-range pseudo-spread spectrum codes that are difficult with IC/LSI! An option to enhance secure communication.
- Personal authentication
"Technical documentation for transmitting images via radio waves" now available all at once!
★ We are releasing a wealth of technical information that includes experience and know-how related to radio laws, antennas, transmitters and receivers, installation, etc., when transmitting video via radio waves. A must-read for all stakeholders! ● When transmitting video via radio waves, we provide a clear explanation of legal considerations, antenna selection, performance evaluation of transmitters and receivers, the latest digital wireless technologies, and installation precautions. ● In explaining video transmission via wireless, we aim to avoid using formulas as much as possible, instead providing clear explanations through text and photos that are easier to understand than formulas. This is essential reading for researchers and salespeople involved in radio operations! ● The author has been involved in wireless operations for 30 years and explains the know-how gained from experience in research, design, manufacturing, and on-site installation in an easily understandable manner within limited pages. ● As we are in an era of energy conservation and efficiency, we hope you will utilize this material to review products related to wireless equipment. ● Considering various individuals engaged in wireless-related fields, we have tried to explain things with minimal use of formulas. We hope this can serve as a helpful resource for enhancing everyone's knowledge.
The only hardware you need is your smartphone! It will be used as a QR code reader for reception.
- 2D Code Reader
- Entrance and exit control system
- Personal authentication
AI facial recognition, employee management solution, attendance and labor management, entry and exit management, strengthening internal controls, reliable construction and maintenance system, retail i...
- Entrance and exit control system
- Personal authentication
Equipped with a multi-card module! Android LCDP for third-party app integration.
- Personal authentication
8-inch TFT color touchscreen with a narrow bezel design! Supports IEEE 802.3af/at PoE power supply.
- Personal authentication
It can be equipped with an optional removable backup battery, making it suitable for temporary site management and other uses.
- Personal authentication
Supports visible light facial recognition and palm recognition! Prevents spoofing with photos, videos, and 3D masks.
- Personal authentication
Achieving high-precision biometric authentication! Demonstrating stable and high-precision authentication performance even in different environments and various lighting conditions.
- Personal authentication
A dual camera with a visible light camera and an infrared camera captures palm prints and palm veins in high quality.
- Personal authentication
Equipped with high-performance on-chip storage, supporting large-capacity face registration and matching.
- Personal authentication
Supports various card types and mobile authentication! Flexible security operations are possible.
- Personal authentication
No dedicated drivers or software needed! An IC card reader that can be used immediately by connecting via USB.
- Other PCs and OA equipment
- Personal authentication
Just hold up the IC card to collect data (CSV)! You can easily set it up on your computer, so no specialized knowledge is required!
- Entrance and exit control system
- Personal authentication
Helps eliminate hygiene concerns! Face and palm authentication and fever detection terminal.
- Other security
- Other security and surveillance systems
- Personal authentication
Face/palm/fingerprint/card/password compatible! Temperature measurement compatible hybrid authentication terminal.
- Other security
- Other security and surveillance systems
- Personal authentication
LED light and touch keypad! An IC card reader with high stability and energy efficiency.
- Personal authentication
- Other security
Introducing examples of implementing two-factor authentication using facial recognition in government agencies and local municipalities to enhance login security for computers and systems.
- Other security and surveillance systems
- Personal authentication
Masks, goggles, and helmets can be certified even outdoors! Examples of access control systems in factory facilities.
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
Introducing a case where a cloud-based human resource management system integrates a facial recognition system, enabling attendance and absence management via smartphones and tablets.
- Other security and surveillance systems
- Personal authentication
This is an AI facial recognition engine that can be equipped with world-class facial recognition capabilities for various software, hardware, and services.
- Personal authentication
- Other embedded systems (software and hardware)
High-speed facial recognition and spoof prevention using edge AI enables strict access control management, with FaceMe Security supporting VIA Technologies' access control device "ACS-5000."
This time, the ACS-5000 is available as a facial recognition terminal compatible with FaceMe Security's add-on feature "Face Terminal," enabling access control management that combines "advanced anti-spoofing features" with high-speed facial recognition powered by edge AI. ■ Main Features 1. Accelerated Authentication Processing FaceMe Security is optimized for the MediaTek Genio 700's NPU, achieving faster facial recognition processing and reduced CPU load compared to processing solely on the CPU. It ensures stable authentication without delays even during peak times such as clocking in and out, contributing to alleviating congestion. 2. Advanced "Anti-Spoofing" Optimized for the IR + RGB camera mounted on the ACS-5000, it can quickly detect fraudulent authentication using photos, videos, or 3D masks within 0.6 seconds, ensuring reliable identity verification. 3. Door Control Without Additional Equipment FaceMe Security can directly control the digital I/O of the ACS-5000, allowing for the construction of an access control management system without the need for additional equipment. This simplifies system configuration and reduces implementation costs.
FaceMe is a world-class AI facial recognition product with a rich track record of adoption in offices and factories. [Presentation materials on facial recognition systems available.]
- Other security and surveillance systems
- Entrance and exit control system
- Personal authentication
A leading company in access security and safety certification systems.
- Entrance and exit control system
- RFID/IC tags
- Personal authentication
Integration with infrared body temperature measurement is also possible! It contributes to improving productivity in event operations.
- 2D Code Reader
- Personal authentication
A verification device that can display the front and back information of My Number cards, foreign resident cards, and driver's licenses on a reading screen for identity verification and counterfeit de...
- Personal authentication
A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.
A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.
A device that reads the photo page and IC chip information of a passport and international driver's license, displaying them on a screen for identity verification and forgery authentication.
- Personal authentication
A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.
A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.
A personal identification verification counterfeit detection device that allows for the display and comparison of the front and back information of identification documents such as My Number Card, dri...
- Personal authentication
A factory for counterfeiting residence cards and My Number cards has been raided. The EXC-2800 device can instantly view the front and back information of My Number cards, driver's licenses, foreign residence cards, etc., and can verify identity as well as detect counterfeiting or alteration.
A Chinese national suspect who forged My Number cards and residence cards has been arrested. Approximately 750 sheets for forgery were discovered at their home, and the data for forgery was sent via the Chinese communication app WeChat, with about 3,000 pieces of data believed to be for card forgery. The majority were for residence cards, while about 70 were for My Number cards. We would like to introduce the EXC-2800 device, which allows for immediate viewing of information on the front and back of My Number cards, driver's licenses, foreign residence cards, etc., as well as the information within the IC chip, enabling identity verification and detection of forgery/alteration. 1. With a single insertion, front and back information, IC chip data, and facial photos can be quickly compared and verified on a PC. 2. Information such as name, address, date of birth, and expiration date can be converted into text data using OCR character recognition, allowing for quick database creation and prevention of input errors. 3. Data can be saved in various formats, including text, CSV, and JPEG images. 4. For driver's licenses and My Number cards with unknown PINs, the device can read surface patterns using a unique algorithm to determine authenticity. 5. It has a tampering check function that detects surface adhesive forgery, making it possible to identify altered cards.
We would like to introduce a case where facial recognition devices were installed at four office entrance doors!
- Personal authentication
By outputting the information from the read card directly as Wiegand, it can be used with controllers and readers compatible with controller modes!
- Personal authentication
From the detection of authentication data to the authentication decision takes about 1 second! It is possible to prevent impersonation using photo images and other means.
- Personal authentication
Encrypt user data! Advanced hardware and software optimized for facial recognition.
- Personal authentication
It is possible to apply it to strengthening security, traffic surveys, and promotional activities in retail stores!
- Personal authentication
- Other measurement, recording and measuring instruments
Even in difficult situations for recognition, real-time matching with millions of face databases is possible!
- Other security and surveillance systems
- Personal authentication
- Other security
Only one ID/PASS is required for login! Promising high security and convenience.
- Personal authentication
Easily authenticate users of your company's official app to streamline and enhance efficiency at the reception, and securely log in to store terminals.
- Personal authentication
Four measures against targeted phishing emails that you can start today, along with an introduction to the characteristics of targeted phishing emails!
- Personal authentication
- ISO-related consultant
Introducing what can be solved with business card management services and tools, along with recommended handling methods!
- Personal authentication
You don't have to change your password regularly, and we will introduce recommended password management methods!
- Personal authentication
Introducing our E-Learning, which is suitable for education on P Mark and ISMS!
- Personal authentication
Introducing how to proceed with operational verification and the items to check during the verification!
- Personal authentication
Introducing the relationship between personal information management systems and privacy marks!
- Personal authentication
No need for troublesome network construction! Introducing lockers and storage units that use QR codes as keys.
- locker
- Encryption and authentication
- Personal authentication