List of Personal authentication products
- classification:Personal authentication
91~135 item / All 412 items
Reduce the workload from handling heavy objects! Here are five case studies that solved customer challenges! We are also accepting free consultations and tests tailored to your work!
- Other conveying machines
A belt grinding machine that has been in use for about 50 years since 1973. In addition to trust and proven results, the lineup is also extensive.
- Other machine tools

Belt grinding machine "Veda Machine" has high durability and a wide range of service parts.
The "Bader Machine" is our belt grinder that boasts excellent polishing performance for each individual unit. By selecting models and types according to the shape and size of the workpiece, and by equipping it with a polishing belt suitable for the task, it can flexibly accommodate a wide variety of items across various fields. Please make extensive use of it for high-efficiency polishing and grinding, reduction of work time, labor-saving, and standardization of tasks. 【Lineup】 ■ Portable type BP-K (air motor type) ■ Made-to-order machine PC-1 (wheel centerless), BC (standard dust cover) ■ Installed type BM (basic type), SBA-1, BH-2 ■ Wheel type SBD-4S, SBD-7, BWd *For more details, please download the PDF or contact us.
Anyone can easily verify a driver's license! It is effective in preventing and deterring counterfeit driver's licenses.
- Personal authentication
- Other security
Can be installed in various vending machines such as "tobacco vending machines" and "alcohol beverage vending machines"!
- Personal authentication
- Other security
Verify your identity more quickly and accurately. Simply insert your card to easily check for counterfeits and alterations!
- Personal authentication
- Other security
Enhancing security during PC login and improving operational efficiency! Ensuring reliable identity verification.
- Personal authentication

Hitachi Systems Engineering Services Private Exhibition 2024 (November 6, 2024 (Wednesday) - November 7, 2024 (Thursday))
Hitachi Systems Engineering Services, Ltd. will hold the "Hitachi Systems Engineering Services Private Exhibition 2024." With the theme of Zero Trust Security, we will introduce advanced security technologies from our company and partner companies. This event is aimed at customers who are facing challenges with cloud migration and security measures for their IT systems. We plan to have presentations on topics such as "Recent Cases of Cyber Attacks Worldwide and Preparedness for Increasing Cyber Attacks" and "The Reality Behind Cyber Attacks: The Dark Web and What Companies Should Prepare For." We sincerely look forward to your attendance.
Utilize IC cards and biometric authentication! Smart and secure office work.
- Personal authentication

Hitachi Systems Engineering Services Private Exhibition 2024 (November 6, 2024 (Wednesday) - November 7, 2024 (Thursday))
Hitachi Systems Engineering Services, Ltd. will hold the "Hitachi Systems Engineering Services Private Exhibition 2024." With the theme of Zero Trust Security, we will introduce advanced security technologies from our company and partner companies. This event is aimed at customers who are facing challenges with cloud migration and security measures for their IT systems. We plan to have presentations on topics such as "Recent Cases of Cyber Attacks Worldwide and Preparedness for Increasing Cyber Attacks" and "The Reality Behind Cyber Attacks: The Dark Web and What Companies Should Prepare For." We sincerely look forward to your attendance.
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication

Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
A detailed explanation of the expected benefits of the collaboration between robots and facial recognition systems, as well as actual examples of their utilization [Free materials available].
- Personal authentication
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance and exit control system
- Personal authentication
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Other Code Readers
- Personal authentication
- Entrance and exit control system
A dedicated device for OTP token authentication as an alternative to smartphone apps.
- Personal authentication
Introducing facial recognition products for security purposes aimed at the digital signage industry!
- Software (middle, driver, security, etc.)
- Personal authentication
Achieve management of workers' entry and exit, location, and movement using color codes!
- Entrance and exit control system
- Other security
- Personal authentication
High security is possible! An access control system that can manage up to 2,560 gates.
- Entrance and exit control system
- Personal authentication
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
On-site management of who entered and exited, and when! A case where smooth entry and exit became possible.
- Personal authentication
- Entrance and exit control system
A case where reception management became smoother due to the introduction! Additional implementation has also been decided since April 2023.
- Personal authentication
- Entrance and exit control system
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security