List of Personal authentication products
- classification:Personal authentication
136~180 item / All 420 items
We provide manufacturing technology for neutralization, esterification, sulfonation, phosphorylation, polycondensation reactions, powder mixing, emulsification, and dispersion, etc. *We can also handl...
- Contract manufacturing
Do you have any concerns about contract manufacturing of various chemical products?
We would like to introduce the contract manufacturing services provided by Riten Chemical Co., Ltd. We are a chemical manufacturer based in Kyoto with 70 years of experience. Since our establishment, we have been developing, manufacturing, and selling various surfactants used in the textile and paper industries. Based on the technology and development capabilities we have cultivated over the years, we accept contract manufacturing of various chemical products, so please feel free to contact us. 【Contract Manufacturing Achievements】 ■ Construction waterproofing agents ■ Plant growth promoters ■ Construction waterproofing materials ■ Greening-related agents ■ Chemicals for the electronics industry ■ Wastewater treatment agents ■ Industrial preservatives ■ Special surfactants... We provide more detailed information through related products and catalogs.
Heat resistant up to 1200℃. We will custom-make high-performance insulation covers that ensure safety in the working environment!
- Glass
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication
Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
Easily implementable AI-equipped systems. Solutions for detecting people, objects, and work conditions. Support available from proof of concept to commercialization.
- Personal authentication
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
A detailed explanation of the expected benefits of the collaboration between robots and facial recognition systems, as well as actual examples of their utilization [Free materials available].
- Personal authentication
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance and exit control system
- Personal authentication
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Other Code Readers
- Personal authentication
- Entrance and exit control system
A dedicated device for OTP token authentication as an alternative to smartphone apps.
- Personal authentication
Introducing facial recognition products for security purposes aimed at the digital signage industry!
- Software (middle, driver, security, etc.)
- Personal authentication
Achieve management of workers' entry and exit, location, and movement using color codes!
- Entrance and exit control system
- Other security
- Personal authentication
High security is possible! An access control system that can manage up to 2,560 gates.
- Entrance and exit control system
- Personal authentication
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security
On-site management of who entered and exited, and when! A case where smooth entry and exit became possible.
- Personal authentication
- Entrance and exit control system
A case where reception management became smoother due to the introduction! Additional implementation has also been decided since April 2023.
- Personal authentication
- Entrance and exit control system
Smart lock with 3D facial recognition
- Personal authentication
- Encryption and authentication
- Other security
We will notify parents via email or other means about their child's arrival/departure from the facility. The method used to authenticate the child employs the latest facial recognition technology.
- Personal authentication
- Entrance and exit control system
Enjoy the convenience of the cloud! Introducing security enhancement through device authentication in our blog.
- Personal authentication
Introducing edge devices with diverse features and excellent scalability in our blog!
- Personal authentication
- Encryption and authentication
It is possible to avoid troubles! Introducing the facial recognition system in the blog.
- Personal authentication
- Entrance and exit control system
Introducing a facial recognition system on the blog that also enhances security!
- Entrance and exit control system
- Personal authentication
Equipped with a facial recognition engine that can recognize faces even with masks on!
- Personal authentication
We will introduce numerous examples of how standardization and efficiency improvements have significantly increased work efficiency! You can create IC cards easily and cheaply.
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Identity verification using IC card + fingerprint without a dedicated authentication server or fingerprint authentication device.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Reduction of key management burden / Improvement of information and safety management / Measures for personal information protection law
- Encryption and authentication
- Entrance and exit control system
- Personal authentication
Touch panel LCD integrated with entry and exit controller non-contact IC card reader.
- Entrance and exit control system
- Personal authentication
- Encryption and authentication
A fingerprint authentication IC card that realizes two-factor authentication with "ownership authentication via IC card" and "biometric authentication via fingerprint" on a single card.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Starting with AHD cameras, we offer a lineup of IP cameras, AI facial recognition cameras, and thermal cameras!
- Surveillance Cameras
- Surveillance Camera System
- Personal authentication
Industry-leading certification accuracy supports the safety and security of society!
- Personal authentication
The facial recognition system monitors in place of the human eye, preventing unauthorized outings by residents!
- Personal authentication
The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.
- Personal authentication
- Encryption and authentication
A new choice for reception! Would you like to modernize your company's entrance?
- Personal authentication
Notifies parents of children's arrival/departure at daycare and kindergarten via LINE or email. It alerts parents to any instances of children being left behind during drop-off and pick-up.
- Personal authentication
- Other security and surveillance systems
Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Achieve automatic PC locking when away! Accurately track PC operating time! Implement labor management and security measures with a single card!
- Entrance and exit control system
- Personal authentication
- Personnel and Labor
Automate business processes with appropriate judgment through log acquisition! Achieve labor management and security measures simultaneously!
Do you have any concerns regarding labor management and security measures? When you are suddenly called away from your PC in the office, there is a worry about information leakage due to forgetting to lock Windows when stepping away while working in an external space. Additionally, there are challenges related to management in telework, long working hours, and inefficient working times... issues arising from the diversification of work styles. For those facing such concerns, we recommend the PC Auto Lock Smart Card "Iltone," which automatically locks your PC when you step away for a few seconds and automatically logs you in when you return. With this one card, you can simultaneously solve your worries about labor management and security measures! We would greatly appreciate your consideration.