List of Encryption and authentication products
- classification:Encryption and authentication
91~135 item / All 264 items
Ensuring safety! Introducing security solutions in our blog.
- Encryption and authentication
Achieving a robust security network! Introducing Zero Trust in our blog.
- Encryption and authentication
Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.
- Encryption and authentication
Identity verification using IC card + fingerprint without a dedicated authentication server or fingerprint authentication device.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Reduction of key management burden / Improvement of information and safety management / Measures for personal information protection law
- Encryption and authentication
- Entrance and exit control system
- Personal authentication
Touch panel LCD integrated with entry and exit controller non-contact IC card reader.
- Entrance and exit control system
- Personal authentication
- Encryption and authentication
A fingerprint authentication IC card that realizes two-factor authentication with "ownership authentication via IC card" and "biometric authentication via fingerprint" on a single card.
- Dedicated IC
- Personal authentication
- Encryption and authentication
Here we gather the technology cultivated through years of RF-EAS gate development! Achieving a longer battery life.
- Other security
- Encryption and authentication
The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.
- Personal authentication
- Encryption and authentication
With a license, access restrictions are possible.
- Development support tools (ICE, emulators, debuggers, etc.)
- Encryption and authentication

Creating new business opportunities for MTF measurement software SFR-Fit with CodeMeter technology.
Wibu-Systems Supports Leader Electronics Co., Ltd.'s Initiatives Wibu-Systems, which provides protection and licensing technology through CodeMeter, has partnered with Leader Electronics Co., Ltd., a specialized manufacturer of electronic measuring instruments in Japan, to support the company's global expansion. With the integration of CodeMeter's protection and licensing technology into the MTF measurement software SFR-Fit developed in MATLAB, new prospects for secure and profitable growth in both domestic and overseas markets are opened. User Case Summary: • Leader Electronics Co., Ltd.'s software "SFR-Fit" generates and displays accurate test charts with various types of cameras. • Aiming to improve its global market share, a new sales strategy has been chosen. • Wibu-Systems supports the protection and licensing of the resolution measurement software "SFR-Fit." • Wibu-Systems' CodeMeter provides robust IP protection and versatile license management features for files generated by the MATLAB compiler.
Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.
- Other security
- Encryption and authentication
[Information Leakage Countermeasures] The rapid increase in online file transfers. Learn about the risks involved and solutions from usage examples!
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
You can try all the features of CodeMeter!
- Encryption and authentication
- Software (middle, driver, security, etc.)

【Tips】How to protect applications developed with TouchDesigner using CodeMeter.
Recently, we have received multiple inquiries from TouchDesigner users who want to protect their developed applications with CodeMeter and attach licenses. TouchDesigner is a development environment for multimedia content created by Derivative, a company based in Canada, and it is popular among media art professionals. In fact, CodeMeter is used in the licensing system of TouchDesigner itself. A user named @motoishmz contacted Derivative about how to attach licenses to tox files developed in TouchDesigner for copy protection and license sales, and they have compiled a very detailed article on the topic, which we would like to introduce. If you are interested in doing something similar, please consider using it as a reference.
It is a fully integrated authentication enhancement system for Active Directory that can be implemented in a short period of time and is easy to manage, supporting two-factor and multi-factor authenti...
- Encryption and authentication
All pages are SSL-enabled! It benefits both users and website operators.
- Other contract services
- Encryption and authentication
- Other security
Proposal for the introduction of AI with high investment value.
- Personal authentication
- Encryption and authentication
- Voice Recognition Software
To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.
- Encryption and authentication
Protecting logon to PC terminals with enhanced security! Reducing operational burden when using USB keys.
- Encryption and authentication
- Other security
Prevent information leaks caused by human error! This is a product that achieves cost performance.
- Encryption and authentication
- Other security
Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.
- Encryption and authentication
Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.
- Encryption and authentication
Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.
- Encryption and authentication
Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!
- Encryption and authentication
"Cloud Authentication Service" that allows you to choose from multiple authentication methods.
- Encryption and authentication
Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!
- Encryption and authentication
Windows login enters the passwordless era! Protected with advanced security.
- Encryption and authentication
- Other security
All-in-one security solution that integrates all features.
- filtering
- Firewall and intrusion prevention
- Encryption and authentication
Use commercially available USB devices as keys for PCs to lock unauthorized operations on Windows Server. It also supports USB connection restrictions for smartphones.
- Encryption and authentication
- others
- Other security
Encrypt files/folders ◆ Simply drag and drop data onto the application icon.
- Encryption and authentication
File/folder-level encryption software. Passwordless operation is also possible when used within a group.
- Encryption and authentication
Equipped with data leakage prevention features when transferring data to USB-connected storage (including smartphones).
- Encryption and authentication
- others

Ideal for My Number measures! Launch of the PC operation log collection software "LB Access Log 2 Pro" equipped with monitoring features and no server required.
Lifeboat Co., Ltd. (President Takahiro Yamazaki, Chiyoda-ku, Tokyo, TEL 03-3265-1250, URL http://www.lifeboat.jp/) will start selling "LB Access Log 2 Pro" (LB Access Log 2 Pro), a software developed by Es Computer that does not require a dedicated server and can collect and monitor PC operation logs, starting from February 15, 2016, through various sales agents, with a standard price of 22,000 yen (excluding tax) and up. In addition to collecting operation logs, it features the ability to take screenshots and notify administrators when specific actions are performed, monitor network traffic to detect unexpected data transmissions, and restrict the use of USB devices, among other diverse functionalities. It is an ideal software for monitoring PCs and collecting operation logs, particularly for enhancing the security of PCs handling My Number information. ● For more details on LB Access Log 2 Pro, please visit http://www.lifeboat.jp/products/alog2p/.
Create a secret area on removable media or HDD.
- Encryption and authentication
- others
Create an encrypted disk with simple operations by following the wizard.
- Encryption and authentication
- Other security
- others
Unauthorized USB memory - Shut out hard disks.
- Encryption and authentication
Whitelist-type malware protection software
- Encryption and authentication
Rambus TLS Toolkit Standard FIPS Edition
- Encryption and authentication
Encrypt various data on a file-by-file basis, regardless of file format or storage location!
- Encryption and authentication
Domestic engine development! Iris recognition technology, which is a touchless biometric authentication method.
- Personal authentication
- Personal authentication
- Encryption and authentication

We have released the English version of the iris recognition technology website.
We have officially released the English version of the "Iris Authentication Technology" and "Iris Authentication SDK" website (https://iris.pas-ta.io/en/). We have enhanced the technical and product information more than ever before, enabling information dissemination both domestically and internationally, and we will continue to strengthen our service offerings at a global level in the future.
Gradually realizing a "keyless" office.
- locker
- Encryption and authentication
- Personal authentication
A digital array that changes each time to prevent number inference! We propose the Air Gate System.
- Control Panel
- Entrance and exit control system
- Encryption and authentication
Abolishing the mailing of USB memory! Introducing a case that achieves safe and speedy delivery (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software
Achieving a speedup in business operations! Introducing a case study that significantly reduced the production time for design (Crypto Delivery).
- Firewall and intrusion prevention
- Encryption and authentication
- Virus software