List of Personal authentication products
- classification:Personal authentication
91~135 item / All 416 items
No need for login or logout! Use the cloud safely and securely with "magical" authentication!
- Personal authentication
Crytech Japan is a company that provides top-level iris authentication technology.
- Personal authentication
Anyone can easily verify a driver's license! It is effective in preventing and deterring counterfeit driver's licenses.
- Personal authentication
- Other security
Can be installed in various vending machines such as "tobacco vending machines" and "alcohol beverage vending machines"!
- Personal authentication
- Other security
Verify your identity more quickly and accurately. Simply insert your card to easily check for counterfeits and alterations!
- Personal authentication
- Other security
Enhancing security during PC login and improving operational efficiency! Ensuring reliable identity verification.
- Personal authentication

Hitachi Systems Engineering Services Private Exhibition 2024 (November 6, 2024 (Wednesday) - November 7, 2024 (Thursday))
Hitachi Systems Engineering Services, Ltd. will hold the "Hitachi Systems Engineering Services Private Exhibition 2024." With the theme of Zero Trust Security, we will introduce advanced security technologies from our company and partner companies. This event is aimed at customers who are facing challenges with cloud migration and security measures for their IT systems. We plan to have presentations on topics such as "Recent Cases of Cyber Attacks Worldwide and Preparedness for Increasing Cyber Attacks" and "The Reality Behind Cyber Attacks: The Dark Web and What Companies Should Prepare For." We sincerely look forward to your attendance.
Utilize IC cards and biometric authentication! Smart and secure office work.
- Personal authentication

Hitachi Systems Engineering Services Private Exhibition 2024 (November 6, 2024 (Wednesday) - November 7, 2024 (Thursday))
Hitachi Systems Engineering Services, Ltd. will hold the "Hitachi Systems Engineering Services Private Exhibition 2024." With the theme of Zero Trust Security, we will introduce advanced security technologies from our company and partner companies. This event is aimed at customers who are facing challenges with cloud migration and security measures for their IT systems. We plan to have presentations on topics such as "Recent Cases of Cyber Attacks Worldwide and Preparedness for Increasing Cyber Attacks" and "The Reality Behind Cyber Attacks: The Dark Web and What Companies Should Prepare For." We sincerely look forward to your attendance.
Enhancing security using biometric information from finger veins while also achieving labor-saving during passage! A timer function allows for the setting of access restrictions as well.
- Personal authentication
Introducing how facial recognition will become rooted in our lives in a column format!
- Personal authentication
Introducing the future prospects of facial recognition technology in a column, incorporating specific examples!
- Personal authentication
An overview and explanation of single sign-on features! We are comparing major tools.
- Encryption and authentication
- Personal authentication
- Other security
A column explaining the advantages and disadvantages of implementation, as well as the methods of single sign-on!
- Encryption and authentication
- Personal authentication
The benefits of single sign-on using SAML authentication! Explanation of the differences with OAuth as well.
- Encryption and authentication
- Personal authentication
Introducing the cloud-based and on-premises types! Also explaining the main features and how to choose.
- Encryption and authentication
- Personal authentication
- Other security
Explaining methods and usage examples! We will also introduce the system for achieving single sign-on.
- Encryption and authentication
- Personal authentication
Explaining the six authentication methods and mechanisms of single sign-on, as well as the four benefits of its implementation!
- Encryption and authentication
- Personal authentication
Web authentication system using USB keys. Effective security measures. Strong security is possible with one-time passwords.
- Personal authentication
- Other security
High-quality standard-compliant smart card token "LOCK STAR-uToken"
- Personal authentication
- Encryption and authentication
- Other security
This is a product that uses a USB security key to prevent information leakage and unauthorized use from computers with easy operation and short implementation time.
- Personal authentication
- Software (middle, driver, security, etc.)
- Encryption and authentication
Virtual function-equipped SSL-VPN remote access solution
- Firewall and intrusion prevention
- Encryption and authentication
- Personal authentication

Ideal for BYOD, no dedicated app required, prevents information leakage from smart devices.
Logical Tech Co., Ltd. will start selling its information leakage prevention system "LOCK STAR-SGateM" (Lock Star SGateM), which uses a screen transfer method and is compatible with any terminal and OS, from March 4, 2013. "LOCK STAR-SGateM" is a screen transfer-based security solution built on a Linux server. This solution operates on browsers that support HTML5, eliminating the need for dedicated applications. Additionally, by utilizing free OS, it allows companies to save on the substantial costs associated with licensing fees. Furthermore, by integrating with the currently available integrated security system LOCK STAR-SGate series, it can accommodate various usage scenarios tailored to corporate needs. Groupware such as Notes, which was previously only usable on PCs, can now be used directly on smartphones and tablets (iPhone, iPad, Android devices) without leaving any data on the device, making it easy and cost-effective, thus providing an optimal environment for BYOD (Bring Your Own Device) utilization.
[Telework Recommended] Securely log in to Windows using two-factor authentication with a smartphone app. *A document introducing the new features will be provided.
- Personal authentication
Daily body surface temperature measurement and alcohol check with this one device! Identity verification with AI facial recognition.
- Other measurement, recording and measuring instruments
- Other inspection equipment and devices
- Personal authentication
Reduce the hassle of registering images to facial recognition terminals. Easily register face photos taken with a tablet PC to the terminal. Data updates can be done using only Excel.
- Personal authentication
Just place it for automatic detection. It can be used by all organizations, companies, and institutions involved with foreigners.
- Personal authentication
Certification is possible even when wearing goggles in hazardous environments, food factories, laboratories, and more!
- Personal authentication
- Other security and surveillance systems
- Entrance and exit control system
Compact design that can be placed anywhere! Enables operation at low cost.
- Encryption and authentication
- Personal authentication
Access restriction and attendance management application: Fast, contactless, hands-free authentication.
- Image Processing Equipment
- Entrance and exit control system
- Personal authentication
The wanderer should report the still images to the caregivers and administrators via email!
- Personal authentication
- Other security and surveillance systems
Protect your system more safely! The best solution for two-factor authentication.
- Encryption and authentication
- Personal authentication
CIVAMS for video analysis, including facial recognition, access control, attendance management, vehicle management, and suspicious person detection.
- Entrance and exit control system
- Personal authentication
- Firewall and intrusion prevention
Identify individuals through walkthroughs! Integration with surveillance camera systems is also possible.
- Personal authentication
Who was the last person to open that safe? A trump card against impersonation and the risk of losing the key.
- Encryption and authentication
- Personal authentication
A detailed explanation of the expected benefits of the collaboration between robots and facial recognition systems, as well as actual examples of their utilization [Free materials available].
- Personal authentication
An intelligent terminal that supports a variety of authentication methods, from mobile access cards to RFID cards, QR codes, and barcodes.
- Entrance and exit control system
- Personal authentication
In stock! The perfect product for you looking for a card reader due to the semiconductor shortage! OSDP compatible!
- Other Code Readers
- Personal authentication
- Entrance and exit control system
A dedicated device for OTP token authentication as an alternative to smartphone apps.
- Personal authentication
Introducing facial recognition products for security purposes aimed at the digital signage industry!
- Software (middle, driver, security, etc.)
- Personal authentication
Achieve management of workers' entry and exit, location, and movement using color codes!
- Entrance and exit control system
- Other security
- Personal authentication
High security is possible! An access control system that can manage up to 2,560 gates.
- Entrance and exit control system
- Personal authentication
Authentication enhancement by combining two or more elements! Protecting business and data from security threats.
- Personal authentication
- Other security
Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.
- Personal authentication
- Encryption and authentication
- Other security