Authentication Solutions - List of Manufacturers, Suppliers, Companies and Products

Authentication Solutions Product List

1~12 item / All 12 items

Displayed results

[Case Study] Facial Recognition Solution

Real-time facial recognition with just the camera! A facial recognition solution that can also perform face detection verification.

We would like to introduce a case study of our "facial recognition solution." The customer's challenge was that they had to put down their luggage and input a key or PIN code. However, by implementing our product, they were able to verify their identity simply by facing the camera, allowing for easy and smooth entry and exit. 【Case Study】 ■ Challenge - Had to put down luggage and input a key or PIN code ■ Implementation Effect - Identity verification by simply facing the camera - Easy and smooth entry and exit *For more details, please refer to the PDF document or feel free to contact us.

  • Other security systems
  • Security cameras and surveillance systems
  • Security devices

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FR facial recognition solution 'GV-AI FR'

The video from the network camera is sent to the server, where face detection and authentication are performed.

"GV-AI FR" is a facial recognition software that meets new needs. It sends video from network cameras to a server, where face detection and authentication are performed. 【Features】 ■ Face detection/authentication, age and gender judgment ■ Aggregation of face recognition results ■ Notifications via LINE Notify and external devices (I/O) ■ Welcome screen display ■ Search for authentication results *For more details, please refer to the PDF document or feel free to contact us.

  • Other commercial buildings and service facilities

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI Thermal Camera Face Recognition Solution

For offices, medical institutions, public facilities, and event venues! Personal authentication and temperature measurement are conducted quickly and non-contact.

Our company has launched an AI thermal camera solution that performs non-contact personal authentication and quickly detects individuals with fever. For facilities that require personal authentication, such as offices and medical institutions, we offer a "face recognition AI thermal camera" that can simultaneously measure personal authentication and fever detection in just 0.2 seconds. * A face recognition-free mode is also available, suitable for clinics and restaurants. For managing entry and exit in large facilities with many visitors, we provide a dome-shaped "AI thermal camera." 【Features of the Face Recognition AI Thermal Camera】 ■ Detection speed of approximately 0.2 seconds ■ Industry-leading face recognition accuracy of 99% ■ High security achieved through dual lenses for 3D modeling (prevents unauthorized entry using facial photos, etc.) ■ Mandatory mask-wearing mode that allows entry only for individuals wearing masks ■ Six types of attendance modes suitable for attendance management ■ Face recognition-free mode is also available (suitable for clinics and restaurants) * For more details, please refer to the PDF document or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Background authentication solution "DZ Security"

No need for login or logout! Safe and secure cloud usage with "magical" authentication!

Our company has developed a background authentication solution called 'DZ Security' that requires no IT knowledge and can be used safely by anyone. This advanced solution performs continuous multi-factor authentication in the background of the services being used through multiple "biometric authentications" and associated "auxiliary authentications (behavioral)" linked to them. 【Features】 ■ "Ease of use" ■ No IT knowledge required at all ■ Just being the person is enough ■ Solutions for GDPR-related issues ■ Solutions for contractual issues ■ Solutions for implementation barrier issues *For more details, please download the PDF or feel free to contact us.

  • Firewall

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition solution with temperature measurement function

Centralized management of multiple gates! It is also possible to configure a large-scale system that manages between locations.

We propose a "Face Recognition Solution with Temperature Measurement Function" using a face recognition terminal equipped with a temperature measurement feature. The terminal can be installed in areas without walls using a dedicated mounting pole. It also provides a voice alarm to warn individuals with elevated temperatures and prohibits their passage. 【Terminal Features】 ■ Easy to install ■ Enhanced verification performance ■ Mask detection ■ Various verification methods ■ Long-distance face recognition ■ Temperature measurement *For more details, please download the PDF or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Capy biometric authentication solution

Cloud service that realizes biometric authentication by FIDO.

Our company provides a cloud service that safely implements biometric authentication using an international standard technology for online authentication called FIDO. The implementation can be easily integrated into your current services by simply installing JavaScript or incorporating APIs. Additionally, by using the API, you can link SecurePass with your existing website or smartphone applications, enabling easy biometric authentication. 【Features】 ■ Easy implementation of biometric authentication by simply installing JavaScript ■ Compatible with Android devices that support biometric authentication and iOS's Touch ID/Face ID ■ Utilizing a cloud environment allows for reduced implementation costs and running expenses ■ No need to install biometric authentication devices as authentication is performed via smartphones ■ Can be used as an SDK, allowing integration with existing smartphone applications *For more details, please download the PDF or contact us.

  • Company:Capy
  • Price:Other
  • Security Assessment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition solution "WelcomID Alcohol Checker"

Achieve routine in digital operations! Easy and effortless, continues every day.

We would like to introduce our facial recognition solution, "WelcomID Alcohol Checker." We offer the facial recognition interface terminal "WelcomID" and the alcohol detector "Tanita ALBLOFC-1200." It is possible to export data in a standard Excel format, and with an option for cloud data management, you can manage multiple locations collectively. 【Features】 ■ Digitalize management processes with facial recognition ■ No need to launch a PC or app during inspection ■ Space-saving with no PC required ■ Easy data storage with linked information ■ PC integration for data management *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Email audit tool to protect businesses from intellectual property theft due to cyber attacks.

Rapidly increasing cyber attacks from abroad! The targets are the intellectual properties of small and medium-sized enterprises, such as technology, designs, and patents. If we don't protect ourselves, could the company be in crisis?

Don't you think that cyber attacks only target large companies? In reality, cybercriminals often first infect small and medium-sized enterprises with viruses, and then embed those viruses in emails sent to large companies. The small and medium-sized enterprises that are used as stepping stones have all their intellectual property and client information stolen. Subsequently, similar products are mass-produced in countries like China, leading to price competition that prevents them from making profits. Furthermore, they may be held responsible for infecting large companies with viruses and face potential liability for damages (as it falls under the tort of Article 709 of the Civil Code). The actual flow of an attack typically involves sending emails that impersonate employees of the target company or disguise themselves as clients to employees of that company. Once someone opens the email, they become infected, and the infection spreads from there. In other words, eliminating the initial "spoofed email impersonating internal or external individuals" is crucial for protecting both your company and your clients. So, what should be done to eliminate spoofed emails? ★ We are currently offering explanatory materials. Please check them out via "PDF Download.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

"Numerous implementation results from hospitals to large commercial facilities" AI facial recognition solution.

Advanced facial recognition evolved through AI learning! It detects only the target individuals.

We offer the facial recognition system 'LYKAON-i', which achieves a level of authentication accuracy closer to human vision by incorporating an AI learning-based facial recognition engine. There is no need to carry authentication cards or memorize PIN codes, allowing for stress-free use. It also minimizes the need for personnel deployment for security, leading to cost reductions. Additionally, concerns about human errors such as distractions, misunderstandings, and forgetfulness are alleviated, enabling a greater focus on work. 【Features】 ■ Authentication similar to "human vision" through deep learning ■ Authentication at diagonal angles ■ Real-time notifications ■ Intuitive operation ■ Storage of video for a certain period ■ Information security *For more details, please download the PDF or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

On-premises? Cloud? What is the suitable authentication solution?

Ensuring safety! Introducing security solutions in the blog.

This blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI SOLUTIONS

Providing solutions based on AI technologies such as image analysis!

We would like to introduce "AI SOLUTIONS" offered by Moztec Inc. We develop and provide solutions based on advanced AI technologies, including facial recognition for security, suspicious person detection, traffic volume analysis for marketing, and crowd flow analysis. Additionally, we offer solutions that use mobile devices as user interfaces, customized solutions for the logistics sector, and security support solutions. 【Solutions】 ■ Facial Recognition ■ Attribute Analysis ■ Suspicious Person Detection ■ Crowd Flow Analysis ■ License Plate Recognition ■ Traffic Volume Measurement *For more details, please download the PDF or feel free to contact us.

  • Entrance and exit control system
  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

DX is not just 1 or 0, but is divided more finely into 0.001.

Introducing in a column format what kind of DX HOUSEI aims for!

HOUSEI actively participates in the IT revolution with the mission of becoming a significant force in society's digital transformation (DX). To achieve this, it is necessary to upgrade the ways in which IT technology is utilized. This means implementing DX, which involves both digitization and enhancing digital capabilities. For example, controlling customer support that is currently conducted over the phone with AI, or utilizing the internet instead of having people visit for customer acquisition. *For more details on the column, please refer to the related links. For further inquiries, feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration