card(key) - List of Manufacturers, Suppliers, Companies and Products

card Product List

1~4 item / All 4 items

Displayed results

Impersonation prevention solution using facial information: KAOKEY

A development kit that can build a high-security environment with ID cards and facial recognition. "KAOKEY" can establish a new environment for two-factor authentication.

KAOKEY" solves current operational challenges. Issues with current IC card authentication include problems such as "lending and borrowing cards," "loss," and "theft," which allow for fraudulent use through "impersonation." "KAOKEY" addresses these issues. Additionally, "KAOKEY" can achieve two-factor authentication in offline environments. It has three features: "user-friendly operation," "operation of two-factor authentication," and "no need for an authentication server." By matching facial feature data stored in the IC card with actual facial images, it can establish a highly secure two-factor authentication system. Please use KAOKEY for integration into systems requiring high security and two-factor authentication, such as access control systems and electronic medical record logins. Since it can establish an offline operational environment with high security, incorporating KAOKEY allows for differentiation from competitors. Regarding ID card issuance, it can be supported by the card issuance system "ID Maker.

  • Printer

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IC card with fingerprint authentication sensor "ATKey.Card"

Enhance the security level with fingerprint authentication while keeping your current IC card access control system!

By introducing the ATKey.Card, the following can be achieved! - You can easily upgrade the security level with fingerprint authentication while keeping the existing IC card access control system. - Fingerprint registration can be done using just the card, without the need for a computer, allowing for immediate use. - Even if the card is lost, you can use it with peace of mind since NFC will not be activated unless fingerprint authentication is performed. - It is possible to prevent impersonation through the transfer of IC cards to others.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

sysmoISIM

SIM/USIM/ISIM card that allows reprogramming of authentication information.

Standard-compliant GSM SIM + UMTS USIM + IMS/VoLTE ISIM card. It is intended for use in sysmoNITB / Osmocom-based cellular networks, but can also be used in any core network, including GSM (2G), UMTS (3G), LTE (4G), and even 5G. It supports cutting into three sizes of SIM cards: Classic SIM (2FF), Micro SIM (3FF), and Nano SIM (4FF). A key feature is the ability to reprogram (rewrite) authentication information (IMSI, K, OPC, etc.), allowing users to create and edit files and directories (EF or DF) within the card file system. Reprogramming requires the purchase of a card with ADM keys (with ADM keys / no ADM keys). SIM cards with ADM keys can also have Java applets installed.

  • Information and communication equipment and infrastructure

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration