iPROS Urban Planning
  • Search for products by classification category

    • Building Materials
      Building Materials
      35541items
    • Facilities
      Facilities
      56657items
    • Lighting and Interior
      Lighting and Interior
      17273items
    • Common materials
      Common materials
      37004items
    • Civil Engineering Materials
      Civil Engineering Materials
      9533items
    • Construction, work and methods
      Construction, work and methods
      27655items
    • Surveys, Measurements, and Services
      Surveys, Measurements, and Services
      30352items
    • IT/Software
      IT/Software
      31783items
    • others
      others
      84503items
    • Store and facility supplies
      Store and facility supplies
      4358items
    • Office and commercial supplies
      Office and commercial supplies
      11462items
    • Hospital and welfare facility supplies
      Hospital and welfare facility supplies
      952items
    • Logistics Equipment
      Logistics Equipment
      7378items
    • Energy and Resources
      Energy and Resources
      11606items
  • Search for companies by industry

    • Information and Communications
      7197
    • others
      6979
    • Building materials, supplies and fixtures manufacturers
      6683
    • Service Industry
      4607
    • Trading company/Wholesale
      2996
    • Other construction industries
      2456
    • Electrical equipment construction business
      642
    • Interior Design
      528
    • Facility Design Office
      492
    • Construction Consultant
      464
    • Architectural design office
      361
    • retail
      345
    • Warehousing and transport related industries
      321
    • Electricity, Gas and Water Industry
      290
    • General contractors and subcontractors
      288
    • Interior construction business
      274
    • Medical and Welfare
      272
    • Educational and Research Institutions
      258
    • Building Management
      253
    • Renovation and home construction industry
      224
    • Water supply and drainage construction business
      204
    • Housing manufacturers and construction companies
      187
    • Transportation
      160
    • Real Estate Developers
      155
    • Fisheries, Agriculture and Forestry
      124
    • Structural Design Office
      66
    • Finance, securities and insurance
      35
    • Restaurants and accommodations
      29
    • self-employed
      29
    • Mining
      26
    • Public interest/special/independent administrative agency
      18
    • Police, Fire Department, Self-Defense Forces
      18
    • Store and building owners
      9
    • Property Owner
      8
    • Government
      8
    • Individual
      8
  • Special Features
  • Ranking

    • Overall Products Ranking
    • Overall Company Ranking
Search for Products
  • Search for products by classification category

  • Building Materials
  • Facilities
  • Lighting and Interior
  • Common materials
  • Civil Engineering Materials
  • Construction, work and methods
  • Surveys, Measurements, and Services
  • IT/Software
  • others
  • Store and facility supplies
  • Office and commercial supplies
  • Hospital and welfare facility supplies
  • Logistics Equipment
  • Energy and Resources
Search for Companies
  • Search for companies by industry

  • Information and Communications
  • others
  • Building materials, supplies and fixtures manufacturers
  • Service Industry
  • Trading company/Wholesale
  • Other construction industries
  • Electrical equipment construction business
  • Interior Design
  • Facility Design Office
  • Construction Consultant
  • Architectural design office
  • retail
  • Warehousing and transport related industries
  • Electricity, Gas and Water Industry
  • General contractors and subcontractors
  • Interior construction business
  • Medical and Welfare
  • Educational and Research Institutions
  • Building Management
  • Renovation and home construction industry
  • Water supply and drainage construction business
  • Housing manufacturers and construction companies
  • Transportation
  • Real Estate Developers
  • Fisheries, Agriculture and Forestry
  • Structural Design Office
  • Finance, securities and insurance
  • Restaurants and accommodations
  • self-employed
  • Mining
  • Public interest/special/independent administrative agency
  • Police, Fire Department, Self-Defense Forces
  • Store and building owners
  • Property Owner
  • Government
  • Individual
Special Features
Ranking
  • Overall Products Ranking
  • Overall Company Ranking
  • privacy policy
  • terms of service
  • About Us
  • Careers
  • Advertising
  1. Home
  2. others
  3. 飛天ジャパン
  4. Product/Service List
others
  • Added to bookmarks

    Bookmarks list

    Bookmark has been removed

    Bookmarks list

    You can't add any more bookmarks

    By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

    Free membership registration

飛天ジャパン

EstablishmentMarch 7, 2006
capital1600Ten thousand
addressTokyo/Chuo-ku/9-3 Koamicho, Nihonbashi, Canal Tower 4F/7F
phone03-3668-6668
  • Official site
last updated:Jun 09, 2022
飛天ジャパンlogo
  • Contact this company

    Contact Us Online
  • Company information
  • Products/Services(49)
  • catalog(19)
  • news(0)

飛天ジャパン List of Products and Services

  • category

1~45 item / All 49 items

Displayed results

class="retina-image"

OTP token "c610" *Free trial version available for loan.

A dedicated device for OTP token authentication as an alternative to smartphone apps.

The OTP token "c610" is an authenticator that generates a multi-factor authentication (MFA) one-time password (6-digit number). Registration is completed simply by having the user scan the displayed QR code with this product. Therefore, it can be operated without placing a burden on the administrator. It can be used as an alternative to the mobile authenticator app for employees who are not provided with a company mobile phone. 【Features】 ■ Easy to introduce ■ Easy to operate ■ Safe even without a smartphone ■ Compliant with OATH standards ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please refer to the PDF materials or feel free to contact us.

  • Other PCs and OA equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Be cautious when using VPN during remote access such as telework.

Strengthening security measures such as multi-factor authentication! Posting alerts from CISA.

This blog introduces precautions regarding the use of VPNs during remote access. A VPN establishes a virtual private line over the internet, ensuring a secure route for exchanging important information, thereby protecting confidential data from security threats such as "eavesdropping" and "tampering." To prevent the spread of viruses, companies implementing telework, such as remote work from home, are rapidly increasing. As phishing attacks targeting remote workers are also on the rise, there is a growing demand for enhanced security measures, such as multi-factor authentication, when using VPNs for remote access. [Contents] ■ Alerts from the Cybersecurity and Infrastructure Security Agency (CISA) ■ Applying security patches to devices used for remote access ■ Reasons for implementing multi-factor authentication in VPN connections *For more details, please refer to the related links. *For further information, please consult the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Strengthening security with two-factor authentication.

Explaining the advantages and disadvantages of major authentication methods! Introducing 'Raku-nin,' which adopts a multi-authentication method.

Two Factor Authentication (2FA) is a system that uses two elements to authenticate a user. For a long time, authentication using an ID and password was common, but this is an authentication method based on a single element, "ID + password." In recent years, there have been continuous incidents of account information leaks, and it has been pointed out that authentication based on a single element poses security issues. Two Factor Authentication requires two out of the three elements of authentication to be present for the authentication to be successful, significantly enhancing the strength of the authentication. In this blog, we introduce examples of Two Factor Authentication. Please take a moment to read it. [Contents] ■ What is Two Factor Authentication? ■ Advantages and disadvantages of major authentication methods ■ Why is password authentication problematic? ■ Combining different authentication methods *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementing multi-factor authentication with a low-cost authentication token.

User operation is easy! Use a one-time password authentication token.

This blog introduces "MFA (Multi-Factor Authentication)" that can be implemented at a low cost. Multi-factor authentication, which requires two or more authentication factors, has become essential for web services provided by major companies. MFA using one-time password authentication tokens can be implemented at a low cost, and while user operations are simple, it enhances security, leading to an increase in its adoption. [Contents] ■ Multi-factor authentication (MFA) is also used in services of major IT companies ■ Easy-to-use one-time password (OTP) tokens ■ Provides robust security even in online banking * For more details, you can view the related links. * For more information, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a physical security key that achieves robust security and convenience?

Used like a physical key! No need to enter passwords or passcodes.

This blog introduces "Physical Security Keys that Achieve Strong Security and Convenience." As online services become widespread, relying solely on passwords for authentication increases the risk of information leaks. Additionally, two-factor authentication using SMS (short message service) on smartphones can be cumbersome and time-consuming. Therefore, the use of security keys is gaining attention as a measure to enhance corporate security. Since they are used like a physical key, authentication can be performed smoothly. [Contents] ■ FIDO-compliant security keys are becoming mainstream ■ "Having it" serves as identity verification ■ Effective in preventing phishing scams ■ The necessity of multi-factor authentication is advancing, expanding its applications * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Tokens/Security keys available for Azure AD authentication

Many domestic customers are using it! Introducing 'basic features', 'implementation benefits', and 'authentication methods'.

This blog introduces "Tokens/Security Keys Available with Azure AD Authentication." Microsoft's Azure AD (Active Directory) is used as the authentication infrastructure for various cloud services, including "Microsoft 365." Users can utilize authentication methods using traditional usernames and passwords, as well as security keys compliant with "FIDO2" and OTP tokens compliant with OATH. Additionally, it is possible to complement or replace the basic password with additional authentication methods, enhancing security. [Content Included] ■ A robust network of Azure spanning countries and regions ■ Azure AD supporting sign-ins to services like Microsoft 365 ■ Basic features of Azure AD ■ Benefits of implementing Azure AD ■ Authentication methods of Azure AD *Detailed content of the blog can be viewed through related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Implementation of mandatory MFA (Multi-Factor Authentication) for Salesforce.

Authentication enhancement by combining two or more elements! Protecting business and data from security threats.

This blog introduces the "Mandatory Implementation of MFA (Multi-Factor Authentication) for Salesforce." The customer relationship management (CRM) solution "Salesforce" made the use of multi-factor authentication (MFA) mandatory in February 2022. As the threat of unauthorized access continues to rise, the aim is to protect important information of client companies by enhancing security through the combination of two or more factors, rather than relying solely on ID and password. Since two-factor authentication via SMS or email alone cannot meet the requirements of mandatory multi-factor authentication, three authentication methods are recommended. [Content Overview] ■ Reasons why Salesforce requires MFA (Multi-Factor Authentication) ■ Responding to rapidly changing threats ■ What MFA (Multi-Factor Authentication) methods does Salesforce recommend? *For more details, you can view the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI temperature measurement terminals are gaining attention for virus prevention! They detect the absence of masks and abnormal body temperatures.

Demonstrating high authentication accuracy! Introducing an AI facial recognition terminal that also allows temperature measurement in our blog.

This blog features AI facial recognition terminals that can also measure body temperature. Our company sells the AI recognition terminal "SpeedFace-V5L/ProFace X," which enables contactless facial recognition and palm recognition, to businesses, schools, and clinics, such as offices and factories. Without touching the terminal, it alerts users with screen displays and alarm sounds when it detects individuals without masks or with abnormal body temperatures, making it a focus of attention as an effective measure for preventing viral infections. [Content] ■ AI-based temperature measurement, advanced and highly reliable access management support ■ AI recognition through walk-through, detecting abnormalities and issuing warnings *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system
  • Entrance/exit management and personal identification system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Accelerating integration of facial recognition with existing systems.

It is possible to avoid trouble! Introducing the facial recognition system in the blog.

This blog discusses methods to achieve both enhanced security and infection control. There is an increasing effort to strengthen security by integrating facial recognition with existing systems. Due to its high accuracy in preventing impersonation and its hygienic nature, there are more cases of implementing facial recognition in system integration in response to the spread of viruses. [Content] ■ Strengthening security through impersonation prevention ■ Enabling contactless, walk-through authentication ■ Entire apartment buildings using facial recognition * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system
  • Entrance/exit management and personal identification system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Face recognition edge device suitable for system integration.

Introducing a blog about edge devices with diverse features and excellent scalability!

This blog features information about system integration with facial recognition edge devices. Facial recognition edge devices are on-site terminals that verify identity using facial recognition. Thanks to the Internet of Things (IoT), they can now integrate with systems that provide various functions over the internet. Their applications are expanding in facilities such as companies, schools, hospitals, and apartment complexes for purposes like access control, attendance management, and enhancing security. [Content Featured] ■ Edge devices that excel in speed, cost, flexibility, and scalability ■ Examples of system integration with facial recognition edge devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance/exit management and personal identification system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cashless with IoT devices

Optimization of management resources is also possible! Introducing cashless solutions with IoT devices in our blog.

This blog discusses how to enable cashless transactions using IoT devices. In Japan, there are many coin-operated machines that require inserting coins to receive services. However, by utilizing these IoT devices, there is a growing interest in evolving them into online machines that enable cashless payments. Transforming coin-operated machines to support cashless payments and online functionality can lead to various management improvement effects. [Content Overview] - The risk of missing business opportunities with offline machines alone - Affordable retrofitting of cashless functionality using IoT devices - Diverse payment options, comprehensive support, and easy implementation... *For more details, please refer to the related links. *For further information, please check the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Enhancing security with Azure AD device authentication.

Enjoy the convenience of the cloud! Introducing security enhancements through device authentication in our blog.

This blog features a convenient service for managing authentication information in bulk. Microsoft's Azure Active Directory (AD) is used as the authentication foundation for various cloud services, including Microsoft 365. In addition to authentication methods using ID and password, device authentication can be added with FIDO security keys and OTP tokens compliant with OATH, enabling enhanced security through multi-factor authentication (MFA). [Content] ■ Maintaining the security level of cloud service authentication ■ Achieving MFA by adding FIDO security keys ■ Utilizing tokens for Azure AD authentication ■ Field sales representatives logging in on shared devices *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What are the benefits of passwordless authentication?

It's possible to save costs! Introducing the benefits of passwordless authentication in a blog.

This blog discusses the benefits of adopting passwordless authentication. Authentication using ID/password is exposed to the risk of "unauthorized access" if the password is leaked to a third party. To protect important information and assets of individuals and companies from malicious unauthorized access, passwordless authentication, which does not use passwords, is gaining attention. [Content] ■ Risk reduction through multi-factor authentication (MFA) such as "biometric authentication" ■ Utilizing the passwordless authentication standard "FIDO" that balances security and convenience ■ Liberation from the stress of password management *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication in Zero Trust

Achieving a robust security network! Introducing Zero Trust in our blog.

This blog discusses the zero trust approach to user authentication. With the advancement of mobile devices such as laptops and tablets, there is an increasing business scene of telecommuting away from the office. While there are benefits from this digital transformation, the security risks targeting information, which is a critical asset for companies, are also rising. The first barrier to reducing the risk of information leakage from both external and internal sources is the zero trust approach to user authentication. [Content] - Zero Trust = Trust nothing - Zero Trust authentication through Multi-Factor Authentication (MFA) - Preventing information leakage due to internal misconduct - Low-cost, efficient management is key to improving productivity *For more details, you can view the blog through the related links. *For more information, please refer to the PDF document or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Prevent information leakage with file encryption software.

Enhance your security level! Introducing ways to prevent information leaks on the blog.

This blog discusses measures against information leakage using file encryption software. File encryption is the process of converting certain data into another form through special processing. To view the encrypted data, it is necessary to decrypt the file using a "key," such as a password. By using file encryption software, even if the data falls into the hands of a third party, its contents cannot be read. [Contents] ■ Loss of customer trust if information leakage occurs ■ Software that automatically performs encryption is gaining attention ■ Choose based on the overall cost-performance ratio of information leakage countermeasures * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What devices are suitable for multi-factor authentication (MFA)?

Prevent unauthorized login by impersonation! Introducing appropriate MFA devices in our blog.

This blog features devices suitable for multi-factor authentication. As the risks of unauthorized access through password-only authentication are being pointed out, many internet-related services are beginning to implement multi-factor authentication as part of their security enhancements. We have seen an increase in inquiries about using hardware as MFA devices, including not only cases that utilize smartphones commonly used but also various types such as physical security keys and hardware tokens that display one-time passwords. [Content Featured] - Utilizing smartphones, which are familiar MFA devices - "Physical security keys" that are inserted like a key for user authentication - MFA devices that display one-time passwords - FIDO security keys for MFA in Azure AD and Salesforce *For more details about the blog, you can view it through the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

What is a FIDO passkey that encourages passwordless authentication?

Available authentication credentials! Introducing security keys in our blog.

This blog provides detailed information about "FIDO Passkeys." This product is a new security technology that replaces passwords. The "FIDO Alliance" and the "World Wide Web Consortium" are working together to develop it, and the three major U.S. IT companies—Google, Microsoft, and Apple—have announced plans to support it as a standard for passwordless sign-in. [Content] ■ Solving the challenges of reconfiguration with multi-device support ■ Support from Google, Microsoft, and Apple ■ Synchronizing cryptographic keys belonging to FIDO Passkeys across devices * More details can be viewed through the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

To prevent unauthorized use of licenses

Understand the expiration date! Introducing effective methods to prevent license violations in our blog.

This blog discusses methods to prevent the misuse of licenses. Software license violations pose a significant risk to companies and organizations. If one unknowingly uses software illegally in their operations, they may face not only fines but also a loss of social credibility. To avoid this, it is crucial to thoroughly implement "license management," understand the contract periods of software, and utilize "protector tools" such as dongles to prevent unauthorized use. [Content] ■ The risk of having to pay multiple times the usage fee if a license violation occurs ■ Assembling necessary software and managing licenses properly ■ The benefits of managing software licenses ■ Utilizing cost-effective protector tools *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

On-premises? Cloud? What is the suitable authentication solution?

Ensuring safety! Introducing security solutions in the blog.

This blog features suitable authentication solutions. The IT environments of companies are diversifying, ranging from traditional on-premises systems to cloud-based systems, and it is necessary to consider the implementation of authentication security that fits their own systems. In response to these changes in the environment, more companies are adopting authentication solutions that incorporate multi-factor authentication, such as the use of one-time password tokens and security keys. [Content] ■ Addressing the risks of entrusting data to cloud services ■ The increase of hybrid on-premises and cloud systems necessitates a response to diversification ■ "Zero Trust Security," which perceives internal and external network environments as borderless * For more details, you can view the related links. * For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Advantages and disadvantages of one-time password authentication.

Effective for enhancing security! By combining 'multi-factor authentication,' it is also possible to increase safety further.

This blog discusses the advantages and disadvantages of one-time password authentication. One-time passwords are gaining renewed attention as a system to enhance login authentication security. Unlike traditional ID/password authentication methods, one-time passwords utilize disposable passwords that can be used only once, significantly improving security levels. [Content] - Strengthening authentication with user-friendly one-time passwords - New attack methods targeting one-time passwords - Utilizing multi-factor authentication in the cloud service authentication platform "Azure AD" *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

A facial recognition system suitable for office access control.

Introducing a facial recognition system on the blog that also leads to enhanced security!

This blog features a facial recognition system that is well-suited for managing office entry and exit. The facial recognition system is an authentication method that identifies individuals by matching facial information captured by a camera with a database. It is a secure authentication method that makes impersonation and other fraudulent activities difficult, and it does not require the setting of passwords. Additionally, it is contactless and highly convenient, resulting in less psychological burden for users. [Content Included] ■ What is a facial recognition system? ■ AI image recognition technology and its accuracy ■ Well-suited for office entry and exit management ■ Benefits of implementation *For more details, you can view the related links. *For more information, please refer to the PDF materials or feel free to contact us.

  • Entrance and exit control system
  • Entrance/exit management and personal identification system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Case Study Interview on Cloud Authentication Service: Applied Geology Co., Ltd.

The reason for choosing "Raku-nin" from Hiten Japan is its ease of operation! Case study of the certification service *Free trial version available for loan.

Applied Geology Co., Ltd. is a geological survey company / construction consulting company. Hiten Japan's "Raku-Nin" is used for authentication when the company's clients, private developers and house manufacturers, access the survey data related to ground and geology provided by the company. "We have received feedback that it is a management system that can be understood without referring to the manual much if you understand the system, and the user log management is well organized, which provides peace of mind." ★Please apply for a free trial version from "Contact Us"★ For detailed case information, please refer to the related links below. 【Case Overview】 ■Implementation Site: Applied Geology Co., Ltd. ■Implemented Product: Cloud Authentication Service "Raku-Nin" ■Effects ・After implementation, customers were able to switch over without discomfort. ・The replacement also enabled the use of software tokens. *For more details, please refer to the PDF materials or feel free to contact us.

  • Other PCs and OA equipment
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB Dongle Implementation Case Study Interview: Swallow Incubate

Thanks to "ROCKEY," the sales channels for licenses have doubled! Case study on the introduction of USB dongles that help prevent unauthorized use. *Free trial version available for loan.

Swallow Incubate Co., Ltd. is a cutting-edge technology venture in the IT and IoT fields, established in Tsukuba in 2013. We purchased the USB dongle "ROCKEY" from Hiten Japan and incorporated it into the SDK developed by the company. By ensuring that the ID of the dongle matches during the SDK compilation, we are able to deter unauthorized use. With this implementation, we can now sell to offline customers who cannot use the company's technology online, effectively doubling our sales channels. ★Please apply for a free trial version through the "Contact Us" section★ For detailed case information, please refer to the related links below. 【Case Overview】 ■Implementation Company: Swallow Incubate Co., Ltd. ■Implemented Product: USB Dongle "ROCKEY" ■Effect: Enabled sales to offline customers who cannot use the company's technology online. *For more details, please refer to the PDF document or feel free to contact us.

  • Other PCs and OA equipment
  • Other security systems

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Pay BOX Implementation Case Interview: Bodywork Service

The quality of support was the deciding factor! Solving issues and reducing costs with the introduction of the IoT platform Pay BOX.

Bodywork Service Co., Ltd. is a company that installs, rents, and sells massage chairs to various facilities, businesses, and individuals across the country. The new model of massage chair "Space Shuttle," released in September 2021, is equipped with Hiten Japan's IoT platform "IoT Cube"/Pay BOX. "We felt that the technical support was robust during development. Additionally, there was support in terms of information, and it was great to be able to consult on various matters," was the feedback we received. For detailed case information, please refer to the related links below. [Case Overview] ■ Client: Bodywork Service Co., Ltd. ■ Product Introduced: IoT platform "IoT Cube"/Pay BOX ■ Challenge: In the case of coin-operated machines, it takes time to confirm sales. ■ Effect: Users can use it without confusion. *For more details, please refer to the PDF document or feel free to contact us.

  • IoT

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO key/OTP token for Azure AD multi-factor authentication.

Support for Azure AD multi-factor authentication with hardware tokens! Choose products that suit your needs. *Free trial available.

The challenges faced by Azure AD users contacting our company include: "We want to distribute hardware tokens for MFA to employees who do not have company smartphones," and "Since remote work has become widespread across the company, we want to implement Azure AD multi-factor authentication to enhance security." The "FIDO Security Key" enables passwordless authentication using PIN/biometric authentication by utilizing FIDO2. Additionally, the "One-Time Password (OTP) Token" allows you to choose between a 30-second type and a 60-second type, and it displays the battery level, reducing the risk of running out of battery. 【Features of the FIDO Security Key】 ■ Achieves passwordless authentication using PIN/biometric authentication by utilizing FIDO2 ■ Designed to replace traditional authentication with strong hardware-based authentication using public key cryptography to protect against various cyber attacks ■ A rich lineup of options ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please refer to the PDF materials or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO security key for Salesforce multi-factor authentication.

Achieve strong two-factor authentication with simple operations! You can choose a product that suits your needs. *Free trial version available.

Salesforce has made multi-factor authentication (MFA) mandatory to address threats related to customer data protection, such as unauthorized access. The "FIDO Security Key" enables strong two-factor authentication through a simple operation: after entering your ID/password (U2F) or PIN (FIDO2), just touch the security key. You can choose from a range of products, including cost-effective options, those with fingerprint sensors, and USB-TypeC compatible products that suit your needs. 【Features of the FIDO Security Key】 ■ FIDO2/U2F standard compliant ■ Wide variety of lineup ■ Easy operation ★ To request a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform "IoT Cube" / Pay BOX

No major modifications to existing equipment are required for implementation! Centralized management of sales remotely.

The IoT platform "IoT Cube"/Pay BOX brings offline devices online and allows coin-operated machines to accept both cash and cashless payments. With internet connectivity, it is possible to remotely obtain sales, operational status, and marketing information. It also enables management of change, inventory control of prizes, adjustments to fees, and monitoring of machine troubles. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.

  • IoT

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Temperature check capable / Optimal AI facial recognition terminal for system integration

A wide range of highly scalable AI facial recognition terminals available!

We provide AI facial recognition terminals that allow for safe management of entrance, store access, and room entry without the need for personnel. In addition to temperature measurement, it can also determine whether a mask is being worn. Furthermore, it can be integrated with existing systems such as electric locks and attendance management. 【Product Lineup】 ■Elite [TI] ■ProFace X [TI] ■SpeedFace-V5L [TI] *For more details, please download the PDF or feel free to contact us.

  • Entrance and exit control system

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

AI facial recognition module suitable for embedded development

This is a facial recognition module suitable for embedded development in various devices. By integrating it into machine tools and factory equipment, it also enables the restriction of operator access.

The "AI Face Recognition Module" is a product well-suited for embedded development in on-premises systems, client PCs, and various devices' fixtures, enclosures, and panels. Since it can also estimate age, gender, and emotions, it can be used for marketing purposes by integrating it into various devices. We have a rich lineup, including the "FA51M/FA51MC," which can perform palm recognition and mask detection, so please feel free to contact us. 【Features】 ■ Face recognition ■ Age estimation ■ Gender estimation ■ Emotion estimation ■ Biometric determination ■ USB connection *For more details, please refer to the related links or feel free to contact us.

  • Other commercial buildings and service facilities
  • Other store equipment and supplies
  • Other analytical equipment

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

QR code payment terminal

Equipped with high-quality and robust security! It can be used in various situations such as restaurants and delivery destinations.

We offer a range of high-quality, secure two-dimensional code payment terminals. Starting with the "ePayPOS QE41," which intentionally limits its features to keep costs low, and including the "SCITUS F40," which is equipped with Android 7.0 and a high-speed thermal printer, we have a rich lineup. These devices can be utilized in a wide variety of settings, such as retail stores and outdoor events. 【Features】 <ePayPOS QE41> ■ Double display ■ Cordless ■ Dedicated scanning window *For more details, please refer to the PDF document or feel free to contact us.

  • Payments, cards, and electronic money

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Cloud authentication service "Raku-Nin" *Free trial version available for loan.

Cloud authentication service that allows you to choose from multiple authentication methods.

"Raku-Nin" is a cloud authentication service that enables two-factor authentication and two-step verification by being integrated into your system. You can choose from multiple authentication methods to add. It can be developed and implemented in a short period, and it is priced significantly lower than other cloud services. 【Features】 ■ Excellent usability ■ Simplification through cloud services ■ Compatible with various systems ■ Peace of mind with international security standards ■ Utilizes domestic servers ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

FIDO security key *Free trial available

Authentication that balances security and convenience! Towards a world without passwords with easier and stronger authentication!

When it comes to web authentication, passwords are the standard, but they come with the disadvantages of information leakage risks and the hassle of management. Recently, attention has turned to the authentication standard 'FIDO' that achieves both security and convenience without using passwords. FIDO is expected to become the de facto standard for online authentication. Please feel free to contact us for more details. 【Features of FIDO Security Keys】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server, making it safe. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ To borrow a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the related links or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Fingerprint authentication device 'BioPass FIDO2' *Free trial version available for loan.

Password-free fingerprint authentication device! Next-generation authentication that balances security and convenience.

"BioPass FIDO2" is a password-free fingerprint authentication device. It is the next-generation authentication FIDO that balances security and convenience. Since it does not share sensitive information with servers, there is no risk of information leakage, making it safe. This device alone achieves two-factor authentication and securely stores biometric information. 【Features】 ■ Passwordless ■ Achieves two-factor authentication with this device alone ■ Securely stores biometric information ■ Usable across multiple services ■ Authentication is completed with a simple operation, without relying on memory ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF document or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication device "OTP Token" *Free trial version available for loan.

Generate a one-time disposable password! It enables stronger authentication than a fixed password.

The "One-Time Password (OTP) Token" is an authentication device that enables stronger authentication than fixed passwords. It generates a one-time disposable password to identify the user, allowing for access restrictions to important applications and confidential information. Compliant with the OATH standard, it can be integrated with other OATH-compliant products from different manufacturers, providing a high-quality solution. 【Features】 ■ Provides compatibility with third-party software due to OATH standard compliance ■ Does not require connection to a PC, so end users do not need to install drivers or applications ■ Pressing the button on the token displays a one-time disposable password, eliminating the need to remember it ■ Capable of integration with various applications ■ Portable design for easy carrying ★ To request a free trial version, please apply through "Contact Us" ★ * For more details, please refer to the PDF document or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

One-time password token "C200" *Free trial version available for loan.

Compliant with OATH's TOTP (Time-based One-time Password Algorithm)!

The "C200" is a one-time password token that generates a one-time password at regular intervals, enabling two-factor authentication during login. The display of battery life allows for risk management of running out of battery in advance, such as through replacement or stockpiling. 【Our OTP Features】 ■ High security ■ High convenience ■ Low cost ■ Usable for a wide range of applications ■ Customizable design ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please download the PDF or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Authentication device "ePass USB Token" *Free trial version available for loan.

Prevent fraud with enhanced authentication! It is possible to integrate with various authentication solutions compliant with PKI.

The "ePass USB Token" is a two-factor authentication device that securely stores user information and prevents unauthorized access through impersonation. Equipped with advanced encryption algorithms, it securely stores important personal authentication information (electronic certificates, private keys, user IDs/passwords). It robustly protects against threats such as data leakage and tampering due to impersonation. It can be integrated with various authentication solutions compliant with PKI. 【Features】 ■ Prevents unauthorized access with enhanced authentication ■ Supports multi-access ■ Two-factor authentication ■ Easy integration ■ A rich product lineup tailored to various use cases ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

OTP authentication system "FOAS" *Free trial version available for loan.

Easily add one-time password authentication to existing systems! Strengthen the authentication of your company's web services.

"FOAS" is a robust OTP authentication system required in the cloud era. It enhances the security level of authentication by using one-time password tokens. It strengthens authentication across various information devices such as PCs, tablet PCs, and smartphones. It achieves high security at a low cost. 【Features】 ■ Easily add strong authentication ■ Interoperable with various systems ■ Usable regardless of the format of information devices ■ Low implementation cost ■ Easy to switch from other authentication servers compliant with the international standard OATH ■ Custom integration using APIs is possible ★ To request a free trial version, please apply through "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Online authentication FIDO security key *Free trial available

To prevent the sharing of confidential information with the server, the risk of password leakage is zero! Peace of mind with international security standards.

The FIDO security key is a next-generation authentication technology that balances security and convenience without using passwords. Since it does not transmit authentication information over the network or store it on servers, there is no risk of password leakage. In today's world, where online services are widely adopted, it is being used by many individuals and companies as a next-generation authentication technology that replaces password authentication. The FIDO Alliance, the organization that develops the standards, includes leading companies in the IT industry such as Google, Microsoft, and Yahoo, and the number of member companies continues to grow each year. 【Features of the FIDO Security Key】 ■ High Security There is no risk of information leakage as confidential information is not shared with the server, making it safe. ■ Easy Operation Authentication is completed with simple actions, eliminating the need to rely on memory. ■ Peace of Mind with International Security Standards It is expected to become the de facto standard for online authentication. ★ Please apply for a free trial version through the "Contact Us" section. ★ *For more details, please refer to the related links or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

IoT platform Pay BOX can be easily and affordably implemented!

We solve the challenges of coin-operated machines and bring improvements in labor productivity and efficiency to your business!

The IoT platform "IoT Cube"/Pay BOX enables remote centralized management of cash and sales, monitoring of machine operating conditions, and inventory management of prizes. By being able to grasp the situation remotely, it is expected to reduce labor costs and improve sales. It can be implemented easily and inexpensively in a short period, making it available for many small and medium-sized businesses. 【Features】 ■ Centralized management of cash and cashless payment sales remotely ■ Reduction of human resources ■ Decrease in vending machine losses = Increase in sales ■ Easy and inexpensive implementation in a short period *For more details, please refer to the PDF document or feel free to contact us.

  • IoT

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Achieving Two-Factor Authentication 'SecureCore For BioPass'

Windows login enters the passwordless era! Protected with advanced security.

"SecureCore For BioPass" is a solution that enables passwordless two-factor authentication by utilizing a fingerprint authentication device. By inserting the fingerprint authentication device "BioPass" as a physical "key" into the PC, users can log on. If the BioPass is removed during use, the PC will be locked to prevent unauthorized access. Since it is a fingerprint authentication device compliant with FIDO (international standard), multiple FIDO services can be used with this single security device. 【Features】 ■ Equipped with logging functionality ■ Can issue one-time passwords ■ User-friendly GUI interface for IT administrators ■ Policy setting tools allow for pre-configuration of restrictions ■ Usable with the three factors of "possession" + "biometrics" + "knowledge (password)" *For more details, please refer to the PDF document or feel free to contact us.

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

PC terminal login control "SecureCore" *Free trial version available for loan.

Protect logon to PC terminals with enhanced security! Reduce operational burden when using USB keys.

"SecureCore" is software that controls logon to Windows PCs using a USB key (ePass token) as a physical "key." With the administrator software, adding and registering USB tokens is easy. Policy settings can also be freely modified. You can consolidate and store various website IDs and passwords within the USB token, allowing for automatic authentication simply by accessing websites with Internet Explorer. 【Features】 ■ Logging function included ■ Two-factor authentication combined with ID and password ■ One-time password issuance available ■ Can store electronic certificates ■ Policy settings can be freely modified ★ Please apply for a free trial version through the "Contact Us" section ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Two-Factor Authentication System 'SecureVisit' *Free Trial Available

Two-factor authentication system using USB keys and one-time password tokens!

"SecureVisit" is a web authentication enhancement solution that achieves advanced security through a robust two-factor authentication method utilizing USB keys or one-time password tokens, surpassing traditional authentication methods. It can be easily implemented without the need to modify existing web servers. It is suitable for customers managing corporate web services solely with IDs and passwords. 【Features】 ■ Advanced devices that enable two-factor authentication ■ Easy implementation, construction, and operation ■ Low implementation and operational costs ■ Flexible support for large corporations to small and medium-sized enterprises ★ Please apply for a free trial version through "Contact Us" ★ *For more details, please download the PDF or feel free to contact us.*

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

File encryption "SecureCore DSE" *Free trial version available for loan.

Prevent information leaks caused by human error! This is a product that achieves cost performance.

"SecureCore DSE" is software that creates a secure internal environment by being installed on all computers within the company. Files of target applications generated within this product are instantly encrypted. It prevents any gaps and protects against the leakage of confidential information during work. It packages various security features into an all-in-one solution, significantly reducing not only the cost of the product itself but also the total costs associated with information leakage prevention. 【Features】 ■ Prevents internal misconduct ■ Controls external media and communication devices ■ Even if an email is mistakenly sent, the file remains encrypted ■ Simplified initial setup and a non-complicated system reduce the burden on administrators ■ Provides a response that does not interfere with customer operations, balancing productivity and security ★ Please apply for a free trial version from "Contact Us" ★ *For more details, please refer to the PDF materials or feel free to contact us.*

  • Other Software

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

Data encryption tool 'SecureCore SFE'

Data encryption solution that does not require a management server!

"SecureCore SFE" is a client PC-based encryption application that easily implements advanced encryption and automatic password assignment for data on file servers and NAS. If advanced encryption and password authentication are applied to the data in the event of a confidential data leak, reporting to the Personal Information Protection Commission becomes unnecessary, significantly reducing "threats and risks of cybercrime," "strengthened penalties under the Personal Information Protection Act," and "indirect risks related to information leakage." 【Features】 ■ Functional Aspects - Adopts advanced encryption (AES government recommended) - Encrypts data from various applications ■ Operational Aspects - Simply place this program in the shared folders of file servers or NAS to start operation ■ Management Aspects - No need for a management server or individual client installation work - No performance issues *For more details, please download the PDF or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration

USB dongle "ROCKEY4ND" *Free trial version available for loan.

Industry-leading anti-piracy dongle!

"ROCKEY4ND" is a high-performance, high-functionality driverless dongle that employs anti-tampering body and onboard encryption engine. By utilizing the API, powerful protection can be implemented, and existing applications can also be protected using the ROCKEY4ND envelope tool. 【Features】 ■ Driverless, so it can be used simply by connecting to a PC ■ In addition to the A1 standard package, an E5 compact package has been added ★ Please apply for a free trial version through "Contact Us" ★ * For more details, please download the PDF or feel free to contact us.

  • others

Added to bookmarks

Bookmarks list

Bookmark has been removed

Bookmarks list

You can't add any more bookmarks

By registering as a member, you can increase the number of bookmarks you can save and organize them with labels.

Free membership registration
Prev 12 Next
  • イプロスがリアル展示会を主催します! AI/DX 営業・マーケティング展 出展社募集中 リード数・商談数が止まらない!新しいリアル展示会を提供 会期 2026年3月24日(火)~25日(水) 会場 東京ビッグサイト東4ホール 出展概要資料を進呈!
    • Contact this company

      Contact Us Online

    Products

    • Search for Products

    Company

    • Search for Companies

    Special Features

    • Special Features

    Ranking

    • Overall Products Ranking
    • Overall Company Ranking

    support

    • site map
    IPROS
    • privacy policy Regarding external transmission of information
    • terms of service
    • About Us
    • Careers
    • Advertising
    COPYRIGHT © 2001-2025 IPROS CORPORATION ALL RIGHTS RESERVED.
    Please note that the English text on this page is automatically translated and may contain inaccuracies.