{"id":36,"date":"2018-04-02T20:34:17","date_gmt":"2018-04-02T11:34:17","guid":{"rendered":"https:\/\/www.cyberware.co.jp\/en\/?page_id=36"},"modified":"2019-04-24T10:27:48","modified_gmt":"2019-04-24T01:27:48","slug":"products","status":"publish","type":"page","link":"https:\/\/www.cyberware.co.jp\/en\/products\/","title":{"rendered":"Products, Solutions, &#038; Services"},"content":{"rendered":"<h1>PRODUCTS<\/h1>\n<h2>ID Management<\/h2>\n<section>\n<figure><\/figure>\n<div>\n<h3>Unmanned Reception System With Biometric Authentication Technology \u2014IDEA Gate Series<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-241\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2019\/04\/img_products_01.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>IDEA Gate provides efficient reception for visitors by using face recognition. We have an on-premise edition focused on security functions suitable for minor offices or data centers, and other editions each focused on signage functions or identity verification functions to fit stores or mansions and also hotels.<\/p>\n<\/div>\n<\/section>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>Support for Reading Works of Official Identifications \u2014ID sakusaku Series<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-72\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_products_02.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>ID sakusaku supports all kinds of works that need to read official identifications making it possible by scanners and IC-card readers available on common markets. Not only our general package product, but also a custom-made original software with functions you need or run times to incorporate into your company\u2019s system are available for you to integrate in the best way.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<p>&nbsp;<\/p>\n<h1>SOLUTIONS<\/h1>\n<h2>eID \/ CyberPhysical<\/h2>\n<h3>Image quality checking \/ correcting solution \u2014IDEA Image AQA<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-73\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_01.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>\u201cIDEA Image AQA\u201d is a solution that provides quality check and image correction for data imported by cameras or scanners to match each customers purpose. Those for face recognition standards and OCR support are some examples while \u201cHIPA\u201d, our image process engine, achieves not only collection and generation of such data but also location adjustment and cleaning by analyzing various information from the images, presenting advanced solutions.<\/p>\n<h6><\/h6>\n<h3>IDEA : Internal Crime Blocking Solution by Face Recognition for Windows<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-74\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_02.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>This software product blocks the client computers to be used by users not allowed and avoids internal crimes by permitted but sinister users, by means of biometric authentications. It includes functions of blocking internal crimes and face authentication for log on \/ unlock.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>IDEA Gate for Immigration<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-75\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_03.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>This is a middleware product that provides all software components required for immigration eGates at airports following FRONTEX Guidelines and ICAO DOC9303. In case the face recognition does not reach the passing score, additionally plural authentications of other biometric data such as finger print(s) and iris are able to be performed, and this is how multi-modal biometric authentication works by judging those scores comprehensively.<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>e-Passport PKI Solution<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-147\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_07.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>This product is completely in accordance with ICAO specifications about passport issuance and verification requirements \/ recommendations. Introductions of passport issuance and immigration examination on production environments, and ID card issuing systems with the security level required for private companies and governments in IEEE SC37 are achieved by this product&#8217;s components.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<p>&nbsp;<\/p>\n<h2>Fintech \/ IoT<\/h2>\n<h3>IC-Cards&#8217; Issuing Controller Engine<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-76\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_04.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>Here is a software package to integrate into card issuance applications using ID card printers \/ IC-card printers. It mediates between the card issuance application and each type of card printers. Customers are able to control command processing for card printers and customize controlling rules easily.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>IDEA : Key Management \/ Encryption Process Module<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-77\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_05.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>Effectively using functions of HSM, this library will free developers from complicated specifications of control and encryption of HSM. Key management function, encrypting function, authentication function, HSM accessing function, and audit log function are combined.<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>Security Solution by Block-Chain<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-78\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_solution_06.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>From consultancy of adaptability of each block chain technology such as the consensus mechanism with business, to application development within each platform such as Hyperledger Fabric, analysis of the security level required, and introduction proposal \/ construction, this is a total solution of block chain systems.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h1>PROFESSIONAL SERVICES<\/h1>\n<p>We are confident of providing solutions customers really require by \u201cconnecting\u201d \u201cprotection\u201d technology and \u201ccommunication\u201d technology. Having experiences of connecting every possible element including latest technologies and all types of devices (e.g. tamper resistant devices, IC-card printers, high resolution cameras, biometric devices), our consultants and engineers will support you in a wide range.<\/p>\n<div class=\"tit tit01\">\n<h4>CONNECT<\/h4>\n<\/div>\n<div class=\"boxR\">\n<ul class=\"ul01\">\n<li class=\"first\">Consultancy and technical research of ID management for SIer<\/li>\n<li>Supply and integration of technology such as PKI, biometrics, NFC, RFID, and image processing<\/li>\n<li>Authentication solutions collaborated with IC-card, biometrics, Active Directory, and Credential Provider<\/li>\n<li>System migration and introduction of communication technology (SOA Migration, XML based Messaging)<\/li>\n<li class=\"last\">System integration of Microsoft products (Active Directory, Exchange, design and construction of SharePoint, customization)<\/li>\n<\/ul>\n<\/div>\n<div class=\"tit tit02\">\n<h4>PROTECT<\/h4>\n<\/div>\n<div class=\"boxR\">\n<ul class=\"ul01\">\n<li class=\"first\">Consultancy and technology research of security field<\/li>\n<li>Introduction of tamper resistant device (HSM), encryption infrastructure, design and construction of PKI application<\/li>\n<li>System design and development in accordance with PCI-DSS<\/li>\n<li>System design and development using biometrics<\/li>\n<li>IC-card issuing solution for e-Passport, National ID, and others<\/li>\n<li>ID management infrastructure using multi modal biometrics<\/li>\n<li class=\"last\">Solution of detecting a specific person or action using motion sensor and face recognition<\/li>\n<\/ul>\n<\/div>\n<div class=\"tit tit03\">\n<h4>COMMUNICATE<\/h4>\n<\/div>\n<div class=\"boxR\">\n<ul class=\"ul01\">\n<li>Introduction of unmanned reception and digital signage using face recognition technology<\/li>\n<li>Introduction of integrated management environment and digital signage to support in-house transmission and ticket-driven development<\/li>\n<li>Remote work support \/ work style management solution<\/li>\n<li>Consultancy and technical research of knowledge management<\/li>\n<li>Consultancy for productivity improvement by groupware and smart phone<\/li>\n<li class=\"last\">Design and development of business applications for smart phone<\/li>\n<\/ul>\n<\/div>\n<h3>Introduction Supporting Service of HSM<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-79\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_service_01.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>Through this service, time and worries of introducing HSM can be lessened. This is a total support about introduction of which requires professional knowledge and experience, from configuration design to operation; proposal of the best structure, HSM constructions \/ configurations in our office, tests in customer\u2019s office, offers of operation manuals. We are also welcome to inquiries about handling industry regulations, PCIDSS for example.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h6><\/h6>\n<h3>Consultation for Secure System Such As Key Management \/ Encryption Process<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-148\" src=\"https:\/\/www.cyberware.co.jp\/en\/wp-content\/uploads\/sites\/2\/2018\/04\/img_service_02.jpg\" alt=\"\" width=\"450\" height=\"239\" \/>We will provide high level consultancies, from introduction to operation, of secure systems that requires data encryption. By using our packages and solutions based on our results of introduction in several industries, costs for development \/ construction and time for preparing installation are possible to reduced.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>PRODUCTS ID Management Unmanned Reception System With Biometric Authentication Technology \u2014IDEA Gate Series ID [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"_g2\/page-onecolumn.php","meta":{"_lightning_design_setting":[],"footnotes":""},"class_list":["post-36","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/pages\/36","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/comments?post=36"}],"version-history":[{"count":76,"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/pages\/36\/revisions"}],"predecessor-version":[{"id":242,"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/pages\/36\/revisions\/242"}],"wp:attachment":[{"href":"https:\/\/www.cyberware.co.jp\/en\/wp-json\/wp\/v2\/media?parent=36"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}