Skip to main content

This page has been translated using TexTra by NICT. Please note that the translation may not be completely accurate.
If you find any mistranslations, we appreciate your feedback on the "Request form for improving the automatic translation ".

List of products and services that realize the digitalization of surveillance to detect intrusion traces and situational abnormalities

This page has been transition to "List of Products and Services that Realize the digitalization of Surveillance to Detect regulations on paper and in-person processes Invasion Traces and Situational Abnormalities ", a trial version of the initiative on Technology Map and technology catalogs that can be used for reviews. The latest information can be found on the trial page after transition.
The following information is current as of March 28, 2024.

We have posted products and services that realize a digitalization for surveillance that enables the detection of traces of intrusion and changes in conditions in a specific area and the notification of remote administrators. Please check the following precautions for using the content before using it.

In addition, when using the Technology Map and Technology Catalog to promote business digitalization, from the viewpoint of securing cybersecurity, we have organized the points to be noted when introducing digital technologies listed in this Technology Catalog. Please use the following materials for considering the introduction of digital technologies.

List of products and services

Points to Note (Hereinafter, quoted from Application Guidelines )

  • In principle, we will post the information provided as it is in the technical catalog.
  • The information published in the Technology Catalog does not provide any technical or legal support, such as certification, certification, and legality, but rather summarizes reference information for the use of technology by persons who consider the selection and selection of technology necessary for the review of regulation. Therefore, it is prohibited to display, advertise, etc. the technology published in the Technology Catalog as if the technology has been supported by the national government (Digital Agency).
  • Any person whose technical information has been published in the Technology Catalog may be responsible under security for defects, errors, bugs, and infringements of rights related to the accuracy, currency, and completeness of the published information, as well as the security, effectiveness, law, etc. of the published technology.

All Listings (in order of application)

List of products and services with essential items

The following is a list of products and services that have an information acquisition function, a function to identify and detect people, vehicles, trains, ships, etc., and a notification function.

List of products and services that do not have essential items

There are no applicable products or services at this time.
A list of products and services that do not have essential functions but can be used in each process of surveillance to detect traces of intrusion and situational changes is posted.

Data relating to public offering

References

Related Links