regular part of our everyday lives, and everyone in the world can use services with peace of mind. Let me introduce three cases as examples. First, envision a world several years into the future in which the sharing economy has become widespread. With the shrinking work force in Japan and other developed countries, social sharing businesses such as babysitting and helper services is becoming prevalent. If the babysitting service you reserved, for instance, begins at a time you are not at home, could you trust that the person who comes to your door is the babysitter you actually requested? You probably wouldn’t feel comfortable giving this person the key to your home that could easily be copied. Even in cases such as these, the face recognition system can be used to ensure that the person who comes to your door is indeed someone you can trust, and you can let them in without giving them the physical key. The requester, which is you in this case, is the only person with access to the one-time key. Next, let’s look at a world where you can use services without having to wait. At airports, stadiums, or during an overseas trip, you can pass through gates and take time to enjoy yourself without having to wait in line. NEC’s walk-through identification system and other similar technologies are solutions that will enable better recognition accuracy and convenience. In addition, you will have access to services without having to carry around official certifications or seals. Even during a large-scale disaster when you may not have any means to prove your identity, your biometric information will provide the necessary proof to withdraw money from your bank account, or utilize other services. The final example is a world in which you will not have to worry about forgetting, losing, or leaking your personal information, because your attributes will be your means of identification. The social damage caused by the leakage of personal information is increasing rapidly. These risks can be minimized through the utilization of biometric authentication. 6