Slide 6
Slide 6 text
Picture a world in which biometric authentication becomes just a regular part of our everyday
lives, and everyone in the world can use services with peace of mind.
Let me introduce three cases as examples.
First, envision a world several years into the future in which the sharing economy has become
widespread.
With the shrinking work force in Japan and other developed countries, social sharing businesses
such as babysitting and helper services is becoming prevalent. If the babysitting service you
reserved, for instance, begins at a time you are not at home, could you trust that the person
who comes to your door is the babysitter you actually requested? You probably wouldn’t feel
comfortable giving this person the key to your home that could easily be copied. Even in cases
such as these, the face recognition system can be used to ensure that the person who comes
to your door is indeed someone you can trust, and you can let them in without giving them the
physical key. The requester, which is you in this case, is the only person with access to the
one-time key.
Next, let’s look at a world where you can use services without having to wait.
At airports, stadiums, or during an overseas trip, you can pass through gates and take time to
enjoy yourself without having to wait in line. NEC’s walk-through identification system and
other similar technologies are solutions that will enable better recognition accuracy and
convenience.
In addition, you will have access to services without having to carry around official certifications
or seals. Even during a large-scale disaster when you may not have any means to prove your
identity, your biometric information will provide the necessary proof to withdraw money from
your bank account, or utilize other services.
The final example is a world in which you will not have to worry about forgetting, losing, or
leaking your personal information, because your attributes will be your means of identification.
The social damage caused by the leakage of personal information is increasing rapidly. These
risks can be minimized through the utilization of biometric authentication.
6