►
From YouTube: BS1 5 日本電気 久冨様
Description
OpenShift Commons Gathering Japan 20200
December 10, 2020
https://commons.openshift.org/gatherings/Japan_OpenShift_Commons_Gathering_2020.html
A
A
A
A
Talk
about
how
biometric
authentication
is
positioned
in
light
of
the
recent
social
situation.
First,.
Let
me
briefly
talk
about
the
biometric
authentication
technology,
that
nec
is
focusing
on,
and
then
introduce
an
infection
control
solution
that
combines
biometric
authentication
and
video
analysis
technology,,
as
well
as
some
pictorial.
A
Platform
also
uses
OpenShift
today.
I
would
like
to
introduce
how
to
use
OpenShift
on
this
platform,
and
also
about
the
points
I
devised.
At.
The
end
of
the
session,
I
would
like
to
introduce
nec's
own
company's
efforts
for
digital
transformation,
and
our
company's
company
building.
Although.
It
is
a
short
time,.
I
would
like
to
ask
for
your
cooperation.
A
A
Is
a
background
that
recognition
of
face
recognition
has
increased
since
the
ic
section
2
photo
of
the
passport
is
registered,
and
recognition
of
face
recognition
has
improved
as
it
has
spread
almost
pro-socially.
As
many
of
you
may
be
familiar
with,.
The
threat
of
terrorism
has
increased,
and
now
in
countries
around
the
world,
immigration
committees
are
being
conducted
using
facial
recognition.
It's,
not
a
good
story,,
but
in
fact,
it's
considered
the
timing.
When
facial
recognition
became
widespread
in
society.
A
A
A
Is
an
example
of
infectious
disease
control
at
an
airport
in
Hawaii,,
which
was
recently
played
by
our
company
as
one
of
our
efforts
to
combat
infectious
diseases.For
Japanese
people,
Hawaii
is
very
familiar.
However,,
as
you
know,,
tourism
is
number
four
in
Hawaii,
and
I've
heard
that
even
in
this
situation,,
the
number
of
tourists
from
overseas,,
including
the
mainland,
United,
States
and
Japan,,
is
declining..
A
A
A
A
A
A
I'm
sure
you
all
have
experienced
this,,
but
if
you're
sweating
or
your
fingers
are
wet,,
you
won't
be
able
to
use
your
fingerprint
authentication,
and
you'll
wear
face
masks
in
dark,
places,
or
you'll,
wear
masks
and
sunglasses.
By,
combining
and
using
appropriate
authentication
methods
according
to
the
application
and
environment,.
We
are.
A
A
A
A
A
A
A
A
A
Well,
I
was
worried
that
the
speed
of
activities
would
slow
down
like
this,,
but
when
I
opened
the
lid,,
the
situation
was
that
instead
of
measuring
it,,
it
was
actually
accelerating.
In
this
era
of
the
new
normal.
The.
New
value
of
biometric
authentication
is
attracting
attention,
and
I.
Think
that
is
a
major
factor.
A
A
By,
the
way,,
if
you
can
make
purchases
with
self-checkout
authentication,,
you
won't
have
to
physically
receive
cash
or
cardstock,,
and
you
'll
also
be
able
to
reduce
the
risk
of
having
to
talk
to
that
employee.
The
value
is
about
30
seconds,,
but
I've
put
it
together
in
a
video,.
So
please
take
a.
A
A
At
the
end
of
the
video,.
There
is
a
photo
of
facial
recognition
while
wearing
a
mask.
If
anything,.
There
was
an
aspect
of
Japan's
unique
needs
in
the
background
of
the
hay
fever
population,.
But
now
the
number
of
people
wearing
masks
is
increasing
all
over
the
world,
and
the
need
for
mask
support
for
face
recognition
is
increasing.
Yes,.
A
A
If
you're
not
wearing
a
mask,,
it's
called
a
black
label.The
probability
of
being
recognized
as
a
face
tends
to
decrease,,
but
at
nec,
we're
raising
this
system
and
improving
it
to
the
point
where
it
can
withstand
actual
use..
The
eyes
are
read
as
glasses
here,,
but
it's
a
technology
that
can
match
the
limited
effect
in
the
area
of
.
The
mask.When
you
wear
a
mask,,
the
part
below
the
nose
is
naturally
hidden.Authentication
is
performed
only
around
the
exposed.
Eyes.
I
have
to
do
it.
By
increasing
the
high
resolution
around
the
eyes,.
A
A
A
A
A
A
A
A
A
A
A
A
Difficult
thing
here
is
that
we
have
to
manage
information
sharing
across
countries,
and
it
is
necessary
to
connect
with
the
systems
of
both
in
and
out
airports,,
and
also
the
results
of
PCR
tests.
It's.
The
surface
temperature
of
the
body,
surface.
Such
personal
health
information
is
extremely
difficult
to
handle,
and
care
is
required
to
comply
with
laws
and
regulations.
The
common
platform,
provided
by
nec,
will
be
the
nec
digital
platform
that
I'm
going
to
talk
about.
A
A
A
A
A
A
This
board
is
globally
standardized,,
which
makes
it
possible
to
develop
global
business..
Open
Shift
is
used
as
a
container
platform
technology,,
which
enables
rapid
development
of
applications.
Components
of
each
application.
By
providing
5
APIs,.
You
can
easily
and
quickly
create
a
solution
by
combining
them.
A
A
A
Is
a
block
diagram
of
the
facial
recognition,
platform.
This
platform
is
running
in
the
Tokyo
region
of
AWS.It
is
distributed
in
three
availability
zones
to
increase
availability.The
top
half
of
this
is
the
part
that
operates
in
an
open
shift.
Environment.
And.
It's
an
application
that
performs
facial
recognition
in
this.
It's
running
as
a
container.
It
will
be
a.
A
A
Here,
it
is
a
database,
etc.
It
is
running,
and
it
takes
the
form
of
pairing
connection
with
this
vpc
in
the
above,
open
shift.
Environment.The
database
contains
various
information
required
for
face.
Authentication.
Information
such
as
whether
or
not
it
is
registered,
is
stored.It
can
be
referenced
from
the
face
authentication
app
as
appropriate.
A
It
is
configured
to
be
distributed
across
the
face.
Recognition,
containers
and
the
databases
are
distributed
to
improve
availability.
Next
is
multi-
tenancy.
However,.
It
is
designed
to
separate
tenants
using
the
namespace
function.For.
The
database,
we
use
amazon
Aurora.It
was
such
a
scene
when
using
managed
services
as
much
as
possible.
The
cost.
A
Moreover,,
we
are
taking
measures
to
encrypt
multiple
layers.For
logging,.
We
add
the
face:
authentication,
pod
meat
and
mud
as
a
container
again
and
transfer
it
to
the
cloud.The
reason
for
the
cloud
watch
is
also
I'm
trying
to
prioritize
the
selection
of
managed,
services,
and
I'm
doing
laundry.
It.
A
Was
a
phenomenon
that
the
component
was
behind
the
scenes
and
enacted
somewhere
p
Communication
was
waiting
for
tricks
In
the
end,.
It
was
an
open
depot
packet
capture
capture
that
did
not
shift.
I
was
able
to
identify
the
problem
by
collecting
the
result.
Bar
Ingress
is
a
past
problem
in
the
open
shift.
Router
part,,
which
was
resolved
by
upgrading
the
version.
It,
was
an
act
that
strongly
felt
that
support
is
extremely
important.,
Analysis
technology,
isn't
it?
I
would
like
to
introduce
nec's
own
efforts
to
realize
new
value
through
combination.