Biometrics - digital identification for a secure future

17
0 © Copyright 2017 FUJITSU Fujitsu Forum 2017 #FujitsuForum

Transcript of Biometrics - digital identification for a secure future

Page 1: Biometrics - digital identification for a secure future

0 copy Copyright 2017 FUJITSU

FujitsuForum2017

FujitsuForum

1 copy Copyright 2017 FUJITSU

BIOMETRICS ndash digitital identification for a secure future

Thomas Bengs

Director amp Head of Biometrics EMEIA

Fujitsu Enterprise amp Cybersecurity EMEIA

2 copy Copyright 2017 FUJITSU

Key threats caused by identity fraud

Terrorist attacks

Misuse of social media

Financial transactions fraud

IP theft

Enterprise data theftmanipulation

Cyber attacks

It takes 20 years to build a reputation andfive minutes to ruin it

Warren Buffet

50 of organizations suffered a data breach in 2016

Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study

3 copy Copyright 2017 FUJITSU

Why the hype about biometric authentication

Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication

absolutely necessary

4 copy Copyright 2017 FUJITSU

Biometric authentication is the right decision

Risk of Fraud Ownership Knowledge Biometrics

To be transferred Yes Yes No

To be stolen Yes Yes No

To be forgotten Yes Yes No

To be copied Yes Yes No

To be lost Yes Yes No

To be altered Yes Yes No

Keys Password Vein

Tokens Pin Iris

Smart Cards Selfie Fingerprint

Face

Voice

Key stroke

Known methods

Possible authentication methods Precision of Biometrics

Biometrics is the preferred method for processes that require authentication

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 2: Biometrics - digital identification for a secure future

1 copy Copyright 2017 FUJITSU

BIOMETRICS ndash digitital identification for a secure future

Thomas Bengs

Director amp Head of Biometrics EMEIA

Fujitsu Enterprise amp Cybersecurity EMEIA

2 copy Copyright 2017 FUJITSU

Key threats caused by identity fraud

Terrorist attacks

Misuse of social media

Financial transactions fraud

IP theft

Enterprise data theftmanipulation

Cyber attacks

It takes 20 years to build a reputation andfive minutes to ruin it

Warren Buffet

50 of organizations suffered a data breach in 2016

Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study

3 copy Copyright 2017 FUJITSU

Why the hype about biometric authentication

Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication

absolutely necessary

4 copy Copyright 2017 FUJITSU

Biometric authentication is the right decision

Risk of Fraud Ownership Knowledge Biometrics

To be transferred Yes Yes No

To be stolen Yes Yes No

To be forgotten Yes Yes No

To be copied Yes Yes No

To be lost Yes Yes No

To be altered Yes Yes No

Keys Password Vein

Tokens Pin Iris

Smart Cards Selfie Fingerprint

Face

Voice

Key stroke

Known methods

Possible authentication methods Precision of Biometrics

Biometrics is the preferred method for processes that require authentication

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 3: Biometrics - digital identification for a secure future

2 copy Copyright 2017 FUJITSU

Key threats caused by identity fraud

Terrorist attacks

Misuse of social media

Financial transactions fraud

IP theft

Enterprise data theftmanipulation

Cyber attacks

It takes 20 years to build a reputation andfive minutes to ruin it

Warren Buffet

50 of organizations suffered a data breach in 2016

Cisco annual Cybersecurity report 2017 2016 Ponemon Cost of Data Breach Study

3 copy Copyright 2017 FUJITSU

Why the hype about biometric authentication

Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication

absolutely necessary

4 copy Copyright 2017 FUJITSU

Biometric authentication is the right decision

Risk of Fraud Ownership Knowledge Biometrics

To be transferred Yes Yes No

To be stolen Yes Yes No

To be forgotten Yes Yes No

To be copied Yes Yes No

To be lost Yes Yes No

To be altered Yes Yes No

Keys Password Vein

Tokens Pin Iris

Smart Cards Selfie Fingerprint

Face

Voice

Key stroke

Known methods

Possible authentication methods Precision of Biometrics

Biometrics is the preferred method for processes that require authentication

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 4: Biometrics - digital identification for a secure future

3 copy Copyright 2017 FUJITSU

Why the hype about biometric authentication

Cloud computing and extra ordinarygrowth of smart mobile devices hasmade secure identity authentication

absolutely necessary

4 copy Copyright 2017 FUJITSU

Biometric authentication is the right decision

Risk of Fraud Ownership Knowledge Biometrics

To be transferred Yes Yes No

To be stolen Yes Yes No

To be forgotten Yes Yes No

To be copied Yes Yes No

To be lost Yes Yes No

To be altered Yes Yes No

Keys Password Vein

Tokens Pin Iris

Smart Cards Selfie Fingerprint

Face

Voice

Key stroke

Known methods

Possible authentication methods Precision of Biometrics

Biometrics is the preferred method for processes that require authentication

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 5: Biometrics - digital identification for a secure future

4 copy Copyright 2017 FUJITSU

Biometric authentication is the right decision

Risk of Fraud Ownership Knowledge Biometrics

To be transferred Yes Yes No

To be stolen Yes Yes No

To be forgotten Yes Yes No

To be copied Yes Yes No

To be lost Yes Yes No

To be altered Yes Yes No

Keys Password Vein

Tokens Pin Iris

Smart Cards Selfie Fingerprint

Face

Voice

Key stroke

Known methods

Possible authentication methods Precision of Biometrics

Biometrics is the preferred method for processes that require authentication

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 6: Biometrics - digital identification for a secure future

5 copy Copyright 2017 FUJITSU

Fujitsulsquos Commitment to Biometrics

Over 20 years in biometrics including significant investment in RampD through Fujitsu Labs (eg PalmSecuretrade Match on Card Cardless Payment Multi Authentication Biometric Fusion etc)

Biometrics experts involved in National and International Standards development from a number of countries

Proven experience across domains and geographic regions

Capabilities to deliver the right solution for each customer

Consulting

Solution design development implementation

Systems Integration

Hosting and cloud services

Products

Digital co-creation

IDaaS solution amp services NEW PalmSecure FPRO Sensor

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 7: Biometrics - digital identification for a secure future

6 copy Copyright 2017 FUJITSU

Biometric authentication - key facts

Market Size amp Trends amp Key Markets Biometrics Business Elements

Drivers Biometrics Key Applications

Total global market size is predicted to be US$ 30 Billion in 2022

1st Fingerprint 2nd Face Recognition 3rd Iris Recognition 4thVein Recognition 5th Voice Recognition

1st Government incl Public Sector 2nd Banking amp Retail3rd Industry 4th Enterprise amp Private Sector

By 2021 50 of online transactions will use biometrics (IDC 2017)

Disruptive fault lines Security privacy and regulation

Connected conflict Convergence of technology and privacy

Talent crunch Global demand for digital workers

Shifting economics Data as digital capital

Everything everywhere The rise of computer-based intelligence

Consulting services

IT-infrastructure (Cloud Server Client Network Biometric SensorApplication software) for on-premise or for off-premise biometricauthentication

Products Mobiles Biometrics as a Service IDaaS

Solution Design Integration Services Maintenance Services

Verification Identification Multi factor authentication

Log in Single Sign On Web Services

Physical access control time attendance

Mobile authentication

Financial transactions payments social authentications

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 8: Biometrics - digital identification for a secure future

7 copy Copyright 2017 FUJITSU

A world in motion needs secure identities

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 9: Biometrics - digital identification for a secure future

8 copy Copyright 2017 FUJITSU

Transport amp Travel

Biometric national ID card

Biometric passport

Biometric boarding pass

Biometric baggage check in

Biometric ticket purchasing

Biometric bonusloyalty card

Biometric staff crew access control

Biometric cockpit access

Biometric aircraft ship train maintenance

Biometric payment

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 10: Biometrics - digital identification for a secure future

9 copy Copyright 2017 FUJITSU

Enterprises

Biometric access to parking

Biometric elevator processing

Biometric biometric time attendance

Biometric biometric access to office area

Biometric locker access

Biometric PC login amp SSO

Biometric printing amp scanning

Biometric payment in canteens amp restaurants

Biometric access to data center amp racks

Biometric visitor management

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 11: Biometrics - digital identification for a secure future

10 copy Copyright 2017 FUJITSU

Financial Services amp Retail

Biometric ATM VTM

Biometric SAP process handling

Biometric financial transactions

Biometric digital working place

Biometric building access

Biometric data center access

Biometric payment

Biometric mobile payment

Biometric online ordering

Biometric self checkout

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 12: Biometrics - digital identification for a secure future

11 copy Copyright 2017 FUJITSU

Public Services

Biometric patient identification

Biometric data proctection

Biometric social funding treatment

Biometric welfare processing

Biometric e-government

Biometric payment in education

Biometric authentication for exams

Biometric access to

- Kindergartenchild care

- Schools School bus Campus

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 13: Biometrics - digital identification for a secure future

12 copy Copyright 2017 FUJITSU

AI IOT Automotive

Biometric car rental

Biometric car opening amp starting

Biometric convenience processing

Biometric payment services

Biometric individual recognition

Biometric data center access

Biometric production line processing amp access

Biometric storagelockers

Biometric tool handling

Biometric time attendance

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 14: Biometrics - digital identification for a secure future

13 copy Copyright 2017 FUJITSU

Mobile devices

Multi-Modal Biometric Identity Management

Anonymous Cloud Storage and Matching

Patented Vendor Agnostic Biometric Technology

Cross Platform Delivery

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 15: Biometrics - digital identification for a secure future

14 copy Copyright 2017 FUJITSU

Biometric authentication Enterprise platform

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 16: Biometrics - digital identification for a secure future

15 copy Copyright 2017 FUJITSU

Security Lectures at the Fujitsu Forum 2017Theatre in the Enterprise and Cyber Security area in the exhibition

November 08

1300 - 1330 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1330 - 1400 Privileged Access Management Managing privileged access and accounts in a secure and trustworthy way Petri Heinaumllauml

1500 - 1530 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1530 - 1600 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

1600 - 1630Radical Innovation in Security Combating cyber crime analytics machine learning and AI An outlook Darren Thomson Symantec CTO EMEA Region

1630 - 1700 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

November 09

1000 - 1030 Identity Lifecycle Management How identity lifecycle can be managed from one place easily and cost effective way Marko Leppaumlnen

1030 - 1100 Biometrics A comprehensive approach for a changing digital world Thomas Bengs

1300 - 1330 GDPR Check your readiness and find ways to get on track Sarah Armstrong-Smith

1400 ndash 1430 Automating Open Source Intelligence Using Open Source intelligence (OSINT) to identify risks faced by companies by todayrsquos threat landscape Steve Pye

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Page 17: Biometrics - digital identification for a secure future

16 copy Copyright 2017 FUJITSU

Fujitsu Sans Light ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacutethorn

yumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ 0123456789

notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucircuumlyacute

thornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl

Fujitsu Sans Medium ndash abcdefghijklmnopqrstuvwxyz ABCDEFGHIJKLMNOPQRSTUVWXYZ

0123456789 notrdquopound$^amp()_+-=[]rsquo~ltgt| copyuml~iexclcentcurrenyenbrvbarsectumlordflaquoraquonot-

regmacrdegplusmnsup2sup3microparamiddotcedilsup1ordmfrac14frac12frac34iquestAgraveAacuteAcircAtildeAumlAringCcedilEgraveAEligEacuteEcircEumlIgraveIacuteIcircIumlETHNtildeOgraveOacuteOcircOtildeOumltimesOslashUgraveUacuteUcircUumlYacuteTHORNszligagraveaacuteacircatildeaumlaringaeligccedilegraveeacuteecirceumligraveiacuteicirciumlethntildeograveoacuteocircotildeoumldivideoslashugraveuacuteucirc

uumlyacutethornyumlĐıŒœŠšŸŽžƒʼˆˇˉ˙˚˛˜˝-‒ndashmdash―lsquorsquosbquoldquordquobdquodaggerDaggerbullhellippermillsaquorsaquoolinefrasl⁰⁴⁵⁶⁷⁸⁹₀₁₂₃₄₅₆₇₈₉eurotradeΩrarrpart∆prodsumminusradicinfinintasympnelegesdotlozfifl