 Hello, hello. Nice to meet you. I'm Ken Naganuma from Hitachi America in the U.S. Today I'll talk about biometrics secret key and its applications. This is our company's product and this is state of art technology from Japan. Okay, let's start with my self introduction. My name is Ken Naganuma and I belong to Hitachi America in the U.S. And I joined Hitachi 27 and I have involved with many projects and from 2040 I'm in charge of developing blockchain technology. And in 2020 I got a PhD from University of Tokyo. This is the first PhD from University of Tokyo about blockchain. And my research topic is blockchain and cryptography and mathematics. And the right hand side picture is my hobby. I'm interested in bodybuilding and men's physique. And last year I won the Western U.S.A. Championship. Oh, thank you. Thank you very much. Okay, today I'd like to introduce my company's product. This is a, can you show this? This is a finger vein authentication system. And you put your finger here. And there's an infrared camera in turn. So this camera scans your finger vein information, not fingerprint, finger vein information. And this device generates your original secret key from your finger vein information. And you can use this secret key as cryptographic secret key. So you can make a digital signature or encryption or decryption key using that. This is your original secret key. And Hitachi has developed this technology about 20 years. So in Japan this technology already has been practical use case for many Japanese banks employ this technology. If you have a bank account in Japan, you can withdraw your money using your finger. You do not require credit card or debit card, pin number. All need is your finger. You can withdraw your money. So which means we achieve high security because bank system requires high security, high usability, high reliability. So we achieve that. And now we'd like to expand our business to blockchain, web survey area. So we are applying this technology to blockchain. So today I introduced two applications about technology. The first one is Recover Secret Phrase. This is a new orientation of backup of Secret. And the second one is proof of origin for NFT. Only two applications today. Okay, let's start with Recover Secret Code. What is Secret Phrase? I think you already know Secret Phrase because this is a blockchain conference. But I reviewed that. Secret Phrase sometimes we call it recovery phrase, mnemonic phrase or pass phrase and so on. And this is the most important information, your crypto wallet. You make a crypto wallet, then you enter your secret words about 12 or 24. This is the most important and sensitive information for your wallet. You know, if you lose your smartphone or PC, you'd like to recover your account, then you enter this secret phrase. So if you leak your secret phrase, then your wallet is not your wallet. Because if I get your secret phrase, then I can install my PC to your wallet and I can take over your wallet information so I can send your cryptocurrency to my wallet. So Secret Phrase is the most important information for your wallet. Why is management secret phrase so difficult? There are two difficulties. The first one is do not leak. I already mentioned if you leak your secret phrase, then your wallet is my wallet. So do not leak. And the second one is do not lose. If you lose your secret phrase, you cannot take over your wallet. So do not leak and do not lose. This is very important. Today, we can solve these inconveniences. We can solve that. By the way, do you have crypto wallet? Oh, there are many please. And can you show your secret phrase? No? No. Oh, okay. You should keep that. You should keep secret. But today, I'd like to show my secret phrase of Metamask. I'll show this right 10 seconds. Please take a photo. You have big chance. You can get all my Ethereum. This is a big chance for you. This is binary data of Secret and the same one as QR code. Can you take a photo? Thank you very much. Of course, you know, this is not my original truth secret phrase. This is encrypted by fingerprint information. So if you get this data, you cannot get any information about my secret phrase. But do not delete your photo. Now, I backup my secret phrase on your smartphone. So if you lose my secret phrase and an event of emergency, I call you. And please send your picture to me. I can recover secret phrase using my finger and this device. So please do not delete your photo. Animation is finished. Can you use my animation? The previous slide. Okay, please delete the sent out picture. Okay, let's say, okay, it's okay. This is not important. And we'd like to launch a new secret management system for backup. You use this device under your finger and you encrypt your secret. And you distribute or put a cloud server or your friends' smartphone under our database. And this is a new service for management of secret. And the event of emergency, you download your encrypted secret phrase and recover your secret using this device. This is our new service model of backup of secret. So we believe we can solve inconveniences of secret phrase management because I already mentioned the art system. Your secret phrase is encrypted. So we can recover your secret. Recover means you can put many places. So you can distribute your encrypted secret phrase many places. So it means you can never lose it. So we can solve, do not lose. This is a new orientation secret phrase management. So this is a brand new idea and we create completely new architecture. Okay, let's show a short demonstration, very, very short demonstration. Thank you. And now I encrypt my secret phrase. I register two fingers. This is encrypted, ciphertext of doccat and AA. And you put this encrypted phrase many places. And the event of emergency, you download this encrypted text and decrypt doccat AA. Thank you very much. Oh, thank you very much. I'm a little bit nervous, sometimes fail. Okay, please change. This picture shows our core technology and you may be interested in our technology. Our key generation module, you input your fingerprint date. Then this module output the secret key, your finger, which is made by your biometrics future. So the second time you input your finger, then the same secret key is outputted. This is very difficult because fingerprint information from the camera always has small fluctuations. So we have to observe that. So this is very difficult and only our company achieved that. And you may think, what is the difference from the ordinary conventional biometrics authentication? The top picture shows the ordinary like face ID or touch ID or bi-form biometrics authentication. You input your fingerprint, for example, then stored fingerprint image is calculated matching score. And matching score is higher than some threshold. Then stored secret key is activated. This is the ordinary biometrics authentication. So this secret key is nothing to do with your biometrics data. So this secret key is randomly generated by a smart phone or PC. So if you lose your smart phone, you also lose your secret key. You cannot recover that. But our system, you can generate your secret key from software area using our device. Then if you lose your smart phone or PC, then no problem because you buy another smart phone and install the same application, then you can generate the same secret key. So this is a new architecture of secret key management. Okay, the second application, proof of origin for NFT. This is a very, very short presentation. Now I introduced secret key management. But this is another application. Now we are applying this technology to NFT. NFT, our technology allows you can generate your digital signature using your finger. So this secret key is generated by your finger. Then we can prove this digital signature come from your finger, which means we can achieve like an autographed signed board in the physical world. So for example, some famous sports player generate his or her NFT, then he or she put his finger, my device, then he can generate his digital signature from his finger. That is just an autographed sign. So we believe this technology makes a valuable NFT for fans. So we are applying this technology to NFT market. And today I have a demonstration of that. If you have an interest in this technology, please catch me after the session. Okay, thank you for your attention. If there's any questions, I have a question, though. Can you tell us a little bit about which hyperledger projects you're using? Sorry, thank you. Thank you for your mention. Now, of course, we apply this technology, Hyperledger Fabric and Hyperledger Indies. So today I introduced the management of the secret phrase. But this technology can apply not only secret phrase, but also secret key or some other secret information. Now we already applied this technology, Hyperledger Fabric, the secret key and Hyperledger Indies wallet data. So unfortunately today, lack of time, so I cannot introduce that. But actually we have a product for key management system using this device for Hyperledger Fabric. Thank you. There's a great presentation that the team did at Hyperledger Global Forum, really focusing down on the technology side. Any questions? Hi, I'm Wodimita. Hello, nice meeting you. So yesterday I did a presentation on an elder wand, so wanted to know if that biometric is transferable to another physical asset like items or merchandise, or are you only able to do it currently on the... You mean now another model like a face? So let's say if you want to put it on an item, like a wand or like any kind of other merchandise so that if, let's say, another company wants to use your biometric to unlock their decentralized ID or is it possible to use that? Yes, yes. I think this is just the user authentication that you can use. So we can apply many applications. For example, in Japan, actually, bank system employs that system. And the other system, you enter the building facility, then you put your finger. So now, just curious, my interest in blockchain. So now apply that blockchain. I'm just curious, whether your finger vein would remain the same from the day you was born until after death? You mean the finger vein? Finger vein, right. Whether it remains the same from the day you was born until after death? That's very... Or what happened when you get injured? Okay, the first question. Actually, we, Japanese bank system, we recommend you should register one year per one year. So for child, change repeatedly, so a half year, you should register again. But our experimental, in adult, 10 years, you cannot change, you do not change finger vein data. So, yeah, but we recommend now one year register. And the second question, if you cut your finger, at first, you have to go to hospital. But, yeah, if you use your finger, it's a big problem for you. But in that system, not so problem, because you register two fingers or three fingers. Yes, so... Thank you. You have 10 of them to get through. Just a quick clarification, sir. Did you say finger vein or did you say fingerprint? You said finger vein, that's actually being identified on the finger, not the fingerprint, is that right? Not fingerprint, fingerprint. Finger vein, okay, gotcha. The reason why we employ finger veins, I think fingerprint is not secure. You know, you upload your picture in your Instagram, we can extract your fingerprint information. But finger vein, the internal data, so that is difficult to extract finger vein information. So actually we use infrared special camera. So, for example, yeah, we think fingerprint is not secure. So if somebody were to get a copy of your finger vein, however means that they do it, then they can basically use that as a means to key to make NFTs using your name. Is that right? I'm sorry? So once somebody gets a copy of your finger vein, however that is done, they can basically use that to generate that key to... Yes, if someone make a complete copy, then he can use my secret key. Of course, that is not a problem. That is not only our biometrics authentication, but also all biometrics authentication has the same problem. So, yeah, but the copy of a finger vein is very difficult. All they have to do is put a little device in their little sensor and copy, you know? A hacker does it put it in there? Some hacking malware installed our device? Like the credit cards, they put credit cards in the ATM machines, put it in the credit card again, and they copy the information. So they do the same idea. Put a little bug into your machine, and copy your finger vein information in the capture, you know? Yeah. Just a thought. Yeah. Please use... I'm really excited about when my Japanese baseball NFT is coming, Ken. I think I asked for one of those the last time I saw the demo, which I think is a great demo. Really, if you think about autographing and authenticity with physical objects, and if we could tie it, you know, into a biometric signature on an NFT of that then is a digital representation of the physical item that you have, I think it's a really fantastic and fun use case as well. So, Ken, thank you so much for presenting today and for sharing some of the work that you've done. So I want to thank everybody again for joining the Hyperledger Suposium. As I mentioned before, the Hyperledger Foundation is an open community. We encourage all of you to participate. If you are building using Hyperledger Tech today, come on over to the booth if you haven't talked to us yet and tell us what you're building, and we'd love to hear from you. If you want to participate, go to hyperledger.org. There's special interest groups. There are working groups. There's projects. I mean, you can have a lifetime of information and fun within our community, and I encourage you to do that. Do come and visit us. We're going to be here for a little bit while longer, and I look forward to seeing you all in the Hyperledger Foundation Global Community, and thanks again for staying today.