{"id":12556,"date":"2020-04-14T08:50:39","date_gmt":"2020-04-14T12:50:39","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=12556"},"modified":"2022-06-20T01:39:22","modified_gmt":"2022-06-20T05:39:22","slug":"biometric-integration-in-web-application-security-for-web-apps","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/","title":{"rendered":"Biometric Integration in Web Application: Security for Web Apps"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-12557\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S.jpg\" alt=\"\" width=\"1840\" height=\"1228\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S.jpg 1840w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S-600x400.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S-1024x683.jpg 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S-768x513.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S-1536x1025.jpg 1536w\" sizes=\"(max-width: 1840px) 100vw, 1840px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">In the modern era, web applications form an integral part of the global market share by delivering customized experiences to the end-users. With 4.54 billion active users on the Internet, the business organizations out there can leverage the immense potential of the web apps to enhance the overall user experiences.\u00a0<\/span><\/p>\n<p><b>Role of Web Applications in the Modern Era<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Web applications are known to deliver a wide spectrum of benefits to both businesses as well as users. These are easily accessible via web browsers and can work as effectively as an application installed locally. With web-based applications, you do not need to install or maintain the same.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Moreover, with web applications, the organizations are no longer required to allocate the respective resources towards maintaining them locally. This has accelerated the process of adopting<\/span><a href=\"https:\/\/www.brainvire.com\/\"> <b>high-end web applications development<\/b><\/a><span style=\"font-weight: 400;\"> with advanced features.\u00a0<\/span><\/p>\n<p><b>The Rise of Web Applications<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Computing, in the modern era, is shifting towards mobility. Mobility turns out to be one of the primary requirements of the modern tech-savvy users. As technology advances and connectivity becomes seamless, <\/span><a href=\"https:\/\/www.cloudapper.com\"><b>web-based business applications<\/b><\/a><span style=\"font-weight: 400;\"> are becoming increasingly appealing due to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">the overall ease of access<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">flexibility<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">a myriad of other potential benefits like scalability\u00a0<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">There are several factors that help in making web applications more widespread and appealing to businesses &amp; end-users. Increased internet accessibility, advancements in the latest web development technologies, improved bandwidth, the involvement of leading giants like Google, Microsoft, Amazon, and so more, competitive pricing for subscriptions, and so more \u2013all of these have helped in making web applications popular.\u00a0<\/span><\/p>\n<p><b>Security for Web Apps<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Security is an important factor to consider when we are talking about web applications. This is because web applications are easily accessible \u2013with a simple URL. Unlike applications that are installed locally \u2013information is usually stored &amp; secured with some physical security access control, the web-based applications do not receive this benefit.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the advent of new, innovative technologies, APIs, and security standards, it is imperative to make use of other advanced security measures, including USB token, biometrics, and so more.\u00a0<\/span><\/p>\n<p><b>Web Applications &amp; Biometrics<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Towards revamping users\u2019 security for web apps, businesses across the world are leveraging the potential offered by biometrics. A reliable biometric authentication software solution for web-based applications can ensure the setting-up process is quite simple &amp; seamless.<\/span><\/p>\n<p><b>Rising Up from the Password Era<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Conventionally, we used passwords for protecting accounts of the users on most of the web applications. However, there is no denying the fact that passwords are highly obsolete methods of ensuring user authentication in the modern era. Passwords not only slow down the overall authentication process, but they are also highly prone to be compromised in one way or the other.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The biometric solution is known to offer an ultimate solution to eliminating all inadequacies in a typical password authentication system. The advanced biometric technology leverages the immense behavioural and physiological characteristics of human beings to uniquely identify individuals and improve the overall security system.<\/span><\/p>\n<p><b>The Implementation of a Biometric Authentication Software System<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The implementation process of a biometric authentication system on local applications has become a very simple task. This is because most of the operating systems out there provide a native ability to ensure biometric recognition. Still, implementing this feature on web-based applications can be slightly complicated.\u00a0<\/span><\/p>\n<p><b>Biometric Tools<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There are several biometric service providers out there delivering the ease of using SDKs or tools to initialize the biometric authentication system on web-based applications. Before you select the SDK or tool for setting up the biometric authentication system on a particular web application, it is imperative to select the biometric modality of your choice.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As biometric recognition features tend to be typically different from each other, there is no implementation of the one-size-fits-all approach.\u00a0<\/span><\/p>\n<p><b>Some of the additional benefits are:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The utilization of an advanced biometric authentication software solution makes the entire implementation process highly manageable.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The programmer or the implementer is capable of focusing on achieving the desired objectives rather than investing time in the development of specific functionalities.\u00a0<\/span><\/li>\n<\/ul>\n<p><b>Biometric SDKs<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Biometric authentication SDKs can be highly specific to the hardware in use. Therefore, again there is no involvement of the one-size-fits-all approach. Most of the biometric authentication software solution providers offer the services at the overall cost of license on a per PC basis.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">An example of the same is:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The innovative <\/span><a href=\"https:\/\/www.m2sys.com\/hybrid-biometric-platform\/\"><b>Hybrid Biometric Platform<\/b><\/a><span style=\"font-weight: 400;\"> by M2SYS is an advanced multimodal biometric SDK. It is known to offer the businesses a highly cost-effective way of leveraging the cutting-edge biometric solutions.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Using the solutions, the organizations are able to focus on the core operations.<\/span><\/li>\n<\/ul>\n<p><b>Biometric API<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Today with the innovation of biometric identification service over restful API technology, any web <a href=\"https:\/\/www.v3cube.com\/\">app developer<\/a> can add biometric identification functionality within a few hours. One of the best solutions currently available in the market is <\/span><strong><a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system-api\/\">CloudABIS\u2122<\/a><\/strong><span style=\"font-weight: 400;\"> &#8211; a superscalar, biometrics-as-a-service (BaaS) matching system that removes the burden &amp; cost associated with building and maintaining an on premise biometric identification system. It also supports a wide range of biometric scanners and different modalities including fingerprint, finger vein, iris, and facial recognition.<\/span><\/p>\n<p><b>Conclusion<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Web applications are gaining popularity in both personal as well as corporate use cases.<\/span>As biometrics continue overtaking most of the authentication systems across the globe, it is high time that businesses should look for an easy &amp; convenient way to ensure\u00a0 security for web apps.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the modern era, web applications form an integral part of the global market share by delivering customized experiences to<\/p>\n","protected":false},"author":383,"featured_media":12557,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[591,1456,1457],"class_list":["post-12556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-technology","tag-biometric-integration","tag-web-apps","tag-web-apps-security"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"In the modern era, web applications form an integral part of the global market share by delivering customized experiences to\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-14T12:50:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-20T05:39:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1840\" \/>\n\t<meta property=\"og:image:height\" content=\"1228\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc\"},\"headline\":\"Biometric Integration in Web Application: Security for Web Apps\",\"datePublished\":\"2020-04-14T12:50:39+00:00\",\"dateModified\":\"2022-06-20T05:39:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\"},\"wordCount\":905,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric integration\",\"Web apps\",\"web apps security\"],\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\",\"name\":\"Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-04-14T12:50:39+00:00\",\"dateModified\":\"2022-06-20T05:39:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Integration in Web Application: Security for Web Apps\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services","og_description":"In the modern era, web applications form an integral part of the global market share by delivering customized experiences to","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-04-14T12:50:39+00:00","article_modified_time":"2022-06-20T05:39:22+00:00","og_image":[{"width":1840,"height":1228,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/04\/man-coding-in-office-LHVW23S.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc"},"headline":"Biometric Integration in Web Application: Security for Web Apps","datePublished":"2020-04-14T12:50:39+00:00","dateModified":"2022-06-20T05:39:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/"},"wordCount":905,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric integration","Web apps","web apps security"],"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/","name":"Biometric Integration in Web Application: Security for Web Apps - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-04-14T12:50:39+00:00","dateModified":"2022-06-20T05:39:22+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometric-integration-in-web-application-security-for-web-apps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Integration in Web Application: Security for Web Apps"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Matt Gibson","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12556"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=12556"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12556\/revisions"}],"predecessor-version":[{"id":12635,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/12556\/revisions\/12635"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/12557"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=12556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=12556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=12556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}