{"id":13990,"date":"2020-10-02T02:30:08","date_gmt":"2020-10-02T06:30:08","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=13990"},"modified":"2021-08-26T22:40:58","modified_gmt":"2021-08-27T02:40:58","slug":"biometrics-and-information-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/","title":{"rendered":"Biometrics and information security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Since ancient times, people have devised various means and methods of keeping their valuable papers and valuables from prying eyes or from the hands of thieves, and every time thieves develop their methods of breaking locks, people resort to improving their defenses, and the conflict continues to this day and there is no indication that it stopped in one day the days.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the modern methods in circulation in the hands of everyone is to set a password for their computers and mobile phones, and even to enter them into some places. Passwords at first were only numbers, then they became a mixture of numbers and letters. Within these protected systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As a result of the repeated piracy operations and the development of &#8220;hackers&#8221; their methods of fraud, many countries and major <\/span><a href=\"https:\/\/trendswide.com\/\"><span style=\"font-weight: 400;\">technology<\/span><\/a><span style=\"font-weight: 400;\"> companies began to search for more effective means to preserve the security of their information, and from here was the mass migration towards &#8220;biosecurity&#8221; or what is also called &#8220;biometrics&#8221;.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What are biometrics?<\/span><\/h2>\n<p><a href=\"https:\/\/www.m2sys.com\/\"><span style=\"font-weight: 400;\">Biometrics<\/span><\/a><span style=\"font-weight: 400;\"> simply are any metrics related to human features, and it is a security mechanism that is used to authenticate and provide access to a specific facility or system based on automatic and immediate verification of an individual&#8217;s physical characteristics, and since biosecurity assesses an individual&#8217;s physical elements or biological data, it is one of the most powerful security techniques. Physical used to verify identity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the most popular examples of a biometric system is the fingerprint and facial recognition technology of smart mobile devices currently in use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Biosecurity is primarily applied in environments with critical physical security requirements or that are highly prone to identity theft, where systems or engines that rely on biosecurity store characteristics of the human body that do not change over an individual&#8217;s lifetime, including fingerprints, texture, sound, hand patterns, and recognition. The face and the iris of the eye.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And unlike passwords or other means of protection, biometric data cannot be forgotten, exchanged or stolen, and neither can it be forged. According to calculations made by Sir Francis Galton (Darwin&#8217;s cousin), the probability of finding two similar fingerprints is one in 64 billion possibilities. .<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The biometric system consists of three different components:<\/span><\/h3>\n<p><b>1- Sensors<\/b><span style=\"font-weight: 400;\">: It is the one that records the user&#8217;s identifying information.<\/span><\/p>\n<p><b>2- Computers<\/b><span style=\"font-weight: 400;\">: Whether you use your vital information to access a computer or anything else, there must be a computer that stores the information for comparison.<\/span><\/p>\n<p><b>3- Software<\/b><span style=\"font-weight: 400;\">: A program is basically what connects computers to a sensor.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How do biometrics work?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When an individual is enrolled in the biometric security system, the specific sensor captures several points on the surface of the part to be approved as a protection reference, for example, Apple&#8217;s <\/span><a href=\"https:\/\/trendswide.com\/\"><span style=\"font-weight: 400;\">iPhone<\/span><\/a><span style=\"font-weight: 400;\"> X facial recognition technology displays 30,000 infrared points on the user&#8217;s face to authenticate the user from Through matching patterns. The sensor adopts these points as semantics on which to build what is called a signature algorithm or a dynamic template.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The registered template for each user is a mathematical representation (algorithm), the algorithm cannot be redesigned or recreated so it cannot be falsified, and the template for future comparison is stored in a central database, and when identification is required, the reader reads the individual&#8217;s characteristics in each new scan , And the identification features from the reader are compared with the stored template to determine if there is a match.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The types of biometrics available today :<\/span><\/h3>\n<p><b>1- Hand recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Based on measuring and recording the length, thickness, width and surface area of a person&#8217;s hand, these devices date back to the 1980s and were commonly used in security applications.<\/span><\/p>\n<p><b>2- Fingerprint scanning technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Captures a unique pattern of hills and valleys on a finger, many smartphones and some laptops use this technology as a kind of password to unlock the screen.<\/span><\/p>\n<p><b>3- Iris recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It identifies the unique patterns of a person&#8217;s iris, the colored area of \u200b\u200bthe eye surrounding the pupil, and although it is used widely in safety applications, it is not commonly used in the consumer market.<\/span><\/p>\n<p><b>4- Voice recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It measures the unique sound waves in the user&#8217;s voice while talking to the device, it may be used by your bank to verify your identity when connecting to your account, or you can use it when giving instructions to a smart speaker such as Amazon&#8217;s Alexa.<\/span><\/p>\n<p><b>5- Behavior recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It analyzes the way you interact with a computerized system. Keystroke, handwriting, the way you walk, how you use the mouse, and other movements can assess your identity and your knowledge of the information you enter.<\/span><\/p>\n<p><b>6- Facial recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It measures the unique patterns of a person\u2019s face by comparing and analyzing facial features. It is used in security and law enforcement but also as a method for authentication and unlocking of devices such as smartphones and laptops.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Types of biometrics are being developed:<\/span><\/h3>\n<p><b>1- Idea recognition technology<\/b><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;The brain&#8217;s password&#8221; or &#8220;my thoughts are the password&#8221;: It is a digital reading of the brain&#8217;s activity when it looks at a group of pictures. When a person looks at a group of pictures or hears a piece of music, their brain reacts and responds in a way that enables researchers to measure it by means of designed sensors for this purpose.<\/span><\/p>\n<p><b>2- User recognition technology through the ear<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Researchers from New York University have come up with a new technology called EarEcho, their new biometric tool, that uses sound waves to identify users based on the unique geometry of the sound channel.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Are biometrics safe?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Given that data breaches have become an inevitable part of our digital world, this means that biosecurity does not have a long-term future before it is also compromised, although it is impossible to forge or steal it, but it&#8217;s penetration does not come from them, but rather from the databases that store them.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This in itself is a force majeure weakness for her. If these rules are breached and the biometrics are stolen, it cannot be reset again, as a person cannot change his fingerprint or change his face or iris.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Since ancient times, people have devised various means and methods of keeping their valuable papers and valuables from prying eyes<\/p>\n","protected":false},"author":398,"featured_media":16505,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[39],"class_list":["post-13990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics and information security - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics and information security - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Since ancient times, people have devised various means and methods of keeping their valuable papers and valuables from prying eyes\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-02T06:30:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-27T02:40:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/biometrics-and-information-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"455\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Biometrics and information security\",\"datePublished\":\"2020-10-02T06:30:08+00:00\",\"dateModified\":\"2021-08-27T02:40:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\"},\"wordCount\":1021,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\",\"name\":\"Biometrics and information security - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-10-02T06:30:08+00:00\",\"dateModified\":\"2021-08-27T02:40:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics and information security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics and information security - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics and information security - Digital Transformation of Government Services","og_description":"Since ancient times, people have devised various means and methods of keeping their valuable papers and valuables from prying eyes","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-10-02T06:30:08+00:00","article_modified_time":"2021-08-27T02:40:58+00:00","og_image":[{"width":800,"height":455,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/10\/biometrics-and-information-security.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Biometrics and information security","datePublished":"2020-10-02T06:30:08+00:00","dateModified":"2021-08-27T02:40:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/"},"wordCount":1021,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/","name":"Biometrics and information security - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-10-02T06:30:08+00:00","dateModified":"2021-08-27T02:40:58+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-and-information-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics and information security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Linda J. Brannon","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13990"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=13990"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13990\/revisions"}],"predecessor-version":[{"id":16506,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/13990\/revisions\/16506"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16505"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=13990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=13990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=13990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}