{"id":14279,"date":"2020-12-23T04:40:44","date_gmt":"2020-12-23T09:40:44","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=14279"},"modified":"2023-09-11T07:09:58","modified_gmt":"2023-09-11T11:09:58","slug":"what-role-will-biometric-authentication-play-in-the-post-pandemic-world","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/","title":{"rendered":"What Role Will Biometric Authentication Play in the Post-pandemic World?"},"content":{"rendered":"<p>The global pandemic has fundamentally changed the way we live and work. To prevent the spread of coronavirus, scientists and industry leaders are looking for ways to leverage existing technologies to address novel problems. One of these technologies is biometric identification.<\/p>\n<p>Biometrics, supported by machine learning development services, is already helping many organizations in their battle against COVID-19. Biometric scanners deployed in the workplace (or any crowded place) can identify infected individuals even before they feel the symptoms themselves. Moreover, biometrics can add a layer of security to organizational data that, due to widespread work from home arrangements, is accessed from different devices and locations.<\/p>\n<h2>What is Biometrics?<\/h2>\n<p>The first commercial use of biometrics dates back to 1858. William James Herschel, a British administrator in India, was in charge of building roads in Bengal during a time of unrest. Herschel asked local subcontractors to sign contracts with their fingertips so that he could track them down if they decided to abandon the job site.<\/p>\n<p><strong>Biometrics include an individual\u2019s physical and behavioral characteristics; they are unique (even for twins) and can be reliably used as a means of identification.<\/strong><\/p>\n<p><strong>Physical biometrics<\/strong> include fingerprint mapping, iris scanning, and voice recognition, among others. An example of <strong>behavioral biometrics<\/strong> is on-screen behavior, such as mouse movement and keystroke dynamics. Behavior biometrics even extends to the way each person sits and walks.<\/p>\n<h3>Biometrics in the Pre-pandemic Era<\/h3>\n<p>Back in 2018, enterprises already recognized biometrics as an effective method of enforcing security. According to the Ping Identity Survey, 92% of participants perceived biometrics as an \u201ceffective\u201d or \u201cvery effective\u201d way of securing the data stored on-premise.<\/p>\n<p>During the same year, Spiceworks conducted another survey revealing that 62% of responding companies already have some form of biometric authentication in place, while an additional 24% were planning to install such a system in the coming two years.<\/p>\n<p>The participants that were delaying the use of biometrics cite technology costs as the main factor, followed by reliability concerns.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14281\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/biggest-barrriers-to-adopting-biometric.png\" alt=\"biggest-barrriers-to-adopting-biometric\" width=\"880\" height=\"664\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/biggest-barrriers-to-adopting-biometric.png 880w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/biggest-barrriers-to-adopting-biometric-600x453.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/biggest-barrriers-to-adopting-biometric-768x579.png 768w\" sizes=\"(max-width: 880px) 100vw, 880px\" \/><\/p>\n<p>Multiple forms of biometrics are used by companies to secure access to their IT systems. In 2019, the most popular form of biometric authentication was fingerprint recognition.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-14280\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/types-of-biometric-technologies.png\" alt=\"types-of-biometric-technologies\" width=\"880\" height=\"657\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/types-of-biometric-technologies.png 880w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/types-of-biometric-technologies-600x448.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/types-of-biometric-technologies-768x573.png 768w\" sizes=\"(max-width: 880px) 100vw, 880px\" \/><\/p>\n<h2>How to Leverage Biometrics During the Pandemic<\/h2>\n<p>Biometrics can help resolve a host of pandemic-related problems, namely limiting the spread of coronavirus by identifying the carriers and enhancing authentication mechanisms in companies conducting business online.<\/p>\n<h3>Challenge 1: Limiting the Spread of COVID-19<\/h3>\n<p>Since the beginning of the pandemic, people have been searching for ways to minimize the spread of the infection. Identifying the carriers early on and isolating them plays an important role. Biometrics not only detect the potentially sick but also point out individuals who do not adhere to the safety measures, such as wearing masks and using hand sanitizer.<\/p>\n<p><strong>Sports Stadiums Use Facial Recognition to Detect Fans Neglecting Coronavirus Precautions\u00a0 <\/strong><\/p>\n<p>When sports activities fully reopen, stadiums will need a way to control the crowd and ensure all the necessary precautions are in place.<\/p>\n<p>The Los Angeles Football Club is updating their virtual ticketing technology with biometric capabilities. It can already perform temperature scans and detect individual spectators that are not wearing masks. Upon entrance, every guest will be required to remove their mask for a facial scan.<\/p>\n<p>European soccer clubs are hoping to follow the US lead and employ facial recognition systems too. However, European regulators are already concerned that such authentication systems could be an invasion of individual privacy secured under the General Data Protection Regulation (GDPR).<\/p>\n<p><strong>A<\/strong> <strong>Fire Department Takes Care of Firefighters with Biometric Rings<\/strong><\/p>\n<p>Employers are using biometrics to spot infected individuals at work and offer immediate help.<\/p>\n<p>For example, the Duxbury Fire Department, Massachusetts, supplies its staff with biometric rings, which help recognize individuals who\u2019ve contracted the virus. These rings track firefighters\u2019 vital signs and sleep cycles to identify when they are the most susceptible to coronavirus (or any other disease). The data from every ring is analyzed and transferred to the corresponding firefighter\u2019s smartphone.<\/p>\n<p>Such rings cost $300, and the fire department is distributing the devices on a voluntary basis. The experiment has been a success, with 90% of the firefighters volunteering to try it out. As the Fire Chief Kevin Nord mentioned:<\/p>\n<p><em>\u201cI just wanted to give the men and women another tool to keep them healthy.\u201d<\/em><\/p>\n<p><strong>Voice Recognition as a New Tool to Spot Infections\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p>Another example is Sonde Health, a healthcare organization that is <a href=\"https:\/\/www.biometricupdate.com\/202008\/sonde-health-purchases-neurolex-labs-voice-platform-and-500k-biometric-samples#:~:text=Sonde%20Health's%20voice%20biometrics%20system,breath%2C%20chest%20tightness%20or%20pain.\">using voice recognition<\/a> to identify infected healthcare workers. The solution employs machine learning to six-second voice samples to spot COVID-19 symptoms such as coughing, shortage of breath, and chest pain. David Liu, the CEO of Sonde said:<\/p>\n<p><em>\u201cAt Sonde, we have unlocked voice as a new vital sign to enable secure, accessible, and non-intrusive monitoring of health.\u201d <\/em><\/p>\n<h3>Challenge 2: Enhancing Enterprise Security<\/h3>\n<p>With the start of the pandemic, an overwhelming amount of the workforce moved to work remotely. According to a survey by Gartner, almost half of the participating organizations reported <a href=\"https:\/\/www.gartner.com\/en\/newsroom\/press-releases\/2020-04-14-gartner-hr-survey-reveals-41--of-employees-likely-to-\">at least 81% of their employees<\/a> are working from home, and 41% are likely to adopt the WFH policy for a longer period.<\/p>\n<p>With this work paradigm, online resources and personal devices are heavily used, giving hackers an opportunity to interfere. The FBI\u2019s cybercrime division reports receiving around 4,000 cybersecurity complaints a day, which is 400% of its 2019 volume.<\/p>\n<p>As a result, enterprises are searching for more reliable ways of securing their data, especially when conventional passwords seem to work as an invitation for security breaches. Biometrics presents a convenient form of authentication, as people can\u2019t lose or forget them, and they can\u2019t be stolen or cracked.<\/p>\n<h4>Traditional Passwords Fail to Prevent Security Breaches<\/h4>\n<p>Even prior to the pandemic, passwords presented a weak spot in enterprise security. Even though they are easy to replace when compromised, they are also easy to steal, and sometimes even guess. Enterprise employees are facilitating hacking even further, as 99% of them are reusing their passwords across networks. A Verizon Data Breach Investigations Report showed that 80% of hacking-related data breaches benefited from lost\/weak credentials.<\/p>\n<p><strong>Breach Examples<\/strong><\/p>\n<p>As WFH policies are now widely adopted by most organizations, video conferencing apps like Zoom have become commonplace. After a series of hacking incidents, 500,000 Zoom passwords were up for sale on the dark web for $0.002 per credential. As a result of this, some government agencies are requiring contractors to remove Zoom from devices they use for work.<\/p>\n<p>In May of this year, Magellan Health was struck by a well-planned cyberattack. Hackers installed malware to intercept employee credentials and use them to access sensitive patient information. Around 365,000 patients were impacted.<\/p>\n<h4>Biometrics as a More Reliable Authentication Solution<\/h4>\n<p>As established above, biometrics play an important role in security, as they present a reliable identification solution. However, not all types of biometric authentication are in equal demand. For example, contact-based biometric systems placed in public spaces tend to scare people away. Consequently, ABI Research predicted the global biometric market <a href=\"https:\/\/www.abiresearch.com\/press\/covid-19-pandemic-pummels-biometrics-market-causing-device-revenues-drop-us2-billion-while-forcing-investment-surge-ai-face-recognition-applications\/\">to lose around $2 billion<\/a> during 2020. This loss is mainly attributed to the reduced demand in contact-based biometric solutions.<\/p>\n<p>According to Mohammed Murad, Vice President of Global Sales and Business Development at Iris ID:<\/p>\n<p><em>\u201cWe feel very strongly that under the circumstances now and previously, in the majority of cases, customers do want something that is non-contact, accurate, and frictionless.\u201d\u00a0<\/em><\/p>\n<p>However, this is not the end of contact-based biometrics. People are still comfortable using them on their personal devices such as PCs and smartphones.<\/p>\n<p><strong>Examples of Biometric Authentication<\/strong><\/p>\n<p>In 2019, NatWest became the first bank to issue biometrics-based credit cards, using the owner&#8217;s fingerprints for payment authorization. With this security measure, even if the card is stolen or its number is intercepted, the thief can\u2019t initiate any transactions.<\/p>\n<p>Barclays, an international banking chain, was among the pioneers employing voice-based customer authentication. When a customer calls, they are identified from the first few words of the conversation. This method protects the bank\u2019s support team from processing fraudulent calls.<\/p>\n<h4>Privacy<\/h4>\n<p>For some users, biometrics are raising privacy concerns. Most of the time, authentication systems are not limited to collecting biometric data. They also capture where and when the person was at the time of scanning. People are aware that companies store their biometric data, but they don\u2019t know how secure it is, or if and how this data is being processed. Some might find later that this data was used without their permission on \u201cside projects.\u201d<\/p>\n<p>Two Illinois residents filed a lawsuit against tech giants IBM, Amazon, and Microsoft for using images of their faces without permission to train a facial recognition system. This violates the Biometric Information Privacy Act, which was passed in Illinois over a decade ago. Earlier this year, Facebook paid $550 million on a lawsuit stemming from the same regulation.<\/p>\n<p>Privacy concerns related to biometrics are particularly challenging for enterprises operating on an international scale as they might need to transfer biometrics across geographical borders. In this case, it is essential to understand privacy laws in your location of operation. To reduce the risk, store and process all biometric data on one local device. This practice will also reassure your employees their data will not be maliciously accessed as it can be with the cloud.<\/p>\n<h2>The Future of Biometrics<\/h2>\n<p>Thanks to advances in machine learning, biometric authentication is gaining reliability. Researchers are investigating the possibility of adopting behavioral biometrics and are coming up with new authentication modalities. Moreover, there are studies on privacy-preserving technologies such as zero-knowledge cryptography that enable secure storage of biometric data.<\/p>\n<p>Experts predict that in the future, biometrics might be used in combination with password-like credentials. This is especially convenient for enterprises with locations in different parts of the world. These companies can use passwords when accessing resources across borders to mitigate issues related to GDPR and other legislation that prohibits transferring biometrics.<\/p>\n<p>Continued intensive research will make biometrics even more secure in the future. However, if a company uses a weak, outdated system and user biometric data is breached, it will be a challenge to recover as biometrics are forever linked to a particular individual and can\u2019t be easily replaced like passwords.<\/p>\n<h1>Getting Started with Biometrics<\/h1>\n<p>Biometrics was in use even before the pandemic due to their convenience and reliability, and they are even more relevant now, as many business transactions occur online.<\/p>\n<p>Before deciding on the best fitting biometric recognition method for your facility, think about the following aspects:<\/p>\n<ul>\n<li>Identify the type of authentication you already have and what you can replace. If you installed an access card system, maybe it is best to replace it with a touch-free biometric recognition technology so that employees who often lose or forget their cards will still have access.<\/li>\n<li>Decide whether you want to employ a one-factor-authentication or prefer a multimodal approach.<\/li>\n<li>Make sure you guard your employees\u2019 privacy and be careful with storing and using biometric data.<\/li>\n<li>Check how your approach to biometrics corresponds to the legislation in your country.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>The global pandemic has fundamentally changed the way we live and work. To prevent the spread of coronavirus, scientists and<\/p>\n","protected":false},"author":398,"featured_media":16545,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[],"class_list":["post-14279","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The global pandemic has fundamentally changed the way we live and work. To prevent the spread of coronavirus, scientists and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2020-12-23T09:40:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-09-11T11:09:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/List-no-27.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"What Role Will Biometric Authentication Play in the Post-pandemic World?\",\"datePublished\":\"2020-12-23T09:40:44+00:00\",\"dateModified\":\"2023-09-11T11:09:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\"},\"wordCount\":1818,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\",\"name\":\"What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2020-12-23T09:40:44+00:00\",\"dateModified\":\"2023-09-11T11:09:58+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"What Role Will Biometric Authentication Play in the Post-pandemic World?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/","og_locale":"en_US","og_type":"article","og_title":"What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services","og_description":"The global pandemic has fundamentally changed the way we live and work. To prevent the spread of coronavirus, scientists and","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2020-12-23T09:40:44+00:00","article_modified_time":"2023-09-11T11:09:58+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2020\/12\/List-no-27.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"What Role Will Biometric Authentication Play in the Post-pandemic World?","datePublished":"2020-12-23T09:40:44+00:00","dateModified":"2023-09-11T11:09:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/"},"wordCount":1818,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/","name":"What Role Will Biometric Authentication Play in the Post-pandemic World? - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2020-12-23T09:40:44+00:00","dateModified":"2023-09-11T11:09:58+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/what-role-will-biometric-authentication-play-in-the-post-pandemic-world\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"What Role Will Biometric Authentication Play in the Post-pandemic World?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Guest","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14279"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=14279"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14279\/revisions"}],"predecessor-version":[{"id":20110,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14279\/revisions\/20110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/16545"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=14279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=14279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=14279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}