{"id":19510,"date":"2023-02-14T05:47:56","date_gmt":"2023-02-14T10:47:56","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=19510"},"modified":"2024-05-30T05:14:57","modified_gmt":"2024-05-30T09:14:57","slug":"how-to-implement-biometric-functionality-in-any-web-application","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/","title":{"rendered":"How to Implement  Biometric Functionality in any Web Application"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Biometric identification technology has evolved significantly over the years. Initially, biometric identification was used primarily for large-scale government projects such as national ID cards, passports, law enforcement and other <a href=\"https:\/\/www.m2sys.com\/egovernment-solutions\/\">eGovernance solutions<\/a>. The technology was complex and expensive, making it inaccessible to the average business organization. However, as the demand for more secure forms of identification grew, the technology became more accessible and affordable.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Today, biometric identification is used in many applications, including<a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis-border-control-and-border-protection\"> border control<\/a>, banking, healthcare, and even most enterprises use biometric identification to manage their workforce. The technology has become much more user-friendly, with many biometric identification systems relying on the iris, facial recognition, and fingerprint scanning. Biometric identification is now more accessible to developers, with many biometric APIs available for integration into a wide range of applications. As a result, the use of biometric identification is becoming increasingly widespread. It is expected to continue to grow in the coming years. This blog will give a step-by-step process to add biometric functionality to any web application.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Biometric Capture Tool &amp; Matching Engine\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Integrating biometric functionality into a web application requires a biometric device, a <a href=\"https:\/\/www.m2sys.com\/cloudscanr-application-for-biometric-device-integration-with-web-service\/\">biometric capture tool<\/a>, and a <a href=\"https:\/\/www.m2sys.com\/cloud-based-abis-automated-biometric-identification-system-api\/\">biometric matching engine<\/a>. In this context, CloudScanr will serve as the biometric capture tool, CloudABIS as the biometric matching engine, and the Prison secure application from M2SYS eGov will be used to demonstrate the integration process. In order to proceed with the setup, it is important to gain a fundamental understanding of both the biometric capture tool and the matching engine.\u00a0<\/span><\/p>\n<p><b>Biometric Capture Tool: <\/b><span style=\"font-weight: 400;\">You can use any biometric device to capture your biometric data. Once the capture tool completes biometric data capturing, the capture tool will initiate the API call and send the capture data to the biometric matching servers along with the required parameters. M2SYS CloudScanr is a dynamic capture tool that simplifies the process of integrating biometric hardware into web applications, eliminating the need for developers to worry about ActiveX, native code integration, or browser plug-ins. CloudScanr utilizes a web-based API that allows you to integrate capturing from various biometric devices into any windows or web-based application. It automates the ability to capture various kinds of biometric templates and image formats into a very simple-to-use framework.\u00a0<\/span><span style=\"font-weight: 400;\">With CloudScanr, the most popular biometric devices can be easily integrated, providing a seamless &#8220;plug and play&#8221; experience for the user.\u00a0<\/span><\/p>\n<p><b>Biometric Matching Engine: <\/b><span style=\"font-weight: 400;\">A biometric matching engine is a crucial software component that compares and matches biometric data with already enrolled templates stored in the database. The matching engine&#8217;s main objective is to compare an individual&#8217;s identity by determining if the biometric data collected from them matches the already enrolled template stored in the database. CloudABIS is a robust and scalable biometric identification system offered as a service (BaaS) that eliminates the challenges and expenses associated with constructing and maintaining a reliable biometric identification system. It supports multimodal matching with a single API call and all the user data is completely secure against various cyberattacks.\u00a0<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19513 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudABIS--600x308.jpg\" alt=\"CloudABIS\" width=\"600\" height=\"308\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudABIS--600x308.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudABIS-.jpg 659w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><br \/>\n<span style=\"font-weight: 400;\">To configure CloudABIS biometric API with your web application, please follow these straightforward steps:<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Setting Up CloudABIS Account<\/span><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudAbis-Signup.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-19515\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudAbis-Signup-600x456.jpg\" alt=\"CloudAbis Signup\" width=\"400\" height=\"304\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudAbis-Signup-600x456.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudAbis-Signup-768x583.jpg 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/CloudAbis-Signup.jpg 977w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">To start, the user must first <a href=\"https:\/\/identity.cloudabis.com\/?_gl=1*esv3qp*_ga*NTE3NzIzNzg2LjE2Njc1NTQ4Mjc.*_ga_4M462VW5VL*MTY3NjM1NzA2NS4xMTguMS4xNjc2MzcxMzA4LjQ0LjAuMA..&amp;_ga=2.27236861.1155436963.1676260507-517723786.1667554827\">create an account<\/a> on the CloudABIS portal. Once the registration process is complete, the user will be directed to a page where they must select the preferred biometric modality for their project. It is then necessary to name the project and save it for future reference.<\/span><\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">Collect the Biometric Credential\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Once an account is created, users will be given a 14-day trial period to test the software and determine whether they want to subscribe to CloudABIS based on their project or business needs. To configure the application, users must first obtain their biometric credentials, including the Matching API URL, Client API KEY, and the Client KEY. These credentials can be obtained by clicking on the \u2018Biometric Information\u2019 tab and selecting \u2018Subscription Keys\u2019.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential-.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19519 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential--600x205.png\" alt=\"Collect the Biometric Credential\u00a0\" width=\"600\" height=\"205\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential--600x205.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential--1024x349.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential--768x262.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Collect-the-Biometric-Credential-.png 1310w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<h2><span style=\"font-weight: 400;\">Download CloudScanr Capture Tool<\/span><\/h2>\n<h2><span style=\"font-weight: 400;\"> <a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Scanr.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-19520\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Scanr-600x371.png\" alt=\"Scanr\" width=\"400\" height=\"248\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Scanr-600x371.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Scanr-768x475.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Scanr.png 890w\" sizes=\"(max-width: 400px) 100vw, 400px\" \/><\/a><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Users can seamlessly integrate any biometric device with their Windows PC by downloading CloudScanr from the CloudABIS portal and installing it. Once CloudScanr is installed, users can easily connect their desired biometric device to their PC, select the device from CloudScanr, and save it. CloudScanr will take care of the rest by automatically installing the necessary driver and integrating the device for immediate use.<\/span><\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2><span style=\"font-weight: 400;\">Configure the Application with Biometric Credential\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">To configure and test the biometric credentials, we will utilize the M2SYS prison secure application. The first step is to download the application from the <a href=\"https:\/\/www.m2sys.com\/egovernment-software-solutions-marketplace\/\">M2SYS eGov Marketplace<\/a>. Once downloaded, users should click on the application icon and select &#8220;Edit Design&#8221; by clicking on the three dots.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential-.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19521 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential--600x264.png\" alt=\"Configure the Application with Biometric Credential\u00a0\" width=\"600\" height=\"264\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential--600x264.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential--1024x451.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential--768x338.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential--1536x677.png 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-with-Biometric-Credential-.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Once the &#8220;Edit Design&#8221; button is clicked, the Application Designer will open up. Users should then navigate to the &#8220;Options&#8221; tab and select &#8220;Biometric Setup&#8221; to proceed.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19522 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-600x265.png\" alt=\"Configure the Application\" width=\"600\" height=\"265\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-600x265.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-1024x452.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-768x339.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application-1536x678.png 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Configure-the-Application.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">At the Biometric Setup menu, users are required to select the specified device or modality they will be using, and configure the biometrics from this section. To do so, users need to copy and paste the biometric matching credential obtained from the CloudABIS portal. Once the credentials have been inputted, users should click the &#8220;Save&#8221; button to complete the setup process.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19523 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu-600x278.png\" alt=\"Biometric Setup menu\" width=\"600\" height=\"278\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu-600x278.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu-1024x474.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu-768x356.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu-1536x711.png 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Biometric-Setup-menu.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">After inputting the credentials, click save.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Register Biometric\u00a0<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Since we are using a secure prison application from M2SYS eGov, we will need to register the biometrics of an offender. This can be done by clicking on the &#8220;Administrator&#8221; button located in the upper menu and selecting the &#8220;Offender Contact List.&#8221; From there, users can select the name of the offender they wish to register, and if the person is not yet registered with biometrics, they can click on the &#8220;Register&#8221; button.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19524 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric-600x277.png\" alt=\"Register Biometric\" width=\"600\" height=\"277\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric-600x277.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric-1024x472.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric-768x354.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric-1536x708.png 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Register-Biometric.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">This will trigger an API call to CloudScanr, which will initiate the biometric capture process. Once the biometric data is captured and is converted to a base64 template, it will initiate an API call to send the captured data to CloudABIS API, along with the necessary parameters. Based on the request received, the capture tool will then communicate the corresponding response back to the application.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/API-call-to-CloudScanr.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19525\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/API-call-to-CloudScanr-600x384.png\" alt=\"API call to CloudScanr\" width=\"460\" height=\"294\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/API-call-to-CloudScanr-600x384.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/API-call-to-CloudScanr-768x492.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/API-call-to-CloudScanr.png 875w\" sizes=\"(max-width: 460px) 100vw, 460px\" \/><\/a>Identify Users<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Utilizing biometrics, the administrator can identify individuals with precision by performing numerous 1:N searches. The identification process through the Prison secure app is simple. Click on the biometric icon from the offender contact list, and the app will initiate the biometric capture process by making an API call to the capture tool. The captured biometric data will be converted into a base64 template and sent to CloudABIS API through another API call. CloudABIS will search for the template in its stored database and return the results to the application.<\/span><\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-19526 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users-600x147.png\" alt=\"Identify Users\" width=\"600\" height=\"147\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users-600x147.png 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users-1024x252.png 1024w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users-768x189.png 768w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users-1536x377.png 1536w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/Identify-Users.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><br \/>\n<span style=\"font-weight: 400;\">We hope that the steps outlined above will assist you in implementing biometric functionality on your web platform. Should you encounter any issues during the configuration process or have any queries, please do not hesitate to <a href=\"https:\/\/www.m2sys.com\/contact-us\/\">contact us<\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Biometric identification technology has evolved significantly over the years. Initially, biometric identification was used primarily for large-scale government projects such<\/p>\n","protected":false},"author":424,"featured_media":19511,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"Web Application","_yoast_wpseo_title":"How to Implement Biometric Functionality in any Web Application","_yoast_wpseo_metadesc":"A step by step guide on how to configure biometric functionality in any web application.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1231],"tags":[],"class_list":["post-19510","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-identification"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Implement Biometric Functionality in any Web Application<\/title>\n<meta name=\"description\" content=\"A step by step guide on how to configure biometric functionality in any web application.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Implement Biometric Functionality in any Web Application\" \/>\n<meta property=\"og:description\" content=\"A step by step guide on how to configure biometric functionality in any web application.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-14T10:47:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-30T09:14:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/cloudABIS-diagram.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Stanly Palma\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Stanly Palma\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\"},\"author\":{\"name\":\"Stanly Palma\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/330181132dc9e075017eebf4c11f940e\"},\"headline\":\"How to Implement Biometric Functionality in any Web Application\",\"datePublished\":\"2023-02-14T10:47:56+00:00\",\"dateModified\":\"2024-05-30T09:14:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\"},\"wordCount\":1141,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\",\"name\":\"How to Implement Biometric Functionality in any Web Application\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2023-02-14T10:47:56+00:00\",\"dateModified\":\"2024-05-30T09:14:57+00:00\",\"description\":\"A step by step guide on how to configure biometric functionality in any web application.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"How to Implement Biometric Functionality in any Web Application\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/330181132dc9e075017eebf4c11f940e\",\"name\":\"Stanly Palma\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51c1692867c792c6bb6117b5a954390a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51c1692867c792c6bb6117b5a954390a?s=96&d=mm&r=g\",\"caption\":\"Stanly Palma\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/sudipta\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Implement Biometric Functionality in any Web Application","description":"A step by step guide on how to configure biometric functionality in any web application.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/","og_locale":"en_US","og_type":"article","og_title":"How to Implement Biometric Functionality in any Web Application","og_description":"A step by step guide on how to configure biometric functionality in any web application.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2023-02-14T10:47:56+00:00","article_modified_time":"2024-05-30T09:14:57+00:00","og_image":[{"width":1024,"height":534,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/02\/cloudABIS-diagram.jpg","type":"image\/jpeg"}],"author":"Stanly Palma","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Stanly Palma","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/"},"author":{"name":"Stanly Palma","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/330181132dc9e075017eebf4c11f940e"},"headline":"How to Implement Biometric Functionality in any Web Application","datePublished":"2023-02-14T10:47:56+00:00","dateModified":"2024-05-30T09:14:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/"},"wordCount":1141,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/","name":"How to Implement Biometric Functionality in any Web Application","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2023-02-14T10:47:56+00:00","dateModified":"2024-05-30T09:14:57+00:00","description":"A step by step guide on how to configure biometric functionality in any web application.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-identification\/how-to-implement-biometric-functionality-in-any-web-application\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"How to Implement Biometric Functionality in any Web Application"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/330181132dc9e075017eebf4c11f940e","name":"Stanly Palma","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51c1692867c792c6bb6117b5a954390a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51c1692867c792c6bb6117b5a954390a?s=96&d=mm&r=g","caption":"Stanly Palma"},"url":"https:\/\/www.m2sys.com\/blog\/author\/sudipta\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19510"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/424"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=19510"}],"version-history":[{"count":14,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19510\/revisions"}],"predecessor-version":[{"id":21166,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/19510\/revisions\/21166"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/19511"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=19510"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=19510"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=19510"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}