{"id":4917,"date":"2015-04-23T03:00:57","date_gmt":"2015-04-23T07:00:57","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=4917"},"modified":"2025-04-23T07:56:10","modified_gmt":"2025-04-23T11:56:10","slug":"beyond-science-fiction-facial-recognition-software-transforms-airport-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/","title":{"rendered":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security"},"content":{"rendered":"<p><em><strong>The following is a guest post submitted written\u00a0by ADAGOLD, an Australian-based Global Aviation specialist that has been providing market leading aircraft charter solutions.<\/strong><\/em><\/p>\n<p>Once considered a topic of science fiction, facial recognition software has evolved from imagination to reality in a matter of decades. Today, face recognition technology has radical, real world applications that can <strong>transform how we live and travel<\/strong>.<\/p>\n<p>Facial recognition technology captures data form the contours of a person\u2019s face and then computes the ratios between each feature. Since no face is exactly the same, each person would generate a unique data set based on the shape, size, and location of their features. This mathematical output can be compared and sorted for matching and identification purposes or to track a person\u2019s identity.<\/p>\n<p>Although <a title=\"Link to Wikipedia facial recognition biometrics page\" href=\"https:\/\/en.wikipedia.org\/wiki\/Facial_recognition_system\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>facial recognition<\/strong><\/a> has been developing for many years, its most prevalent real-world application is in aviation security technology. During the early 1990s, several British airports began adopting basic facial matching to deter <strong><a href=\"https:\/\/www.m2sys.com\/blog\/privacy-2\/biometrics-privacy-and-identity-theft-%e2%80%93-what-are-you-risking\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=privacy%20in%202015\">identity theft<\/a><\/strong> and passport fraud. Since then, facial recognition technology has become popular across Europe and the United States, with biometric checkpoints at major airports such as Washington Dulles International and Miami International Airport. By the end of 2015, more than 10 major US airports will use some form of facial technology to augment their security measures.<\/p>\n<p>Airports today use facial recognition to expedite the check in and boarding process, improve <strong><a href=\"https:\/\/www.m2sys.com\/blog\/border-control-2\/biometric-border-control-in-2015-is-it-making-our-world-more-secure\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=world%20more%20secure\">border and passport control<\/a><\/strong>, and enhance security scanning. This technology can help ensure the same person checking in is also the same person getting on a plane, or to compare passengers against known terrorist databases. In addition to its safety benefits, face recognition can be used to track the time it takes for a passenger to complete certain tasks, such as check in or baggage claim, in order to evaluate and improve the efficiency of a certain travel checkpoint and enhance the customer experience.<\/p>\n<p><strong>Learn More:<\/strong><em>\u00a0<\/em><span style=\"text-decoration: underline;\"><em><a href=\"https:\/\/www.m2sys.com\/blog\/facial-recognition-2\/is-facial-recognition-the-future-of-border-security\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=Face%20Recognition%20Future\"><strong>Is Facial Recognition the Future of Border Security?<\/strong><\/a><\/em><\/span><\/p>\n<p>Due to its passive nature, face recognition is often favored over other forms of biometric scanning such as retina matching or fingerprinting. However, there are still limitations to this technology. Depending on the angle of a face, early forms of this technology could be \u201coutsmarted\u201d by wearing glasses, changing hair length, or other rudimentary disguise efforts. Similarly, people with near perfect facial symmetry, such as twins, could also cause identification issues. These early shortcomings cast doubt on the software\u2019s effectiveness and slowed its adoption. Today, that reputation is changing. Facial recognition software can now capture 2D and 3D output, making it more reliable and efficient than ever before. As the software evolves, it will continue to be a powerful addition to airports\u2019 arsenal of <a title=\"Link to M2SYS blog post on the use of biometrics for aviation security\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometric-smartgates-improve-border-security-airport-efficiency\/?utm_source=beyond%20science%20fiction&amp;utm_medium=blog%20post&amp;utm_campaign=blog\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>aviation security technology<\/strong><\/a>.<\/p>\n<p>As facial recognition software becomes more accurate, legislators have expressed some concern over privacy and information storage. This technology could limit our privacy to travel anonymously, feeding into a growing concern that we are always being watched. Similarly, passengers\u2019 travel data could be especially valuable in cyber attacks targeting political figures\u2019, diplomats\u2019 and celebrities\u2019 whereabouts. These concerns, however, have not outweighed the potential benefit and seamless security facial recognition can provide.<\/p>\n<p>As recognition technology evolves, we should expect to see enhancements that also track a person\u2019s gait, perform long-range <strong><a href=\"https:\/\/www.m2sys.com\/blog\/scanning-and-efficiency\/common-misunderstandings-between-iris-recognition-and-retina-scanning\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=common%20misunderstanding\">iris scanning<\/a><\/strong>, and advanced facial modeling and recognition. Biometric technology could one day become the only form of identification we need \u2026 because although that future seems far off, so did facial recognition software just a few years ago.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post submitted written\u00a0by ADAGOLD, an Australian-based Global Aviation specialist that has been providing market leading<\/p>\n","protected":false},"author":398,"featured_media":15639,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"airport security","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"The rising use of facial recognition to increase airport security is helping to improve border security around the world.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[570,39,6,303,93,186],"class_list":["post-4917","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-aviation-security","tag-biometric","tag-biometrics","tag-border-control","tag-facial-recognition","tag-guest-blog-post"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"The rising use of facial recognition to increase airport security is helping to improve border security around the world.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The rising use of facial recognition to increase airport security is helping to improve border security around the world.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2015-04-23T07:00:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T11:56:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/04\/airport-security-check-2021-04-03-03-24-37-utc-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7\"},\"headline\":\"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security\",\"datePublished\":\"2015-04-23T07:00:57+00:00\",\"dateModified\":\"2025-04-23T11:56:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\"},\"wordCount\":589,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"aviation security\",\"biometric\",\"biometrics\",\"border control\",\"facial recognition\",\"guest blog post\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\",\"name\":\"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-04-23T07:00:57+00:00\",\"dateModified\":\"2025-04-23T11:56:10+00:00\",\"description\":\"The rising use of facial recognition to increase airport security is helping to improve border security around the world.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services","description":"The rising use of facial recognition to increase airport security is helping to improve border security around the world.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/","og_locale":"en_US","og_type":"article","og_title":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services","og_description":"The rising use of facial recognition to increase airport security is helping to improve border security around the world.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2015-04-23T07:00:57+00:00","article_modified_time":"2025-04-23T11:56:10+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/04\/airport-security-check-2021-04-03-03-24-37-utc-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7"},"headline":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security","datePublished":"2015-04-23T07:00:57+00:00","dateModified":"2025-04-23T11:56:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/"},"wordCount":589,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["aviation security","biometric","biometrics","border control","facial recognition","guest blog post"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/","name":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-04-23T07:00:57+00:00","dateModified":"2025-04-23T11:56:10+00:00","description":"The rising use of facial recognition to increase airport security is helping to improve border security around the world.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/beyond-science-fiction-facial-recognition-software-transforms-airport-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Beyond Science Fiction: Facial Recognition Software Transforms Airport Security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/4917"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=4917"}],"version-history":[{"count":18,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/4917\/revisions"}],"predecessor-version":[{"id":15640,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/4917\/revisions\/15640"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15639"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=4917"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=4917"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=4917"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}