{"id":5530,"date":"2015-06-04T01:54:50","date_gmt":"2015-06-04T05:54:50","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=5530"},"modified":"2024-12-18T03:08:15","modified_gmt":"2024-12-18T08:08:15","slug":"biometrics-and-privacy-in-2015-maintaining-a-delicate-balance","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/","title":{"rendered":"Biometrics and Privacy in 2015: Maintaining a Delicate Balance"},"content":{"rendered":"<p>With the rapid adoption of biometric identification technology by Apple and other giant mobile phone manufacturers, biometric technology has become a mainstream technology in 2015 by opening availability to more people for daily use. Does this mean that our privacy is even more at risk from snoopers, hackers, and identity thieves?<\/p>\n<p>The answer is &#8212; not really. Today we are going to discuss how biometric technology is maintaining a delicate balance with privacy concerns as its use proliferates across many different markets.<\/p>\n<p>The most common privacy fears and concerns that we have today are actually the same types of questions we had in mind when asked to put our credit card numbers on an online shopping site: \u201cWho has access to my information?\u201d<\/p>\n<p>If we decide to give our biometric credentials in a departmental store to pay the bills for example, we want to be sure that it cannot be accessed by a hacker or government agencies \u2013 two core privacy concerns.<\/p>\n<p>There&#8217;s been a lot of confusion and misinformation already about biometrics and privacy concerns, so today we are going to clarify the technology behind biometrics, how it works, how it&#8217;s stored, and how hard it is to abuse and misuse biometric data.<\/p>\n<p>Biometrics, while having its limitations, offers substantial security benefits to the average consumer &#8212; including greater protection from <a title=\"Identity Theft\" href=\"https:\/\/www.m2sys.com\/blog\/privacy-2\/biometrics-privacy-and-identity-theft-%e2%80%93-what-are-you-risking\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=privacy%20in%202015\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>identity theft<\/strong><\/a>, <a href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometrics-data-security\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=privacy%20in%202015\"><strong>data theft<\/strong><\/a><strong>,<\/strong> and possibly even financial fraud. It&#8217;s substantially more secure for privacy protection than using a basic password or four digit personal identification number (PIN).<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/easyscan-optical-fingerprint-reader\/?utm_source=Article-Privacy-Balance-2015&amp;utm_medium=EasyScan&amp;utm_campaign=Blog-DisplayAds\" rel=\"attachment wp-att-6497\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-6497 size-full\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3.png\" alt=\"A Variety of Fingerprint Scanners and Fingerprint Sensor Technologies for Varying Industry Conditions\" width=\"557\" height=\"128\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3.png 557w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/03\/ES-3-300x69.png 300w\" sizes=\"(max-width: 557px) 100vw, 557px\" \/><\/a><\/p>\n<h2>How does biometric technology protect your privacy?<\/h2>\n<p>Biometric technology has evolved over the last few years and always maintained a delicate balance with end user privacy concerns. Let\u2019s take a look at how biometric is maintaining this balance:<\/p>\n<p><a href=\"https:\/\/www.m2sys.com\/m2fuseid-smart-fingerprint-reader\/?utm_source=Article-Privacy-Balance-2015&amp;utm_medium=FuseID&amp;utm_campaign=Blog-DisplayAds\" rel=\"attachment wp-att-6560\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-6560\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/01\/FuseID-1.png\" alt=\"M2-FuseID\u2122 Advanced Fingerprint Reader\" width=\"298\" height=\"251\" \/><\/a>First, it&#8217;s important to realize that most <a href=\"https:\/\/www.m2sys.com\/easyscan-optical-fingerprint-reader\/\"><strong>fingerprint scanner<\/strong><\/a><strong>s<\/strong> available today in the market do not store a raw image of a fingerprint. Instead, they interpret a digital representation of certain characteristics of your fingerprint, which is called a template. To put it in an easier way, it saves the fingerprint as binary digits, not as a raw image. Every biometric scanner manufacturer has their own algorithm for creating these templates and most of them are not compatible with each other. Therefore, it\u2019s nearly impossible to steal and use someone\u2019s biometric template to access their accounts across all platforms.<\/p>\n<p>Just for the sake of argument, even if a hacker does get access to the digital template of your fingerprint, it is nearly impossible to reverse engineer and use that to recreate the actual fingerprint &#8212; or any other modality of biometrics being used, as every system uses different algorithms for interpreting this data.<\/p>\n<h2>What if someone try to spoof or steal biometric data?<\/h2>\n<p>Just like any other technology, biometrics has its limitations too. It is possible to &#8220;steal&#8221; or &#8220;spoof&#8221; a person&#8217;s biometrics &#8212; as we have seen with the <a href=\"https:\/\/www.youtube.com\/watch?v=geTgSzrKYdc\"><strong>iPhone 5S fingerprint scanner hack<\/strong><\/a>. But that is not very easy to do. In fact, it can be much harder than guessing or brute forcing a password or PIN code. In order to steal a fingerprint:<\/p>\n<ul>\n<li>The attacker must have direct contact with the person<\/li>\n<li>Lift the print without ruining it or being seen<\/li>\n<li>Save it as a very high-resolution image<\/li>\n<li>Print it out in a high-res format<\/li>\n<li>And then manage to trick the fingerprint scanner into thinking the artificial print is real<\/li>\n<\/ul>\n<p><a href=\"https:\/\/www.m2sys.com\/hybrid-biometric-platform\/?utm_source=Article-Privacy-Balance-2015&amp;utm_medium=HBP&amp;utm_campaign=Blog-DisplayAds\" rel=\"attachment wp-att-6550\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-full wp-image-6550\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/01\/HBP-1.png\" alt=\"1 Integration, 1 Platform, Any Form of Biometrics. The Only Identity Platform You\u2019ll Ever Need!\" width=\"305\" height=\"255\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/01\/HBP-1.png 305w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2016\/01\/HBP-1-300x251.png 300w\" sizes=\"(max-width: 305px) 100vw, 305px\" \/><\/a>Obviously it can be done, but this number of steps rules out many of the usual suspects. In order to stop these kind of spoofing attacks there are biometric scanners available in the market with strong anti-spoofing capabilities. For example, <a href=\"https:\/\/www.m2sys.com\/m2-fuseid-multimodal-fingerprint-finger-vein-reader\/\"><strong>M2-FuseID\u2122<\/strong><\/a> \u00a0is a fingerprint scanner which can avert spoof attacks with sophisticated liveness detection capabilities. This next generation fingerprint scanner captures both the fingerprint and the unique finger vein pattern inside your finger. If a hacker can spoof fingerprints, how will they be able to fool the vein detection system when it requires the presence of live blood flow for identification?<\/p>\n<h2>Conclusion<\/h2>\n<p>Biometric technology maintains the balance of privacy in our society in a way that is not entirely new to us. Therefore end users need to be well informed\/educated of the privacy implications related to biometric technology. There might not be a single solution to minimize the potential privacy loss through the use of biometrics \u2013 but if you look around there will always be different protections for different scenarios.<\/p>\n<p>Want consultation on a privacy friendly biometric solution deployment? Feel free to reach us at <a href=\"https:\/\/www.m2sys.com\/\"><strong>M2SYS Technology<\/strong><\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the rapid adoption of biometric identification technology by Apple and other giant mobile phone manufacturers, biometric technology has become<\/p>\n","protected":false},"author":383,"featured_media":15737,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometrics and privacy","_yoast_wpseo_title":"Biometrics and Privacy in 2015","_yoast_wpseo_metadesc":"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[1791],"tags":[],"class_list":["post-5530","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-others"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics and Privacy in 2015<\/title>\n<meta name=\"description\" content=\"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics and Privacy in 2015\" \/>\n<meta property=\"og:description\" content=\"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2015-06-04T05:54:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-18T08:08:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/06\/woman-touching-a-screen-with-her-finger-2021-05-04-07-18-09-utc_800x445.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/2aad7b341e3dff98e6669e47dccad90e\"},\"headline\":\"Biometrics and Privacy in 2015: Maintaining a Delicate Balance\",\"datePublished\":\"2015-06-04T05:54:50+00:00\",\"dateModified\":\"2024-12-18T08:08:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\"},\"wordCount\":760,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Others\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\",\"name\":\"Biometrics and Privacy in 2015\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2015-06-04T05:54:50+00:00\",\"dateModified\":\"2024-12-18T08:08:15+00:00\",\"description\":\"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics and Privacy in 2015: Maintaining a Delicate Balance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/2aad7b341e3dff98e6669e47dccad90e\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics and Privacy in 2015","description":"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics and Privacy in 2015","og_description":"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.","og_url":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2015-06-04T05:54:50+00:00","article_modified_time":"2024-12-18T08:08:15+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2015\/06\/woman-touching-a-screen-with-her-finger-2021-05-04-07-18-09-utc_800x445.jpg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/2aad7b341e3dff98e6669e47dccad90e"},"headline":"Biometrics and Privacy in 2015: Maintaining a Delicate Balance","datePublished":"2015-06-04T05:54:50+00:00","dateModified":"2024-12-18T08:08:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/"},"wordCount":760,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Others"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/","url":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/","name":"Biometrics and Privacy in 2015","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2015-06-04T05:54:50+00:00","dateModified":"2024-12-18T08:08:15+00:00","description":"As the adoption rate is increasing worldwide, biometrics and privacy concerns are maintaining a delicate balance with each other.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/others\/biometrics-and-privacy-in-2015-maintaining-a-delicate-balance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics and Privacy in 2015: Maintaining a Delicate Balance"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/2aad7b341e3dff98e6669e47dccad90e","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5530"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=5530"}],"version-history":[{"count":9,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5530\/revisions"}],"predecessor-version":[{"id":21723,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/5530\/revisions\/21723"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15737"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=5530"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=5530"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=5530"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}