{"id":7202,"date":"2017-04-16T05:20:41","date_gmt":"2017-04-16T09:20:41","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=7202"},"modified":"2022-06-21T00:30:48","modified_gmt":"2022-06-21T04:30:48","slug":"biometrics-movies-sci-fi-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/","title":{"rendered":"Biometrics in Movies Sci-Fi Security (Infographic)"},"content":{"rendered":"<p><span class=\"fontstyle0\">Do you remember the first time you saw biometric technology? Was it in an early \u201cStar Trek\u201d episode or maybe in \u201c2001: A Space Odyssey?\u201d Have you noticed the biometrics used in recent movies like \u201cDredd,\u201d \u201cDistrict 9,\u201d or \u201cEx Machina?\u201d<br \/>\n<\/span><\/p>\n<p><span class=\"fontstyle0\">Biometrics have long been used in science fiction movies to portray a futuristic world of advanced technology. From retina scans to voice identification and facial recognition, we\u2019ve seen these technologies on the big screen for more than 50 years.<br \/>\n<\/span><\/p>\n<p><span class=\"fontstyle0\">In the 1960s, computers cost an outrageous $5 million and had much less computing power than anything we have today. Yet in this time of emerging technology, \u201cStar Trek\u201d showed retina scans and facial recognition scans as part of digital security systems. The movie \u201c2001: A Space Odyssey\u201d imagined a computer that was smart enough to authenticate by voice, understand speech, and interpret emotions.<br \/>\n<\/span><\/p>\n<p><span class=\"fontstyle0\">A few decades later in the 1980s, when home computers were coming onto the market, we saw \u201cBack to the Future II\u201d show how fingerprints could be used to validate a digital payment. In \u201cRobocop,\u201d a driver&#8217;s license wasn&#8217;t needed for identification because the police force used digital facial recognition.<\/span><\/p>\n<p><span class=\"fontstyle0\">Movies and television have played a prominent role in spurring the public conversation about these technologies and how they could be implemented into the products and services of daily life.<br \/>\n<\/span><\/p>\n<p><span class=\"fontstyle0\">Now that available technologies are catching up to what science fiction imagined our future could look like, let\u2019s look back through movie history to see how biometrics were used. And in looking back at this movie timeline, we might also be looking ahead into future technologies that may soon come on the market.<\/span><\/p>\n<p><a href=\"https:\/\/www.avatier.com\/blog\/biometrics-in-sci-fi-movies\/\"><img decoding=\"async\" class=\"ngg_none\" src=\"https:\/\/www.avatier.com\/blog\/wp-content\/uploads\/2017\/01\/biometrics-in-sci-fi-movies_IG.png\" alt=\"Biometrics in Sci-Fi Movies\" width=\"600px\" height=\"7985px\" \/><\/a><\/p>\n<p>Created By: <a href=\"https:\/\/www.avatier.com\">Avatier.com<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you remember the first time you saw biometric technology? Was it in an early \u201cStar Trek\u201d episode or maybe<\/p>\n","protected":false},"author":389,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"Biometrics in Movies Sci-Fi Security (Infographic)","_yoast_wpseo_metadesc":"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[911],"tags":[],"class_list":["post-7202","post","type-post","status-publish","format-standard","hentry","category-biometric-technology"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics in Movies Sci-Fi Security (Infographic)<\/title>\n<meta name=\"description\" content=\"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics in Movies Sci-Fi Security (Infographic)\" \/>\n<meta property=\"og:description\" content=\"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-04-16T09:20:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T04:30:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.avatier.com\/blog\/wp-content\/uploads\/2017\/01\/biometrics-in-sci-fi-movies_IG.png\" \/>\n<meta name=\"author\" content=\"Mehedi Hassan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mehedi Hassan\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\"},\"author\":{\"name\":\"Mehedi Hassan\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/26b2e33f28e194d1bbf4b17efc3d5f3a\"},\"headline\":\"Biometrics in Movies Sci-Fi Security (Infographic)\",\"datePublished\":\"2017-04-16T09:20:41+00:00\",\"dateModified\":\"2022-06-21T04:30:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\"},\"wordCount\":284,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Technology\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\",\"name\":\"Biometrics in Movies Sci-Fi Security (Infographic)\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-04-16T09:20:41+00:00\",\"dateModified\":\"2022-06-21T04:30:48+00:00\",\"description\":\"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics in Movies Sci-Fi Security (Infographic)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/26b2e33f28e194d1bbf4b17efc3d5f3a\",\"name\":\"Mehedi Hassan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6148163dc81f4c57368bf622cd9cbc69?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6148163dc81f4c57368bf622cd9cbc69?s=96&d=mm&r=g\",\"caption\":\"Mehedi Hassan\"},\"description\":\"Mehedi Hassan Digital Marketing Executive at M2SYS Technology Bangladesh View Profile\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/mehedi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics in Movies Sci-Fi Security (Infographic)","description":"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics in Movies Sci-Fi Security (Infographic)","og_description":"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-04-16T09:20:41+00:00","article_modified_time":"2022-06-21T04:30:48+00:00","og_image":[{"url":"https:\/\/www.avatier.com\/blog\/wp-content\/uploads\/2017\/01\/biometrics-in-sci-fi-movies_IG.png"}],"author":"Mehedi Hassan","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Mehedi Hassan","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/"},"author":{"name":"Mehedi Hassan","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/26b2e33f28e194d1bbf4b17efc3d5f3a"},"headline":"Biometrics in Movies Sci-Fi Security (Infographic)","datePublished":"2017-04-16T09:20:41+00:00","dateModified":"2022-06-21T04:30:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/"},"wordCount":284,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Technology"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/","name":"Biometrics in Movies Sci-Fi Security (Infographic)","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-04-16T09:20:41+00:00","dateModified":"2022-06-21T04:30:48+00:00","description":"Biometrics are widely using in movies for a long time. Here you can get a comprehensive list of movies with the kind of usages of biometric modalities.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-technology\/biometrics-movies-sci-fi-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics in Movies Sci-Fi Security (Infographic)"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/26b2e33f28e194d1bbf4b17efc3d5f3a","name":"Mehedi Hassan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6148163dc81f4c57368bf622cd9cbc69?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6148163dc81f4c57368bf622cd9cbc69?s=96&d=mm&r=g","caption":"Mehedi Hassan"},"description":"Mehedi Hassan Digital Marketing Executive at M2SYS Technology Bangladesh View Profile","url":"https:\/\/www.m2sys.com\/blog\/author\/mehedi\/"}]}},"modified_by":"Linda J. Brannon","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7202"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/389"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=7202"}],"version-history":[{"count":5,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7202\/revisions"}],"predecessor-version":[{"id":9033,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7202\/revisions\/9033"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=7202"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=7202"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=7202"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}