{"id":8823,"date":"2018-06-19T06:55:03","date_gmt":"2018-06-19T10:55:03","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=8823"},"modified":"2022-06-21T01:00:44","modified_gmt":"2022-06-21T05:00:44","slug":"the-history-of-biometrics-technology","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/","title":{"rendered":"Biometrics: History, Origin &amp; How It Affects Our Lives"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Just hearing the term biometrics, we draw a picture of the fingerprint in the back of our mind, but, originally biometrics is a term related to our human body itself. The original term \u201cBiometrics\u201d actually refers to measurements and different sorts of calculations that are related to the human body. It is the measurement of human characteristics in a matrix form. Biometric measurements are unique and irreversible depending on their types. This is why in modern day identification biometrics measurements ensure maximum efficiency.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The history of Biometrics originated back in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Since then, this practice happens all over the world. However, now biometric authentication has just not become important, but a welcomed in all aspects of our lives. Biometric measurements also have evolved from only fingerprint and now different parts of our body such as finger vein, palm vein, iris scan, voice recognition, facial recognition, brain waves, heart signals, DNA identification, and behavior biometrics.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Breaking the barriers of use in only for criminal identification, biometrics has now evolved to personal security level and reached to cloud computing as well. Biometrics help us change our lives reforming manual tasks into automation and providing that extra layer of security. It is not only affecting our lives only as an individual but also as a community, and even as a species in the environment.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Let us have a quick overview how the biometric technology is affecting our lives.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Security<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Undoubtedly the first things that biometric technology makes our lives easy is through enhancing security. Biometric authentication and identification are changing the way we do and see things. Smart mobile devices are now adding an extra layer of security through<\/span><a href=\"https:\/\/www.m2sys.com\/m2-s-fingerprint-scanner\/?utm_source=blog&amp;utm_medium=M2-S%20Landing%20Page&amp;utm_campaign=M2-S%20fingerprint\"> <b>fingerprint scanner<\/b><\/a><span style=\"font-weight: 400;\">, voice, or facial recognition. Recently, Samsung has added an iris scanner in their latest \u00a0smartphone. The data center of Google uses multimodal biometric verification to keep track of the security. Biometric visitor management systems like<\/span><a href=\"https:\/\/www.m2sys.com\/visitor-track-biometric-visitor-management-solution\/?utm_source=blog&amp;utm_medium=visitortrack%20landing%20page&amp;utm_campaign=visitortrack\"> <b>VisitorTrack\u2122<\/b><\/a><span style=\"font-weight: 400;\"> is helping to maintain visitors in any environment and keep a record of their activities on the premise. Also, passwords and pins are too weak in terms of security. Moreover, pins or passwords are hard to remember by most people.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">In a recent study performed on Canadians revealed that they tend to forget their pins or passwords and leave any authentication online unfinished. Security checks are boring and tiresome in all the facilities. To automate this process, Japan used facial recognition gates at one of their airport that automatically scans passersby as they go through the gate and match it with the stored images. Many airports now use iris scan as well. Even the upcoming Olympic going to be held in Japan deployed the same facial recognition technology to scan their staff, media representatives, and athletes, as reported by Japan Times. Just recently, on the Ukrainian Border, the country established a biometric border control system to keep track of migrations. These technologies save time, create less hassle, reduce staff costs and maintain maximum efficiency. Such one tool created to help border control forces is <\/span><a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis-border-control-and-border-protection\/?utm_source=blog&amp;utm_campaign=border%20control&amp;utm_medium=m2sys%20landing%20page\"><b>SecuredPass\u2122<\/b><\/a> <span style=\"font-weight: 400;\">that allows biometric enrollment of travelers. It is a central system that connects the whole county covering all the aiports, docks passport &amp; also visa offices. \u00a0No more the old fashioned ways of pins passwords or manual face matching when one\u2019s own body becomes the ultimate password.<\/span><\/p>\n<p style=\"text-align: justify;\"><style type=\"text\/css\">\r\n.ad-area1 { border-radius: 8px; overflow: hidden; padding: 20px 10px; box-shadow: 0 0px 15px #ddd; margin: 15px 8px; border-top: 5px solid #a81010; }\r\n.left-area, .right-area { width: 50%; float: left; }\r\n.left-area { padding-top: 12px; }\r\n.left-area img { max-width: 95%; }\r\n.right-area h2 { text-align: center; padding-bottom: 0; font-size: 26px; font-weight: 900; margin-top: 0; }\r\n.right-area h2 span { color: #a81010; }\r\n.right-area h3 { text-align: center; font-size: 16px; text-transform: capitalize; font-weight: 700; padding-top: 10px; padding-bottom: 10px; line-height: normal; }\r\n.ad-area-head { text-align: center; font-weight: 900; font-size: 14px; border-bottom: 1px dotted #ddd; width: 70%; margin: 0 auto; }\r\n.ad-area-desc { padding: 5px 0; }\r\n.right-area p { text-align: center; font-size: 12px; padding-bottom: 0; margin: 0; line-height: 2; }\r\n.ad-area-desc b { font-weight: 700; display: block; }\r\n.ad-area1-learn { display: table; margin: 0 auto; background: #a81010; color: #fff; padding: 6px 20px; border-radius: 50px; font-size: 14px; }\r\n.ad-area1-learn:hover { color: #fff; }\r\n\r\n@media (max-width:320px), (max-width:360px), (max-width:375px), (max-width:400px), (max-width:480px) {\r\n.left-area, .right-area { width: 100%; float: none; }\r\n}\r\n<\/style>\r\n<div class=\"ad-area1\">\r\n\t<div style=\"overflow: hidden;\">\r\n\t\t<div class=\"left-area\">\r\n\t\t\t<img decoding=\"async\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/12\/hybrid-biometric-platform-middleware.png\" alt=\"Bio-plugin-SDK\" width=\"\">\r\n\t\t<\/div>\r\n\t\t<div class=\"right-area\">\r\n\t\t\t<h2><span>Core Biometric Technology<\/span><\/h2>\r\n\t\t\t<h3>Hassle-Free Biometric Software Integration Solutions<\/h3>\r\n\t\t\t<div class=\"ad-area-head\"><\/div>\r\n\t\t\t<div class=\"ad-area-desc\">\r\n\t\t\t\t<p>CloudABIS\u2122 | CloudScanr\u2122 | CloudApper\u2122<\/p>\r\n\t\t\t\t<p>HyperDeduplicador\u2122 | Bio-Plugin\u2122 | Bio-SnapON\u2122<\/p>\r\n\t\t\t\t<p>Hybrid Biometric Platform\u2122 | Bio-Hyperserver\u2122<\/p>\r\n\t\t\t\t<p><\/p>\r\n\t\t\t<\/div>\r\n\t\t\t<a class=\"ad-area1-learn\" href=\"https:\/\/www.m2sys.com\/coretech\/?utm_source=Biometrics%3A+History%2C+Origin+%26+How+It+Affects+Our+Lives&amp;utm_medium=Core+Biometric+Technology&amp;utm_campaign=Blog+DisplayAds\">Learn More<\/a>\r\n\t\t<\/div>\r\n\t<\/div>\t\r\n<\/div><\/p>\n<p style=\"text-align: justify;\"><b>Financial Services<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric technology is being deployed in financial services worldwide. The Bank of Russia recently authorized mass biometric data enrollment for all the account holders of all the banks of Russia. The plan is to enable an account holder to make any payment, do transactions or apply for a loan just through a smart mobile device that has biometric scanners installed in it. Bank of Cyprus is issuing biometric payment cards for their account holders that will only work when held by the card owner. ATM machines are now using fingerprint, facial recognition or<\/span><a href=\"https:\/\/www.m2sys.com\/m2-auto-tilt-iris-recognition-camera\/?utm_source=blog&amp;utm_medium=m2sys%20landing%20page&amp;utm_campaign=autotilt%20iris\"> <b>iris scanner<\/b><\/a><span style=\"font-weight: 400;\"> to ease access.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">People do not have to bring anything or even remember his account number to be able to make a transaction. One of the most significant solution in payment terms was recently provided by WFO and UNHCR in the Zaatari Camp for refugee Syrians situated in Jordan. In the camp, the organizers installed an iris scanning payment system to allow the refugees to be able to purchase what they need from the funding they are receiving without even getting the money in \u00a0cash. This system automatically scans and identifies the account holder and checks the balance and make the payment. With this system, maximum fraud protection is now possible in terms of donation. <\/span><b>CertisID\u2122<\/b><span style=\"font-weight: 400;\"> is a solution that is specially designed for financial services and it also works to track and identify an employee and also a non-account holder.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Data Access<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Previously it was seen that how biometric provides national level security. But it can also provide personal security in terms of valuable data and privacy. Since a long time, Hewlett Packard is using fingerprint access on their laptop PCs. Also, various mobile smartphones are now equipped with different biometric identification technology to provide maximum data security. On Cloud also, the biometric technology is on the rise in popularity.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>National and political activities<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometric systems are the most efficient and secure for governments to have national projects. A great example of this would be back in 2014, Yemen government installed the M2SYS<\/span><a href=\"https:\/\/www.m2sys.com\/automated-fingerprint-identification-system-afis-voter-registration\/?utm_source=blog&amp;utm_medium=m2sys&amp;utm_campaign=truevoter\"> <b>TrueVoter\u2122<\/b><\/a><span style=\"font-weight: 400;\">, biometric voter registration system. This system registers a voter, identifies him or her during the voting process, automatically checks if he or she has voted before. There is no way of fraud since biometric measurements are in use here. Another example can be found in India since the people of India are getting their national ID \u201cAadhar\u201d card through fingerprint and facial scan registration. Even in Bangladesh recently, smart national ID has been provided that is registered with 10 fingerprints and an iris scan.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Architecture<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Emotional architectural designs depict the aesthetic sense of an architect. However, there is no definite way to see how people view a fa\u00e7ade or building. Thanks to architect Ann Sussman and designer Janice M. Ward now there is with the help of biometric. They came up with a system that measures the movement of the eye and how long view focus is fixed on a fa\u00e7ade. The system then turns it into a heat map to show where we are focusing and depending on what. This system also can be integrated with brainwave scanning and get the exact emotion of the viewer. This indeed is a very good time to be an architect.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Advertising &amp; psychological researchers<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Advertising is crucial and for the best result of the campaign, the advertisers are always on the toes to measure the best performance. In many cases to do psychological researchers on viewing of an advertisement, biometric measures such as brain waves, iris movement, heartbeats are being used a measurement of the effects of the campaign. The first company to implement biometric advertisement in daily life was the giant Tesco. They came up with facial detection to personalize ads when customers are on the counter to pay for their gas in gas stations.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Preserving ecosystem<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">It is not a new thing that poacher activity just made Rhino\u2019s one of the most critically endangered species. To fight back the poachers and create a safe haven for the Rhinos, recently in South Africa an unnamed park has been equipped with the latest biometric security management. They are using heat signatures, facial recognition through CCTV and drones. In addition, during the entrance, every visitor has to go through a biometric fingerprint and facial scanning system. This way not only Rhinos but every animal will from now on be safe from poaching.<\/span><\/p>\n<p style=\"text-align: justify;\"><b>Behaviometrics<\/b><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Behaviometrics is the analyzing of behaviors which is unique from person to person. This analyzes every action of an individual and from then with that data, any level of security or research can be done. Even it can be integrated with a computer to protect personal files, or in a high-security facility to let the right people enter.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Biometrics is technology that adapts to anything. It is a one-stop solution to many security-related problems and with the help of different biometric technology, we are changing the world, and thus changing us.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Just hearing the term biometrics, we draw a picture of the fingerprint in the back of our mind, but, originally<\/p>\n","protected":false},"author":396,"featured_media":15999,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"history of biometrics","_yoast_wpseo_title":"History of biometrics & how the technology affects our lives","_yoast_wpseo_metadesc":"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let's find out how it is affecting our lives.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[54],"tags":[803,806,802,809,808,804,807,805],"class_list":["post-8823","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-resources","tag-biometrics-definition","tag-biometrics-were-first-used-to","tag-history-of-biometrics","tag-origin-of-biometrics","tag-what-is-biometric-technology","tag-what-is-biometrics","tag-when-was-fingerprinting-first-used","tag-when-were-fingerprints-first-used"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>History of biometrics &amp; how the technology affects our lives<\/title>\n<meta name=\"description\" content=\"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let&#039;s find out how it is affecting our lives.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"History of biometrics &amp; how the technology affects our lives\" \/>\n<meta property=\"og:description\" content=\"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let&#039;s find out how it is affecting our lives.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2018-06-19T10:55:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T05:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/06\/history-of-biometrics-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Masum Shibli\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/masum_shibli\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Masum Shibli\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\"},\"author\":{\"name\":\"Masum Shibli\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/a22b42d30398cbe39bd4c25b27f14732\"},\"headline\":\"Biometrics: History, Origin &amp; How It Affects Our Lives\",\"datePublished\":\"2018-06-19T10:55:03+00:00\",\"dateModified\":\"2022-06-21T05:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\"},\"wordCount\":1463,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometrics definition\",\"biometrics were first used to\",\"history of biometrics\",\"origin of biometrics\",\"what is biometric technology\",\"what is biometrics\",\"when was fingerprinting first used\",\"when were fingerprints first used\"],\"articleSection\":[\"Biometric Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\",\"name\":\"History of biometrics & how the technology affects our lives\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2018-06-19T10:55:03+00:00\",\"dateModified\":\"2022-06-21T05:00:44+00:00\",\"description\":\"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let's find out how it is affecting our lives.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics: History, Origin &amp; How It Affects Our Lives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/a22b42d30398cbe39bd4c25b27f14732\",\"name\":\"Masum Shibli\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g\",\"caption\":\"Masum Shibli\"},\"description\":\"Business Development Analyst, M2SYS Technology\",\"sameAs\":[\"https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shibli\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"History of biometrics & how the technology affects our lives","description":"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let's find out how it is affecting our lives.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/","og_locale":"en_US","og_type":"article","og_title":"History of biometrics & how the technology affects our lives","og_description":"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let's find out how it is affecting our lives.","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2018-06-19T10:55:03+00:00","article_modified_time":"2022-06-21T05:00:44+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2018\/06\/history-of-biometrics-2.jpg","type":"image\/jpeg"}],"author":"Masum Shibli","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/masum_shibli","twitter_site":"@m2sys","twitter_misc":{"Written by":"Masum Shibli","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/"},"author":{"name":"Masum Shibli","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/a22b42d30398cbe39bd4c25b27f14732"},"headline":"Biometrics: History, Origin &amp; How It Affects Our Lives","datePublished":"2018-06-19T10:55:03+00:00","dateModified":"2022-06-21T05:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/"},"wordCount":1463,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometrics definition","biometrics were first used to","history of biometrics","origin of biometrics","what is biometric technology","what is biometrics","when was fingerprinting first used","when were fingerprints first used"],"articleSection":["Biometric Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/","name":"History of biometrics & how the technology affects our lives","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2018-06-19T10:55:03+00:00","dateModified":"2022-06-21T05:00:44+00:00","description":"The history of Biometrics originated in 1981 to identify criminal\u2019s fingerprints to be analyzed and stored. Let's find out how it is affecting our lives.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-resources\/the-history-of-biometrics-technology\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics: History, Origin &amp; How It Affects Our Lives"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/a22b42d30398cbe39bd4c25b27f14732","name":"Masum Shibli","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1e88467c8cf79a053bb898764e8e8c48?s=96&d=mm&r=g","caption":"Masum Shibli"},"description":"Business Development Analyst, M2SYS Technology","sameAs":["https:\/\/twitter.com\/https:\/\/twitter.com\/masum_shibli"],"url":"https:\/\/www.m2sys.com\/blog\/author\/shibli\/"}]}},"modified_by":"Linda J. Brannon","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8823"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=8823"}],"version-history":[{"count":8,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8823\/revisions"}],"predecessor-version":[{"id":16000,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/8823\/revisions\/16000"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15999"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=8823"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=8823"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=8823"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}