{"id":362556,"date":"2023-05-09T16:34:01","date_gmt":"2023-05-09T14:34:01","guid":{"rendered":"https:\/\/recogtech.com\/2023\/uncategorized\/the-basics-of-biometrics\/"},"modified":"2024-08-15T16:28:34","modified_gmt":"2024-08-15T14:28:34","slug":"the-basics-of-biometrics","status":"publish","type":"post","link":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/","title":{"rendered":"The basics of biometrics"},"content":{"rendered":"<p style=\"font-weight: 400;\">In order to compare biometric applications, it is useful to know something about the basics. In this article, we briefly outline the &#8216;basics of biometrics&#8217; for you.<img decoding=\"async\" class=\"alignnone wp-image-361448 size-full\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/kennisbank-basics-biometrie-600x250-1.jpg\" alt=\"De basis van biometrie - Recogtech\" width=\"600\" height=\"250\" srcset=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/kennisbank-basics-biometrie-600x250-1.jpg 600w, https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/kennisbank-basics-biometrie-600x250-1-480x200.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) 600px, 100vw\" \/><\/p>\n<h2>1. General definition of biometrics<\/h2>\n<div><span lang=\"EN-GB\">Biometric features are unique, person-specific characteristics that allow a person&#8217;s identity to be established. Body characteristics eligible for biometric solutions are not, or not easily transferable to other persons. Unlike, for example, cards, keys and passwords. They are also not prone to fraud, such as photos and signatures. Biometric features can not be removed.<\/span><\/div>\n<h2>2. <span lang=\"EN-GB\">Commonly used biometric features<\/span><\/h2>\n<p style=\"font-weight: 400;\">Commonly used biometric features include:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Fingerprints<\/li>\n<li style=\"font-weight: 400;\">Eye (retina and iris)<\/li>\n<li style=\"font-weight: 400;\"><a href=\"https:\/\/recogtech.com\/en\/palm-vein-scanner\/\">Vein pattern in the palm<\/a> or finger<\/li>\n<li><span lang=\"EN-GB\">Face, voice and speech<\/span><\/li>\n<\/ul>\n<h2>3. <span lang=\"EN-GB\">Why biometrics?<\/span><\/h2>\n<p style=\"font-weight: 400;\">Biometric data is not transferable to other people in the same way that cards, keys and passwords are. Secondly, biometrics are much less susceptible to fraud. Photographs, signatures and access cards are susceptible to fraud, which means that a person&#8217;s identity cannot always be established with certainty in the process. A third feature of using body characteristics for biometric applications is that they are basically non-removable. <span style=\"font-weight: 400;\">Want to know more or looking for a biometric security solution for your organisation?<\/span><\/p>\n<p style=\"font-weight: 400;\"><a href=\"https:\/\/recogtech.com\/en\/contact\/\"><button class=\"button-blog1 button-blog2\">Contact us<\/button><\/a><\/p>\n<h2>4. <span lang=\"EN-GB\">Biometric techniques<\/span><\/h2>\n<p style=\"font-weight: 400;\">To &#8216;read&#8217; the body characteristics mentioned above, biometrics uses several techniques. Think of:<\/p>\n<ul>\n<li style=\"font-weight: 400;\">Photo and video camera technology<\/li>\n<li style=\"font-weight: 400;\">Pressure measurement<\/li>\n<li style=\"font-weight: 400;\">Heat measurement<\/li>\n<li style=\"font-weight: 400;\">Voice recognition<\/li>\n<li><span style=\"font-weight: 400;\">Computer technology<\/span><\/li>\n<\/ul>\n<h2>5. <span lang=\"EN-GB\">The benefits of biometrics in identification<\/span><\/h2>\n<p style=\"font-weight: 400;\">The advantage that biometrics offers in security or <a href=\"https:\/\/recogtech.com\/en\/biometric-access-system\/\">access solutions<\/a> is twofold. On the one hand, ease of use: you don&#8217;t have to remember anything or take anything with you. On the other hand, the level of security: identification based on biometrics is much less susceptible to fraud.<\/p>\n<p>With identification, it has another added benefit. It is completely personalised so offers little to no chance of identity fraud.<\/p>\n<p><span style=\"font-weight: 400;\">Strong together! Biometrics are regularly used in conjunction with conventional forms of identification. This increases the assurance that you are dealing with the right person.<\/span><img decoding=\"async\" class=\"alignnone size-full wp-image-361447\" src=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/bezit-kennis-biometrie-circels.jpg\" alt=\"\" width=\"400\" height=\"267\" \/><\/p>\n<h2 style=\"font-weight: 400;\">Property or knowledge or biometrics? They are super strong together!<\/h2>\n<p style=\"font-weight: 400;\">So far, &#8216;property&#8217; (think passport or card) and &#8216;knowledge&#8217; (think password or PIN) have always been the main forms of identification and security. To achieve an even higher level of security, combinations of the two have also been common for some time (think a card with PIN). Biometric security is not only an alternative to these traditional forms of identification, but offers opportunities to create an extremely high level of security by combining all three forms.<\/p>\n<p><span style=\"font-weight: 400;\">Want to know more or looking for a biometric security solution for your organisation?<\/span><\/p>\n<p><a href=\"https:\/\/recogtech.com\/en\/contact\/\"><button class=\"button-blog1 button-blog2\">Contact us<\/button><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In order to compare biometric applications, it is useful to know something about the basics. In this article, we briefly outline the &#8216;basics of biometrics&#8217; for you.<\/p>\n","protected":false},"author":2,"featured_media":362113,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[35],"tags":[],"class_list":["post-362556","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-insights-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The basics of biometrics | Recogtech - Biometrische beveiliging<\/title>\n<meta name=\"description\" content=\"In order to compare biometric applications, it is useful to know something about the basics. We briefly the &#039;basics of biometrics&#039; for you.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The basics of biometrics | Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"og:description\" content=\"In order to compare biometric applications, it is useful to know something about the basics. We briefly the &#039;basics of biometrics&#039; for you.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/\" \/>\n<meta property=\"og:site_name\" content=\"Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-09T14:34:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-15T14:28:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Justi Veenhof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Justi Veenhof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/\"},\"author\":{\"name\":\"Justi Veenhof\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\"},\"headline\":\"The basics of biometrics\",\"datePublished\":\"2023-05-09T14:34:01+00:00\",\"dateModified\":\"2024-08-15T14:28:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/\"},\"wordCount\":430,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-02.jpg\",\"articleSection\":[\"Insights\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/\",\"name\":\"The basics of biometrics | Recogtech - Biometrische beveiliging\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-02.jpg\",\"datePublished\":\"2023-05-09T14:34:01+00:00\",\"dateModified\":\"2024-08-15T14:28:34+00:00\",\"description\":\"In order to compare biometric applications, it is useful to know something about the basics. We briefly the 'basics of biometrics' for you.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-02.jpg\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/blog-header-02.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"De basics van biometrie - Recogtech\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/insights-en\\\/the-basics-of-biometrics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The basics of biometrics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"name\":\"Recogtech - Biometrische beveiliging\",\"description\":\"High-end Biometric Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/recogtech.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#organization\",\"name\":\"Recogtech B.V.\",\"url\":\"https:\\\/\\\/recogtech.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"width\":600,\"height\":111,\"caption\":\"Recogtech B.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/en\\\/#\\\/schema\\\/person\\\/aabb0d9a4b473b0a549126d6b30b6735\",\"name\":\"Justi Veenhof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g\",\"caption\":\"Justi Veenhof\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The basics of biometrics | Recogtech - Biometrische beveiliging","description":"In order to compare biometric applications, it is useful to know something about the basics. We briefly the 'basics of biometrics' for you.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/","og_locale":"en_US","og_type":"article","og_title":"The basics of biometrics | Recogtech - Biometrische beveiliging","og_description":"In order to compare biometric applications, it is useful to know something about the basics. We briefly the 'basics of biometrics' for you.","og_url":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/","og_site_name":"Recogtech - Biometrische beveiliging","article_published_time":"2023-05-09T14:34:01+00:00","article_modified_time":"2024-08-15T14:28:34+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg","type":"image\/jpeg"}],"author":"Justi Veenhof","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Justi Veenhof","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#article","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/"},"author":{"name":"Justi Veenhof","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735"},"headline":"The basics of biometrics","datePublished":"2023-05-09T14:34:01+00:00","dateModified":"2024-08-15T14:28:34+00:00","mainEntityOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/"},"wordCount":430,"commentCount":0,"publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg","articleSection":["Insights"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/","url":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/","name":"The basics of biometrics | Recogtech - Biometrische beveiliging","isPartOf":{"@id":"https:\/\/recogtech.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#primaryimage"},"image":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#primaryimage"},"thumbnailUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg","datePublished":"2023-05-09T14:34:01+00:00","dateModified":"2024-08-15T14:28:34+00:00","description":"In order to compare biometric applications, it is useful to know something about the basics. We briefly the 'basics of biometrics' for you.","breadcrumb":{"@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#primaryimage","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/blog-header-02.jpg","width":1920,"height":1080,"caption":"De basics van biometrie - Recogtech"},{"@type":"BreadcrumbList","@id":"https:\/\/recogtech.com\/en\/insights-en\/the-basics-of-biometrics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/recogtech.com\/en\/"},{"@type":"ListItem","position":2,"name":"The basics of biometrics"}]},{"@type":"WebSite","@id":"https:\/\/recogtech.com\/en\/#website","url":"https:\/\/recogtech.com\/en\/","name":"Recogtech - Biometrische beveiliging","description":"High-end Biometric Security","publisher":{"@id":"https:\/\/recogtech.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/recogtech.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/recogtech.com\/en\/#organization","name":"Recogtech B.V.","url":"https:\/\/recogtech.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","width":600,"height":111,"caption":"Recogtech B.V."},"image":{"@id":"https:\/\/recogtech.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/recogtech.com\/en\/#\/schema\/person\/aabb0d9a4b473b0a549126d6b30b6735","name":"Justi Veenhof","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c0691fdf289a8540abf11dabefe94b90e1896aef23be8d99b18fbb45ff6d458b?s=96&d=mm&r=g","caption":"Justi Veenhof"}}]}},"_links":{"self":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362556","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/comments?post=362556"}],"version-history":[{"count":4,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362556\/revisions"}],"predecessor-version":[{"id":364622,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/posts\/362556\/revisions\/364622"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media\/362113"}],"wp:attachment":[{"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/media?parent=362556"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/categories?post=362556"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/recogtech.com\/en\/wp-json\/wp\/v2\/tags?post=362556"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}