﻿{"id":13736,"date":"2024-12-16T15:24:31","date_gmt":"2024-12-16T07:24:31","guid":{"rendered":"https:\/\/hfsecurity.cn\/?p=13736"},"modified":"2024-12-16T15:24:32","modified_gmt":"2024-12-16T07:24:32","slug":"fingerprint-scanner-history","status":"publish","type":"post","link":"https:\/\/hfsecurity.cn\/ar\/fingerprint-scanner-history\/","title":{"rendered":"\u062a\u0627\u0631\u064a\u062e \u0645\u0627\u0633\u062d \u0628\u0635\u0645\u0627\u062a \u0627\u0644\u0623\u0635\u0627\u0628\u0639"},"content":{"rendered":"<p>Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.<\/p>\n\n\n\n<p>In 1000 BC, traders in ancient Babylon carved contracts on clay tablets, and then both parties pressed their fingerprints on the clay tablets, and the contract officially came into effect.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"476\" src=\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-1024x476.webp\" alt=\"\u0645\u0627\u0633\u062d \u0636\u0648\u0626\u064a \u0644\u0628\u0635\u0645\u0627\u062a \u0627\u0644\u0623\u0635\u0627\u0628\u0639 Bio600\" class=\"wp-image-12174\" srcset=\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-1024x476.webp 1024w, https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-300x139.webp 300w, https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-768x357.webp 768w, https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-1536x714.webp 1536w, https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-2048x952.webp 2048w, https:\/\/hfsecurity.cn\/wp-content\/uploads\/Bio600-Ten-Fingerprint-Scanner1-18x8.webp 18w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">\u0645\u0627\u0633\u062d \u0636\u0648\u0626\u064a \u0644\u0628\u0635\u0645\u0627\u062a \u0627\u0644\u0623\u0635\u0627\u0628\u0639 Bio600<\/figcaption><\/figure>\n\n\n\n<p>200 BC &#8211; China<br>The Qin Dynasty in China (221-206 BC) There is such a record in the documents of the Qin Dynasty that any theft will be recorded as evidence.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe title=\"HFSECURITY FAP30 OS3000 Linux  &amp; Windows $ Android Demo\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/N3VKlDwE0uo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<p>Clay seals with fingerprints were found in both the Qin Dynasty and the Han Dynasty (221 BC-220 AD)<\/p>\n\n\n\n<p>In 1686, Marcello Malpighi, a professor at the University of Bologna in Italy, found that fingerprint images have rich images, including arches, rings, vortices and ridges. These discoveries paved the way for the confirmation of fingerprint images in 1823<\/p>\n\n\n\n<p>In 1823, Professor Johannes Evengrista Purkinje discovered 9 more fingerprint images based on the previous ones, although they were not used at the time<\/p>\n\n\n\n<p>In 1858, the British began to spread fingerprint recognition. In the same year, Sir William Herschel, the chief magistrate of the Hooghly region of Juniper, India, used fingerprint technology in contracts regulating local land use. Initially, the entire palm print was used, and now a single fingerprint is gradually used. <\/p>\n\n\n\n<p>In 1880, the real use of fingerprints, the function of identification, was excavated. Dr. Foldes proved that fingerprints are effective through a case. This case was successfully verified by comparing the fingerprints left on the bottle with the fingerprints of the laboratory staff. His idea was successfully verified. Before this, fingerprints were only used in writing and theoretically until 1896, when fingerprint identification was used in a criminal case; <\/p>\n\n\n\n<p>the Argentine police analyzed the bloody fingerprints left on the door frame and found the owner of the fingerprint in the data, thus quickly confirming the suspect; after this successful case, more and more law enforcement agencies can collect and retain fingerprints; in 1896, law enforcement agencies around the world began to use fingerprint identification. With the continuous use of fingerprint identification, standardization, internationalization, and security also need to be confirmed;<\/p>\n\n\n\n<p>In 1924, the Federal Bureau of Investigation (FBI) of the United States undertook this task and began to formulate a standardized process for fingerprints<\/p>\n\n\n\n<p>In 1971, the FBI had collected and stored more than 200 million fingerprints<\/p>\n\n\n\n<p>In the 1990s, the development of computers also accelerated the development of <a href=\"https:\/\/hfsecurity.cn\/ar\/\u0645\u0627\u0633\u062d-\u0636\u0648\u0626\u064a-\u0628\u0635\u0631\u064a-\u0644\u0628\u0635\u0645\u0627\u062a-\u0627\u0644\u0623\u0635\u0627\u0628\u0639-\u064a\u0639\u0645\u0644-\u0628\u0646\u0638\/\" target=\"_blank\" rel=\"noreferrer noopener\">fingerprint identification<\/a>, and fingerprint programs developed by computers were gradually put on the agenda<\/p>\n\n\n\n<p>Child safety has always been a global concern, in order to solve the problem of child loss and kidnapping.<\/p>\n\n\n\n<p>In 1996, American Fingerprint was founded by Chris Migilaro. This policy has found many lost children.<\/p>\n\n\n\n<p>In 2012, the data of Interpol&#8217;s automatic fingerprint identification system has summarized more than 150,000 fingerprint information from 190 member countries.<\/p>\n\n\n\n<p>Fingerprint recognition in 2021 is a milestone year. The FBI and the DNA Index System (CODIS) have successfully matched 20 million pieces of data.<\/p>\n\n\n\n<p>2024~Future<\/p>\n\n\n\n<p>Fingerprint recognition technology will become more and more mature, helping you complete identity verification<br>Chongqing Huifan Technology Co., Ltd. has 19 years of professional identity verification experience.<\/p>","protected":false},"excerpt":{"rendered":"<p>\u0644\u0642\u062f \u0643\u0627\u0646\u062a \u0623\u062c\u0647\u0632\u0629 \u0645\u0633\u062d \u0628\u0635\u0645\u0627\u062a \u0627\u0644\u0623\u0635\u0627\u0628\u0639 \u0645\u0648\u062c\u0648\u062f\u0629 \u0645\u0646\u0630 \u0641\u062a\u0631\u0629 \u0637\u0648\u064a\u0644\u0629 \u062c\u062f\u064b\u0627. \u0633\u062a\u062a\u0639\u0631\u0641 \u0627\u0644\u064a\u0648\u0645 \u0639\u0644\u0649 \u0639\u062f\u0629 \u0646\u0642\u0627\u0637 \u0632\u0645\u0646\u064a\u0629 \u0631\u0626\u064a\u0633\u064a\u0629 \u0645\u0646 \u0627\u0644\u0645\u0642\u0627\u0644\u0629 \u0627\u0644\u062a\u0627\u0644\u064a\u0629. \u0641\u064a \u0639\u0627\u0645 1000 \u0642\u0628\u0644 \u0627\u0644\u0645\u064a\u0644\u0627\u062f\u060c \u0642\u0627\u0645 \u0627\u0644\u062a\u062c\u0627\u0631 \u0641\u064a \u0628\u0627\u0628\u0644 \u0627\u0644\u0642\u062f\u064a\u0645\u0629 \u0628\u0646\u062d\u062a \u0627\u0644\u0639\u0642\u0648\u062f \u0639\u0644\u0649 \u0623\u0644\u0648\u0627\u062d \u0637\u064a\u0646\u064a\u0629\u060c \u062b\u0645 \u0642\u0627\u0645 \u0643\u0644\u0627 \u0627\u0644\u0637\u0631\u0641\u064a\u0646 \u0628\u0636\u063a\u0637 \u0628\u0635\u0645\u0627\u062a \u0623\u0635\u0627\u0628\u0639\u0647\u0645\u0627 \u0639\u0644\u0649 \u0627\u0644\u0623\u0644\u0648\u0627\u062d \u0627\u0644\u0637\u064a\u0646\u064a\u0629\u060c \u0648\u062f\u062e\u0644 \u0627\u0644\u0639\u0642\u062f \u0631\u0633\u0645\u064a\u064b\u0627 \u062d\u064a\u0632 \u0627\u0644\u062a\u0646\u0641\u064a\u0630. \u0641\u064a \u0639\u0627\u0645 200 \u0642\u0628\u0644 \u0627\u0644\u0645\u064a\u0644\u0627\u062f [\u2026]<\/p>","protected":false},"author":1,"featured_media":13737,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[538],"tags":[],"class_list":["post-13736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-industry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.1 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Fingerprint Scanner History - HFSecurity biometric solution<\/title>\n<meta name=\"description\" content=\"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hfsecurity.cn\/ar\/fingerprint-scanner-history\/\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fingerprint Scanner History\" \/>\n<meta property=\"og:description\" content=\"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hfsecurity.cn\/ar\/fingerprint-scanner-history\/\" \/>\n<meta property=\"og:site_name\" content=\"HFSecurity biometric solution\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/huifanTech\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-16T07:24:31+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-16T07:24:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"fb\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HF_Security\" \/>\n<meta name=\"twitter:site\" content=\"@HF_Security\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"fb\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/\"},\"author\":{\"name\":\"fb\",\"@id\":\"https:\/\/hfsecurity.cn\/#\/schema\/person\/6aa1715f97afa34b3f629a9f1358a752\"},\"headline\":\"Fingerprint Scanner History\",\"datePublished\":\"2024-12-16T07:24:31+00:00\",\"dateModified\":\"2024-12-16T07:24:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/\"},\"wordCount\":517,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/hfsecurity.cn\/#organization\"},\"image\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp\",\"articleSection\":[\"Industry\"],\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/\",\"url\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/\",\"name\":\"Fingerprint Scanner History - HFSecurity biometric solution\",\"isPartOf\":{\"@id\":\"https:\/\/hfsecurity.cn\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp\",\"datePublished\":\"2024-12-16T07:24:31+00:00\",\"dateModified\":\"2024-12-16T07:24:32+00:00\",\"description\":\"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.\",\"breadcrumb\":{\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage\",\"url\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp\",\"contentUrl\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp\",\"width\":1280,\"height\":700,\"caption\":\"FINGERPRINT SCANNER HISTORY\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/hfsecurity.cn\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fingerprint Scanner History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/hfsecurity.cn\/#website\",\"url\":\"https:\/\/hfsecurity.cn\/\",\"name\":\"HFSecurity biometric solution\",\"description\":\"Biometric Product Solution China Factory\",\"publisher\":{\"@id\":\"https:\/\/hfsecurity.cn\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/hfsecurity.cn\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/hfsecurity.cn\/#organization\",\"name\":\"HFSecurity\",\"url\":\"https:\/\/hfsecurity.cn\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/hfsecurity.cn\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/2022\/02\/logo-3.png\",\"contentUrl\":\"https:\/\/hfsecurity.cn\/wp-content\/uploads\/2022\/02\/logo-3.png\",\"width\":837,\"height\":414,\"caption\":\"HFSecurity\"},\"image\":{\"@id\":\"https:\/\/hfsecurity.cn\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/huifanTech\",\"https:\/\/x.com\/HF_Security\",\"https:\/\/www.linkedin.com\/feed\/\",\"http:\/\/www.youtube.com\/c\/Hfcctv\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/hfsecurity.cn\/#\/schema\/person\/6aa1715f97afa34b3f629a9f1358a752\",\"name\":\"fb\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326\",\"url\":\"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326\",\"contentUrl\":\"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326\",\"caption\":\"fb\"},\"sameAs\":[\"https:\/\/hfsecurity.cn\"],\"url\":\"https:\/\/hfsecurity.cn\/ar\/author\/fb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fingerprint Scanner History - HFSecurity biometric solution","description":"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hfsecurity.cn\/ar\/fingerprint-scanner-history\/","og_locale":"ar_AR","og_type":"article","og_title":"Fingerprint Scanner History","og_description":"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.","og_url":"https:\/\/hfsecurity.cn\/ar\/fingerprint-scanner-history\/","og_site_name":"HFSecurity biometric solution","article_publisher":"https:\/\/www.facebook.com\/huifanTech","article_published_time":"2024-12-16T07:24:31+00:00","article_modified_time":"2024-12-16T07:24:32+00:00","og_image":[{"width":1280,"height":700,"url":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp","type":"image\/webp"}],"author":"fb","twitter_card":"summary_large_image","twitter_creator":"@HF_Security","twitter_site":"@HF_Security","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"fb","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"3 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#article","isPartOf":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/"},"author":{"name":"fb","@id":"https:\/\/hfsecurity.cn\/#\/schema\/person\/6aa1715f97afa34b3f629a9f1358a752"},"headline":"Fingerprint Scanner History","datePublished":"2024-12-16T07:24:31+00:00","dateModified":"2024-12-16T07:24:32+00:00","mainEntityOfPage":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/"},"wordCount":517,"commentCount":0,"publisher":{"@id":"https:\/\/hfsecurity.cn\/#organization"},"image":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage"},"thumbnailUrl":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp","articleSection":["Industry"],"inLanguage":"ar","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/","url":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/","name":"Fingerprint Scanner History - HFSecurity biometric solution","isPartOf":{"@id":"https:\/\/hfsecurity.cn\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage"},"image":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage"},"thumbnailUrl":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp","datePublished":"2024-12-16T07:24:31+00:00","dateModified":"2024-12-16T07:24:32+00:00","description":"Fingerprint scanners have been around for a very long time. Today you will learn about several key time points from the following article.","breadcrumb":{"@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#primaryimage","url":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp","contentUrl":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/FINGERPRINT-SCANNER-HISTORY.webp","width":1280,"height":700,"caption":"FINGERPRINT SCANNER HISTORY"},{"@type":"BreadcrumbList","@id":"https:\/\/hfsecurity.cn\/fingerprint-scanner-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hfsecurity.cn\/"},{"@type":"ListItem","position":2,"name":"Fingerprint Scanner History"}]},{"@type":"WebSite","@id":"https:\/\/hfsecurity.cn\/#website","url":"https:\/\/hfsecurity.cn\/","name":"HFSecurity biometric solution","description":"Biometric Product Solution China Factory","publisher":{"@id":"https:\/\/hfsecurity.cn\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hfsecurity.cn\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Organization","@id":"https:\/\/hfsecurity.cn\/#organization","name":"HFSecurity","url":"https:\/\/hfsecurity.cn\/","logo":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/hfsecurity.cn\/#\/schema\/logo\/image\/","url":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/2022\/02\/logo-3.png","contentUrl":"https:\/\/hfsecurity.cn\/wp-content\/uploads\/2022\/02\/logo-3.png","width":837,"height":414,"caption":"HFSecurity"},"image":{"@id":"https:\/\/hfsecurity.cn\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/huifanTech","https:\/\/x.com\/HF_Security","https:\/\/www.linkedin.com\/feed\/","http:\/\/www.youtube.com\/c\/Hfcctv"]},{"@type":"Person","@id":"https:\/\/hfsecurity.cn\/#\/schema\/person\/6aa1715f97afa34b3f629a9f1358a752","name":"fb","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326","url":"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326","contentUrl":"https:\/\/hfsecurity.cn\/wp-content\/litespeed\/avatar\/c44a0d58d3840733447fda96b5ce6916.jpg?ver=1776148326","caption":"fb"},"sameAs":["https:\/\/hfsecurity.cn"],"url":"https:\/\/hfsecurity.cn\/ar\/author\/fb\/"}]}},"_links":{"self":[{"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/posts\/13736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/comments?post=13736"}],"version-history":[{"count":1,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/posts\/13736\/revisions"}],"predecessor-version":[{"id":13738,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/posts\/13736\/revisions\/13738"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/media\/13737"}],"wp:attachment":[{"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/media?parent=13736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/categories?post=13736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hfsecurity.cn\/ar\/wp-json\/wp\/v2\/tags?post=13736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}