{"id":7214,"date":"2023-06-16T13:42:55","date_gmt":"2023-06-16T13:42:55","guid":{"rendered":"https:\/\/dev.ftxidentity.com\/custom-development\/?p=7214"},"modified":"2025-03-21T05:35:14","modified_gmt":"2025-03-21T05:35:14","slug":"how-fake-ids-scan","status":"publish","type":"post","link":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/","title":{"rendered":"Do Fake IDs Scan? A Closer Look at ID Scanning"},"content":{"rendered":"<p>Fake IDs are very prevalent these days. And they\u2019re better than ever. In fact, many of the options sold on popular sites are \u201cguaranteed to scan.\u201d<\/p>\n<p>You might be wondering: How is that possible? How can fake IDs that are sold online scan?<\/p>\n<p><strong>Here\u2019s a simple answer:<\/strong> A lot of fake IDs scan because most ID scanners only check to see if the information encoded in the barcode is in the correct format. Therefore, as long as the barcode is encoded correctly and the data shows the ID holder is of legal age, it will scan like a legitimate ID.<\/p>\n<div class=\"cta-section fake-id-cta\">\n<h2 class=\"cta-title\">Prevent fake IDs from slipping through!<\/h2>\n<p>Explore FTx Identity\u2019s advanced ID scanning solutions.<\/p>\n<p class=\"m-0\"><a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/contact-us\/\" class=\"button schedule-btn\">Request A Demo<\/a><\/p>\n<\/div>\n<p>In other words, the data isn\u2019t cross-referenced against a government database. Therefore, the ID could include a completely made-up identity, and it will continue to scan.<\/p>\n<p>However, this may be changing. AI-based scanners use image processing to scan IDs and compare the ID against official templates. These scanning tools can recognize tiny, telling differences in spacing, <a href=\"https:\/\/www.techyflavors.com\/2024\/06\/best-top-6-font-generator-tools-2024.html\" target=\"_blank\" rel=\"noopener\"><strong>fonts<\/strong><\/a>, holograms and imperfections. These tools can spot fake IDs with much greater precision, but the majority of bar and liquor store scanners don\u2019t yet have these capabilities.<\/p>\n<p>Do you sell age-restricted products or services? Beyond ID scanners there are many other steps you can take to protect yourself. This guide features tips for using ID scanners, as well as other ways to check for fake IDs.<\/p>\n<h2>Why Don\u2019t ID Scanners Catch Fake IDs?<\/h2>\n<p>Most <span style=\"text-decoration:underline;\"><strong><a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/feature\/identity-scan-solutions\/\" target=\"_blank\" rel=\"noreferrer noopener\">online ID scanners<\/a><\/strong><\/span> capture data encrypted in the barcode or magnetic strip on the back of a driver\u2019s license or government-issued ID. These scans determine if the data is valid and in the right format. Therefore, if the barcode is encoded properly and says the ID holder is of age, it will pass a scan.<\/p>\n<div class=\"blog-quote\">\n<p class=\"m-0 text-center\">Looking For the Best ID Scanner to Put a Stop to Fake IDs? Glance through the <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/best-id-scanners\/\"><b>6 Best ID Scanners<\/b><\/a>.<\/p>\n<\/div>\n<p>Why is that possible?<\/p>\n<p>Essentially, ID barcodes are not intended for security. Instead, the barcodes are created to simplify data collection. They enable ID scanners to quickly extract information from an ID, e.g. as you pass through a TSA checkpoint for instance or visit a liquor store.<\/p>\n<p>Counterfeiters can find the tools and encoding schemes online for forging barcode data, and consequently it\u2019s fairly easy to create scannable fake IDs. In fact, the majority of fake IDs sold online will scan as legitimate. ID scanners do, however, catch fakes that aren\u2019t properly encoded.<\/p>\n<p>Many states are introducing counterfeit-proofing features in their IDs to prevent fake IDs from entering the market.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"How Do ID Scanners Work?\" width=\"1200\" height=\"400\" src=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/ID-Features-that-Prevent-Fake-IDs-from-Scanning.jpg\"><\/p>\n<h2>New ID Features to Stop Counterfeiting<\/h2>\n<p>Many states have incorporated encrypted features that prevent fake IDs from scanning. The most common types of features include:<\/p>\n<ul>\n<li><strong>Holograms: <\/strong> Many IDs have holograms embedded into the card itself. These holograms are often complex and difficult to replicate, making it harder for fake IDs to pass a scan.<\/li>\n<li><strong>UV Features: <\/strong> Some IDs have features that are only visible under UV light. If a fake ID doesn\u2019t replicate these features correctly, it won\u2019t pass a scan.<\/li>\n<li><strong>Microprinting: <\/strong> This involves very small text or numbers printed onto the ID that are difficult to replicate without high-quality equipment.<\/li>\n<li><strong>RFID Chips: <\/strong> Some IDs have RFID chips embedded in them, which contain information that can be read by a scanner. If a fake ID doesn\u2019t have a working RFID chip, it won\u2019t pass a scan.<\/li>\n<li><strong>Complex Card Designs: <\/strong> Many IDs have complex designs with multiple layers and colors, which can be difficult to replicate accurately.<\/li>\n<li><strong>Tactile Features: <\/strong> Some IDs have raised text, distinct typefaces, fine lines, microtext or images that can be felt. If these aren\u2019t replicated on a fake ID, it can be a giveaway.<\/li>\n<li><strong>Ghost Images: <\/strong> Some IDs have a smaller, ghost image of the ID holder. This is another feature that can be difficult to replicate.<\/li>\n<\/ul>\n<div class=\"did-you-know-second-option\">\n<p class=\"m-0 text-center\">Many counterfeiters use actual holograms and UV features from real IDs to bypass checks. This makes <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/feature\/identity-scan-solutions\/\"><strong>advanced ID scanners<\/strong><\/a> crucial for detection. <\/p>\n<\/div>\n<h3>Passing Lighting Checks<\/h3>\n<p>Holograms and UV features are some of the most difficult to forge. These features can be tested with white light. By shining white light on the ID or exposing it to UV light, holograms and fluorescent overlays are utilized as an additional layer of security.<\/p>\n<p>Because it is simple to verify these security measures with low-tech techniques, today\u2019s counterfeiters will attempt to replicate them as precisely as possible. To pass these checks, forgers either attempt to duplicate these security features or port over genuine versions from legitimate IDs.<\/p>\n<p>The quality of the fake ID and the ID scanner\u2019s complexity determine whether or not it will pass the lighting test on an ID scanner. Relying solely on these tests can give the false impression of security because more advanced fake IDs can duplicate holograms and fluorescent overlays.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" alt=\"ID Scanning Solutions\" width=\"1200\" height=\"400\" src=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/What-Information-Do-ID-Scanners-Gather.jpg\"><\/p>\n<h2>What Information Do ID Scanners Gather?<\/h2>\n<p>ID scanners typically gather vital ID stats from cards. Therefore, it\u2019s recommended that in addition to ID scanning, bars and age-restricted businesses use questions and visual checks as an added layer of protection.<\/p>\n<p>The types of stats captured by ID scanners include:<\/p>\n<ul>\n<li><strong>Full Name: <\/strong> The individual\u2019s first and last name.<\/li>\n<li><strong>Date of Birth: <\/strong> The individual\u2019s birth date to verify their age.<\/li>\n<li><strong>ID Expiration Date: <\/strong> The date when the ID will or has expired. (Note: <span style=\"text-decoration:underline;\"><a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/do-expired-ids-scan\/\">Expired IDs do scan<\/a><\/span>. Therefore, it\u2019s important that businesses know the local laws in their states regarding expired IDs.)<\/li>\n<li><strong>ID Issue Date: <\/strong> The date when the ID was issued.<\/li>\n<li><strong>ID Number: <\/strong> The unique identification number associated with the ID.<\/li>\n<li><strong>Gender: <\/strong> The individual\u2019s gender as listed on the ID.<\/li>\n<li><strong>Address: <\/strong> The individual\u2019s address as listed on the ID.<\/li>\n<li><strong>Photo: <\/strong> Some ID scanners can also capture the photo from the ID for further verification.<\/li>\n<\/ul>\n<p>The specific information gathered typically varies depending on the type of ID scanner used and the local laws and regulations regarding privacy and data collection.<\/p>\n<div class=\"tips-box\">\n\t<label>Tip<\/label><\/p>\n<p>Curious about the legal aspects? Check out our guide on <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/id-scanning-laws\/\"><strong>ID Scanning Laws by State<\/strong><\/a>.<\/p>\n<\/div>\n<h2>How ID Scanners Help Businesses Detect Fake IDs<\/h2>\n<p>You might be wondering: Is an ID scanner worth the investment if some fake IDs scan?<\/p>\n<p>The short answer is yes! ID scanning solutions \u2013 especially digital identity checkers \u2013 offer benefits like:<\/p>\n<ul>\n<li><strong>Fast, convenient ID scans \u2013 <\/strong> This is necessary at bars and nightclubs that must serve a large volume of customers.<\/li>\n<li><strong>Fake ID detection \u2013 <\/strong> ID scanners will typically catch the majority of low-quality fake IDs. These won\u2019t include scannable barcodes.<\/li>\n<li><strong>Pattern matching \u2013 <\/strong> The best ID scanners include the ability to detect tiny differences in text and images.<\/li>\n<\/ul>\n<p>Do fake IDs scan, considering all the factors discussed? Generally speaking, it is possible, although the probability of success is relatively low due to the implementation of advanced proprietary scanning technologies.<\/p>\n<div class=\"blog-quote\">\n<p class=\"m-0 text-center\">Are you ready to effectively prevent the use of fake IDs at your establishment, once and for all? Get in touch with <span style=\"text-decoration:underline;\"><strong> FTx Identity <\/strong><\/span>to demo our <a href=\"https:\/\/dev.ftxidentity.com\/custom-development\/\">identity verification software<\/a> today!<\/p>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Fake IDs are very prevalent these days. And they\u2019re better than ever. In fact, many of the options sold on popular sites are \u201cguaranteed to scan.\u201d You might be wondering: How is that possible? How can fake IDs that are sold online scan? Here\u2019s a simple answer: A lot of fake IDs scan because most [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7223,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[16],"tags":[51,52,53],"class_list":["post-7214","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-identity-verification","tag-do-fake-ids-scan","tag-how-do-fake-ids-scan","tag-id-scanning-solutions"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.8 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>How Do Fake IDs Scan? A Brief Overview of ID Scanning<\/title>\n<meta name=\"description\" content=\"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do Fake IDs Scan? A Closer Look at ID Scanning\" \/>\n<meta property=\"og:description\" content=\"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\" \/>\n<meta property=\"og:site_name\" content=\"FTx Identity\" \/>\n<meta property=\"article:published_time\" content=\"2023-06-16T13:42:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-21T05:35:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Danielle Dixon\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Danielle Dixon\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\"},\"author\":{\"name\":\"Danielle Dixon\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/ca532dd3620540f856e041a26e4a519c\"},\"headline\":\"Do Fake IDs Scan? A Closer Look at ID Scanning\",\"datePublished\":\"2023-06-16T13:42:55+00:00\",\"dateModified\":\"2025-03-21T05:35:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\"},\"wordCount\":1185,\"publisher\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg\",\"keywords\":[\"do fake ids scan\",\"how do fake ids scan\",\"ID scanning solutions\"],\"articleSection\":[\"Identity Verification\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\",\"name\":\"How Do Fake IDs Scan? A Brief Overview of ID Scanning\",\"isPartOf\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg\",\"datePublished\":\"2023-06-16T13:42:55+00:00\",\"dateModified\":\"2025-03-21T05:35:14+00:00\",\"description\":\"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg\",\"contentUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg\",\"width\":1200,\"height\":600,\"caption\":\"Do Fake IDs Scan?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do Fake IDs Scan? A Closer Look at ID Scanning\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#website\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\",\"name\":\"FTx Identity\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dev.ftxidentity.com\/custom-development\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#organization\",\"name\":\"FTx Identity\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg\",\"contentUrl\":\"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg\",\"caption\":\"FTx Identity\"},\"image\":{\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/ca532dd3620540f856e041a26e4a519c\",\"name\":\"Danielle Dixon\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g\",\"caption\":\"Danielle Dixon\"},\"description\":\"Danielle is a content writer at FTx POS. She specializes in writing about all-in-one, cutting-edge POS and business solutions that can help companies stand out. In addition to her passions for reading and writing, she also enjoys crafts and watching documentaries.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How Do Fake IDs Scan? A Brief Overview of ID Scanning","description":"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Do Fake IDs Scan? A Closer Look at ID Scanning","og_description":"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.","og_url":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/","og_site_name":"FTx Identity","article_published_time":"2023-06-16T13:42:55+00:00","article_modified_time":"2025-03-21T05:35:14+00:00","og_image":[{"width":1200,"height":600,"url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg","type":"image\/jpeg"}],"author":"Danielle Dixon","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Danielle Dixon","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#article","isPartOf":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/"},"author":{"name":"Danielle Dixon","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/ca532dd3620540f856e041a26e4a519c"},"headline":"Do Fake IDs Scan? A Closer Look at ID Scanning","datePublished":"2023-06-16T13:42:55+00:00","dateModified":"2025-03-21T05:35:14+00:00","mainEntityOfPage":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/"},"wordCount":1185,"publisher":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg","keywords":["do fake ids scan","how do fake ids scan","ID scanning solutions"],"articleSection":["Identity Verification"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/","url":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/","name":"How Do Fake IDs Scan? A Brief Overview of ID Scanning","isPartOf":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage"},"thumbnailUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg","datePublished":"2023-06-16T13:42:55+00:00","dateModified":"2025-03-21T05:35:14+00:00","description":"New ID scanners can prevent fake IDs from scanning. Learn why fake IDs scan, the types that work, and how you can catch fake IDs in your business.","breadcrumb":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#primaryimage","url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg","contentUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2023\/06\/Blog-18-How-Do-Fake-IDs-Scan-NEW.jpg","width":1200,"height":600,"caption":"Do Fake IDs Scan?"},{"@type":"BreadcrumbList","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/blog\/how-fake-ids-scan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dev.ftxidentity.com\/custom-development\/"},{"@type":"ListItem","position":2,"name":"Do Fake IDs Scan? A Closer Look at ID Scanning"}]},{"@type":"WebSite","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#website","url":"https:\/\/dev.ftxidentity.com\/custom-development\/","name":"FTx Identity","description":"","publisher":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dev.ftxidentity.com\/custom-development\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#organization","name":"FTx Identity","url":"https:\/\/dev.ftxidentity.com\/custom-development\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/","url":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg","contentUrl":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-content\/uploads\/2025\/01\/FTXIdentity-1.svg","caption":"FTx Identity"},"image":{"@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dev.ftxidentity.com\/custom-development\/#\/schema\/person\/ca532dd3620540f856e041a26e4a519c","name":"Danielle Dixon","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bc1070b4e92ed30b9b2dcce33b3374282d2237fbda47371395e9ae4ca323cc88?s=96&d=mm&r=g","caption":"Danielle Dixon"},"description":"Danielle is a content writer at FTx POS. She specializes in writing about all-in-one, cutting-edge POS and business solutions that can help companies stand out. In addition to her passions for reading and writing, she also enjoys crafts and watching documentaries."}]}},"_links":{"self":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/7214","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/comments?post=7214"}],"version-history":[{"count":1,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/7214\/revisions"}],"predecessor-version":[{"id":12414,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/posts\/7214\/revisions\/12414"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/media\/7223"}],"wp:attachment":[{"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/media?parent=7214"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/categories?post=7214"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dev.ftxidentity.com\/custom-development\/wp-json\/wp\/v2\/tags?post=7214"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}