{"version":"1.0","provider_name":"IDZONE - Access Control System","provider_url":"https:\/\/idzone.com.sa\/arabic","title":"Mobile Devices \u2013 The Future of Access Cards - IDZONE - Access Control System","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"SWGJxHTJNS\"><a href=\"https:\/\/idzone.com.sa\/arabic\/mobile-devices-the-future-of-access-cards\/\">\u0627\u0644\u0623\u062c\u0647\u0632\u0629 \u0627\u0644\u0645\u062d\u0645\u0648\u0644\u0629 - \u0645\u0633\u062a\u0642\u0628\u0644 \u0628\u0637\u0627\u0642\u0627\u062a \u0627\u0644\u0648\u0635\u0648\u0644<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/idzone.com.sa\/arabic\/mobile-devices-the-future-of-access-cards\/embed\/#?secret=SWGJxHTJNS\" width=\"600\" height=\"338\" title=\"&#8220;Mobile Devices \u2013 The Future of Access Cards&#8221; &#8212; IDZONE - Access Control System\" data-secret=\"SWGJxHTJNS\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/idzone.com.sa\/wp-content\/uploads\/2021\/08\/mobile-access-ds-teaser.png","thumbnail_width":480,"thumbnail_height":248,"description":"With legacy access cards moving out of the way for mobile phones to take over physical security, it\u2019s high time we look at the benefits mobile phone authentication provides. Mobile phones come with different chips and features which make them suitable for physical access control and authentication. The best way to use a mobile phone [&hellip;]"}