{"version":"1.0","provider_name":"ACIX","provider_url":"https:\/\/www.acixme.com\/sa","author_name":"Aufait Test","author_url":"https:\/\/www.acixme.com\/sa\/author\/aufaituser\/","title":"Matrix QR-Based Access Control | ACIX","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YlaCtlevSQ\"><a href=\"https:\/\/www.acixme.com\/sa\/product\/matrix-qr-code-access-control\/\">Matrix QR-Based Access Control<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.acixme.com\/sa\/product\/matrix-qr-code-access-control\/embed\/#?secret=YlaCtlevSQ\" width=\"600\" height=\"338\" title=\"&#8220;Matrix QR-Based Access Control&#8221; &#8212; ACIX\" data-secret=\"YlaCtlevSQ\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.acixme.com\/sa\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.acixme.com\/sa\/wp-content\/uploads\/2022\/02\/Picture2-2.png","thumbnail_width":500,"thumbnail_height":267,"description":"Smartphones have revolutionized the world. In today\u2019s increasingly digitalizing world, you can perform nearly all tasks with a few taps on your phone. Whether you want to buy new clothes or order food, you can rely on smartphones to do it for you. Naturally, it also makes sense that you can control your facility\u2019s access through your smartphone. Building owners often want to control access and foot traffic in their buildings. Whether it\u2019s an office, commercial, or residential building, you don\u2019t want unauthorized personnel entering your premises without any security checks or measures. You might wonder why? The answer\u2019s straightforward. For starters, your residents and commercial tenants won\u2019t be happy if unauthorized personnel can enter and exit the building freely because of security risks. Likewise, office buildings house countless employees. However, more importantly, they also store physical and IP assets. Organizations don\u2019t want their IP assets in the wrong hands. That\u2019s why security is a serious concern for them."}