{"version":"1.0","provider_name":"Lisam Time","provider_url":"https:\/\/time.lisam.com\/nl\/","author_name":"Lisam Time","author_url":"https:\/\/time.lisam.com\/nl\/author\/itsupport_rpo0xgfw\/","title":"Biometrische identificatie: methoden en oplossingen - Lisam Time","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Hlsr7Se3E9\"><a href=\"https:\/\/time.lisam.com\/nl\/biometrische-identificatie-methoden-en-oplossingen\/\">Biometrische identificatie: methoden en oplossingen<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/time.lisam.com\/nl\/biometrische-identificatie-methoden-en-oplossingen\/embed\/#?secret=Hlsr7Se3E9\" width=\"600\" height=\"338\" title=\"&#8220;Biometrische identificatie: methoden en oplossingen&#8221; &#8212; Lisam Time\" data-secret=\"Hlsr7Se3E9\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/time.lisam.com\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/time.lisam.com\/wp-content\/uploads\/2025\/08\/Identification-biometrique-methodes-et-solutions.jpg","thumbnail_width":1367,"thumbnail_height":644,"description":"Identiteitsfraude, documentendiefstal, cybercriminaliteit\u2026 zoveel bedreigingen die bedrijven in het vizier hebben en die vragen om het nemen van specifieke maatregelen. Met de technologische ontwikkelingen van de afgelopen jaren hebben bedrijven ervoor gekozen biometrie in te zetten om zich te beschermen tegen kwaadaardige activiteiten. Een overzicht van deze beveiligingsmaatregel. Een overzicht van biometrische authenticatie Biometrische analyse [&hellip;]"}