{"version":"1.0","provider_name":"EENewsEurope","provider_url":"https:\/\/www.ecinews.fr\/fr\/","author_name":"eeNews Europe","author_url":"https:\/\/www.ecinews.fr\/fr\/author\/eenews-europe\/","title":"R\u00e9alisation de cl\u00e9s USB s\u00e9curis\u00e9es","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"KF0iO40hJM\"><a href=\"https:\/\/www.ecinews.fr\/fr\/white_papers\/realisation-de-cles-usb-securisees\/\">R\u00e9alisation de cl\u00e9s USB s\u00e9curis\u00e9es<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ecinews.fr\/fr\/white_papers\/realisation-de-cles-usb-securisees\/embed\/#?secret=KF0iO40hJM\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0R\u00e9alisation de cl\u00e9s USB s\u00e9curis\u00e9es\u00a0\u00bb &#8212; EENewsEurope\" data-secret=\"KF0iO40hJM\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/import\/eci3139_cypress-applic-.jpg","thumbnail_width":2143,"thumbnail_height":2012,"description":"Les multiples avantages des cl\u00e9s-m\u00e9moires USB ont favoris\u00e9 leur utilisation pour le stockage de donn\u00e9es dans de nombreux secteurs de l'industrie. Toutefois leur portabilit\u00e9 impose de pr\u00eater une attention particuli\u00e8re \u00e0 la protection des donn\u00e9es personnelles et sensibles contre le vol ou la perte accidentelle. Il existe plusieurs mani\u00e8res de r\u00e9aliser une cl\u00e9 s\u00e9curis\u00e9e, l'id\u00e9al \u00e9tant d'\u00e9quilibrer le co\u00fbt syst\u00e8me et le niveau de s\u00e9curisation n\u00e9cessit\u00e9 par une application donn\u00e9e. Cet article d\u00e9crit les techniques utilis\u00e9es pour la s\u00e9curisation des cl\u00e9s USB."}