{"id":195763,"date":"2016-10-13T01:00:00","date_gmt":"2016-10-13T01:00:00","guid":{"rendered":"https:\/\/eenewseurope.artwhere.co\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/"},"modified":"2016-10-13T01:00:00","modified_gmt":"2016-10-13T01:00:00","slug":"authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/","title":{"rendered":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT"},"content":{"rendered":"<p>Du fait de la contrefa\u00e7on rampante, de la r\u00e9utilisation dangereuse d&rsquo;accessoires m\u00e9dicaux, et de la vuln\u00e9rabilit\u00e9 de n\u0153uds capteur connect\u00e9s aux r\u00e9seaux, les entreprises sont conscientes de la n\u00e9cessit\u00e9 d&rsquo;int\u00e9grer des protections efficaces \u00e0 leurs produits et \u00e0 leurs syst\u00e8mes. Ce circuit de s\u00e9curit\u00e9 fournit un ensemble d&rsquo;outils cryptographiques cibl\u00e9s, \u00e0 cl\u00e9 asym\u00e9trique et cl\u00e9 sym\u00e9trique, le tout sous un format compact et \u00e0 bas co\u00fbt. Les fonctions \u00e0 cl\u00e9 publique asym\u00e9trique sont support\u00e9es par un algorithme cryptographique ECC (Elliptic Curve Cryptography) P256 et une cl\u00e9 secr\u00e8te sym\u00e9trique SHA-256.<\/p>\n<p>Ce dispositif fournit deux broches GPIO authentifi\u00e9es \u00e0 contr\u00f4le d&rsquo;\u00e9tat et d\u00e9tection de niveau s\u00e9curis\u00e9s, ainsi qu&rsquo;une fonction unique pour am\u00e9liorer les op\u00e9rations de t\u00e9l\u00e9chargement ou d&rsquo;amor\u00e7age s\u00e9curis\u00e9. Il int\u00e8gre \u00e9galement des contre-mesures sophistiqu\u00e9es pour prot\u00e9ger des attaques de s\u00e9curit\u00e9 invasives ou non-invasives.<\/p>\n<p>Les applications finales sont notamment l&rsquo;authentification bidirectionnelle, le stockage s\u00e9curis\u00e9 de donn\u00e9es syst\u00e8me (comme les crypto-cl\u00e9s du syst\u00e8me), la v\u00e9rification de donn\u00e9es syst\u00e8me critiques, l&rsquo;amor\u00e7age s\u00e9curis\u00e9, et le contr\u00f4le d&rsquo;utilisation de produits finaux.<br \/>\nPour les applications o\u00f9 le microcontr\u00f4leur du syst\u00e8me h\u00f4te ne dispose pas de ressources suffisantes pour faire tourner les algorithmes ECC, ou lorsque le syst\u00e8me ne dispose pas de m\u00e9moire s\u00e9curis\u00e9e pour stocker la cl\u00e9 sym\u00e9trique SHA-256, le DS28C36 poss\u00e8de un coprocesseur, DS2476.<\/p>\n<p>Gr\u00e2ce \u00e0 ses fonctions d&rsquo;authentification s\u00e9curis\u00e9e emp\u00eachant le clonage, ce circuit \u00e9vite toute contrefa\u00e7on. Il g\u00e8re de mani\u00e8re s\u00e9curis\u00e9e les diff\u00e9rentes utilisations et fonctions du syst\u00e8me en supervisant ou limitant l&rsquo;usage d&rsquo;un p\u00e9riph\u00e9rique en fonction de param\u00e8tres stock\u00e9s dans une EEPROM&nbsp; s\u00e9curis\u00e9e et de l&rsquo;\u00e9tat d&rsquo;un compteur d\u00e9cr\u00e9mental 17 bits. L&rsquo;association d&rsquo;une fonction robuste de t\u00e9l\u00e9chargement ou d&rsquo;amor\u00e7age s\u00e9curis\u00e9 et de broches GPIO s\u00e9curis\u00e9es emp\u00eache le piratage du syst\u00e8me. De plus, les donn\u00e9es sensibles ne sont accessibles qu&rsquo;en lecture ou \u00e9criture crypt\u00e9e \u00e0 l&rsquo;aide d&rsquo;une cl\u00e9 \u00e9tablie par un protocole ECDH (Diffie-Hellman).<\/p>\n<hr \/>\n<p>\u00ab\u00a0Les biens de nos clients font l&rsquo;objet d&rsquo;attaques en permanence. Le DS28C36 leur offre une bo\u00eete \u00e0 outils cibl\u00e9e, avec des fonctions crypto et des caract\u00e9ristiques de s\u00e9curit\u00e9 s&rsquo;appuyant sur ECC et SHA-256, pour r\u00e9pondre \u00e0 un grand nombre de probl\u00e8mes de s\u00e9curit\u00e9 embarqu\u00e9e,\u00a0\u00bb d\u00e9clare Scott Jones, Directeur Ex\u00e9cutif, S\u00e9curit\u00e9 embarqu\u00e9e, Maxim Integrated. \u00ab\u00a0Maxim s&rsquo;appuie sur plus de 20 ans d&rsquo;exp\u00e9rience et d&rsquo;attachement au march\u00e9 de la s\u00e9curit\u00e9, sur un support d\u2019applications exceptionnel, et sur des services de programmation en usine pour aider ses clients \u00e0 r\u00e9ussir.\u00a0\u00bb<\/p>\n<p>Propos\u00e9 en bo\u00eetier TDFN de 3 mm x 3 mm, ce composant fonctionne sur toute la plage de temp\u00e9ratures allant de -40 \u00b0C \u00e0 +85 \u00b0C.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les concepteurs de produits industriels, m\u00e9dicaux et IoT, b\u00e9n\u00e9ficient d\u00e9sormais d&rsquo;un niveau d&rsquo;IP suppl\u00e9mentaire et d&rsquo;une protection d&rsquo;int\u00e9grit\u00e9 de dispositif, gr\u00e2ce \u00e0 l&rsquo;authentificateur s\u00e9curis\u00e9 DeepCover DS28C36 de Maxim Integrated Products. Il fournit une cryptographie \u00e0 cl\u00e9 publique et \u00e0 cl\u00e9 secr\u00e8te qui autorise des niveaux in\u00e9dits de protection de la s\u00e9curit\u00e9 embarqu\u00e9e.<\/p>\n","protected":false},"author":9,"featured_media":195764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[881],"tags":[893],"domains":[47],"ppma_author":[1141],"class_list":["post-195763","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouveaux-produits","tag-authentication-encryption-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title><\/title>\n<meta name=\"description\" content=\"Les concepteurs de produits industriels, m\u00e9dicaux et IoT, b\u00e9n\u00e9ficient d\u00e9sormais d&#039;un niveau d&#039;IP suppl\u00e9mentaire et d&#039;une protection d&#039;int\u00e9grit\u00e9 de...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT\" \/>\n<meta property=\"og:description\" content=\"Les concepteurs de produits industriels, m\u00e9dicaux et IoT, b\u00e9n\u00e9ficient d\u00e9sormais d&#039;un niveau d&#039;IP suppl\u00e9mentaire et d&#039;une protection d&#039;int\u00e9grit\u00e9 de dispositif, gr\u00e2ce \u00e0 l&#039;authentificateur s\u00e9curis\u00e9 DeepCover DS28C36 de Maxim Integrated Products. Il fournit une cryptographie \u00e0 cl\u00e9 publique et \u00e0 cl\u00e9 secr\u00e8te qui autorise des niveaux in\u00e9dits de protection de la s\u00e9curit\u00e9 embarqu\u00e9e.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-13T01:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8105_maxim_ds28c36_diagram.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"499\" \/>\n\t<meta property=\"og:image:height\" content=\"299\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT\",\"datePublished\":\"2016-10-13T01:00:00+00:00\",\"dateModified\":\"2016-10-13T01:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/\"},\"wordCount\":539,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\"],\"articleSection\":[\"Nouveaux produits\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/\",\"name\":\"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2016-10-13T01:00:00+00:00\",\"dateModified\":\"2016-10-13T01:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n?...","description":"Les concepteurs de produits industriels, m\u00e9dicaux et IoT, b\u00e9n\u00e9ficient d\u00e9sormais d'un niveau d'IP suppl\u00e9mentaire et d'une protection d'int\u00e9grit\u00e9 de...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763\/","og_locale":"fr_FR","og_type":"article","og_title":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT","og_description":"Les concepteurs de produits industriels, m\u00e9dicaux et IoT, b\u00e9n\u00e9ficient d\u00e9sormais d'un niveau d'IP suppl\u00e9mentaire et d'une protection d'int\u00e9grit\u00e9 de dispositif, gr\u00e2ce \u00e0 l'authentificateur s\u00e9curis\u00e9 DeepCover DS28C36 de Maxim Integrated Products. Il fournit une cryptographie \u00e0 cl\u00e9 publique et \u00e0 cl\u00e9 secr\u00e8te qui autorise des niveaux in\u00e9dits de protection de la s\u00e9curit\u00e9 embarqu\u00e9e.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763\/","og_site_name":"EENewsEurope","article_published_time":"2016-10-13T01:00:00+00:00","og_image":[{"width":499,"height":299,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci8105_maxim_ds28c36_diagram.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT","datePublished":"2016-10-13T01:00:00+00:00","dateModified":"2016-10-13T01:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/"},"wordCount":539,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["Authentication &amp; Encryption"],"articleSection":["Nouveaux produits"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/","url":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/","name":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2016-10-13T01:00:00+00:00","dateModified":"2016-10-13T01:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/authentificateur-securise-protegeant-les-systemes-et-les-noeuds-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Authentificateur s\u00e9curis\u00e9 prot\u00e9geant les syst\u00e8mes et les n\u0153uds IoT"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=195763"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/195763\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/195764"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=195763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=195763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=195763"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=195763"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=195763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}