{"id":207400,"date":"2016-06-19T23:00:00","date_gmt":"2016-06-19T23:00:00","guid":{"rendered":"https:\/\/eenewseurope.artwhere.co\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/"},"modified":"2016-06-19T23:00:00","modified_gmt":"2016-06-19T23:00:00","slug":"solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/","title":{"rendered":"Solution facilitant l&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 pour l&rsquo;Internet des objets"},"content":{"rendered":"<p>De nombreux produits grand public, appareils domestiques, actifs industriels et capteurs sont d\u00e9j\u00e0 connect\u00e9s \u00e0 l&rsquo;Internet, ou le seront bient\u00f4t. La plupart d&rsquo;entre eux sont con\u00e7us pour fonctionner de fa\u00e7on autonome et sans surveillance et, \u00e0 ce titre, doivent b\u00e9n\u00e9ficier d&rsquo;une s\u00e9curit\u00e9 \u00e9lectronique de pointe afin d&#8217;emp\u00eacher les hackers de proc\u00e9der \u00e0 toute tentative de contrefa\u00e7on, de clonage, de vol d&rsquo;informations ou d&rsquo;utilisation abusive.<\/p>\n<p>Cette solution \u00ab\u00a0cl\u00e9 en main\u00a0\u00bb s\u00e9curis\u00e9e met \u00e0 la disposition de l\u2019IoT l&rsquo;expertise \u00e9prouv\u00e9e de la soci\u00e9t\u00e9 dans les domaines de la s\u00e9curit\u00e9 \u00e9lectronique pour des applications telles que les services bancaires, le commerce \u00e9lectronique ou la protection des identit\u00e9s. En tant qu&rsquo;\u00e9l\u00e9ment de s\u00e9curit\u00e9 fournissant des services d&rsquo;authentification et pouvant \u00eatre associ\u00e9 \u00e0 un microcontr\u00f4leur classique, cette solution int\u00e8gre son propre syst\u00e8me d&rsquo;exploitation s\u00e9curis\u00e9 et est certifi\u00e9e conforme aux Crit\u00e8res Communs de niveau 5 EAL5+, la norme de s\u00e9curit\u00e9 appliqu\u00e9e par l&rsquo;industrie bancaire.<\/p>\n<p>\u00ab\u00a0Le STSAFE-A100 est une solution hautement s\u00e9curis\u00e9e, \u00e9conomique et certifi\u00e9e pour prot\u00e9ger les objets de marque et l&rsquo;Internet des objets. Par rapport aux approches existantes telles que la s\u00e9curit\u00e9 \u00e0 base de logiciels d\u00e9ploy\u00e9e sur des microcontr\u00f4leurs polyvalents ou dans des \u00e9l\u00e9ments de s\u00e9curit\u00e9 non-certifi\u00e9s, cette alternative pr\u00e9sente des avantages \u00e9vidents,\u00a0\u00bb a d\u00e9clar\u00e9 Laurent Degauque, directeur du marketing, Division Secure Microcontrollers, Groupe MDG, STMicroelectronics. \u00ab\u00a0L&rsquo;int\u00e9gration ais\u00e9e facilite la mise en place de la s\u00e9curit\u00e9 au c\u0153ur du produit, et permet aux d\u00e9veloppeurs de se concentrer pleinement sur la valeur ajout\u00e9e qu&rsquo;ils apportent \u00e0 l&rsquo;application.\u00a0\u00bb<\/p>\n<p>Propos\u00e9 en bo\u00eetiers SO8N (4 x 5&nbsp;mm) et UFDFPN8 (2 x 3&nbsp;mm), cet \u00e9l\u00e9ment dispose de fonctions d&rsquo;authentification forte gr\u00e2ce auxquelles, seuls les appareils IoT autoris\u00e9s peuvent acc\u00e9der \u00e0 des services en ligne et, seuls les accessoires ou consommables autoris\u00e9s sont reconnus et accept\u00e9s par une application. Il est compatible avec le protocole d&rsquo;authentification de p\u00e9riph\u00e9riques USB&nbsp;Type C et s\u00e9curise les communications avec un h\u00f4te distant utilisant le protocole d&rsquo;\u00e9tablissement de connexions TLS (Transport Layer Security).<\/p>\n<hr \/>\n<p>Plusieurs fonctions suppl\u00e9mentaires permettent de r\u00e9duire les risques de faille de s\u00e9curit\u00e9, parmi lesquelles la v\u00e9rification de signature pour s\u00e9curiser le boot et la mise \u00e0 jour des firmware, des compteurs s\u00e9curis\u00e9s qui contr\u00f4lent l&rsquo;utilisation de consommables, l&rsquo;appairage s\u00e9curis\u00e9 au processeur d&rsquo;application h\u00f4te, le chiffrement et le d\u00e9chiffrement de donn\u00e9es pour un h\u00f4te local ou distant, ainsi que la g\u00e9n\u00e9ration de paires de cl\u00e9s de chiffrement.<\/p>\n<p>L\u2019\u00e9l\u00e9ment prend en charge les technologies de chiffrement asym\u00e9trique telles que le chiffrement par courbe elliptique ECC NIST ou Brainpool sur 256 et 384 bits, ainsi que le chiffrement sym\u00e9trique utilisant des cl\u00e9s AES-128\/AES-256. Il est livr\u00e9 avec un num\u00e9ro de s\u00e9rie propre \u00e0 chaque circuit. Son syst\u00e8me d&rsquo;exploitation comprend un noyau pour l&rsquo;authentification et la gestion des donn\u00e9es, et assure une protection forte contre les attaques physiques, logiques, par faute ou par canal cach\u00e9.<\/p>\n<p>Pour faciliter l&rsquo;int\u00e9gration de son \u00e9l\u00e9ment de s\u00e9curit\u00e9, ST propose un \u00e9cosyst\u00e8me complet compos\u00e9 d&rsquo;une carte d&rsquo;extension avec un brochage Arduino, d&rsquo;une librairie logicielle pour microcontr\u00f4leurs et de codes d&rsquo;impl\u00e9mentation de r\u00e9f\u00e9rence. Ces outils simplifient la connexion de l&rsquo;\u00e9l\u00e9ment de s\u00e9curit\u00e9 \u00e0 des microcontr\u00f4leurs appartenant, par exemple, \u00e0 la famille STM32.<\/p>\n<p><a href=\"http:\/\/www.st.com\/content\/st_com\/en\/products\/secure-mcus\/security-for-computer-and-consumer\/smartgrid-and-brand-protection-secure-mcus\/stsafe-a100.html?icmp=tt3732_gl_pron_jun2016\" target=\"_blank\" rel=\"noopener\">www.st.com\/STSAFE-A100<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A la fois robuste et d&rsquo;utilisation ais\u00e9e, l\u2019\u00e9l\u00e9ment de s\u00e9curit\u00e9 STSAFE-A100 de STMicroelectronics (ST) est con\u00e7u pour prot\u00e9ger les appareils industriels et grand public connect\u00e9s \u00e0 l&rsquo;Internet des objets (IoT). Certifi\u00e9 conforme aux normes de s\u00e9curit\u00e9 les plus strictes, il emp\u00eache \u00e9galement le clonage et la copie de produits en garantissant leur authenticit\u00e9.<\/p>\n","protected":false},"author":9,"featured_media":207401,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[881],"tags":[893],"domains":[47],"ppma_author":[1141],"class_list":["post-207400","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouveaux-produits","tag-authentication-encryption-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Solution facilitant l&#039;int\u00e9gration de la s\u00e9curit\u00e9 pour l&#039;Inte...<\/title>\n<meta name=\"description\" content=\"A la fois robuste et d&#039;utilisation ais\u00e9e, l\u2019\u00e9l\u00e9ment de s\u00e9curit\u00e9 STSAFE-A100 de STMicroelectronics (ST) est con\u00e7u pour prot\u00e9ger les appareils...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solution facilitant l&#039;int\u00e9gration de la s\u00e9curit\u00e9 pour l&#039;Internet des objets\" \/>\n<meta property=\"og:description\" content=\"A la fois robuste et d&#039;utilisation ais\u00e9e, l\u2019\u00e9l\u00e9ment de s\u00e9curit\u00e9 STSAFE-A100 de STMicroelectronics (ST) est con\u00e7u pour prot\u00e9ger les appareils industriels et grand public connect\u00e9s \u00e0 l&#039;Internet des objets (IoT). Certifi\u00e9 conforme aux normes de s\u00e9curit\u00e9 les plus strictes, il emp\u00eache \u00e9galement le clonage et la copie de produits en garantissant leur authenticit\u00e9.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-19T23:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci7922_st_stsafe-a100_p3833s.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1772\" \/>\n\t<meta property=\"og:image:height\" content=\"1181\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Alain Dieul\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Alain Dieul\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/\"},\"author\":{\"name\":\"Alain Dieul\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\"},\"headline\":\"Solution facilitant l&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 pour l&rsquo;Internet des objets\",\"datePublished\":\"2016-06-19T23:00:00+00:00\",\"dateModified\":\"2016-06-19T23:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/\"},\"wordCount\":640,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"Authentication &amp; Encryption\"],\"articleSection\":[\"Nouveaux produits\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/\",\"name\":\"Solution facilitant l'int\u00e9gration de la s\u00e9curit\u00e9 pour l'Internet des objets -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2016-06-19T23:00:00+00:00\",\"dateModified\":\"2016-06-19T23:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solution facilitant l&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 pour l&rsquo;Internet des objets\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf\",\"name\":\"Alain Dieul\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g\",\"caption\":\"Alain Dieul\"}}]}<\/script>","yoast_head_json":{"title":"Solution facilitant l'int\u00e9gration de la s\u00e9curit\u00e9 pour l'Inte...","description":"A la fois robuste et d'utilisation ais\u00e9e, l\u2019\u00e9l\u00e9ment de s\u00e9curit\u00e9 STSAFE-A100 de STMicroelectronics (ST) est con\u00e7u pour prot\u00e9ger les appareils...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400\/","og_locale":"fr_FR","og_type":"article","og_title":"Solution facilitant l'int\u00e9gration de la s\u00e9curit\u00e9 pour l'Internet des objets","og_description":"A la fois robuste et d'utilisation ais\u00e9e, l\u2019\u00e9l\u00e9ment de s\u00e9curit\u00e9 STSAFE-A100 de STMicroelectronics (ST) est con\u00e7u pour prot\u00e9ger les appareils industriels et grand public connect\u00e9s \u00e0 l'Internet des objets (IoT). Certifi\u00e9 conforme aux normes de s\u00e9curit\u00e9 les plus strictes, il emp\u00eache \u00e9galement le clonage et la copie de produits en garantissant leur authenticit\u00e9.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400\/","og_site_name":"EENewsEurope","article_published_time":"2016-06-19T23:00:00+00:00","og_image":[{"width":1772,"height":1181,"url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/import\/default\/files\/sites\/default\/files\/images\/eci7922_st_stsafe-a100_p3833s.jpg","type":"image\/jpeg"}],"author":"Alain Dieul","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Alain Dieul","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#article","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/"},"author":{"name":"Alain Dieul","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf"},"headline":"Solution facilitant l&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 pour l&rsquo;Internet des objets","datePublished":"2016-06-19T23:00:00+00:00","dateModified":"2016-06-19T23:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/"},"wordCount":640,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["Authentication &amp; Encryption"],"articleSection":["Nouveaux produits"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/","url":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/","name":"Solution facilitant l'int\u00e9gration de la s\u00e9curit\u00e9 pour l'Internet des objets -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2016-06-19T23:00:00+00:00","dateModified":"2016-06-19T23:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.ecinews.fr\/fr\/solution-facilitant-lintegration-de-la-securite-pour-linternet-des-objets\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Solution facilitant l&rsquo;int\u00e9gration de la s\u00e9curit\u00e9 pour l&rsquo;Internet des objets"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/568c789a4794bd460460501ba91f5daf","name":"Alain Dieul","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/6d32dc651fbcef3b338066625b118364","url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","caption":"Alain Dieul"}}]}},"authors":[{"term_id":1141,"user_id":9,"is_guest":0,"slug":"alaindieul","display_name":"Alain Dieul","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/93708ec89b35deb10f4cfbfe144b4e07?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=207400"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/207400\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/207401"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=207400"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=207400"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=207400"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=207400"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=207400"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}