{"id":458691,"date":"2024-08-22T10:00:21","date_gmt":"2024-08-22T08:00:21","guid":{"rendered":"https:\/\/www.ecinews.fr\/?p=458691"},"modified":"2024-08-20T18:34:51","modified_gmt":"2024-08-20T16:34:51","slug":"circuits-integres-dauthentification-securisee","status":"publish","type":"post","link":"https:\/\/www.ecinews.fr\/fr\/circuits-integres-dauthentification-securisee\/","title":{"rendered":"Circuits int\u00e9gr\u00e9s d&rsquo;authentification s\u00e9curis\u00e9e"},"content":{"rendered":"<h3>La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de s\u00e9curisation peuvent s\u2019av\u00e9rer complexes et on\u00e9reux.<\/h3>\n<p>Pour simplifier l&rsquo;approvisionnement s\u00e9curis\u00e9 de cl\u00e9s et permettre un prototypage plus rapide, Microchip Technology a ajout\u00e9 les circuits int\u00e9gr\u00e9s CryptoAuthentication ECC204, SHA104 et SHA105 \u00e0 son portefeuille de dispositifs, <a href=\"https:\/\/www.microchip.com\/en-us\/products\/security\/trust-platform\/trustflex?utm_source=pressrelease_medium=pressrelease&amp;utm_campaign=tfexpansion&amp;%20&amp;utm_bu=scg\"><strong>services et outils TrustFLEX<\/strong><\/a> .<\/p>\n<p><strong>\u00a0<\/strong>Les circuits int\u00e9gr\u00e9s ECC20x et SHA10x sont des dispositifs de stockage s\u00e9curis\u00e9s bas\u00e9s sur une conception architecturale, con\u00e7us pour prot\u00e9ger les cl\u00e9s secr\u00e8tes contre les attaques et les acc\u00e8s non autoris\u00e9es. Dans le cadre de la plateforme TrustFLEX, les circuits int\u00e9gr\u00e9s ECC204, SHA104 et SHA105 sont pr\u00e9configur\u00e9s pour r\u00e9pondre \u00e0 des cas d&rsquo;utilisations estim\u00e9s comme fr\u00e9quents dans le cadre d\u2019applications s\u00e9curis\u00e9es.Ces\u00a0 restent toutefois personnalisables cl\u00e9s cryptographiques et des exemples de code pour rationaliser le processus de d\u00e9veloppement sont mis \u00e0 disposition des d\u00e9veloppeurs.<\/p>\n<p>\u00ab L&rsquo;ajout des appareils pr\u00e9configur\u00e9s ECC20x et SHA10x \u00e0 notre plateforme TrustFLEX facilitera l&rsquo;exploitation des services de provisionnement s\u00e9curis\u00e9 de Microchip pour un ensemble plus large d&rsquo;applications \u00bb, Nuri Dagdeviren, vice-pr\u00e9sident du groupe informatique s\u00e9curis\u00e9 de Microchip. \u00ab Avec cette extension de plateforme, Microchip continue de renforcer son portefeuille, en rendant les circuits int\u00e9gr\u00e9s d&rsquo;authentification de s\u00e9curit\u00e9 plus accessibles et plus sp\u00e9cifiquement optimis\u00e9s pour les applications \u00e0 volume \u00e9lev\u00e9 et sensibles aux co\u00fbts\u00a0\u00bb.<\/p>\n<p>Les appareils ECC20x et SHA10x r\u00e9pondent aux exigences communes de stockage de cl\u00e9s s\u00e9curis\u00e9es (JIL) et ont \u00e9t\u00e9 certifi\u00e9s par le NIST Entropy Source Validation (ESV) et le Cryptographic Algorithm Validation Program (CAVP) conform\u00e9ment \u00e0 la norme f\u00e9d\u00e9rale de traitement de l&rsquo;information (FIPS). Les familles de circuits int\u00e9gr\u00e9s s\u00e9curis\u00e9s sont con\u00e7ues pour mettre en \u0153uvre une authentification fiable afin de maintenir la confidentialit\u00e9, l&rsquo;int\u00e9grit\u00e9 et l&rsquo;authenticit\u00e9 des donn\u00e9es et des communications dans une large gamme de syst\u00e8mes et d&rsquo;applications.<\/p>\n<p>Les circuits int\u00e9gr\u00e9s de crypto-authentification de Microchip sont de petits dispositifs \u00e0 faible consommation d\u2019\u00e9nergie, con\u00e7us pour \u00eatre compatibles avec tous les microprocesseurs (MPU) ou microcontr\u00f4leurs (MCU). Ils fournissent des solutions flexibles pour s\u00e9curiser les dispositifs industriels, m\u00e9dicaux, les \u00e9quipements aliment\u00e9s par batterie et les applications jetables. De plus, l&rsquo;ECC204 est un sous-syst\u00e8me de stockage s\u00e9curis\u00e9 (SSS) d&rsquo;authentification Qi approuv\u00e9 par le Wireless Power Consortium (WPC). Visitez le site Web de Microchip pour en savoir plus sur la <a href=\"https:\/\/www.microchip.com\/en-us\/products\/security\/trust-platform\/trustflex?utm_source=pressrelease_medium=pressrelease&amp;utm_campaign=tfexpansion&amp;%20&amp;utm_bu=scg\"><strong>plateforme Trust<\/strong><\/a> et son portefeuille de <a href=\"https:\/\/www.microchip.com\/en-us\/products\/security?utm_source=pressrelease_medium=pressrelease&amp;utm_campaign=tfexpansion&amp;%20&amp;utm_bu=scg\"><strong>solutions de s\u00e9curit\u00e9<\/strong><\/a><strong><u>.<\/u><\/strong><\/p>\n<p><strong><u>\u00a0<\/u><\/strong><strong>Outils de d\u00e9veloppement<\/strong><\/p>\n<p>Les circuits int\u00e9gr\u00e9s ECC20x et SHA10x sont pris en charge par <a href=\"https:\/\/www.microchip.com\/en-us\/products\/security\/trust-platform\/tpds\"><strong>la suite Trust Platform Design<\/strong><\/a> de Microchip, qui fournit des exemples de code et de mat\u00e9riel d&rsquo;apprentissage. Elle permet aussi le transfert s\u00e9curis\u00e9 des informations d&rsquo;identification pour exploiter plus facilement les services de fourniture de cl\u00e9s s\u00e9curis\u00e9es de Microchip. Les appareils sont \u00e9galement pris en charge par l&rsquo;environnement de d\u00e9veloppement int\u00e9gr\u00e9 (IDE) MPLAB<sup>\u00ae<\/sup> X, des cartes d&rsquo;\u00e9valuation sp\u00e9cifiques au produit et la prise en charge de la biblioth\u00e8que CryptoAuthLib.<\/p>\n<p><a href=\"https:\/\/www.microchip.com\/\">Microchip <strong>Technology<\/strong><\/a><\/p>\n<p><strong>\u00a0<\/strong><a href=\"https:\/\/news.google.com\/publications\/CAAqBwgKMJbcwQswuPfYAw?hl=fr&amp;gl=BE&amp;ceid=BE:fr\">Suivre ECInews sur Google news<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de [&hellip;]<\/p>\n","protected":false},"author":39,"featured_media":458700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[881],"tags":[936,7265,3861],"domains":[47],"ppma_author":[6113],"class_list":["post-458691","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-nouveaux-produits","tag-circuits-integres","tag-cryptographie-fr","tag-securite-fr","domains-electronique-eci"],"acf":[],"yoast_head":"<title>Circuits int\u00e9gr\u00e9s d&#039;authentification s\u00e9curis\u00e9e ...<\/title>\n<meta name=\"description\" content=\"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Circuits int\u00e9gr\u00e9s d&#039;authentification s\u00e9curis\u00e9e\" \/>\n<meta property=\"og:description\" content=\"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de s\u00e9curisation peuvent s\u2019av\u00e9rer complexes et on\u00e9reux.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691\/\" \/>\n<meta property=\"og:site_name\" content=\"EENewsEurope\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-22T08:00:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-20T16:34:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/2024\/08\/ECI4385-MC1673fr-TrustFlex-Expansion-Press-Release-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1080\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"NicolasFeste\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"NicolasFeste\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/\"},\"author\":{\"name\":\"NicolasFeste\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43\"},\"headline\":\"Circuits int\u00e9gr\u00e9s d&rsquo;authentification s\u00e9curis\u00e9e\",\"datePublished\":\"2024-08-22T08:00:21+00:00\",\"dateModified\":\"2024-08-20T16:34:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/\"},\"wordCount\":625,\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"keywords\":[\"Circuits int\u00e9gr\u00e9s\",\"Cryptographie\",\"s\u00e9curit\u00e9\"],\"articleSection\":[\"Nouveaux produits\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/\",\"url\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/\",\"name\":\"Circuits int\u00e9gr\u00e9s d'authentification s\u00e9curis\u00e9e -\",\"isPartOf\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\"},\"datePublished\":\"2024-08-22T08:00:21+00:00\",\"dateModified\":\"2024-08-20T16:34:51+00:00\",\"description\":\"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de s\u00e9curisation peuvent s\u2019av\u00e9rer complexes et on\u00e9reux.\",\"breadcrumb\":{\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ecinews.fr\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Circuits int\u00e9gr\u00e9s d&rsquo;authentification s\u00e9curis\u00e9e\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#website\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"name\":\"EENewsEurope\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#organization\",\"name\":\"EENewsEurope\",\"url\":\"https:\/\/www.ecinews.fr\/fr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"contentUrl\":\"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg\",\"width\":283,\"height\":113,\"caption\":\"EENewsEurope\"},\"image\":{\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43\",\"name\":\"NicolasFeste\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/1ea421e7d03c1e96a9ea2bcf2705734a\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g\",\"caption\":\"NicolasFeste\"}}]}<\/script>","yoast_head_json":{"title":"Circuits int\u00e9gr\u00e9s d'authentification s\u00e9curis\u00e9e ...","description":"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691\/","og_locale":"fr_FR","og_type":"article","og_title":"Circuits int\u00e9gr\u00e9s d'authentification s\u00e9curis\u00e9e","og_description":"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de s\u00e9curisation peuvent s\u2019av\u00e9rer complexes et on\u00e9reux.","og_url":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691\/","og_site_name":"EENewsEurope","article_published_time":"2024-08-22T08:00:21+00:00","article_modified_time":"2024-08-20T16:34:51+00:00","og_image":[{"width":1080,"height":600,"url":"https:\/\/cdn.eenewseurope.com\/wp-content\/uploads\/2024\/08\/ECI4385-MC1673fr-TrustFlex-Expansion-Press-Release-scaled.jpg","type":"image\/jpeg"}],"author":"NicolasFeste","twitter_card":"summary_large_image","twitter_misc":{"Written by":"NicolasFeste","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#article","isPartOf":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/"},"author":{"name":"NicolasFeste","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43"},"headline":"Circuits int\u00e9gr\u00e9s d&rsquo;authentification s\u00e9curis\u00e9e","datePublished":"2024-08-22T08:00:21+00:00","dateModified":"2024-08-20T16:34:51+00:00","mainEntityOfPage":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/"},"wordCount":625,"publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"keywords":["Circuits int\u00e9gr\u00e9s","Cryptographie","s\u00e9curit\u00e9"],"articleSection":["Nouveaux produits"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/","url":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/","name":"Circuits int\u00e9gr\u00e9s d'authentification s\u00e9curis\u00e9e -","isPartOf":{"@id":"https:\/\/www.ecinews.fr\/fr\/#website"},"datePublished":"2024-08-22T08:00:21+00:00","dateModified":"2024-08-20T16:34:51+00:00","description":"La s\u00e9curisation des cl\u00e9s est cruciale pour prot\u00e9ger les cl\u00e9s sensibles contre les manipulations non autoris\u00e9es et les attaques malveillantes. Pour garantir la s\u00e9curit\u00e9 des applications grand public, industrielles, des centres de donn\u00e9es et m\u00e9dicales, il est indispensable de stocker les cl\u00e9s de mani\u00e8re s\u00e9curis\u00e9e. Cependant, le d\u00e9veloppement et la documentation de ce processus de s\u00e9curisation peuvent s\u2019av\u00e9rer complexes et on\u00e9reux.","breadcrumb":{"@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cdn.eenewseurope.com\/fr\/circuits-integres-dauthentification-securisee\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ecinews.fr\/fr\/"},{"@type":"ListItem","position":2,"name":"Circuits int\u00e9gr\u00e9s d&rsquo;authentification s\u00e9curis\u00e9e"}]},{"@type":"WebSite","@id":"https:\/\/www.ecinews.fr\/fr\/#website","url":"https:\/\/www.ecinews.fr\/fr\/","name":"EENewsEurope","description":"Just another WordPress site","publisher":{"@id":"https:\/\/www.ecinews.fr\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ecinews.fr\/fr\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.ecinews.fr\/fr\/#organization","name":"EENewsEurope","url":"https:\/\/www.ecinews.fr\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","contentUrl":"https:\/\/www.ecinews.fr\/wp-content\/uploads\/2022\/02\/logo-1.jpg","width":283,"height":113,"caption":"EENewsEurope"},"image":{"@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/c7104a72b466a801f257e51481de0c43","name":"NicolasFeste","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.ecinews.fr\/fr\/#\/schema\/person\/image\/1ea421e7d03c1e96a9ea2bcf2705734a","url":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","caption":"NicolasFeste"}}]}},"authors":[{"term_id":6113,"user_id":39,"is_guest":0,"slug":"nicolasfeste","display_name":"NicolasFeste","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/2e187f4d96902933ba445ed6c760e11c?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691"}],"collection":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/users\/39"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/comments?post=458691"}],"version-history":[{"count":0,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/posts\/458691\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media\/458700"}],"wp:attachment":[{"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/media?parent=458691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/categories?post=458691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/tags?post=458691"},{"taxonomy":"domains","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/domains?post=458691"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.ecinews.fr\/fr\/wp-json\/wp\/v2\/ppma_author?post=458691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}