{"id":21568,"date":"2020-02-20T04:00:27","date_gmt":"2020-02-20T09:00:27","guid":{"rendered":"https:\/\/blogs.funiber.org\/pt\/?p=21568"},"modified":"2020-02-19T05:09:10","modified_gmt":"2020-02-19T10:09:10","slug":"funiber-autenticacao-biometrica","status":"publish","type":"post","link":"https:\/\/www.funiber.blog\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica","title":{"rendered":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas"},"content":{"rendered":"<h2>A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.<\/h2>\n<p>Dada a data de vencimento das senhas, pr\u00f3xima ao vencimento, as empresas come\u00e7am a apostar na integra\u00e7\u00e3o de sistemas de identifica\u00e7\u00e3o biom\u00e9trica em seus escrit\u00f3rios, pois \u00e9 uma solu\u00e7\u00e3o mais segura.<!--more--><\/p>\n<p>A autentica\u00e7\u00e3o biom\u00e9trica \u00e9 diferenciada usando as caracter\u00edsticas do corpo humano como a chave para identifica\u00e7\u00e3o.<\/p>\n<p>O portal <a href=\"https:\/\/cepymenews.es\" target=\"_blank\" rel=\"noopener noreferrer\">Cepymenews<\/a> lista os tipos mais comuns de autentica\u00e7\u00e3o biom\u00e9trica:<\/p>\n<ul>\n<li>Digitaliza\u00e7\u00e3o de \u00edris: \u00e9 considerada uma das formas mais seguras de biometria &#8220;, pois existem mais de 200 pontos \u00fanicos em cada \u00edris&#8221;.<\/li>\n<li>Identifica\u00e7\u00e3o de impress\u00e3o digital: esse m\u00e9todo \u00e9 muito popular em dispositivos m\u00f3veis.<\/li>\n<li>Reconhecimento facial: \u201csensores sofisticados podem se adaptar a diferentes tons e posi\u00e7\u00f5es do rosto\u201d.<\/li>\n<li>Impress\u00e3o de voz: por meio de uma grava\u00e7\u00e3o feita anteriormente, o usu\u00e1rio precisar\u00e1 apenas dizer algumas palavras para o sistema vincul\u00e1-lo \u00e0 grava\u00e7\u00e3o.<\/li>\n<li>Biometria comportamental: o site da Cepymenews destaca que este sistema tem uma vis\u00e3o mais geral, na qual toda a atividade do usu\u00e1rio \u00e9 investigada at\u00e9 que algo suspeito seja encontrado.<\/li>\n<\/ul>\n<p>\u201cQuase sem perceber, adotamos m\u00e9todos de autentica\u00e7\u00e3o biom\u00e9trica em nossas vidas di\u00e1rias por meio de nossos dispositivos m\u00f3veis pessoais, seja usando um scanner de impress\u00e3o digital ou reconhecimento facial. Ele continuar\u00e1 evoluindo para fornecer um processo sem atrito e melhorar a experi\u00eancia e a seguran\u00e7a do usu\u00e1rio. Como tal, as empresas tamb\u00e9m devem estar cientes das regulamenta\u00e7\u00f5es do setor para garantir que seus servi\u00e7os e tecnologia atendam aos requisitos\u201d, conclui o site da Cepymenews.<\/p>\n<p>A <a href=\"https:\/\/www.funiber.org.br\" target=\"_blank\" rel=\"noopener noreferrer\">FUNIBER<\/a> patrocina um grande n\u00famero de programas universit\u00e1rios para profissionais que desejam expandir seus conhecimentos e forma\u00e7\u00e3o no campo de novas tecnologias. Um dos cursos oferecidos \u00e9 o <a href=\"https:\/\/www.funiber.org.br\/mestrado-em-transforma\u00e7ao-digital\" target=\"_blank\" rel=\"noopener noreferrer\">Mestrado em Transforma\u00e7\u00e3o Digital.<\/a><\/p>\n<p>Fonte: <a href=\"https:\/\/cepymenews.es\/autenticacion-biometrica-futuro\" target=\"_blank\" rel=\"noopener noreferrer\">La autenticaci\u00f3n biom\u00e9trica es el futuro. \u00bfEst\u00e1 preparado tu negocio?<\/a><\/p>\n<p>Foto: Todos os direitos reservados.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais. Dada a data de vencimento das senhas, pr\u00f3xima ao vencimento, as empresas come\u00e7am a apostar na integra\u00e7\u00e3o de sistemas de identifica\u00e7\u00e3o biom\u00e9trica em seus escrit\u00f3rios, pois \u00e9 uma solu\u00e7\u00e3o mais [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":21569,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[6],"tags":[6006,5827,1242,855,285,408,172,119,504,248,911,890,6007,641,787,26],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas<\/title>\n<meta name=\"description\" content=\"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.\" \/>\n<meta name=\"robots\" content=\"noindex, nofollow\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas\" \/>\n<meta property=\"og:description\" content=\"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\" \/>\n<meta property=\"og:site_name\" content=\"FuniBlogs - FUNIBER\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/funiber\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-20T09:00:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-19T10:09:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/02\/funiblog-tic-biometria.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"543\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ruth Congregado\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:site\" content=\"@FUNIBER\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ruth Congregado\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#article\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\"},\"author\":{\"name\":\"Ruth Congregado\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/d1f71292335f509051d4b7c96f3a388a\"},\"headline\":\"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas\",\"datePublished\":\"2020-02-20T09:00:27+00:00\",\"dateModified\":\"2020-02-19T10:09:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\"},\"wordCount\":353,\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"keywords\":[\"Autentica\u00e7\u00e3o biom\u00e9trica\",\"biometria\",\"Bolsas\",\"Doutorado\",\"Educa\u00e7\u00e3o\",\"Educa\u00e7\u00e3o a Dist\u00e2ncia\",\"Empresas\",\"Estudos\",\"Forma\u00e7\u00e3o\",\"Funiber\",\"FUNIBER Opini\u00f5es\",\"Hackers\",\"Mestrado em Transforma\u00e7\u00e3o Digital\",\"Opini\u00e3o FUNIBER\",\"Seguran\u00e7a cibern\u00e9tica\",\"tecnologia\"],\"articleSection\":[\"Tecnologias TIC\"],\"inLanguage\":\"pt-BR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\",\"name\":\"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\"},\"datePublished\":\"2020-02-20T09:00:27+00:00\",\"dateModified\":\"2020-02-19T10:09:10+00:00\",\"description\":\"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.\",\"breadcrumb\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"In\u00edcio\",\"item\":\"https:\/\/blogs.funiber.org\/pt\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#website\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"name\":\"FuniBlogs - FUNIBER\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#organization\",\"name\":\"FuniBlogs - FUNIBER\",\"url\":\"https:\/\/blogs.funiber.org\/pt\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"contentUrl\":\"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg\",\"width\":1,\"height\":1,\"caption\":\"FuniBlogs - FUNIBER\"},\"image\":{\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/funiber\",\"https:\/\/twitter.com\/FUNIBER\",\"https:\/\/www.instagram.com\/funiber_becas\",\"https:\/\/www.youtube.com\/user\/funiber\",\"https:\/\/www.linkedin.com\/company\/funiber\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/d1f71292335f509051d4b7c96f3a388a\",\"name\":\"Ruth Congregado\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad1938e89a5f73dc96b83b7d1960a1a1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad1938e89a5f73dc96b83b7d1960a1a1?s=96&d=mm&r=g\",\"caption\":\"Ruth Congregado\"},\"url\":\"https:\/\/www.funiber.blog\/pt\/author\/ruth-congregado\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas","description":"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.","robots":{"index":"noindex","follow":"nofollow"},"og_locale":"pt_BR","og_type":"article","og_title":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas","og_description":"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.","og_url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica","og_site_name":"FuniBlogs - FUNIBER","article_publisher":"https:\/\/www.facebook.com\/funiber","article_published_time":"2020-02-20T09:00:27+00:00","article_modified_time":"2020-02-19T10:09:10+00:00","og_image":[{"width":800,"height":543,"url":"https:\/\/blogs.funiber.org\/pt\/wp-content\/uploads\/2020\/02\/funiblog-tic-biometria.jpg","type":"image\/jpeg"}],"author":"Ruth Congregado","twitter_card":"summary_large_image","twitter_creator":"@FUNIBER","twitter_site":"@FUNIBER","twitter_misc":{"Escrito por":"Ruth Congregado","Est. tempo de leitura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#article","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica"},"author":{"name":"Ruth Congregado","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/d1f71292335f509051d4b7c96f3a388a"},"headline":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas","datePublished":"2020-02-20T09:00:27+00:00","dateModified":"2020-02-19T10:09:10+00:00","mainEntityOfPage":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica"},"wordCount":353,"publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"keywords":["Autentica\u00e7\u00e3o biom\u00e9trica","biometria","Bolsas","Doutorado","Educa\u00e7\u00e3o","Educa\u00e7\u00e3o a Dist\u00e2ncia","Empresas","Estudos","Forma\u00e7\u00e3o","Funiber","FUNIBER Opini\u00f5es","Hackers","Mestrado em Transforma\u00e7\u00e3o Digital","Opini\u00e3o FUNIBER","Seguran\u00e7a cibern\u00e9tica","tecnologia"],"articleSection":["Tecnologias TIC"],"inLanguage":"pt-BR"},{"@type":"WebPage","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica","url":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica","name":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas","isPartOf":{"@id":"https:\/\/blogs.funiber.org\/pt\/#website"},"datePublished":"2020-02-20T09:00:27+00:00","dateModified":"2020-02-19T10:09:10+00:00","description":"A seguran\u00e7a da senha \u00e9 um dos problemas que foram questionados nos \u00faltimos anos, dada a capacidade dos hackers de obter dados e informa\u00e7\u00f5es confidenciais.","breadcrumb":{"@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.funiber.org\/pt\/tecnologias-tic\/2020\/02\/20\/funiber-autenticacao-biometrica#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"In\u00edcio","item":"https:\/\/blogs.funiber.org\/pt"},{"@type":"ListItem","position":2,"name":"Autentica\u00e7\u00e3o biom\u00e9trica vence a batalha contra senhas"}]},{"@type":"WebSite","@id":"https:\/\/blogs.funiber.org\/pt\/#website","url":"https:\/\/blogs.funiber.org\/pt\/","name":"FuniBlogs - FUNIBER","description":"","publisher":{"@id":"https:\/\/blogs.funiber.org\/pt\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.funiber.org\/pt\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/blogs.funiber.org\/pt\/#organization","name":"FuniBlogs - FUNIBER","url":"https:\/\/blogs.funiber.org\/pt\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/","url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","contentUrl":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2022\/02\/logo-funiber-pt-br-v-dos.svg","width":1,"height":1,"caption":"FuniBlogs - FUNIBER"},"image":{"@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/funiber","https:\/\/twitter.com\/FUNIBER","https:\/\/www.instagram.com\/funiber_becas","https:\/\/www.youtube.com\/user\/funiber","https:\/\/www.linkedin.com\/company\/funiber"]},{"@type":"Person","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/d1f71292335f509051d4b7c96f3a388a","name":"Ruth Congregado","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/blogs.funiber.org\/pt\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ad1938e89a5f73dc96b83b7d1960a1a1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1938e89a5f73dc96b83b7d1960a1a1?s=96&d=mm&r=g","caption":"Ruth Congregado"},"url":"https:\/\/www.funiber.blog\/pt\/author\/ruth-congregado"}]}},"jetpack_featured_media_url":"https:\/\/www.funiber.blog\/pt\/wp-content\/uploads\/2020\/02\/funiblog-tic-biometria.jpg","jetpack_shortlink":"https:\/\/wp.me\/p7ee1t-5BS","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21568"}],"collection":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/comments?post=21568"}],"version-history":[{"count":1,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21568\/revisions"}],"predecessor-version":[{"id":21570,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/posts\/21568\/revisions\/21570"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media\/21569"}],"wp:attachment":[{"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/media?parent=21568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/categories?post=21568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.funiber.blog\/pt\/wp-json\/wp\/v2\/tags?post=21568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}