{"id":12397,"date":"2018-07-25T11:41:36","date_gmt":"2018-07-25T15:41:36","guid":{"rendered":"https:\/\/projecthermes.wpengine.com\/tokenization-and-mobile-payments-security-part-1-of-2\/"},"modified":"2023-07-20T15:19:17","modified_gmt":"2023-07-20T19:19:17","slug":"tokenization-and-mobile-payments-security-part-1-of-2","status":"publish","type":"post","link":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/","title":{"rendered":"Tokenization and Mobile Payments Security: Part 1 of 2"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_flex valign_top type_default stacking_default\"><div class=\"vc_col-sm-12 wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Getting customers to part with their hard-earned cash has been a core part of being a merchant since, well, forever. Since payments started to become less physical, however, the question of security has loomed larger in the minds of both parties to a transaction. No one wants a simple purchase to turn into an opportunity for later theft or fraud \u2013 but that\u2019s exactly the risk presented by the transfer of personal financial information (a credit card number, for example) from a buyer to a seller. Confidential information can be intercepted when the transaction is made, or stolen later by employees or hackers.<\/p>\n<p>Mobile payments, by transmitting information through the air from device to point-of-sale system or through the Internet to remote servers, add another window of potential access.<\/p>\n<p>We\u2019ve talked before (in our <a class=\"link-orange\" href=\"https:\/\/innovation.interac.ca\/white-paper-modernized-payment-system\/\" target=\"_blank\" rel=\"noopener\">Faster Payments white paper<\/a>, for example) about the principle of \u201cdata abstraction\u201d, by which unique, public identifiers are used in the place of unique but confidential identifiers. With <em>Interac<\/em> e-Transfer, for example, a person can send money to a friend using only their email address (a public identifier) rather than their personal account information (a confidential identifier).<\/p>\n<h2>How Tokenization Works with Mobile Payments<\/h2>\n<p>We use this same principle to secure mobile payments, though in this case the approach is called \u201ctokenization\u201d. Essentially, we replace a highly confidential piece of data \u2013 like a person\u2019s debit card number \u2013 with a random piece of data, and use that for the transaction.<\/p>\n<p>Here\u2019s how it works. When a consumer adds a payment card to the digital wallet on their device, like a mobile phone, the wallet communicates with a remote service (like <em>Interac<\/em> Token Service Provider) and receives a randomized number that it associates with the consumer\u2019s payment card. This randomized number is called a \u201ctoken\u201d, and is formatted like the payment card number it is replacing.<\/p>\n<p>When a consumer uses that card (in the digital wallet) to purchase something from a merchant, the wallet sends the token to the merchant\u2019s system, rather than sending the actual card number. And when the merchant\u2019s payment system processes the token, behind the scenes the token is instantly validated by the financial institution and the token service provider, the transaction is authorized, and the merchant will subsequently receive the funds from the transaction in their account.<\/p>\n<p>Through tokenization, the consumer\u2019s confidential card information is not on their mobile device: it is not transmitted through the air, nor is it seen by an employee, nor stored in the merchant\u2019s systems. The token, even if intercepted or hacked, is useless beyond the now-completed transaction.<\/p>\n<p>Many retailers now offer in-app or in-browser payments for customers shopping at home or on the move, and these use tokenization too as a security measure. But because a physical chip-enabled card isn&rsquo;t present, we add a further layer of security to remote transactions using cryptograms. We&rsquo;ll explain more in our next post on mobile payments security.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/section>\n<\/div>","protected":false},"excerpt":{"rendered":"Getting customers to part with their hard-earned cash has been a core part of being a merchant since, well, forever. Since payments started to become less physical, however, the question of security has loomed larger in the minds of both parties to a transaction. No one wants a simple purchase to turn into an opportunity...","protected":false},"author":9,"featured_media":12077,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[150,155],"tags":[],"posts_format":[112],"class_list":["post-12397","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-creation-de-jetons","category-fournisseur-de-service-de-jeton-interac","posts_format-article-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Innovation Hub - Tokenization and Mobile Payments Security: Part 1 of 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tokenization and Mobile Payments Security: Part 1 of 2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation Hub\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/interac\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-25T15:41:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-07-20T19:19:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kashmera Self\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@interac\" \/>\n<meta name=\"twitter:site\" content=\"@interac\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kashmera Self\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/\"},\"author\":{\"name\":\"Kashmera Self\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\"},\"headline\":\"Tokenization and Mobile Payments Security: Part 1 of 2\",\"datePublished\":\"2018-07-25T15:41:36+00:00\",\"dateModified\":\"2023-07-20T19:19:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/\"},\"wordCount\":517,\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Tokenization-and-Mobile-Payments-Security.png\",\"articleSection\":[\"Cr\u00e9ation de jetons\",\"Fournisseur de service de jeton Interac\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/\",\"name\":\"Tokenization and Mobile Payments Security: Part 1 of 2 - Innovation Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Tokenization-and-Mobile-Payments-Security.png\",\"datePublished\":\"2018-07-25T15:41:36+00:00\",\"dateModified\":\"2023-07-20T19:19:17+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#primaryimage\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Tokenization-and-Mobile-Payments-Security.png\",\"contentUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2018\\\/07\\\/Tokenization-and-Mobile-Payments-Security.png\",\"width\":800,\"height\":800},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-1-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tokenization and Mobile Payments Security: Part 1 of 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"name\":\"Innovation Hub\",\"description\":\"Innovation Hub\",\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\",\"name\":\"Interac\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"contentUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"width\":2210,\"height\":2210,\"caption\":\"Interac\"},\"image\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/interac\",\"https:\\\/\\\/x.com\\\/interac\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/InteracBrand\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/interac-corp\\\/\",\"https:\\\/\\\/www.instagram.com\\\/interac\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\",\"name\":\"Kashmera Self\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"caption\":\"Kashmera Self\"},\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/author\\\/kselfinterac-ca\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Innovation Hub - Tokenization and Mobile Payments Security: Part 1 of 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Tokenization and Mobile Payments Security: Part 1 of 2","og_url":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/","og_site_name":"Innovation Hub","article_publisher":"https:\/\/www.facebook.com\/interac","article_published_time":"2018-07-25T15:41:36+00:00","article_modified_time":"2023-07-20T19:19:17+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png","type":"image\/png"}],"author":"Kashmera Self","twitter_card":"summary_large_image","twitter_creator":"@interac","twitter_site":"@interac","twitter_misc":{"\u00c9crit par":"Kashmera Self","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#article","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/"},"author":{"name":"Kashmera Self","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c"},"headline":"Tokenization and Mobile Payments Security: Part 1 of 2","datePublished":"2018-07-25T15:41:36+00:00","dateModified":"2023-07-20T19:19:17+00:00","mainEntityOfPage":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/"},"wordCount":517,"publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"image":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png","articleSection":["Cr\u00e9ation de jetons","Fournisseur de service de jeton Interac"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/","url":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/","name":"Tokenization and Mobile Payments Security: Part 1 of 2 - Innovation Hub","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#primaryimage"},"image":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#primaryimage"},"thumbnailUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png","datePublished":"2018-07-25T15:41:36+00:00","dateModified":"2023-07-20T19:19:17+00:00","breadcrumb":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#primaryimage","url":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png","contentUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2018\/07\/Tokenization-and-Mobile-Payments-Security.png","width":800,"height":800},{"@type":"BreadcrumbList","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/innovation.interac.ca\/fr\/"},{"@type":"ListItem","position":2,"name":"Tokenization and Mobile Payments Security: Part 1 of 2"}]},{"@type":"WebSite","@id":"https:\/\/innovation.interac.ca\/fr\/#website","url":"https:\/\/innovation.interac.ca\/fr\/","name":"Innovation Hub","description":"Innovation Hub","publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/innovation.interac.ca\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/innovation.interac.ca\/fr\/#organization","name":"Interac","url":"https:\/\/innovation.interac.ca\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","contentUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","width":2210,"height":2210,"caption":"Interac"},"image":{"@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/interac","https:\/\/x.com\/interac","https:\/\/www.youtube.com\/user\/InteracBrand","https:\/\/www.linkedin.com\/company\/interac-corp\/","https:\/\/www.instagram.com\/interac\/"]},{"@type":"Person","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c","name":"Kashmera Self","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","caption":"Kashmera Self"},"url":"https:\/\/innovation.interac.ca\/fr\/author\/kselfinterac-ca\/"}]}},"_links":{"self":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12397","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/comments?post=12397"}],"version-history":[{"count":0,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12397\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/media\/12077"}],"wp:attachment":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/media?parent=12397"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/categories?post=12397"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/tags?post=12397"},{"taxonomy":"posts_format","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts_format?post=12397"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}