{"id":11172,"date":"2018-08-07T17:14:34","date_gmt":"2018-08-07T16:14:34","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=11172\/"},"modified":"2020-01-03T09:18:52","modified_gmt":"2020-01-03T08:18:52","slug":"interview-copsonic-securite-ultrasons","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/","title":{"rendered":"L\u2019INTERVIEW DE COPSONIC \u2013 LA SECURITE PAR LES ULTRASONS"},"content":{"rendered":"<p><em>Dans le cadre des Banking CyberSecurity Innovation Awards, <strong>CopSonic<\/strong>, gagnant du <strong>grand prix BCSIA<\/strong>, d\u00e9veloppe et commercialise une technologie de communication sans contact utilisant les ultrasons comme moyen d&#8217;interaction et de transmission de donn\u00e9es entre les dispositifs \u00e9lectroniques. Voici l\u2019interview de son fondateur, Emmanuel Ruiz qui d\u00e9taille pour nous comment sa solution contribue \u00e0 la cybers\u00e9curit\u00e9 de la banque de demain.<\/em><\/p>\n<h2>Comment l&#8217;id\u00e9e vous est-elle venue ?<\/h2>\n<p><strong>Emmanuel Ruiz <\/strong>nous explique que \u00ab\u00a0<em>l\u2019\u00e9quipe CopSonic [le] suit depuis plus de 15 ann\u00e9es dans l\u2019entrepreneuriat [\u2026] de traitement du signal audio\u00a0\u00bb<\/em>. Ayant d\u00e9couvert par hasard, en travaillant sur un effet sp\u00e9cial, qu&#8217;il \u00e9tait possible de \u00ab\u00a0<em>transmettre via du son de petites quantit\u00e9s de donn\u00e9es<\/em>\u00a0\u00bb, l&#8217;\u00e9quipe structure ensuite le produit sous forme de Software Development Kit (SDK) \u00ab\u00a0<em>afin de s\u00e9curiser les \u00e9changes de donn\u00e9es et de communications en champ proche<\/em>\u00a0\u00bb.<\/p>\n<h2>Quel est le plus grand risque de s\u00e9curit\u00e9 pour les banques et pour ses clients selon vous ? Comment r\u00e9pondez-vous \u00e0 la menace qui p\u00e8se sur les banques ?<\/h2>\n<p><strong>Emmanuel Ruiz <\/strong>met en avant que \u00ab\u00a0<em>le plus grand risque reste la fraude \u00e0 l\u2019identit\u00e9 et la validation d\u2019une transaction de paiement \u00e0 l\u2019insu de la personne concern\u00e9e. C\u2019est en tout cas le risque que nous cherchons \u00e0 couvrir avec notre technologie en \u00e9quipant les utilisateurs d\u2019une banque donn\u00e9e avec une technologie universelle, s\u00e9curis\u00e9e et facile d\u2019utilisation <\/em>\u00bb. La solution permet notamment de se prot\u00e9ger contre les nouvelles menaces qui se propagent par ultrasons car \u00ab<em>\u00a0il existe depuis 3 ans un virus v\u00e9hicul\u00e9 par ondes acoustiques entre appareils \u00e9lectroniques [ainsi que] des attaques sur des assistants vocaux [comme] Dolphin Hack <\/em>\u00bb.<\/p>\n<h2>L&#8217;enjeu pour les RSSI aujourd&#8217;hui est de parvenir \u00e0 concilier la facilit\u00e9 d&#8217;impl\u00e9mentation, la simplicit\u00e9 d&#8217;utilisation des solutions de s\u00e9curit\u00e9 avec une technologie s\u00e9curis\u00e9e. Comment convaincre un RSSI de la pertinence de votre solution et de la s\u00e9curit\u00e9 du produit ? Quels sont les diff\u00e9renciateurs qui vous d\u00e9marquent sur le march\u00e9\u00a0?<\/h2>\n<p><strong>CopSonic<\/strong> propose une technologie conforme \u00e0 la Directive PSD2 et au RGPD. L&#8217;int\u00e9r\u00eat pour les banques est de pouvoir exploiter la technologie directement en l&#8217;int\u00e9grant dans leurs applications \u201c<em>pour [leur] permettre de garder le contr\u00f4le sur la transaction de paiement r\u00e9alis\u00e9e par l\u2019utilisateur final. Cette technologie est universelle et fonctionne sur tout type de dispositif, sans d\u00e9ploiement mat\u00e9riel nouveau \u00e0 mettre en \u0153uvre. Elle est donc incomparablement moins ch\u00e8re que les autres.<\/em>\u201d<\/p>\n<p>Cette technologie inaudible \u00e0 l&#8217;oreille humaine permet cependant de v\u00e9hiculer des informations de mani\u00e8re s\u00e9curis\u00e9e ; ce moyen de communication \u00e9tant r\u00e9silient \u00e0 toutes les technologies \u00e9lectromagn\u00e9tiques dans des usages de proximit\u00e9 (de type NFC ou Bluetooth). Le march\u00e9 de la communication par les ultrasons est \u00e0 l&#8217;aube de son explosion : par exemple Google se positionne d\u00e9j\u00e0 sur le paiement par ultrason avec sa solution Google TEZ, lanc\u00e9e depuis septembre 2017 en Inde.<\/p>\n<h2>Quelles sont les synergies entre votre innovation et les solutions de s\u00e9curit\u00e9 bancaires existantes \u00e0 l&#8217;heure actuelle\u00a0?<\/h2>\n<p><strong>CopSonic<\/strong> d\u00e9crit sa technologie comme \u00ab\u00a0<em>avant tout compl\u00e9mentaire aux autres usages, dans un monde transactionnel mobile, web ou en champ proche [mais elle] s\u2019impose en revanche comme la seule valable et compatible avec les assistants vocaux, qui vous demanderont bient\u00f4t de valider une transaction de paiement<\/em>\u00a0\u00bb. La solution de CopSonic offre donc \u00ab\u00a0<em>un service innovant r\u00e9pondant aux besoins des utilisateur<\/em>s<em>\u00a0\u00bb<\/em>. Par ailleurs, \u00ab\u00a0<em>sur les sujets de phishing, skimming, eavesdropping, [CopSonic propose] des solutions qui ne requi\u00e8rent qu\u2019une mise \u00e0 jour logicielle dans l\u2019infrastructure existante du serveur bancaire jusqu\u2019\u00e0 l\u2019application mobile en passant par les POS, TPE ou ATM\/DAB<\/em>\u00a0\u00bb.<\/p>\n<p>Ces cas d&#8217;usages sont d\u00e9j\u00e0 une r\u00e9alit\u00e9 puisque CopSonic annonce \u00ab\u00a0t<em>ravailler avec une banque fran\u00e7aise pour proposer sur des TPE un \u2018\u2019QRCode Invisible\u2019\u2019<\/em> : <em>le service proposera en parall\u00e8le un ultrason pour s\u00e9curiser cette transaction via un OTP ultrasonique\u00a0<\/em>\u00bb. Par rapport \u00e0 un QRCode classique, l&#8217;avantage pour l&#8217;utilisateur r\u00e9side dans le fait qu&#8217;il n&#8217;aura pas besoin de viser avec la cam\u00e9ra de son smartphone le TPE.<\/p>\n<h2>Comment voyez-vous la banque de demain\u00a0? Quelles opportunit\u00e9s pour la cybers\u00e9curit\u00e9 dans la banque de demain\u00a0?<\/h2>\n<p>Pour <strong>CopSonic<\/strong>, le plus grand changement qui attend la banque de demain est li\u00e9 \u00e0 la s\u00e9curisation de l&#8217;exp\u00e9rience utilisateur\u00a0: ces derniers sont de plus en plus exigeants sur l&#8217;ensemble de la chaine. Depuis la mise en relation jusqu\u2019\u00e0 l&#8217;exp\u00e9rience de paiement, ils attendent de la banque un parcours fluide et s\u00e9curis\u00e9.<\/p>\n<p><strong>Emmanuel Ruiz<\/strong> d\u00e9taille ainsi : \u00ab\u00a0<em>Le d\u00e9veloppement des paiements instantan\u00e9s (peer-to-peer), des paiements IOT (comment payer une prise de courant qui vous d\u00e9livre 60 minutes de courant\u00a0?) et des nouveaux comportements de consommation (assistants vocaux au domicile, en voiture connect\u00e9e) vont voir na\u00eetre autant de nouvelles normes que de nouveaux risques et solutions pour les couvrir au mieux. La banque devra en tout \u00e9tat de cause continuer d\u2019\u00e9quiper ses utilisateurs de moyens de validation de transactions de paiement en conciliant s\u00e9curit\u00e9 et facilit\u00e9 d\u2019utilisation.\u00a0\u00bb<\/em><\/p>\n<p>&nbsp;<\/p>\n<p>Pour en savoir plus\u00a0: <a href=\"https:\/\/www.copsonic.com\/\">https:\/\/www.copsonic.com\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Dans le cadre des Banking CyberSecurity Innovation Awards, CopSonic, gagnant du grand prix BCSIA, d\u00e9veloppe et commercialise une technologie de communication sans contact utilisant les ultrasons comme moyen d&#8217;interaction et de transmission de donn\u00e9es entre les dispositifs \u00e9lectroniques. Voici l\u2019interview&#8230;<\/p>\n","protected":false},"author":21,"featured_media":9830,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3229,36],"tags":[3287,59,3307,3081],"coauthors":[807,3023],"class_list":["post-11172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-for-financial-services","category-cybersecurity-digital-trust","tag-bcsia","tag-donnees","tag-financial-services-cyber","tag-paiements"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Dans le cadre des Banking CyberSecurity Innovation Awards, CopSonic, gagnant du grand prix BCSIA, d\u00e9veloppe et commercialise une technologie de communication sans contact utilisant les ultrasons comme moyen d&#8217;interaction et de transmission de donn\u00e9es entre les dispositifs \u00e9lectroniques. Voici l\u2019interview...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-07T16:14:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-03T08:18:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1407\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Gabriel Amirault\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Gabriel Amirault\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\"},\"author\":{\"name\":\"Gabriel Amirault\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\"},\"headline\":\"L\u2019INTERVIEW DE COPSONIC \u2013 LA SECURITE PAR LES ULTRASONS\",\"datePublished\":\"2018-08-07T16:14:34+00:00\",\"dateModified\":\"2020-01-03T08:18:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\"},\"wordCount\":894,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg\",\"keywords\":[\"BCSIA\",\"donn\u00e9es\",\"financial services cyber\",\"paiements\"],\"articleSection\":[\"Cyber for Financial Services\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\",\"name\":\"COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg\",\"datePublished\":\"2018-08-07T16:14:34+00:00\",\"dateModified\":\"2020-01-03T08:18:52+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg\",\"width\":1407,\"height\":1350,\"caption\":\"mobile apps concept. Mobile apps concept. Flat design vector illustration. Human hand with mobile phone, tablet, laptop and interface icons\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"L\u2019INTERVIEW DE COPSONIC \u2013 LA SECURITE PAR LES ULTRASONS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca\",\"name\":\"Gabriel Amirault\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/","og_locale":"en_US","og_type":"article","og_title":"COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight","og_description":"Dans le cadre des Banking CyberSecurity Innovation Awards, CopSonic, gagnant du grand prix BCSIA, d\u00e9veloppe et commercialise une technologie de communication sans contact utilisant les ultrasons comme moyen d&#8217;interaction et de transmission de donn\u00e9es entre les dispositifs \u00e9lectroniques. Voici l\u2019interview...","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/","og_site_name":"RiskInsight","article_published_time":"2018-08-07T16:14:34+00:00","article_modified_time":"2020-01-03T08:18:52+00:00","og_image":[{"width":1407,"height":1350,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg","type":"image\/jpeg"}],"author":"Gabriel Amirault","twitter_misc":{"Written by":"Gabriel Amirault","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/"},"author":{"name":"Gabriel Amirault","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca"},"headline":"L\u2019INTERVIEW DE COPSONIC \u2013 LA SECURITE PAR LES ULTRASONS","datePublished":"2018-08-07T16:14:34+00:00","dateModified":"2020-01-03T08:18:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/"},"wordCount":894,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg","keywords":["BCSIA","donn\u00e9es","financial services cyber","paiements"],"articleSection":["Cyber for Financial Services","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/","name":"COPSONIC : Echange de donn\u00e9es s\u00e9curis\u00e9 par ultrasons - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg","datePublished":"2018-08-07T16:14:34+00:00","dateModified":"2020-01-03T08:18:52+00:00","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/06\/Fotolia_81225116_Subscription_Monthly_M.jpg","width":1407,"height":1350,"caption":"mobile apps concept. Mobile apps concept. Flat design vector illustration. Human hand with mobile phone, tablet, laptop and interface icons"},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2018\/08\/interview-copsonic-securite-ultrasons\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"L\u2019INTERVIEW DE COPSONIC \u2013 LA SECURITE PAR LES ULTRASONS"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/6e59709056fa2859e362ae119d5370ca","name":"Gabriel Amirault","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gabriel-amirault\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=11172"}],"version-history":[{"count":4,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11172\/revisions"}],"predecessor-version":[{"id":11207,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/11172\/revisions\/11207"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9830"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=11172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=11172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=11172"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=11172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}