{"id":362710,"date":"2023-09-01T10:53:50","date_gmt":"2023-09-01T08:53:50","guid":{"rendered":"https:\/\/recogtech.com\/kritische-infrastruktur\/"},"modified":"2025-05-23T14:28:53","modified_gmt":"2025-05-23T12:28:53","slug":"kritische-infrastruktur","status":"publish","type":"page","link":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/","title":{"rendered":"Kritische Infrastruktur"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8220;1&#8243; next_background_color=&#8220;#ffffff&#8220; admin_label=&#8220;section&#8220; module_class=&#8220;dh-valign-center-section&#8220; _builder_version=&#8220;4.22.1&#8243; background_enable_color=&#8220;off&#8220; use_background_color_gradient=&#8220;on&#8220; background_color_gradient_direction=&#8220;105deg&#8220; background_color_gradient_stops=&#8220;rgba(0,38,100,0.8) 0%|rgba(0,38,100,0.8) 50%|rgba(220,222,230,0) 50%|rgba(255,255,255,0) 99%&#8220; background_color_gradient_overlays_image=&#8220;on&#8220; background_image=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/palm-id-pro-header-v4.jpg&#8220; height=&#8220;300px&#8220; height_tablet=&#8220;300px&#8220; height_phone=&#8220;240px&#8220; height_last_edited=&#8220;on|phone&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; bottom_divider_style=&#8220;slant2&#8243; bottom_divider_height=&#8220;75px&#8220; bottom_divider_flip=&#8220;horizontal&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row admin_label=&#8220;row&#8220; _builder_version=&#8220;4.21.0&#8243; background_size=&#8220;initial&#8220; background_position=&#8220;top_left&#8220; background_repeat=&#8220;repeat&#8220; custom_padding=&#8220;0px||0px||false|false&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.16&#8243; custom_padding=&#8220;|||&#8220; global_colors_info=&#8220;{}&#8220; custom_padding__hover=&#8220;|||&#8220;][et_pb_text _builder_version=&#8220;4.27.4&#8243; _module_preset=&#8220;default&#8220; text_text_color=&#8220;#FFFFFF&#8220; hover_enabled=&#8220;0&#8243; sticky_enabled=&#8220;0&#8243; link_text_color=&#8220;#FFFFFF&#8220; text_font_size=&#8220;14px&#8220; custom_margin=&#8220;||14px|||&#8220; locked=&#8220;off&#8220;]<span><span><a href=\"https:\/\/recogtech.com\/de\/\">Home<\/a><\/span><\/span>[\/et_pb_text][et_pb_text _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; header_text_color=&#8220;#FFFFFF&#8220; header_font_size=&#8220;60px&#8220; header_font_size_tablet=&#8220;56px&#8220; header_font_size_phone=&#8220;42px&#8220; header_font_size_last_edited=&#8220;on|phone&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h1><span lang=\"DE\">Kritische Infrastruktur<\/span><span style=\"color: #e70000;\">.<\/span><\/h1>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<div><span lang=\"DE\">Sichere Standorte mit maximalem Schutz? Dann f\u00fchren Sie den Palm-ID Card ein. In einer Hochrisiko-Umgebung, in der der Schutz vor Terrorismus und anderen Bedrohungen von gr\u00f6\u00dfter Bedeutung ist, bietet den Palm-ID Card eine beispiellose Zutrittskontrolll\u00f6sung.<\/span><\/div>\n<div>\u00a0<\/div>\n<div><span lang=\"DE\">An diesen Standorten darf das Sicherheitsbed\u00fcrfnis nicht ignoriert werden. Herk\u00f6mmliche Zugangsmethoden k\u00f6nnen anf\u00e4llig f\u00fcr externe Angriffe sein. Mit dem Palm-ID Card k\u00f6nnen Sie sich auf ein \u00e4u\u00dferst sicheres und autonomes Sicherheitssystem verlassen. Jeder Palm-ID Card vergleicht den verschl\u00fcsselten Template des auf der Karte gespeicherten Venenmusters mit der angebotenen Hand. Dadurch entf\u00e4llt die Notwendigkeit einer Netzwerkverbindung zur Identifizierung und Authentifizierung, wodurch das Risiko eines unbefugten Zutritts zu Hochrisiko-Standorten minimiert wird.<\/span><\/div>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM2MTQ0NCJ9fQ==@&#8220; button_text=&#8220;M\u00f6chten Sie uns kennenlernen?&#8220; _builder_version=&#8220;4.22.1&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_font=&#8220;|700|||||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/palm-id-pro-header-v4.jpg&#8220; alt=&#8220;Recogtech &#8211; L\u00f6sungen f\u00fcr kritische Infrastrukturen&#8220; title_text=&#8220;palm-id-pro-header-v4&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; background_color=&#8220;rgba(0,38,100,0.15)&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;4_4&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_blurb use_icon=&#8220;on&#8220; font_icon=&#8220;&#xf10e;||fa||900&#8243; content_max_width=&#8220;800px&#8220; _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; body_font=&#8220;|700|||||||&#8220; body_text_color=&#8220;#002664&#8243; body_font_size=&#8220;20px&#8220; body_line_height=&#8220;1.6em&#8220; text_orientation=&#8220;center&#8220; module_alignment=&#8220;center&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<p style=\"font-weight: 400;\"><em><strong>&#8222;<span lang=\"DE\">In der Welt der kritischen Infrastruktur, in der Hochrisiko-Standorte sehr wichtig sind, reicht ein einziger Fehler aus, um katastrophale Folgen herbeizuf\u00fchren. Deshalb verwenden wir den Palm-ID Card als integralen Bestandteil unserer Sicherheitspolitik, denn in diesem Zusammenhang ist Perfektion der einzige Standard, der z\u00e4hlt.<\/span>&#8222;<\/strong><\/em><\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8220;1&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; locked=&#8220;off&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_row column_structure=&#8220;1_2,1_2&#8243; _builder_version=&#8220;4.22.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_text _builder_version=&#8220;4.22.1&#8243; _module_preset=&#8220;default&#8220; header_2_font_size=&#8220;36px&#8220; global_colors_info=&#8220;{}&#8220;]<\/p>\n<h2><span lang=\"DE\">Die <\/span>L\u00f6sung f\u00fcr die kritische Infrastruktur<\/h2>\n<p style=\"font-weight: 400;\">Mit dem Palm-ID Card erh\u00f6hen Sie die Sicherheit von Hochrisiko-Standorten. Dieses fortschrittliche System bietet eine autonome und leistungsstarke Sicherheitsl\u00f6sung, die speziell f\u00fcr die besonderen Herausforderungen des Hochrisiko-Umfeldes entwickelt wurde. Entscheiden Sie sich f\u00fcr eine Sicherheitsl\u00f6sung, die den h\u00f6chsten Schutz bietet und die den Schutz von Hochrisiko-Standorten auf h\u00f6chstem Niveau h\u00e4lt, sogar bei terroristischen Bedrohungen.<\/p>\n<p>[\/et_pb_text][et_pb_button button_url=&#8220;@ET-DC@eyJkeW5hbWljIjp0cnVlLCJjb250ZW50IjoicG9zdF9saW5rX3VybF9wYWdlIiwic2V0dGluZ3MiOnsicG9zdF9pZCI6IjM2MTQ0NCJ9fQ==@&#8220; button_text=&#8220;Kontakt aufnehmen&#8220; _builder_version=&#8220;4.22.1&#8243; _dynamic_attributes=&#8220;button_url&#8220; _module_preset=&#8220;default&#8220; custom_button=&#8220;on&#8220; button_font=&#8220;|700|||||||&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_button][\/et_pb_column][et_pb_column type=&#8220;1_2&#8243; _builder_version=&#8220;4.21.0&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][et_pb_image src=&#8220;https:\/\/recogtech.com\/wp-content\/uploads\/2023\/06\/sfeer-palm-id-13.jpg&#8220; alt=&#8220;Recogtech &#8211; L\u00f6sungen f\u00fcr kritische Infrastrukturen&#8220; title_text=&#8220;sfeer-palm-id-13&#8243; _builder_version=&#8220;4.23.1&#8243; _module_preset=&#8220;default&#8220; global_colors_info=&#8220;{}&#8220;][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p><span><span><a href=\"https:\/\/recogtech.com\/de\/\">Home<\/a><\/span><\/span>Kritische Infrastruktur.Sichere Standorte mit maximalem Schutz? Dann f\u00fchren Sie den Palm-ID Card ein. In einer Hochrisiko-Umgebung, in der der Schutz vor Terrorismus und anderen Bedrohungen von gr\u00f6\u00dfter Bedeutung ist, bietet den Palm-ID Card eine beispiellose Zutrittskontrolll\u00f6sung. \u00a0 An diesen Standorten darf das Sicherheitsbed\u00fcrfnis nicht ignoriert werden. Herk\u00f6mmliche Zugangsmethoden k\u00f6nnen anf\u00e4llig f\u00fcr externe Angriffe sein. Mit [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":362725,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"class_list":["post-362710","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kritische Infrastruktur | Recogtech - Biometrische beveiliging<\/title>\n<meta name=\"description\" content=\"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kritische Infrastruktur | Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"og:description\" content=\"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/\" \/>\n<meta property=\"og:site_name\" content=\"Recogtech - Biometrische beveiliging\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-23T12:28:53+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"4\u00a0Minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/kritische-infrastruktur\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/kritische-infrastruktur\\\/\",\"name\":\"Kritische Infrastruktur | Recogtech - Biometrische beveiliging\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#website\"},\"datePublished\":\"2023-09-01T08:53:50+00:00\",\"dateModified\":\"2025-05-23T12:28:53+00:00\",\"description\":\"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/kritische-infrastruktur\\\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/kritische-infrastruktur\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sektoren\\\/kritische-infrastruktur\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sektoren\",\"item\":\"https:\\\/\\\/recogtech.com\\\/de\\\/sectoren\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Kritische Infrastruktur\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\",\"name\":\"Recogtech - Biometrische beveiliging\",\"description\":\"High-end Biometric Security\",\"publisher\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/recogtech.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#organization\",\"name\":\"Recogtech B.V.\",\"url\":\"https:\\\/\\\/recogtech.com\\\/de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"contentUrl\":\"https:\\\/\\\/recogtech.com\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/recogtech-weblogo-blauw-rood.png\",\"width\":600,\"height\":111,\"caption\":\"Recogtech B.V.\"},\"image\":{\"@id\":\"https:\\\/\\\/recogtech.com\\\/de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kritische Infrastruktur | Recogtech - Biometrische beveiliging","description":"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/","og_locale":"de_DE","og_type":"article","og_title":"Kritische Infrastruktur | Recogtech - Biometrische beveiliging","og_description":"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.","og_url":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/","og_site_name":"Recogtech - Biometrische beveiliging","article_modified_time":"2025-05-23T12:28:53+00:00","twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"4\u00a0Minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/","url":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/","name":"Kritische Infrastruktur | Recogtech - Biometrische beveiliging","isPartOf":{"@id":"https:\/\/recogtech.com\/de\/#website"},"datePublished":"2023-09-01T08:53:50+00:00","dateModified":"2025-05-23T12:28:53+00:00","description":"In einem risikoreichen Umfeld, in dem die Sicherheit vor Bedrohungen und Terrorismus an erster Stelle steht, ist die Palm ID Card die L\u00f6sung.","breadcrumb":{"@id":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/recogtech.com\/de\/sektoren\/kritische-infrastruktur\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/recogtech.com\/de\/"},{"@type":"ListItem","position":2,"name":"Sektoren","item":"https:\/\/recogtech.com\/de\/sectoren\/"},{"@type":"ListItem","position":3,"name":"Kritische Infrastruktur"}]},{"@type":"WebSite","@id":"https:\/\/recogtech.com\/de\/#website","url":"https:\/\/recogtech.com\/de\/","name":"Recogtech - Biometrische beveiliging","description":"High-end Biometric Security","publisher":{"@id":"https:\/\/recogtech.com\/de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/recogtech.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/recogtech.com\/de\/#organization","name":"Recogtech B.V.","url":"https:\/\/recogtech.com\/de\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/recogtech.com\/de\/#\/schema\/logo\/image\/","url":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","contentUrl":"https:\/\/recogtech.com\/wp-content\/uploads\/2023\/05\/recogtech-weblogo-blauw-rood.png","width":600,"height":111,"caption":"Recogtech B.V."},"image":{"@id":"https:\/\/recogtech.com\/de\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362710","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/comments?post=362710"}],"version-history":[{"count":4,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362710\/revisions"}],"predecessor-version":[{"id":365201,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362710\/revisions\/365201"}],"up":[{"embeddable":true,"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/pages\/362725"}],"wp:attachment":[{"href":"https:\/\/recogtech.com\/de\/wp-json\/wp\/v2\/media?parent=362710"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}