{"id":9344,"date":"2025-12-19T14:46:18","date_gmt":"2025-12-19T06:46:18","guid":{"rendered":"https:\/\/www.dccochina.com\/?p=9344"},"modified":"2025-12-19T14:46:39","modified_gmt":"2025-12-19T06:46:39","slug":"understanding-proximity-card-uid-structure-and-data-storage","status":"publish","type":"post","link":"https:\/\/www.dccochina.com\/es\/understanding-proximity-card-uid-structure-and-data-storage\/","title":{"rendered":"Understanding Proximity Card UID Structure and Data Storage"},"content":{"rendered":"<p>Every secure access system relies on unique identification for each credential. A Proximity Card carries a UID, or unique identifier, which distinguishes it from every other card. This UID enables doors, gates, and secure terminals to instantly recognize authorized users. Understanding UID structure and data storage helps system integrators, security managers, and users appreciate how these cards maintain safety. The UID is not just a random number; it follows specific formats and standards to prevent duplication. Proper data storage ensures reliable access and reduces fraud risk. Modern businesses increasingly depend on this invisible backbone.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How UID Uniquely Identifies Each Card<\/h4>\n\n\n\n<p>The UID serves as the card\u2019s fingerprint. Each card manufacturer embeds a unique sequence into the chip. Most UIDs consist of 4, 7, or 10 bytes. The byte length determines the scope of the card\u2019s uniqueness. A 4-byte UID allows roughly 4.3 billion combinations. Longer UIDs offer near-infinite possibilities. Readers detect this code when the card is near the antenna. Once recognized, the system grants or denies access. Even two cards of the same model never share identical UIDs. This uniqueness is crucial in high-security areas such as offices, hospitals, and data centers. Without it, access systems would be vulnerable to cloning.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img fetchpriority=\"high\" decoding=\"async\" width=\"517\" height=\"387\" src=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/09\/1.jpg\" alt=\"ID card\" class=\"wp-image-8680\" style=\"width:840px;height:auto\" srcset=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/09\/1.jpg 517w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/09\/1-300x225.jpg 300w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/09\/1-16x12.jpg 16w\" sizes=\"(max-width: 517px) 100vw, 517px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Common UID Formats and Standards<\/h4>\n\n\n\n<p>Proximity Cards follow internationally recognized standards such as ISO 14443 and ISO 15693. The standard defines UID byte length, encoding, and anti-collision features. Anti-collision ensures that multiple cards presented simultaneously do not interfere with each other. UID formats include fixed, configurable, and random schemes. Fixed UIDs remain constant throughout the card\u2019s life. Configurable UIDs enable the issuer to personalize them. Random UIDs enhance security by changing after each read cycle. Each format suits specific applications. Understanding these options helps organizations select the right Proximity Card for their environment.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How Data Storage Works in Proximity Cards<\/h4>\n\n\n\n<p>Besides the UID, <a href=\"https:\/\/www.dccochina.com\/shop\/tk4100-card\/\">Proximity Cards <\/a>contain memory sectors for storing additional information. Data can include access permissions, user profiles, or encryption keys. Low-frequency (125kHz) cards typically store minimal information. High-frequency (13.56MHz) cards offer larger, sectorized memory blocks. Each block is protected with security keys. Data read or write operations occur only when the reader authenticates correctly. This prevents unauthorized data modification. Efficient data storage allows multi-application usage. Users can access offices, parking, and payment terminals with the same card. Memory structure directly impacts flexibility and security.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-1024x684.png\" alt=\"Proximity Card system\" class=\"wp-image-7054\" srcset=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-1024x684.png 1024w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-300x200.png 300w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-768x513.png 768w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-18x12.png 18w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17-600x401.png 600w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-17.png 1253w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">Security Mechanisms Protecting UID and Data<\/h4>\n\n\n\n<p>Security is embedded in both the UID and the data sectors. Access keys control read\/write permissions. Many Proximity Cards support encryption for sensitive information. Some high-security models use mutual authentication between the card and the reader. Without proper keys, even a detected UID cannot grant access. Anti-cloning measures prevent duplication. Tamper-resistant chips safeguard against physical attacks. Secure UID handling ensures the system only recognizes valid credentials. This layered approach protects both the cardholder and the facility. Security depends on hardware, protocols, and proper configuration.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Integration with Readers and Access Systems<\/h4>\n\n\n\n<p><a href=\"https:\/\/www.databridgemarketresearch.com\/reports\/global-proximity-cards-market\">Proximity Card readers<\/a> interpret UIDs and stored data to manage access decisions. The reader antenna powers the card\u2019s chip via induction. The card transmits UID data to the reader. Software validates this data against a secure database. Additional information from memory sectors can control multi-level access. Integration requires compatibility between card standards and reader firmware. Many readers handle multiple frequencies or support legacy systems. A well-integrated system reduces misreads and improves throughput. Efficient UID recognition is critical in high-traffic environments. Businesses gain reliability and operational efficiency.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"569\" src=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-1024x569.png\" alt=\"card\" class=\"wp-image-6288\" srcset=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-1024x569.png 1024w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-300x167.png 300w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-768x427.png 768w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-1536x853.png 1536w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-18x10.png 18w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-1320x733.png 1320w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51-600x333.png 600w, https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/01\/image-51.png 1800w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Best Practices for Card Issuers and Users<\/h3>\n\n\n\n<p>Organizations issuing Proximity Cards should follow strict UID management protocols. Avoid duplicate UID assignments to maintain system integrity. Use sector-level security keys to protect stored data. Regularly audit card usage to detect anomalies. Training staff on card handling reduces accidental damage or unauthorized access. For users, keeping cards in good condition ensures consistent reading. Avoid exposing cards to strong magnetic fields or extreme temperatures. Following these best practices extends the lifespan of cards and maintains security. Proper management supports both safety and efficiency.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Understanding Proximity Card UID Structure and Data Storage<\/h2>\n\n\n\n<p>A Proximity Card\u2019s UID and memory structure form the foundation of secure access. Each UID uniquely identifies a card, and data storage sectors securely store permissions and credentials. Anti-collision and encryption protect both the UID and the information. Integration with readers ensures smooth access control operations. Organizations following best practices reduce fraud and operational errors. Understanding UID and data architecture allows businesses to select, deploy, and maintain robust access systems. Modern security depends on these invisible but critical technologies.<\/p>\n\n\n\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Every secure access system relies on unique identification for each credential. A Proximity Card carries a UID, or unique identifier, which distinguishes it from every other card. This UID enables doors, gates, and secure terminals to instantly recognize authorized users. Understanding UID structure and data storage helps system integrators, security managers, and users appreciate how [&hellip;]<\/p>","protected":false},"author":1,"featured_media":7218,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[58],"tags":[208],"class_list":["post-9344","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-article","tag-proximity-card"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Proximity Card UID Structure and Data Storage - Dcco<\/title>\n<meta name=\"description\" content=\"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dccochina.com\/es\/understanding-proximity-card-uid-structure-and-data-storage\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Proximity Card UID Structure and Data Storage - Dcco\" \/>\n<meta property=\"og:description\" content=\"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dccochina.com\/es\/understanding-proximity-card-uid-structure-and-data-storage\/\" \/>\n<meta property=\"og:site_name\" content=\"Dcco\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-19T06:46:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-19T06:46:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png\" \/>\n\t<meta property=\"og:image:width\" content=\"831\" \/>\n\t<meta property=\"og:image:height\" content=\"507\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ch123@\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ch123@\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/\"},\"author\":{\"name\":\"ch123@\",\"@id\":\"https:\/\/www.dccochina.com\/#\/schema\/person\/6a860fe9f792152e2ec5d956e440f3ac\"},\"headline\":\"Understanding Proximity Card UID Structure and Data Storage\",\"datePublished\":\"2025-12-19T06:46:18+00:00\",\"dateModified\":\"2025-12-19T06:46:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/\"},\"wordCount\":755,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.dccochina.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png\",\"keywords\":[\"proximity card\"],\"articleSection\":[\"Article\"],\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/\",\"url\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/\",\"name\":\"Understanding Proximity Card UID Structure and Data Storage - Dcco\",\"isPartOf\":{\"@id\":\"https:\/\/www.dccochina.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png\",\"datePublished\":\"2025-12-19T06:46:18+00:00\",\"dateModified\":\"2025-12-19T06:46:39+00:00\",\"description\":\"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage\",\"url\":\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png\",\"contentUrl\":\"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png\",\"width\":831,\"height\":507,\"caption\":\"proximity card\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.dccochina.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Proximity Card UID Structure and Data Storage\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.dccochina.com\/#website\",\"url\":\"https:\/\/www.dccochina.com\/\",\"name\":\"Dcco\",\"description\":\"dccochina\",\"publisher\":{\"@id\":\"https:\/\/www.dccochina.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.dccochina.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.dccochina.com\/#organization\",\"name\":\"Dcco\",\"url\":\"https:\/\/www.dccochina.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.dccochina.com\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Dcco\"},\"image\":{\"@id\":\"https:\/\/www.dccochina.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.dccochina.com\/#\/schema\/person\/6a860fe9f792152e2ec5d956e440f3ac\",\"name\":\"ch123@\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\/\/www.dccochina.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/69b8d7084a796150df25a19cb4f9b679d0448ec2544da0977aa2b78140c2ca39?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/69b8d7084a796150df25a19cb4f9b679d0448ec2544da0977aa2b78140c2ca39?s=96&d=mm&r=g\",\"caption\":\"ch123@\"},\"sameAs\":[\"http:\/\/demo.lezhan.org\"],\"url\":\"https:\/\/www.dccochina.com\/es\/author\/ch123\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Understanding Proximity Card UID Structure and Data Storage - Dcco","description":"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dccochina.com\/es\/understanding-proximity-card-uid-structure-and-data-storage\/","og_locale":"es_ES","og_type":"article","og_title":"Understanding Proximity Card UID Structure and Data Storage - Dcco","og_description":"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.","og_url":"https:\/\/www.dccochina.com\/es\/understanding-proximity-card-uid-structure-and-data-storage\/","og_site_name":"Dcco","article_published_time":"2025-12-19T06:46:18+00:00","article_modified_time":"2025-12-19T06:46:39+00:00","og_image":[{"width":831,"height":507,"url":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","type":"image\/png"}],"author":"ch123@","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ch123@","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#article","isPartOf":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/"},"author":{"name":"ch123@","@id":"https:\/\/www.dccochina.com\/#\/schema\/person\/6a860fe9f792152e2ec5d956e440f3ac"},"headline":"Understanding Proximity Card UID Structure and Data Storage","datePublished":"2025-12-19T06:46:18+00:00","dateModified":"2025-12-19T06:46:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/"},"wordCount":755,"commentCount":0,"publisher":{"@id":"https:\/\/www.dccochina.com\/#organization"},"image":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","keywords":["proximity card"],"articleSection":["Article"],"inLanguage":"es-ES","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/","url":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/","name":"Understanding Proximity Card UID Structure and Data Storage - Dcco","isPartOf":{"@id":"https:\/\/www.dccochina.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage"},"image":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","datePublished":"2025-12-19T06:46:18+00:00","dateModified":"2025-12-19T06:46:39+00:00","description":"Learn how the Proximity Card UID structure and data storage ensure secure, reliable, and efficient access control systems.","breadcrumb":{"@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#primaryimage","url":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","contentUrl":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","width":831,"height":507,"caption":"proximity card"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dccochina.com\/understanding-proximity-card-uid-structure-and-data-storage\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dccochina.com\/"},{"@type":"ListItem","position":2,"name":"Understanding Proximity Card UID Structure and Data Storage"}]},{"@type":"WebSite","@id":"https:\/\/www.dccochina.com\/#website","url":"https:\/\/www.dccochina.com\/","name":"Dcco","description":"dccochina","publisher":{"@id":"https:\/\/www.dccochina.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dccochina.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"es-ES"},{"@type":"Organization","@id":"https:\/\/www.dccochina.com\/#organization","name":"Dcco","url":"https:\/\/www.dccochina.com\/","logo":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.dccochina.com\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Dcco"},"image":{"@id":"https:\/\/www.dccochina.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.dccochina.com\/#\/schema\/person\/6a860fe9f792152e2ec5d956e440f3ac","name":"ch123@","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.dccochina.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/69b8d7084a796150df25a19cb4f9b679d0448ec2544da0977aa2b78140c2ca39?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/69b8d7084a796150df25a19cb4f9b679d0448ec2544da0977aa2b78140c2ca39?s=96&d=mm&r=g","caption":"ch123@"},"sameAs":["http:\/\/demo.lezhan.org"],"url":"https:\/\/www.dccochina.com\/es\/author\/ch123\/"}]}},"jetpack_featured_media_url":"https:\/\/www.dccochina.com\/wp-content\/uploads\/2025\/04\/image-33.png","_links":{"self":[{"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/posts\/9344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/comments?post=9344"}],"version-history":[{"count":1,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/posts\/9344\/revisions"}],"predecessor-version":[{"id":9345,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/posts\/9344\/revisions\/9345"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/media\/7218"}],"wp:attachment":[{"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/media?parent=9344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/categories?post=9344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dccochina.com\/es\/wp-json\/wp\/v2\/tags?post=9344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}