{"id":1369,"date":"2017-10-27T00:00:00","date_gmt":"2017-10-27T00:00:00","guid":{"rendered":"https:\/\/ami2025dev.wpenginepowered.com\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/"},"modified":"2026-01-12T14:51:56","modified_gmt":"2026-01-12T14:51:56","slug":"trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group","status":"publish","type":"project","link":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/","title":{"rendered":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group"},"content":{"rendered":"<h1><a href=\"https:\/\/trustedcomputinggroup.org\/trusted-platform-module-2-0-brief-introduction\/\" target=\"_blank\" rel=\"noopener noreferrer\">Trusted Platform Module (TPM) 2.0 Brief Introduction<\/a><\/h1>\n<p><a href=\"https:\/\/trustedcomputinggroup.org\/trusted-platform-module-2-0-brief-introduction\/\" target=\"_blank\" rel=\"noopener noreferrer\">TPM Module 2.0 Brief Introduction.pdf<\/a><\/p>\n<p>The Trusted Computing Group (TCG) has been addressing the trust issue \u2013 and related security benefits \u2013 for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification.<\/p>\n<p>The TPM standard defines a hardware root of trust (HRoT) widely accepted as more secure than software that can be more easily breached by attackers.<\/p>\n<p>The TPM is used with software to enable features; open source APIs are available and custom software can be developed. Additional resources for software support also are provided later in this paper.<\/p>\n<p>In many systems, the TPM provides integrity measurements, health checks and authentication services.<\/p>\n<h2>TPM Evolves<\/h2>\n<p>While the earlier TPM 1.2 standard was incorporated into billions of PCs, servers, embedded systems, network gear and other devices, the evolving Internet of Things and increasing demand for security beyond traditional PC environment led TCG to develop a new TPM specification, which recently was adopted as an international standard ISO\/IEC 11889:2015.<\/p>\n<p>For more flexibility of application and to enable more widespread use of the specification, TCG created TPM 2.0 with a \u201clibrary\u201d approach. This allows users to choose applicable aspects of TPM functionality for different implementation levels and levels of security. Also, new features and functions were added, such as algorithm agility, the ability to implement new cryptographic algorithms as needed.<\/p>\n<h2>Attributes of the TPM Include:<\/h2>\n<ul>\n<li>Support for bulk (symmetric) encryption in the platform<\/li>\n<li>High quality random numbers<\/li>\n<li>Cryptographic services<\/li>\n<li>A protected persistent store for small amounts of data, sticky- bits, monotonic counters and extendible registers<\/li>\n<li>A protected pseudo-persistent store for unlimited amounts of keys and data<\/li>\n<li>An extensive choice of authorization methods to access protected keys and data<\/li>\n<li>Platform identities<\/li>\n<li>Support for platform privacy<\/li>\n<li>Signing and verifying digital signatures (normal, anonymous, pseudonymous)<\/li>\n<li>Certifying the properties of keys and data<\/li>\n<li>Auditing the usage of keys and data<\/li>\n<\/ul>\n<h3>In A Trusted Platform the TPM Also Provides:<\/h3>\n<ul>\n<li>Attestation: reporting platform state<\/li>\n<li>Sealing: using platform state to authorize access to keys and data<\/li>\n<\/ul>\n<h2>A TPM For Many Applications<\/h2>\n<p>With TPM 2.0, TCG created a library specification that describes all the commands\/features that could be implemented and might be needed in platforms from servers to laptops to embedded systems. Each platform can choose the features needed and the level of security or assurance required. In this way, TPM 2.0 is much more flexible than the original TPM specification. That flexibility allows the newest TPMs to be applied to many embedded applications, including automotive, industrial, smart home and many more \u2013 and for designers and developers to select with more granularity the appropriate TPM capabilities for the targeted use case.<\/p>\n<p>Four types of TPM are popular today, offering different trade-offs between cost, features, and security. TCG continues to evaluate market requirements to further evolve the TPM.<\/p>\n<ol>\n<li><strong>Discrete TPM<\/strong><br \/>\nDiscrete TPM provides the highest level of security, as might be needed for a TPM used to secure the brake controller in a car. The intent of this level is to ensure that the device it\u2019s protecting does not get hacked via even sophisticated methods. To accomplish this, a discrete chip is designed, built and evaluated for the highest level of security that can resist tampering with the chip, including probing it and freezing it with all sorts of sophisticated attacks.<\/li>\n<li><strong>Integrated TPM<\/strong><br \/>\nIntegrated TPM is the next level down in terms of security. This level still has a hardware TPM but it is integrated into a chip that provides functions other than security. The hardware implementation makes it resistant to software bugs, however, this level is not designed to be tamper-resistant.<\/li>\n<li><strong>Firmware TPM<\/strong><br \/>\nFirmware TPM is implemented in protected software. The code runs on the main CPU, so a separate chip is not required. While running like any other program, the code is in a protected execution environment called a trusted execution environment (TEE) that is separated from the rest of the programs that are running on the CPU. By doing this, secrets like private keys that might be needed by the TPM but should not be accessed by others can be kept in the TEE creating a more difficult path for hackers.<br \/>\nIn addition to the lack of tamper resistance, the downside to the TEE or firmware TPM is that now the TPM is dependent on many additional aspects to keep it secure, including the TEE operating system, bugs in the application code running in the TEE, etc.<\/li>\n<li><strong>Software TPM<\/strong><br \/>\nSoftware TPM can be implemented as a software emulator of the TPM. However, a software TPM is open to many vulnerabilities, not only tampering but also the bugs in any operating system running it. It does have key applications: it is very good for testing or building a system prototype with a TPM in it. For testing purposes, a software TPM could provide the right solution\/approach.<\/li>\n<\/ol>\n<p>Many IoT systems include sensors and cloud processing, which means virtualization. In a cloud environment, one clever way to implement a TPM is through a virtual TPM. The virtual TPM is part of the cloud-based environment and it provides the same commands that a physical TPM would but it provides those commands separately to each virtual machine.<\/p>\n<h2>TPM Solutions for Different Needs<\/h2>\n<p>The five variations of TPM, discussed roughly in order of security level and decreasing cost, are shown in Table 1. To get a better handle on the cost and security level impact, the TPM supplier needs to be consulted.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone\" src=\"\/wp-content\/uploads\/2021\/01\/tpm-2.0-table.jpg\" alt=\"chart showing various levels of security and the cost associated as well as typical applications\" width=\"938\" height=\"459\" \/><\/p>\n<h2>TPM Resources<\/h2>\n<p>An \u201copen access\u201d book intended to get one started with TPMs:<br \/>\n\u201cA Practical Guide to TPM 2.0 \u2013 Using the Trusted Platform Module in the New Age of Security\u201d; Arthur, Challener<br \/>\n<a href=\"https:\/\/www.springer.com\/us\/book\/9781430265832\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.springer.com\/us\/book\/9781430265832<\/a><\/p>\n<h3>A reference book intended to help explain TPMs:<\/h3>\n<p>\u201cTrusted Computing Platforms \u2013 TPM2.0 in Context\u201d; Proudler, Chen, Dalton; Springer<br \/>\n<a href=\"https:\/\/www.springer.com\/us\/book\/9783319087436\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.springer.com\/us\/book\/9783319087436<\/a><\/p>\n<h3>Software<\/h3>\n<p><a href=\"https:\/\/sourceforge.net\/projects\/ibmswtpm2\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/sourceforge.net\/projects\/ibmswtpm2\/<\/a><br \/>\n<a href=\"https:\/\/chromium.googlesource.com\/chromiumos\/third_party\/tpm2\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/chromium.googlesource.com\/chromiumos\/third_party\/tpm2\/<\/a><br \/>\n<a href=\"https:\/\/github.com\/vbendeb\/tpm2_server\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/vbendeb\/tpm2_server<\/a><br \/>\n<a href=\"https:\/\/research.microsoft.com\/en-US\/downloads\/35116857-e544-4003-8e7b-584182dc6833\/default.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/research.microsoft.com\/en-US\/downloads\/35116857-e544-4003-8e7b-584182dc6833\/default.aspx<\/a><br \/>\n<a href=\"https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/tree\/tpm-emulator\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/tree\/tpm-emulator<\/a><br \/>\n<a href=\"https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/commit\/9329f13c403daf1f4bd1e715d2ba0866e089fb1d\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/commit\/9329f13c403daf1f4bd1e715d2ba0866e089fb1d<\/a><br \/>\n<a href=\"https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/commit\/bbf2f7064c1452b47f11dfad340326b1205d863a\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/PeterHuewe\/linux-tpmdd\/commit\/bbf2f7064c1452b47f11dfad340326b1205d863a<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Trusted Platform Module (TPM) 2.0 Brief Introduction TPM Module 2.0 Brief Introduction.pdf The Trusted Computing Group (TCG) has been addressing the trust issue \u2013 and related security benefits \u2013 for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification. The TPM standard defines a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1371,"comment_status":"open","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"project_category":[1499],"project_tag":[2323,2324,1888,2003,1889,2100],"class_list":["post-1369","project","type-project","status-publish","has-post-thumbnail","hentry","project_category-blog","project_tag-brief-introduction","project_tag-standards","project_tag-tcg","project_tag-tpm","project_tag-trusted-computing-group","project_tag-trusted-platform-module","topics-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group - AMI<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group\" \/>\n<meta property=\"og:description\" content=\"Trusted Platform Module (TPM) 2.0 Brief Introduction TPM Module 2.0 Brief Introduction.pdf The Trusted Computing Group (TCG) has been addressing the trust issue \u2013 and related security benefits \u2013 for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification. The TPM standard defines a [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\" \/>\n<meta property=\"og:site_name\" content=\"AMI\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-12T14:51:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@AMI_PR\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\",\"url\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\",\"name\":\"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group - AMI\",\"isPartOf\":{\"@id\":\"https:\/\/www.ami.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg\",\"datePublished\":\"2017-10-27T00:00:00+00:00\",\"dateModified\":\"2026-01-12T14:51:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg\",\"width\":1140,\"height\":550},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.ami.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.ami.com\/project\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.ami.com\/#website\",\"url\":\"https:\/\/www.ami.com\/\",\"name\":\"AMI\",\"description\":\"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware\",\"publisher\":{\"@id\":\"https:\/\/www.ami.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.ami.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.ami.com\/#organization\",\"name\":\"AMI\",\"url\":\"https:\/\/www.ami.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"contentUrl\":\"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png\",\"width\":512,\"height\":512,\"caption\":\"AMI\"},\"image\":{\"@id\":\"https:\/\/www.ami.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TheWorldRunsonAMI#\",\"https:\/\/x.com\/AMI_PR\",\"https:\/\/www.linkedin.com\/company\/ami\",\"https:\/\/www.youtube.com\/c\/AMI_PR\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group - AMI","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/","og_locale":"en_US","og_type":"article","og_title":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group","og_description":"Trusted Platform Module (TPM) 2.0 Brief Introduction TPM Module 2.0 Brief Introduction.pdf The Trusted Computing Group (TCG) has been addressing the trust issue \u2013 and related security benefits \u2013 for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification. The TPM standard defines a [&hellip;]","og_url":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/","og_site_name":"AMI","article_publisher":"https:\/\/www.facebook.com\/TheWorldRunsonAMI#","article_modified_time":"2026-01-12T14:51:56+00:00","og_image":[{"width":1140,"height":550,"url":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_site":"@AMI_PR","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/","url":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/","name":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group - AMI","isPartOf":{"@id":"https:\/\/www.ami.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage"},"image":{"@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg","datePublished":"2017-10-27T00:00:00+00:00","dateModified":"2026-01-12T14:51:56+00:00","breadcrumb":{"@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#primaryimage","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg","width":1140,"height":550},{"@type":"BreadcrumbList","@id":"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ami.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.ami.com\/project\/"},{"@type":"ListItem","position":3,"name":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group"}]},{"@type":"WebSite","@id":"https:\/\/www.ami.com\/#website","url":"https:\/\/www.ami.com\/","name":"AMI","description":"Trusted Leader in UEFI, BMC &amp; Open-Source Firmware","publisher":{"@id":"https:\/\/www.ami.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ami.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ami.com\/#organization","name":"AMI","url":"https:\/\/www.ami.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","contentUrl":"https:\/\/www.ami.com\/wp-content\/uploads\/2025\/09\/cropped-AMI-Favicon.png","width":512,"height":512,"caption":"AMI"},"image":{"@id":"https:\/\/www.ami.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TheWorldRunsonAMI#","https:\/\/x.com\/AMI_PR","https:\/\/www.linkedin.com\/company\/ami","https:\/\/www.youtube.com\/c\/AMI_PR"]}]}},"_links":{"self":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/1369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project"}],"about":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/types\/project"}],"author":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/comments?post=1369"}],"version-history":[{"count":0,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project\/1369\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media\/1371"}],"wp:attachment":[{"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/media?parent=1369"}],"wp:term":[{"taxonomy":"project_category","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_category?post=1369"},{"taxonomy":"project_tag","embeddable":true,"href":"https:\/\/www.ami.com\/wp-json\/wp\/v2\/project_tag?post=1369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}