{"version":"1.0","provider_name":"AMI","provider_url":"https:\/\/www.ami.com","title":"Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ju1LTvwJbl\"><a href=\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/\">Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.ami.com\/resource\/trusted-platform-module-2-0-a-brief-introduction-by-trusted-computing-group\/embed\/#?secret=ju1LTvwJbl\" width=\"600\" height=\"338\" title=\"&#8220;Trusted Platform Module 2.0: A Brief Introduction by Trusted Computing Group&#8221; &#8212; AMI\" data-secret=\"ju1LTvwJbl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.ami.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.ami.com\/wp-content\/uploads\/2021\/07\/tpm-2.0-brief-intro_1140x550.jpg","thumbnail_width":1140,"thumbnail_height":550,"description":"Trusted Platform Module (TPM) 2.0 Brief Introduction TPM Module 2.0 Brief Introduction.pdf The Trusted Computing Group (TCG) has been addressing the trust issue \u2013 and related security benefits \u2013 for PCs, servers, networking gear and embedded systems for more than a decade, driven by the Trusted Platform Module (TPM) specification. The TPM standard defines a [&hellip;]"}