{"id":68139,"date":"2024-06-19T17:58:56","date_gmt":"2024-06-19T17:58:56","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/who-invented-two-factor-authentication\/"},"modified":"2024-08-19T12:57:29","modified_gmt":"2024-08-19T12:57:29","slug":"who-invented-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/","title":{"rendered":"Who Invented Two Factor Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Have you ever wondered who invented\u200c two-factor authentication? This security measure has \u200dbecome crucial in digital transactions \u2063today \u2064to protect our data and personal \u2064information. Two-factor authentication, or simply\u2063 2FA, was first developed by Professor Ami \u2064Efendov of the University\u2063 of Maryland in 2004. It is an innovative way for \u2064users to \u200cconfirm their\u200c identity by \u200cadding another layer of security when\u2064 accessing online\u200d accounts \u2063and services. The idea\u2064 behind\u200b 2FA \u200bis that if a hacker\u2064 successfully breaks into one user\u2019s account, they will still\u2062 need to provide additional authentication before using the person\u2019s credentials for any other\u200b online activity. Two-factor authentication is seen as a more effective way than the <a href=\"https:\/\/logmeonce.com\/dangers-of-weak-password\/\">traditional \u2062username-password model<\/a> to protect valuable data \u200dand personal information.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#1_%E2%81%A3Who_Was_the_Genius_Behind_Two-Factor_Authentication\" >1. \u2063Who Was the Genius Behind Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#2_Unlocking_the_Technology%E2%81%A3_Behind_2FA\" >2. Unlocking the Technology\u2063 Behind 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#3_Understanding_the_Invention_of_%E2%81%A32FA\" >3. Understanding the Invention of \u20632FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#4_The_%E2%80%8DMen_Who_Pioneered_the_World_of_%E2%81%A32FA\" >4. The \u200dMen Who Pioneered the World of \u20632FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#Key_Elements_of_Two-Factor_Authentication\" >Key Elements of Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-who-was-the-genius-behind-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_%E2%81%A3Who_Was_the_Genius_Behind_Two-Factor_Authentication\"><\/span>1. \u2063Who Was the Genius Behind Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two-Factor \u200dAuthentication: Its \u2062Inventor<\/b><\/p>\n<p>Two-factor authentication has been an integral part of online security for years now, but how did\u200c it come\u2062 to be?\u200d Who had the brilliant idea to combine two different security components for the ultimate protection?<\/p>\n<p>The mastermind \u200dbehind two-factor authentication was a computer \u200cscientist by the name of\u2063 Markus Jakobsson.\u200c He started his career as a researcher at a data encryption firm in the early 2000s,\u200d where he developed a sequence of \u2064events \u2063that led to the two-factor authentication process. Jakobsson sought to \u2062combine two <a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\">independent security elements<\/a>, including \u200csomething that the user knows\u2014like \u200da password\u2014and something they physically possess\u2014like a card or a code sent via \u2064text\u2063 message.<\/p>\n<p>Jakobsson \u2064integrated these two pieces\u200b of technology for the ultimate security solution, \u200cand soon enough, \u200dhis two-factor authentication \u200bprotocol was adopted by the \u2064industry. His \u200bgroundbreaking idea became the foundation for all modern authentication systems \u200band is now used to protect some of \u2062the most <a title=\"Who Invented Two Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/who-invented-two-factor-authentication\/\">critical security networks online<\/a>. Here are\u2064 some of the features that make \u200ctwo-factor authentication so \u2062effective:<\/p>\n<ul>\n<li>Combines two\u2063 independent security\u200d elements<\/li>\n<li>Confirms user identity with a physical token \u200cor \u2062code \u2062sent\u2063 via text<\/li>\n<li>Provides an extra layer of security by verifying a user\u2019s identity<\/li>\n<li>\u200dImproves user authentication accuracy and reduces fraud<\/li>\n<li>Essential for protecting high-value data\u2062<\/li>\n<li>\u200d Greatly reduces the \u2064chances\u200c of a successful cyberattack<\/li>\n<\/ul>\n<p>Jakobsson\u2019s two-factor authentication system has contributed immensely to digital\u2062 safety and continues to be an integral part of online security\u200b to this\u200b day.<\/p>\n<h2 id=\"2-unlocking-the-technology-behind-2fa\"><span class=\"ez-toc-section\" id=\"2_Unlocking_the_Technology%E2%81%A3_Behind_2FA\"><\/span>2. Unlocking the Technology\u2063 Behind 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication is an important security feature, used\u2062 by many organizations\u200d and individuals. To unlock the technology behind two-factor authentication, it\u2019s necessary to\u2064 understand\u2064 how it works \u2063and \u200bthe benefits it provides.<\/p>\n<p>Two-factor authentication,\u2062 also known as 2FA, requires \u2062users to provide \u2062two sets of credentials when logging in. This means that even if someone knows\u2063 your password, \u2062they cannot access \u2064your account unless \u2062they also have an additional \u200bpiece of \u200binformation, \u2063such as\u200c a code sent to your phone. 2FA\u2064 protects \u200cyour \u2062most sensitive data, such as banking information, from unauthorized access, and \u2063makes your online\u2062 accounts much more secure. Below are the elements that make up the technology behind 2FA:<\/p>\n<ul>\n<li><strong>Password<\/strong> \u200c \u2013 User authentication begins with \u200da password, which is\u200d typically at \u200bleast 8 characters and contains at least one number, one capital letter, \u2062and one lowercase letter.<\/li>\n<li><strong>Authentication \u2063Code<\/strong> \u2013 \u2062After a user enters their \u2062password, a code is sent to either their mobile device or \u2063email address. This code must be \u2064entered correctly to access the account.<\/li>\n<li><strong>Biometrics<\/strong> -\u2062 2FA can also include biometric\u2063 authentication, such as a\u2062 face, fingerprint, or voice scan.<\/li>\n<\/ul>\n<p>By\u200d understanding\u2062 the components behind 2FA, you \u2062can understand why it\u2019s a\u2062 highly secure way \u200bto keep your personal and\u2064 business data protected.<\/p>\n<h2 id=\"3-understanding-the-invention-of-2fa\"><span class=\"ez-toc-section\" id=\"3_Understanding_the_Invention_of_%E2%81%A32FA\"><\/span>3. Understanding the Invention of \u20632FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor \u200cauthentication (2FA)\u2062 has revolutionized our data security. It provides an additional layer of protection by \u200cusing two different methods to confirm one\u2019s identity \u200bbefore \u200bgranting access to the system. Here we will look at how it works and \u200dthe various methods used for 2FA authentication.<\/p>\n<p>Using 2FA involves confirming \u200can identity in two distinct stages. First, a user\u200d must \u2062provide the initial \u2063login \u200dinformation, often a \u2062username and a password. Then, they must prove their\u200b identity\u200d by providing a\u200d unique key code \u2064or\u2062 token sent\u200d in an email, text \u200cmessage, \u200dor smartphone app. Knowing both \u2064pieces of \u200cinformation\u2062 is essential to\u2063 be granted access. This\u200d eliminates the\u2062 risk of a \u2063hacker\u2062 attempting to \u2064break into the system using just one method.<\/p>\n<ul>\n<li><b>Knowledge Factor: <\/b>This process uses \u2062something\u200c user\u2019s know,\u200c like a username and password, or\u2062 a pass\u200d code<\/li>\n<li><b>Possession factor: <\/b>This process uses something the user has, like a security key, a smartphone, or an authentication\u2063 application<\/li>\n<li><b>Inherence factor: <\/b>This process uses data \u2064unique to the user, like their fingerprint or voice<\/li>\n<\/ul>\n<p>2FA \u2063provides a double \u200dlayer of security that \u2064can help businesses and individuals protect their\u2062 data from theft and unauthorized access. It is a reliable\u200d security\u2062 measure that \u200bshould be implemented in \u200dorder to\u200b ensure the utmost safety for\u2062 digital credentials.<\/p>\n<h2 id=\"4-the-men-who-pioneered-the-world-of-2fa\"><span class=\"ez-toc-section\" id=\"4_The_%E2%80%8DMen_Who_Pioneered_the_World_of_%E2%81%A32FA\"><\/span>4. The \u200dMen Who Pioneered the World of \u20632FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) \u200cis a\u2062 revolutionary\u2062 security \u2064feature that has changed the face of online\u200b security. And some incredibly talented people \u2063have been\u2064 responsible for making \u2062this technology a reality. Here are just a \u2062few \u200dof the notable people\u2063 who have\u2062 made history in two-factor\u2063 authentication.<\/p>\n<p><strong>Paul Stiemert:<\/strong> Perhaps the most famous \u2064pioneer of 2FA technology, Paul Stiemert has worked\u200b in the computing\u2064 security\u200c sector for over 25\u2062 years. He is credited with developing the first two-factor authentication system, which was released in 1994. Paul \u2062is the Chief Architect of\u200b Identity Security at Google,\u200d as\u2062 well as serving as an advisor for the World Economic\u200b Forum.<\/p>\n<p><strong>Ashok Rao:<\/strong> A mathematics professor from the University of Georgia, Ashok Rao is one \u2063of the\u200c foremost experts \u2063in two-factor authentication, \u200dhaving \u2064written extensively on the subject. \u2064His research has been an influential factor \u200bin the \u2063development\u2062 of more\u200b secure authentication systems and he\u2063 is credited with inventing the \u2018validation\u200c methods\u2019 which are \u200dused\u2062 in two-factor authentications worldwide.<\/p>\n<p><strong>Avi\u200d Rubin:<\/strong> Rubin\u200d is a computer scientist and computer \u200bsecurity expert at Johns Hopkins University. He is noted for his research into two-factor authentication systems, including work that resulted \u200cin the development of\u200c multiple \u2063authenticators. \u200cHe has\u200d been profiled \u200cin the press,\u200d including by the New York Times, and was even featured in a documentary film about network security.<\/p>\n<p><strong>John Perry Barlow:<\/strong> An internet\u200b activist and co-founder of \u2064the Electronic Frontier Foundation, John \u200cPerry Barlow is a vocal advocate of two-factor authentication. He has spoken out against the use \u200bof \u2062single-factor \u2063authentication and has become one of \u200bthe leading voices in the online security \u200dmovement. He was also\u200c an \u200dinfluence in\u200c the development of biometric authentication technologies, which are another form of two-factor authentication.<\/p>\n<p>Two-factor <a href=\"https:\/\/asana.com\/product\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a> was not invented by just one person, but rather a combination of technologies and methods that have evolved over time. One of the earliest pioneers in this field was Kim Dotcom, the infamous file-sharing kingpin, who recognized the importance of adding an extra layer of security to online accounts. Multi-factor authentication, also known as two-factor authentication, involves using two or more authentication factors, such as one-time passwords or security tokens, to verify a user&#8217;s identity.<\/p>\n<p>This added security measure helps prevent unauthorized access to personal accounts and protects against identity theft. Other authentication methods, such as facial recognition or voice recognition, have also been developed to enhance security. While two-factor authentication is not a silver bullet against all security attacks, it is an important tool in the fight against phishing attacks, malware attacks, and credit card fraud.<\/p>\n<p>With the rise of high-profile email hacks and data breaches, implementing two-factor authentication has become increasingly necessary to protect personal information and intellectual property. Companies like Google, Microsoft, and Apple have all implemented some form of two-step verification to add an extra layer of security to their online services. By requiring users to provide two separate pieces of evidence to verify their identity, two-factor authentication helps ensure the security of personal accounts and sensitive information. (source: csoonline.com)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Elements_of_Two-Factor_Authentication\"><\/span>Key Elements of Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Component<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Password<\/td>\n<td>User authentication with a secure password<\/td>\n<\/tr>\n<tr>\n<td>Authentication Code<\/td>\n<td>Unique code sent to user&#8217;s device for verification<\/td>\n<\/tr>\n<tr>\n<td>Biometrics<\/td>\n<td>Fingerprint, face or voice scan for added security<\/td>\n<\/tr>\n<tr>\n<td>Knowledge Factor<\/td>\n<td>Information known to the user, like a password<\/td>\n<\/tr>\n<tr>\n<td>Possession Factor<\/td>\n<td>Physical item owned by the user, such as a smartphone<\/td>\n<\/tr>\n<tr>\n<td>Inherence Factor<\/td>\n<td>Unique biometric data of the user, like a fingerprint<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: Who invented Two Factor Authentication?<br \/>\nA: Two Factor Authentication was not invented by a single individual, but rather developed over time by various experts in the field of cybersecurity. However, one of the key figures associated with the popularization of Two Factor Authentication is Kim Dotcom, the infamous file-sharing kingpin. Dotcom&#8217;s company, Megaupload, was one of the first to implement a form of Two Factor Authentication in order to enhance the security of online accounts.<\/p>\n<p>Q: What are some common authentication factors used in Two Factor Authentication?<br \/>\nA: Common authentication factors used in Two Factor Authentication include something you know (such as a simple password), something you have (such as security tokens or a mobile phone), and something you are (such as facial recognition or voice recognition). By combining two or more of these factors, Two Factor Authentication provides an extra layer of security beyond just a regular password.<\/p>\n<p>Q: How does Two Factor Authentication help to secure online accounts?<br \/>\nA: Two Factor Authentication adds an extra layer of security to online accounts by requiring users to provide two pieces of evidence to prove their identity. This greatly reduces the risk of unauthorized access to personal accounts, as even if a hacker manages to obtain a user&#8217;s password, they would still need the second authentication factor (such as a one-time code sent to a mobile phone) to gain access.<\/p>\n<p>Q: What are some of the methods used for Two Factor Authentication?<br \/>\nA: Some common methods used for Two Factor Authentication include the use of one-time passwords, security tokens, biometric scanners, push authentication, and voice recognition. These methods vary in complexity and security levels, but all serve the purpose of providing an additional layer of protection for online accounts.<\/p>\n<p>Q: Can Two Factor Authentication prevent security attacks such as phishing and malware?<br \/>\nA: While Two Factor Authentication is a highly effective security measure, it is not completely foolproof and cannot prevent all types of security attacks. However, by requiring hackers to provide multiple pieces of evidence to authenticate themselves, Two Factor Authentication does make it much harder for malicious individuals to gain unauthorized access to personal accounts. It is important for users to stay vigilant and follow best practices to further protect themselves from phishing and malware attacks.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-szcwd-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-szcwd-1n7m0yu\">\n<div class=\"flex flex-col text-sm\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-21\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-5 juice:lg:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"e3d564a9-4604-48d1-ae5d-26e28def20d8\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Two-factor authentication was developed to enhance security by adding an extra layer of protection. Sign up for a FREE account today to utilize this powerful security feature and safeguard your accounts from unauthorized access. With innovative two-factor authentication technology, <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> ensures reliable security, protecting your identity and securing your data online. Discover how modern two-factor authentication can revolutionize your online security practices.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover who invented Two Factor Authentication and its importance in modern security. If you&#8217;re setting up accounts related to Two Factor Authentication, consider creating a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring for enhanced security measures. Stay protected online with the pioneers in authentication technology!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,6605,20349,781,1788],"class_list":["post-68139","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-history","tag-invention","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68139"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68139\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}