{"id":2007,"date":"2012-08-20T09:23:17","date_gmt":"2012-08-20T13:23:17","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=2007"},"modified":"2022-06-21T07:14:57","modified_gmt":"2022-06-21T11:14:57","slug":"the-difference-between-identification-and-verification-for-biometric-patient-identification-systems","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/","title":{"rendered":"The Difference Between Identification and Verification for Biometric Patient Identification Systems"},"content":{"rendered":"<figure id=\"attachment_2010\" aria-describedby=\"caption-attachment-2010\" style=\"width: 300px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-2010\" title=\"RightPatient biometric patient identification system\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026-300x199.jpg\" alt=\"RightPatient is a healthcare biometrics patient ID system that uses iris recognition to prevent duplicate medical records, eliminate medical identity theft and increase patient safety.\" width=\"300\" height=\"199\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026-300x199.jpg 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026-1024x680.jpg 1024w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><figcaption id=\"caption-attachment-2010\" class=\"wp-caption-text\">Biometric Patient Identification Systems &#8211; What are the Differences in Search Functionality?<\/figcaption><\/figure>\n<p>Advance for Healthcare Information Professionals\u00a0published an article on Friday entitled &#8220;<a title=\"the importance of understanding the difference between identification and verification for healthcare biometrics patient identification systems\" href=\"https:\/\/health-information.advanceweb.com\/Features\/Articles\/Defining-Patient-Verification-Identification-in-Healthcare.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Defining Patient Verification &amp; Identification in Healthcare<\/strong><\/a>&#8221; written by our President, Michael Trader. In the article, Michael explains that healthcare biometrics patient identification systems use different searching queries to identify a patient and its important that those directly responsible for purchasing decisions and hospital technology due diligence understand the differences between patient biometric searches and how this impacts the ability to:<\/p>\n<p>&#8212; prevent medical identity theft<br \/>\n&#8212; eliminate duplicate medical records<br \/>\n&#8212; raise patient safety levels<\/p>\n<p>These are among the most important reasons that hospitals invest in healthcare <strong><a href=\"https:\/\/www.m2sys.com\/blog\/health-care\/archbold-memorial-hospital-deploys-rightpatient-biometric-patient-identification-solution\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=archbold%20hospital\">biometrics patient identification<\/a><\/strong> systems and through our research, we have discovered that education on the differences between search methods is needed.<\/p>\n<p><strong>Learn More:\u00a0<span style=\"text-decoration: underline;\"><em><a href=\"https:\/\/www.m2sys.com\/blog\/eventsconferences\/biometric-patient-identification-for-patient-safety\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=webinar%20patient%20identification\">Webinar on Biometric Patient Identification Technology for Patient Safety<\/a><\/em><\/span><\/strong><\/p>\n<p>Hospitals that deploy <a title=\"RightPatient Biometric Patient Identificaiton System\" href=\"https:\/\/www.RightPatient.com\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>healthcare biometrics patient identification systems<\/strong><\/a> that are built on 1:Few search capabilities confirm or deny a patient&#8217;s identity following database segmentation to compare the patient&#8217;s identity against a very small group of records instead of all the records in a master patient index (MPI). These types of searches don&#8217;t provide a mechanism to compare the patient&#8217;s scanned biometric template against\u00a0<em>all\u00a0<\/em>records in the database to check for duplication or to <strong><a href=\"https:\/\/www.m2sys.com\/blog\/workforce-management\/how-does-a-fingerprint-time-clock-eliminate-time-and-attendance-fraud\/?utm_source=blog&amp;utm_medium=blog%20post&amp;utm_campaign=fingerprint%20time%20clock\">prevent fraud<\/a><\/strong> when a patient tries to register with multiple ID&#8217;s. Read the<a title=\"Differences between one-to-many (1:N), one-to-one (1:1), and 1:Few searches\" href=\"https:\/\/health-information.advanceweb.com\/Features\/Articles\/Defining-Patient-Verification-Identification-in-Healthcare.aspx\" target=\"_blank\" rel=\"noopener noreferrer\"><strong> article<\/strong> <\/a>to find out more about the differences between one-to-many (1:N), one-to-one (1:1), and 1:Few searches.<\/p>\n<p>Thank you to the staff<em>\u00a0<\/em>at <em>Advance\u00a0<\/em>for helping us to continue our mission of educating healthcare about biometric patient identification system functionality and the importance of understanding the limitations of searches to help facilities make more educated decisions on what solution is the best to maximize patient safety. Look for more articles on healthcare biometrics patient identification systems posted on this blog and in additional major trade publications.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Advance for Healthcare Information Professionals\u00a0published an article on Friday entitled &#8220;Defining Patient Verification &amp; Identification in Healthcare&#8221; written by our<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"patient identification systems","_yoast_wpseo_title":"Verification vs. Identification for Biometric Patient ID Systems","_yoast_wpseo_metadesc":"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[197],"tags":[262,264,263,261,116,266,265,267,115,268,214],"class_list":["post-2007","post","type-post","status-publish","format-standard","hentry","category-patient-identification","tag-262","tag-1few","tag-1n","tag-advance","tag-healthcare-biometrics","tag-one-to-few","tag-one-to-many","tag-one-to-one","tag-patient-identification","tag-patient-identification-systems","tag-rightpatient"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Verification vs. Identification for Biometric Patient ID Systems<\/title>\n<meta name=\"description\" content=\"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Verification vs. Identification for Biometric Patient ID Systems\" \/>\n<meta property=\"og:description\" content=\"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:author\" content=\"m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-20T13:23:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-21T11:14:57+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026-300x199.jpg\" \/>\n<meta name=\"author\" content=\"John Trader\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Trader\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\"},\"author\":{\"name\":\"John Trader\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\"},\"headline\":\"The Difference Between Identification and Verification for Biometric Patient Identification Systems\",\"datePublished\":\"2012-08-20T13:23:17+00:00\",\"dateModified\":\"2022-06-21T11:14:57+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\"},\"wordCount\":332,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"1:1\",\"1:Few\",\"1:N\",\"Advance\",\"healthcare biometrics\",\"one-to-few\",\"one-to-many\",\"one-to-one\",\"patient identification\",\"patient identification systems\",\"RightPatient\"],\"articleSection\":[\"Patient Identification\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\",\"name\":\"Verification vs. Identification for Biometric Patient ID Systems\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2012-08-20T13:23:17+00:00\",\"dateModified\":\"2022-06-21T11:14:57+00:00\",\"description\":\"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"The Difference Between Identification and Verification for Biometric Patient Identification Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16\",\"name\":\"John Trader\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g\",\"caption\":\"John Trader\"},\"description\":\"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com\",\"sameAs\":[\"https:\/\/www.m2sys.com\/blog\/\",\"m2sys\"],\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/m2john\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Verification vs. Identification for Biometric Patient ID Systems","description":"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/","og_locale":"en_US","og_type":"article","og_title":"Verification vs. Identification for Biometric Patient ID Systems","og_description":"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?","og_url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_author":"m2sys","article_published_time":"2012-08-20T13:23:17+00:00","article_modified_time":"2022-06-21T11:14:57+00:00","og_image":[{"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2012\/08\/DSC_0026-300x199.jpg"}],"author":"John Trader","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"John Trader","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/"},"author":{"name":"John Trader","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16"},"headline":"The Difference Between Identification and Verification for Biometric Patient Identification Systems","datePublished":"2012-08-20T13:23:17+00:00","dateModified":"2022-06-21T11:14:57+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/"},"wordCount":332,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["1:1","1:Few","1:N","Advance","healthcare biometrics","one-to-few","one-to-many","one-to-one","patient identification","patient identification systems","RightPatient"],"articleSection":["Patient Identification"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/","url":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/","name":"Verification vs. Identification for Biometric Patient ID Systems","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2012-08-20T13:23:17+00:00","dateModified":"2022-06-21T11:14:57+00:00","description":"Do you know the difference between verification, identification, and segmentation in healthcare biometric patient identification systems?","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/patient-identification\/the-difference-between-identification-and-verification-for-biometric-patient-identification-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"The Difference Between Identification and Verification for Biometric Patient Identification Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f2c0ad893e583e6aadede987456ead16","name":"John Trader","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/763fc04926a0fda27b5be15779f8f543?s=96&d=mm&r=g","caption":"John Trader"},"description":"John Trader is the Public Relations and Marketing Manager with M2SYS Technology, a recognized industry leader in biometric identity management technology. Headquartered in Atlanta, GA M2SYS Technology's mission is to pioneer the high-tech industry by delivering long-term value to customers, employees and partners through continued innovation and excellence in all aspects of our business. M2SYS continues to innovate, build and bring to market leading-edge biometrics solutions that revolutionize the industry and expand the applicability of biometrics technology in our marketplace. You can view their Web site at www.m2sys.com or contact them via e-mail at info@m2sys.com","sameAs":["https:\/\/www.m2sys.com\/blog\/","m2sys"],"url":"https:\/\/www.m2sys.com\/blog\/author\/m2john\/"}]}},"modified_by":"Stanly Palma","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2007"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=2007"}],"version-history":[{"count":22,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2007\/revisions"}],"predecessor-version":[{"id":17910,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/2007\/revisions\/17910"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=2007"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=2007"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=2007"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}