{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"1-1-Cybersecurity(part1\u662f\u975e\u984c)","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/4\/44872a20c5d2ab73\/thumb_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='404' id='ccShare44339' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/44339'><\/iframe>","type":"video","width":720,"height":404,"duration":"18:40","index":{"item_1":{"title":"1-1-Cybersecurity(part1\u662f\u975e\u984c)","time":"0","indent":"0","sn":"1"}},"resolution":{"playtype":"mp4","subtype":"","src":"1920x1080","mp4":"720x404","mp4_hd":"","mp4_1920":"","mp4_4k":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/4\/44872a20c5d2ab73\/thumb.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/4\/44872a20c5d2ab73\/cover.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/4\/44872a20c5d2ab73\/video\/thumbs\/storyboard.jpg"},"srcFrom":"","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/4\/44872a20c5d2ab73","status":true}