{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"https:\/\/eclass.uch.edu.tw","title":"2-3-Cybersecurity(part2\u9078\u64c7\u984c)11-13","description":"","author_name":"","author_url":"https:\/\/eclass.uch.edu.tw\/user\/","converting":0,"thumbnail_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d7bf5d995e9358d7\/64da_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='404' id='ccShare44547' frameborder='0' scrolling='no' src='http:\/\/eclass.uch.edu.tw\/media\/e\/44547'><\/iframe>","type":"video","width":720,"height":404,"duration":"16:20","index":{"item_1":{"title":"2-3-Cybersecurity(part2\u9078\u64c7\u984c)11-13","time":"0","indent":"0","sn":"1"}},"resolution":{"playtype":"mp4","subtype":"","src":"","mp4":"720x404","mp4_hd":"","mp4_1920":"","mp4_4k":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d7bf5d995e9358d7\/64da.jpg","cover":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d7bf5d995e9358d7\/c7ca.jpg","storyboard":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d7bf5d995e9358d7\/video\/thumbs\/storyboard.jpg"},"srcFrom":"https:\/\/eclass.uch.edu.tw\/media\/44449","base_url":"https:\/\/eclass.uch.edu.tw\/sysdata\/doc\/d\/d7bf5d995e9358d7","status":true}