{"version":"1.0","provider_name":"Camdemy1.0","provider_url":"http:\/\/media.usc.edu.tw","title":"Lock Manager Part-5","description":"","author_name":null,"author_url":"http:\/\/media.usc.edu.tw\/user\/","thumbnail_url":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/d\/d5d25bee7073ba9d\/thumb_l.jpg","thumbnail_height":360,"thumbnail_width":640,"html":"<iframe width='720' height='405' id='ccShare3050' frameborder='0'  src='http:\/\/media.usc.edu.tw\/media\/e\/3050' allowfullscreen><\/iframe>","type":"video","width":720,"height":405,"duration":"19:20","index":{"item_1":{"title":"Design Considerations (2)","time":"0","indent":"0","sn":"1"},"item_2":{"title":"Coding of Request Rules Part-1","time":"24626","indent":"0","sn":"2"},"item_3":{"title":"Coding of Request Rules Part-2","time":"358556","indent":"0","sn":"3"}},"resolution":{"playtype":"fs","subtype":"","src":"1280x720","mp4":"720x404","mp4_hd":"1280x720","mp4_4k":"","mp4_1920":"","mp4_src":"","mp4_base":""},"base_image":{"thumb":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/d\/d5d25bee7073ba9d\/thumb.jpg","cover":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/d\/d5d25bee7073ba9d\/cover.jpg","storyboard":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/d\/d5d25bee7073ba9d\/video\/thumbs\/storyboard.jpg"},"srcFrom":"","base_url":"http:\/\/media.usc.edu.tw\/sysdata\/doc\/d\/d5d25bee7073ba9d","status":true}