CN112307442A - Usage permission detection method and device, electronic equipment and readable storage medium - Google Patents

Usage permission detection method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112307442A
CN112307442A CN202011185672.6A CN202011185672A CN112307442A CN 112307442 A CN112307442 A CN 112307442A CN 202011185672 A CN202011185672 A CN 202011185672A CN 112307442 A CN112307442 A CN 112307442A
Authority
CN
China
Prior art keywords
file
expired
expiration
expiration time
authority
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011185672.6A
Other languages
Chinese (zh)
Inventor
王蒴
李嘉威
孟庆凯
刘文君
李希明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Civic Se Commercial Middleware Co ltd
Original Assignee
Shandong Civic Se Commercial Middleware Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Civic Se Commercial Middleware Co ltd filed Critical Shandong Civic Se Commercial Middleware Co ltd
Priority to CN202011185672.6A priority Critical patent/CN112307442A/en
Publication of CN112307442A publication Critical patent/CN112307442A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a usage right detection method, a usage right detection device, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: if the detection instruction is obtained, obtaining the expiration time corresponding to the authority file; judging whether the authority file is expired or not by using the expiration time and the current time; if the authority file is expired, outputting expiration prompt information by using a modal dialog box, and skipping the current page to a login page; if the authority file is expired, the current page can be jumped to a login page, so that a user can not log in and obtain services; the modal dialog box is used for outputting the expiration prompt information, so that the condition that the use permission is expired and still used due to other operations of a user bypassing the dialog box can be avoided; the method can detect whether the authority file is expired or not when needed, and forcibly quits after the authority file is determined to be expired, so that the authority detection capability is improved, and the condition that the system is still used after the use authority is expired is avoided.

Description

Usage permission detection method and device, electronic equipment and readable storage medium
Technical Field
The present disclosure relates to the field of permission detection technologies, and in particular, to a usage permission detection method, a usage permission detection apparatus, an electronic device, and a computer-readable storage medium.
Background
In order to limit the usage right of the software or system in time, most of the software or system has a right file (or called an authentication file) and records the expiration time. The user can use the provided service within the legitimate use time by paying. The related art detects the usage right at each startup or login of the software or system to prohibit continued usage after the expiration time is reached. However, if the software or system does not reach the expiration time at startup, but reaches the expiration time during operation, the system can still be used because the system is still running without rebooting or logging in. If the user continues to use the system without logging out, the usage right will be expired and still used, and therefore the right detection capability of the related art is poor.
Therefore, the problem of poor authority detection capability in the related art is a technical problem to be solved by those skilled in the art.
Disclosure of Invention
In view of the above, an object of the present application is to provide a usage right detection method, a usage right detection apparatus, an electronic device and a computer-readable storage medium, which improve the capability of the usage right detection.
In order to solve the above technical problem, the present application provides a usage right detection method, including:
if the detection instruction is obtained, obtaining the expiration time corresponding to the authority file;
judging whether the authority file is expired or not by using the expiration time and the current time;
if the authority file is expired, outputting expiration prompt information by using a modal dialog box, and skipping the current page to a login page.
Optionally, if the rights file is not expired, the method further includes:
calculating a remaining time using the expiration time and the current time, and outputting the remaining time using an initial modality dialog.
Optionally, the method further comprises:
and outputting the remaining time by using a bottom information prompt bar.
Optionally, the obtaining of the expiration time corresponding to the rights file includes:
determining whether the expiration time exists in a status container;
if yes, acquiring the expiration time from the status container;
and if the authority file does not exist, acquiring the expiration time from the authority file.
Optionally, the obtaining the expiration time from the rights file includes:
and acquiring the expiration time in the authority file in a file stream mode, and storing the expiration time into the state container.
Optionally, the obtaining of the detection instruction includes:
judging whether a detection period is reached;
if the detection period is reached, determining to acquire the detection instruction;
and/or the presence of a gas in the gas,
and acquiring the detection instruction input from the outside.
Optionally, the outputting the expiration prompt information by using a modal dialog includes:
acquiring due prompt information, and inputting the due prompt information into an initial modal dialog box to obtain the modal dialog box;
and rendering and outputting the modal dialog box.
The application also provides a usage authority detection device, including:
the acquisition module is used for acquiring the expiration time corresponding to the authority file if the detection instruction is acquired;
the expiration judging module is used for judging whether the authority file has expired or not by utilizing the expiration time and the current time;
and the information output module is used for outputting expiration prompt information by using a modal dialog box and jumping the current page to a login page if the authority file has expired.
The present application further provides an electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is configured to execute the computer program to implement the usage right detection method.
The present application also provides a computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the usage right detection method described above.
According to the usage right detection method, if the detection instruction is obtained, the expiration time corresponding to the right file is obtained; judging whether the authority file is expired or not by using the expiration time and the current time; if the authority file is expired, outputting expiration prompt information by using the modal dialog box, and skipping the current page to the login page.
Therefore, the method can acquire the expiration event when the detection instruction is acquired, namely acquire the expiration time corresponding to the authority file when needed, and judge whether the authority file is expired or not by using the current time. If the rights file has expired, the current page may be jumped to the login page. Because the authority file is expired, the user cannot log in and acquire the service under the login page, and the condition that the use authority is expired and still used is prevented. At the same time, the expiration prompt is output using a modal dialog box that causes the user to first respond to an application other than the modal dialog box when the user wants to operate the application. Therefore, the situation that the user bypasses the dialog box to perform other operations and the use authority is expired and is still used can be avoided. The method can detect whether the authority file is expired or not when needed, and forcibly quits after the authority file is determined to be expired, so that the authority detection capability is improved, the condition that the use authority is expired but the system is still used is avoided, and the problem of poor authority detection capability in the related technology is solved.
In addition, the application also provides a use permission detection device, an electronic device and a computer readable storage medium, and the beneficial effects are also achieved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments or related technologies of the present application, the drawings needed to be used in the description of the embodiments or related technologies are briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
Fig. 1 is a flowchart of a usage right detection method according to an embodiment of the present application;
fig. 2 is a flowchart of a specific usage right detection method provided in an embodiment of the present application;
FIG. 3 is a diagram illustrating a particular modal dialog provided by an embodiment of the present application;
FIG. 4 is a diagram of another particular modal dialog provided by an embodiment of the present application;
FIG. 5 is a diagram of another particular modal dialog provided by an embodiment of the present application;
fig. 6 is a schematic diagram of a bottom information prompt bar according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a usage right detection apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a flowchart of a usage right detection method according to an embodiment of the present disclosure. The method comprises the following steps:
s101: and if the detection instruction is acquired, acquiring the expiration time corresponding to the authority file.
It should be noted that all or part of the steps of the permission detection method provided in this embodiment may be executed by a designated electronic device, and the designated electronic device may be any form of device as needed, for example, a computer, or a server. The specified electronic device is an electronic device running software or a system that requires usage right detection.
The detection instruction is an instruction for instructing to start usage right detection, and the specific form and content of the detection instruction are not limited in this embodiment. The detection instruction may be input externally, or may be generated by itself. It is to be understood that the embodiment does not limit the execution frequency of the operation of attempting to acquire the detection instruction, for example, whether the detection instruction is acquired may be detected in real time, or whether the detection instruction is acquired may be detected periodically, or whether the detection instruction is acquired may be monitored when a certain condition (e.g., a time condition, an operating time condition) is satisfied.
After the detection instruction is obtained, it is indicated that the usage permission detection is required, so that the expiration time corresponding to the permission file can be obtained. The authority file is a file corresponding to the software or the system, and may specifically be an authority certificate or other forms. The rights file has an expiration time before which the user can use the software or system. After the expiration time, the user loses access to the software or system. The specific accuracy of the expiration time is not limited, and may be, for example, to the nearest day, or may be to the nearest month or year. Further, the embodiment does not limit a specific obtaining method of the expiration time, for example, the expiration time corresponding to the rights file may be directly obtained, or the generation time and the validity period corresponding to the rights file may be obtained, and the expiration time is obtained by calculating using the generation time and the validity period. It is understood that the expiration time is an authorization expiration time, and the specific content of the authorization is not limited, and may be, for example, a trial-period authorization. Referring to fig. 2, fig. 2 is a flowchart of a specific usage right detection method according to an embodiment of the present application. The system authentication file in the step a is an authority file, which is specifically a trial option file, so that correspondingly, the authorization is a trial authorization.
In one possible embodiment, the process of obtaining the detection instruction may include:
step 11: and judging whether the detection period is reached.
Step 12: and if the detection period is reached, determining to acquire the detection instruction.
In this embodiment, the detection instruction may be obtained in two ways, i.e., internal generation and external obtaining. Specifically, whether a detection period is reached can be determined, and the detection period is a generation period of the detection instruction. This determination step may be performed, or may be performed periodically, for example, once per second. If the detection period is determined to be reached, the detection instruction can be determined to be acquired, namely the detection instruction is generated according to the detection period. In one embodiment, a detection instruction may be generated after a detection period is reached, and an attempt to acquire the detection instruction is started, and when the detection instruction generated by the detection instruction itself is acquired, it may be determined that the detection instruction is acquired; in another possible implementation manner, it may be determined that the detection instruction is acquired directly after the arrival detection period is detected, that is, a signal of the arrival detection period is the detection instruction. The specific size of the detection period is not limited, and may be set according to actual conditions, for example, the time interval corresponding to the detection period may be recorded by using a configuration file, and the configured time interval may be obtained by using a spring injection manner, so as to determine the detection period.
And/or the presence of a gas in the gas,
step 13: and acquiring an externally input detection instruction.
The present embodiment does not limit the specific form and identity of the sender of the externally input detection instruction, and may be, for example, a server dedicated to sending the detection instruction. Specifically, the network may monitor itself, determine whether to receive information sent by the target device, and if the information sent by the target device is received, determine that the detection instruction is received, or further determine whether the information is a detection instruction. If the information has the target identifier corresponding to the detection instruction, the detection instruction input from the outside can be determined to be acquired.
In a possible embodiment, in order to improve the efficiency of acquiring the expiration time and thus the efficiency of detecting the usage right, the acquisition from the status container may be attempted first when acquiring the expiration time. The step of obtaining the expiration time corresponding to the rights file may include:
step 21: judging whether the expiration time exists in the state container or not;
step 22: if yes, acquiring an expiration time from the status container;
step 23: if not, the expiration time is obtained from the rights file.
It will be appreciated that the status container is located in a storage path or storage medium that is more convenient to read or faster to read, such as may be located in a memory. The status container may store other parameters or information indicating the operating status of the system in addition to the expiration time. When the expiration time is obtained, it may be determined whether the expiration time exists in the status container, and the determination manner of determining whether the expiration time exists is not limited in this embodiment. For example, the status container may store data in the form of key-value pairs, determine a corresponding key when obtaining the expiration time, and find whether the key has a corresponding value, and if so, determine that an expiration time exists in the status container, and extract the expiration time from the status container. If not, the expiration time is directly obtained from the rights file. Accordingly, the step of obtaining the expiration time from the rights file may include:
step 31: and acquiring the expiration time in the authority file in a file stream mode, and storing the expiration time into the state container.
It is to be understood that the acquiring of the expiration time in the file stream is only one specific way of acquiring the expiration time, and the expiration time may be acquired in other ways. The expiration time is stored in the status container after it is obtained, so that the expiration time is subsequently obtained directly from the status container.
S102: and judging whether the authority file is expired or not by using the expiration time and the current time.
After the expiration time is obtained, it may be compared to the current time to determine whether the rights file has expired. Specifically, it may be determined whether the current time exceeds an expiration time, and if the current time exceeds the expiration time, it may be determined that the rights file has expired, and the step S103 is performed; if the expiration time is not exceeded, it may be determined that the rights file is not expired, and the step S104 is entered. Referring to fig. 2, in step B, a timing task is used to periodically obtain the current time, and compare the current time with the expiration time in the authentication file to determine whether the current time is expired.
S103: and outputting expiration prompt information by using the modal dialog box, and jumping the current page to a login page.
After determining that the rights file has expired, the expiration prompt may be output using a modal dialog box, which has special characteristics that cause the user to first have to respond to an application other than the modal dialog box when the user wants to operate on the dialog box. Therefore, the expiration prompt information output by using the modal dialog box can ensure that the user knows the expiration prompt information, and can prevent the user from bypassing the dialog box to perform other operations without responding to the expiration prompt information, so that the use right is expired and still used. At the same time, to ensure that the user cannot continue using the software or system, the current page is jumped to the landing page. It can be understood that, the software or the system needs to be used after login, and by jumping to the login page, the user is forced to log in again, and the authorization file is expired, so that the user cannot log in the software or the system and cannot continue to obtain the service provided by the software or the system. The present embodiment does not limit the specific page jump manner, and reference may be made to the related art. It is understood that the present embodiment does not limit the specific execution sequence of the two steps of outputting the expiration prompt information and jumping the current page to the login page, and for example, the two steps may be executed in parallel or may be executed in series. Referring to fig. 2, step D may be performed after determining that it has expired, popping up a mode pop-up (i.e., modal dialog) on the page to block user operations, prompting that the trial period has expired, and falling back to the login page within ten seconds. When the user logs in again on the login page, if a new system authentication file is not obtained and the authentication file is not replaced, for example, the serial number of the system authentication file is not changed, the step E may be executed to limit the user login. Referring to fig. 3, fig. 3 is a schematic diagram of a specific modal dialog according to an embodiment of the present application.
In one possible embodiment, the step of outputting the expiration prompt information using the modal dialog may include:
step 41: and acquiring the due prompt information, and inputting the due prompt information into the initial modal dialog box to obtain the modal dialog box.
Step 42: and rendering and outputting the modal dialog box.
In this embodiment, an initial modality dialog box may be set, and the specific content of the expiration prompt information may be set according to actual needs. By inputting the expiration prompt information into the initial modal dialog box, the modal dialog box can be obtained and rendered for output, i.e., the expiration prompt information can be output. By separating the initial modal dialog box from the expiration prompt information, the initial modal dialog box can be used for outputting other information, only the displayed content is required to be set, and a plurality of different modal dialog boxes are not required to be constructed. Referring to fig. 4, fig. 4 is a schematic diagram of another specific modal dialog box according to an embodiment of the present application. It can be seen that the step of jumping the current page to the landing page has been completed in fig. 4.
S104: and (5) presetting operation.
If the authority file is not expired, it indicates that the authority file can still be used, and at this time, a preset operation can be executed. The present embodiment does not limit the specific content of the preset operation, and for example, the preset operation may be a no-operation, that is, no operation is performed.
Preferably, when it is determined that the rights file is not expired, the remaining time may be output by using an initial modality dialog box so as to remind the user. Referring to fig. 2, after determining that the system authentication file is not expired, step C is performed to calculate the remaining trial time, prompt the user with a pop-up box (the pop-up box time and period can be configured), and display the remaining trial time at a fixed location of the system (e.g., a bottom information prompt bar).
Specifically, if the rights file is not expired, the method may further include:
step 51: the remaining time is calculated using the expiration time and the current time, and the remaining time is output using the initial modality dialog.
And obtaining the residual time by using the difference between the expiration time and the current time. And inputting the remaining time into the initial modal dialog box, and rendering and outputting the initial modal dialog box, namely outputting the remaining time. Referring to fig. 5, fig. 5 is a schematic diagram of another specific modal dialog box according to an embodiment of the present application. Besides, the remaining time can be output by using the bottom information prompt bar. Referring to fig. 6, fig. 6 is a schematic view of a bottom information prompt bar according to an embodiment of the present application.
By applying the usage permission detection method provided by the embodiment of the application, the expiration event can be acquired when the detection instruction is acquired, that is, the expiration time corresponding to the permission file is acquired when needed, and whether the permission file is expired is judged by using the current time. If the rights file has expired, the current page may be jumped to the login page. Because the authority file is expired, the user cannot log in and acquire the service under the login page, and the condition that the use authority is expired and still used is prevented. At the same time, the expiration prompt is output using a modal dialog box that causes the user to first respond to an application other than the modal dialog box when the user wants to operate the application. Therefore, the situation that the user bypasses the dialog box to perform other operations and the use authority is expired and is still used can be avoided. The method can detect whether the authority file is expired or not when needed, and forcibly quits after the authority file is determined to be expired, so that the authority detection capability is improved, the condition that the use authority is expired but the system is still used is avoided, and the problem of poor authority detection capability in the related technology is solved.
In the following, the usage right detection apparatus provided in the embodiment of the present application is introduced, and the usage right detection apparatus described below and the usage right detection method described above may be referred to correspondingly.
Referring to fig. 7, fig. 7 is a schematic structural diagram of a usage right detection apparatus according to an embodiment of the present application, including:
an obtaining module 110, configured to obtain an expiration time corresponding to the authority file if the detection instruction is obtained;
an expiration judging module 120, configured to judge whether the rights file has expired by using the expiration time and the current time;
and an information output module 130, configured to output expiration prompt information by using a modal dialog box if the permission file has expired, and jump the current page to a login page.
Optionally, the method further comprises:
and the residual time prompting module is used for calculating the residual time by utilizing the expiration time and the current time and outputting the residual time by utilizing an initial modal dialog box.
Optionally, the method further comprises:
and the bottom prompting module is used for outputting the remaining time by utilizing a bottom information prompting bar.
Optionally, the obtaining module 110 includes:
a status ease judgment unit for judging whether the expiration time exists in the status container;
a first obtaining unit, configured to obtain the expiration time from the status container if the expiration time exists;
and the second acquisition unit is used for acquiring the expiration time from the authority file if the expiration time does not exist.
Optionally, the second obtaining unit includes:
and the file stream acquisition subunit is used for acquiring the expiration time in the authority file in a file stream mode and storing the expiration time into the state container.
Optionally, the obtaining module 110 includes:
a period judgment unit for judging whether a detection period is reached;
the instruction determining unit is used for determining to acquire the detection instruction if the detection period is reached;
and/or the presence of a gas in the gas,
and the external acquisition unit is used for acquiring the detection instruction input externally.
Optionally, the information output module 130 includes:
the input unit is used for acquiring due prompt information and inputting the due prompt information into an initial modal dialog box to obtain the modal dialog box;
and the output unit is used for rendering and outputting the modal dialog box.
In the following, the electronic device provided by the embodiment of the present application is introduced, and the electronic device described below and the usage right detection method described above may be referred to correspondingly.
Referring to fig. 8, fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Wherein the electronic device 100 may include a processor 101 and a memory 102, and may further include one or more of a multimedia component 103, an information input/information output (I/O) interface 104, and a communication component 105.
The processor 101 is configured to control the overall operation of the electronic device 100 to complete all or part of the steps in the usage right detection method; the memory 102 is used to store various types of data to support operation at the electronic device 100, such data may include, for example, instructions for any application or method operating on the electronic device 100, as well as application-related data. The Memory 102 may be implemented by any type or combination of volatile and non-volatile Memory devices, such as one or more of Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic or optical disk.
The multimedia component 103 may include a screen and an audio component. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 102 or transmitted through the communication component 105. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 104 provides an interface between the processor 101 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 105 is used for wired or wireless communication between the electronic device 100 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 105 may include: Wi-Fi part, Bluetooth part, NFC part.
The electronic Device 100 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors or other electronic components, and is configured to perform the usage right detection method according to the above embodiments.
The following describes a computer-readable storage medium provided in an embodiment of the present application, and the computer-readable storage medium described below and the usage right detection method described above may be referred to correspondingly.
The present application further provides a computer-readable storage medium, on which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the usage right detection method described above.
The computer-readable storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
Finally, it should also be noted that, herein, relationships such as first and second, etc., are intended only to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms include, or any other variation is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that includes a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus.
The principle and the implementation of the present application are explained herein by applying specific examples, and the above description of the embodiments is only used to help understand the method and the core idea of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A usage right detection method, comprising:
if the detection instruction is obtained, obtaining the expiration time corresponding to the authority file;
judging whether the authority file is expired or not by using the expiration time and the current time;
if the authority file is expired, outputting expiration prompt information by using a modal dialog box, and skipping the current page to a login page.
2. The usage right detection method according to claim 1, further comprising, if the right file is not expired:
calculating a remaining time using the expiration time and the current time, and outputting the remaining time using an initial modality dialog.
3. The usage right detection method according to claim 2, further comprising:
and outputting the remaining time by using a bottom information prompt bar.
4. The method for detecting usage right according to claim 1, wherein the obtaining the expiration time corresponding to the right file includes:
determining whether the expiration time exists in a status container;
if yes, acquiring the expiration time from the status container;
and if the authority file does not exist, acquiring the expiration time from the authority file.
5. The usage right detection method according to claim 4, wherein the obtaining the expiration time from the right file comprises:
and acquiring the expiration time in the authority file in a file stream mode, and storing the expiration time into the state container.
6. The usage right detection method according to claim 1, wherein the acquiring of the detection instruction includes:
judging whether a detection period is reached;
if the detection period is reached, determining to acquire the detection instruction;
and/or the presence of a gas in the gas,
and acquiring the detection instruction input from the outside.
7. The usage right detection method according to claim 1, wherein the outputting expiration prompt information using a modal dialog includes:
acquiring due prompt information, and inputting the due prompt information into an initial modal dialog box to obtain the modal dialog box;
and rendering and outputting the modal dialog box.
8. A usage right detecting apparatus, comprising:
the acquisition module is used for acquiring the expiration time corresponding to the authority file if the detection instruction is acquired;
the expiration judging module is used for judging whether the authority file has expired or not by utilizing the expiration time and the current time;
and the information output module is used for outputting expiration prompt information by using a modal dialog box and jumping the current page to a login page if the authority file has expired.
9. An electronic device comprising a memory and a processor, wherein:
the memory is used for storing a computer program;
the processor is configured to execute the computer program to implement the usage right detection method according to any one of claims 1 to 7.
10. A computer-readable storage medium for storing a computer program, wherein the computer program, when executed by a processor, implements the usage rights detection method according to any one of claims 1 to 7.
CN202011185672.6A 2020-10-29 2020-10-29 Usage permission detection method and device, electronic equipment and readable storage medium Pending CN112307442A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011185672.6A CN112307442A (en) 2020-10-29 2020-10-29 Usage permission detection method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011185672.6A CN112307442A (en) 2020-10-29 2020-10-29 Usage permission detection method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112307442A true CN112307442A (en) 2021-02-02

Family

ID=74331900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011185672.6A Pending CN112307442A (en) 2020-10-29 2020-10-29 Usage permission detection method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112307442A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514391A (en) * 2013-10-16 2014-01-15 北京旋极信息技术股份有限公司 Method and device for reminding of expiring of digital certificate
CN105472476A (en) * 2015-12-08 2016-04-06 福建新大陆通信科技股份有限公司 Method and device for reminding authorization expiration of paid programs of set-top box in real time
CN111639053A (en) * 2020-04-28 2020-09-08 深圳壹账通智能科技有限公司 Authorization file expiration alarm prompting method and device and computer equipment
CN111694591A (en) * 2020-06-16 2020-09-22 深圳前海微众银行股份有限公司 Certificate updating method, device, system, server and computer storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103514391A (en) * 2013-10-16 2014-01-15 北京旋极信息技术股份有限公司 Method and device for reminding of expiring of digital certificate
CN105472476A (en) * 2015-12-08 2016-04-06 福建新大陆通信科技股份有限公司 Method and device for reminding authorization expiration of paid programs of set-top box in real time
CN111639053A (en) * 2020-04-28 2020-09-08 深圳壹账通智能科技有限公司 Authorization file expiration alarm prompting method and device and computer equipment
CN111694591A (en) * 2020-06-16 2020-09-22 深圳前海微众银行股份有限公司 Certificate updating method, device, system, server and computer storage medium

Similar Documents

Publication Publication Date Title
CN107643977B (en) Anti-addiction method and related product
JP6100898B2 (en) Method and device for processing messages
CN110309661B (en) Sensitive data use authority management method and device based on control flow
CN108804399B (en) Form verification method and device
CN106940674B (en) Method and device for triggering target event in mobile terminal
US9426130B2 (en) Methods, devices and systems for anti-counterfeiting authentication
CN112612715A (en) System testing method and device based on chaotic engineering, computer equipment and storage medium
CN112464214A (en) Authority detection method and device, electronic equipment and readable storage medium
CN112100536A (en) Webpage access method, device and equipment and readable storage medium
CN110334529B (en) Data processing method, device, equipment, system and audio equipment
US10176306B2 (en) Information processing apparatus, evaluation method, and storage medium for evaluating application program
CN109491908B (en) Page detection method and device, electronic equipment and storage medium
EP2728472B1 (en) User terminal, reliability management server, and method and program for preventing unauthorized remote operation
CN108650645B (en) Method and related device for preventing malicious fee deduction
EP3528151A1 (en) Method and apparatus for user authentication
CN110020531A (en) Internet of things equipment risk checking method and device
CN112307442A (en) Usage permission detection method and device, electronic equipment and readable storage medium
CN106127558B (en) Bill generation method and mobile terminal
CN108874658A (en) A kind of sandbox analysis method, device, electronic equipment and storage medium
CN112153059A (en) Mail verification code acquisition method and device, electronic equipment and storage medium
CN111859364A (en) Authority authentication method, device, equipment and storage medium
KR101582420B1 (en) Method and apparatus for checking integrity of processing module
CN112035888A (en) File path determining method, device and medium based on webpage tamper-proof system
CN114786043A (en) Abnormal state processing method, server and electronic equipment
CN111638917A (en) Application start limiting method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210202

RJ01 Rejection of invention patent application after publication