CN114676395A - Application operation authorization processing method, system and equipment - Google Patents

Application operation authorization processing method, system and equipment Download PDF

Info

Publication number
CN114676395A
CN114676395A CN202210351401.6A CN202210351401A CN114676395A CN 114676395 A CN114676395 A CN 114676395A CN 202210351401 A CN202210351401 A CN 202210351401A CN 114676395 A CN114676395 A CN 114676395A
Authority
CN
China
Prior art keywords
authorization information
dimension
value
target application
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210351401.6A
Other languages
Chinese (zh)
Inventor
张晓奇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Hikvision Digital Technology Co Ltd
Original Assignee
Hangzhou Hikvision Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Hikvision Digital Technology Co Ltd filed Critical Hangzhou Hikvision Digital Technology Co Ltd
Priority to CN202210351401.6A priority Critical patent/CN114676395A/en
Publication of CN114676395A publication Critical patent/CN114676395A/en
Priority to PCT/CN2023/084998 priority patent/WO2023185991A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • G06F21/12Protecting executable software
    • G06F21/121Restricting unauthorised execution of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2137Time limited access, e.g. to a computer or data

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Multimedia (AREA)
  • Technology Law (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a method, a system and equipment for processing application operation authorization, wherein the method comprises the following steps: acquiring authorization information of a target application, wherein the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the multimedia analysis capability of the target application, and the second dimension is used for indicating the total authorized duration of the target application; judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information; if the limit in the authorization information is not exceeded, accumulating the use conditions of the target application; if the limit in the authorization information is exceeded, the operation of the target application is restricted according to a predefined rule. The method and the device solve the problem that the authorization is performed by adopting the natural time in the prior art, thereby improving the authorization flexibility and realizing more refined authorization.

Description

Application operation authorization processing method, system and equipment
Technical Field
The present application relates to the field of application control, and in particular, to a method, a system, and a device for processing application running authorization.
Background
Existing smart applications are authorized by time after purchase by the consumer. After the user purchases the equipment, the equipment is used permanently or is authorized to be used to a certain natural time point, for some equipment, especially security equipment, the difference between the equipment is huge, the analyzed path number difference is large, the limitation is carried out on the simple dependence on time, and the fairness is not enough for application developers and consumers. And the authorization scheme based on natural time also has limitations, such as that a consumer purchases a certain application, but does not use the application in time, and the application is started after the application is placed for a period of time, so that the placement time is wasted.
Disclosure of Invention
The embodiment of the application provides an application operation authorization processing method, system and device, so as to at least solve the problem existing in the prior art that authorization is performed by adopting natural time.
According to an aspect of the present application, there is provided an application running authorization processing method, including: obtaining authorization information of a target application, wherein the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the ability of the target application to analyze multimedia, and the second dimension is used for indicating the total time length of the target application being authorized; judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information; if the limit in the authorization information is not exceeded, accumulating the use of the target application; and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
Further, determining whether the target application exceeds the limit in the authorization information according to the two dimensions of the authorization information includes: and judging whether the target application exceeds the limit in the authorization information according to any one of the two dimensions in the authorization information, wherein the limit exceeding the any one of the two dimensions is the limit exceeding the authorization information.
Further, still include: when the authorization information is multiple, integrating the multiple authorization information into a total authorization information, wherein the total authorization information is used as a basis for judging whether the target application exceeds the authorization information limit; wherein: under the condition that a second dimension in the plurality of authorization information has an overlapping part at the same position on a time axis, arranging a first time length corresponding to a non-overlapping part and a second time length corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; adding first dimensions corresponding to overlapping parts on a time axis in the multiple authorization information to be used as values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information; or determining one authorization information as a first authorization information from the multiple authorization information, respectively converting the rest authorization information of the multiple authorization information according to a first dimension and a second dimension of the first authorization information, and obtaining total authorization information according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; and sequentially prolonging the total duration of the first authorization information according to the converted total duration of each authorization information in the rest of authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolonging as a second dimension of the total authorization information.
Further, determining whether the target application exceeds the limit in the authorization information according to the two dimensions of the authorization information includes: calculating the product of the first dimension and the second dimension to obtain a first value; multiplying the multimedia analysis capability used by the target application and the running time length to obtain a second value; and judging whether the second value exceeds a first value, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
Further, calculating a product of the first dimension and the second dimension to obtain a first value comprises: and in the case that the authorization information is multiple, adding the products of the first dimension and the second dimension in each authorization information as the first value.
Further, when the target application is used for analyzing a real-time video, the first dimension is a path number of an analysis video, and the second dimension is a total duration authorized for the target application.
Further, in the case that the target application runs a plurality of instances, the number of paths of analysis videos that the target application has run is obtained by adding the number of paths of analysis videos running in each instance of the plurality of instances, and the number of paths obtained by adding is limited by the first dimension in the authorization information; the target application running time is obtained by subtracting a second time point from a first time point, wherein the second time point is the starting running time of the earliest running example in the plurality of examples, and the first time point is the ending running time of the latest running example in the plurality of examples.
Further, determining whether the target application exceeds the limit in the authorization information according to the two dimensions of the authorization information includes: representing the first dimension as a multiple if the target application is for analyzing multimedia files, wherein the multiple is used to indicate a multiple of a numerical value in the second dimension; converting the total duration in the second dimension into the total number of the multimedia files capable of being processed according to the time for processing one multimedia file, and/or taking the total duration in the second dimension as the total duration capable of processing the multimedia files; using the product of the multiple and the second dimension as the first value, and using the number of the multimedia files which have been processed by the target application and/or the duration of the processed multimedia files as the second value; and judging whether the second value exceeds a first value, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
Further, still include: judging whether the authorization information comprises a third dimension, wherein the third dimension is used for indicating the total number of the multimedia files capable of being processed and/or the total duration of the multimedia files capable of being processed; and under the condition that the authorization information comprises the third dimension, limiting the processing of the multimedia file performed by the target application according to the third dimension.
Further, if the third dimension is included in the authorization information, the first dimension and the second dimension are not included in the authorization information.
According to another aspect of the present application, there is also provided an application execution authorization processing system, including: the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring authorization information of a target application, the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the capability of the target application for analyzing multimedia, and the second dimension is used for indicating the total time length of the target application which is authorized; the judging module is used for judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information; a processing module for accumulating usage of the target application if the limit in the authorization information is not exceeded; and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
Further, the determining module is configured to determine whether the target application exceeds the limit in the authorization information according to any one of two dimensions in the authorization information, where exceeding the limit in any one of the two dimensions is that the target application exceeds the limit in the authorization information.
Further, still include: the merging module is used for merging the authorization information into a total authorization information under the condition that the authorization information is multiple, and the total authorization information is used as a basis for judging whether the target application exceeds the authorization information limit; wherein: under the condition that a second dimension in the plurality of authorization information has an overlapping part at the same position on a time axis, arranging a first time length corresponding to a non-overlapping part and a second time length corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; adding first dimensions corresponding to overlapping parts on a time axis in the multiple authorization information to be used as values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information; or determining one authorization information as a first authorization information from the multiple authorization information, respectively converting the rest authorization information of the multiple authorization information according to a first dimension and a second dimension of the first authorization information, and obtaining total authorization information according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; and sequentially prolonging the total duration of the first authorization information according to the converted total duration of each authorization information in the rest of authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolonging as a second dimension of the total authorization information.
Further, the judging module comprises: the first calculation unit is used for calculating the product of the first dimension and the second dimension to obtain a first value; the second calculation unit is used for multiplying the multimedia analysis capability used by the target application and the running time length to obtain a second value; a first determination unit configured to determine whether the second value exceeds a first value, and if the second value exceeds the first value, determine that the limit of the authorization information is exceeded.
Further, the first calculation unit is configured to, in a case where the authorization information is multiple, add a product of a first dimension and the second dimension in each authorization information as the first value.
Further, the judging module comprises: a first processing unit for representing the first dimension as a multiple if the target application is used for analyzing multimedia files, wherein the multiple is used for indicating the multiple of the numerical value in the second dimension; converting the total duration in the second dimension into the total number of the multimedia files capable of being processed according to the time for processing one multimedia file, and/or taking the total duration in the second dimension as the total duration capable of processing the multimedia files; a third calculating unit, configured to use a product of the multiple and the second dimension as the first value, and a second processing unit, configured to use the number of already processed multimedia files and/or the duration of the already processed multimedia files of the target application as the second value; and the second determining unit is used for judging whether the second value exceeds the first value or not, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
Further, the determining module is further configured to determine whether the authorization information includes a third dimension, where the third dimension is used to indicate a total number of multimedia files that can be processed and/or a total duration of multimedia files that can be processed; the processing module is further configured to, if the authorization information includes the third dimension, limit processing of the multimedia file by the target application according to the third dimension.
According to yet another aspect of the present application, there is also provided an apparatus for applying an operation authorization process, characterized by comprising a memory for storing a program and/or a processor for executing the program, the program being configured to perform the above method.
In the embodiment of the application, obtaining authorization information of a target application is adopted, wherein the authorization information comprises two dimensions, a first dimension of the two dimensions is used for limiting the capability of the target application for analyzing multimedia, and a second dimension is used for indicating the total time length of the target application which is authorized; judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information; if the limit in the authorization information is not exceeded, accumulating the use of the target application; and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule. The method and the device solve the problem that the authorization is performed by adopting the natural time in the prior art, thereby improving the authorization flexibility and realizing more refined authorization.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flow diagram of a system architecture according to an embodiment of the present application.
Fig. 2 is a flowchart of an application running authorization processing method according to an embodiment of the present application.
FIG. 3 is a first diagram illustrating an authorization information addition process according to an embodiment of the present application;
FIG. 4 is a second diagram illustrating authorization information addition processing according to an embodiment of the present application;
fig. 5 is a third schematic diagram of authorization information addition processing according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The present embodiment may be applied to a system as shown in fig. 1, and certainly, the present embodiment may also be applied to systems with other architectures, where fig. 1 is taken as an example for description, and the application of the present embodiment is not limited to the system in fig. 1. The following describes the respective aspects involved in fig. 1.
And the application developer is responsible for developing the intelligent application program based on the platform open equipment. After the intelligent application program is developed, the intelligent application program needs to be released in an application system platform, namely, the software is put on shelf. The platform open device is a device with an open function, can have high openness, and allows a third-party developer to perform private development directly on the basis of hardware of the device. The device will provide a basic service interface for third party developers to invoke. The platform opening device is various, and for example, the platform opening device includes a computing device at a back end, a data center server device, an intelligent camera device at a front end, an intelligent gate device and the like.
The user, namely the terminal consumer, purchases the platform open device, and associates the device with the user on the application system platform to become the device under the name of the user.
The user can purchase the on-shelf intelligent application, deploy the intelligent application to platform open equipment under the name of the user through an application system platform, and operate the intelligent application program after taking the corresponding license Key. The intelligent application is also called an application or an application program, has an intelligent analysis algorithm and business processing logic inside, and can run in the platform open equipment. Application (APP) can also be operated in the container, the container is a whole set of operation environment provided by the platform open device (namely, the main control device), similar to a virtual machine, the APP can be operated in the container environment, and the container is controlled by the management and the authority of the main control device.
The application system platform is an application mall and is a comprehensive platform for pulling through consumers, application developers and equipment. In the platform, a consumer can associate a purchased platform open device with the name of the consumer, purchase an application developed by an application developer, and download the application to the device with the name of the consumer for operation. The application system platform is responsible for providing services such as payment settlement, application management, authorization authentication, equipment management and the like. The application system platform has a unique identifier called APPID, which is composed of a string of character strings, has global uniqueness, can be assigned by the application system platform, and cannot be specified by an application developer; alternatively, the application developer may specify itself.
Application developers are often subdivided into multiple subdivided roles: an application provider (for example, an intelligent algorithm application provider), a software integrator or an operator, and an application developer can apply for an authorization code (license eCode) through an application system platform and sell the license eCode to the software integrator, wherein the license eCode is agreed with the maximum number of authorization information (license Key) which can be generated by software developed by the developer. And the software integrator or the operator generates the corresponding license eKey by taking the license eCode and sells the license eKey to the terminal consumer, thereby completing the whole software selling. Wherein, license Key: the license sekey is a file for authorizing an application, in an example, the license sekey associates a unique identifier of the platform open device (for example, a serial number of the device), a unique identifier of the application (for example, the above mentioned APPID), and an authorization information content of the application, and of course, the license sekey may not be limited to associate the aforementioned three items of content, and may associate other information as needed, for example, content such as identity information of a user (i.e., a user using the application). License eCode: the data is applied by an application developer in an application system platform and can be distributed to software distributors and integrators. The data records the ability of an application to support the number of authorizations, and like a seed, the license eCode generates the license Key.
In the above architecture, for convenience of description, a basic service system of the open platform device is referred to as "master control", and the open platform device is referred to as "device", and in this embodiment, a control process of the APP authorization check is as follows:
the master is responsible for recording license sekey information corresponding to each APP and running conditions thereof, such as running time and currently analyzed number of ways (in this embodiment, the number of ways of multimedia is referred to herein) information. Applications herein may be of various kinds, such as APPs for object recognition (e.g., face recognition, vehicle recognition, object recognition, etc.), intelligent analysis (e.g., event analysis, behavior analysis, etc.), etc., that is, various APPs having analysis functions, and developers may develop various APPs having various functions according to their own abilities. In this embodiment, specific service functions of the APP are not limited, and are freely developed by an application developer, and only in the operating environment provided by the open platform, the development is allowed; for example, the applications may be developed based on a software interface of an open platform, where the open platform refers to a system capable of providing a running environment for the applications, and may be a software system, a hardware system, or a combination of software and hardware. Of course illegal, disrupting the functionality of other developers' APPs is not allowed. Before the APP is in the shopping mall (i.e. the aforementioned application system platform), the APP is checked.
It should be noted that, in this embodiment, as an optional implementation manner, one APP may also run multiple instances, where an instance refers to the number of programs that the APP runs, for example, for a certain APP, on a device having 8 engines, the APP may be simultaneously and respectively run on 8 engines in parallel, so that at the same time, it is equivalent to that 8 APPs run simultaneously, and then the APP running on each engine is referred to as a running instance of the APP program. The engine may be a physical unit with intelligent analysis function, such as a GPU. A GPU is generally called an engine.
The authorization check can be carried out through the APP, the check judgment is completed through calling the query interface provided by the master control inside the APP, and the master control interface can be called to carry out the operations of error reporting, operation stopping and the like.
After the application is authorized, the situation of the application usage authorization can be monitored, fig. 2 is a flowchart of an application operation authorization processing method according to an embodiment of the present application, and as shown in fig. 2, the flowchart includes the following steps:
step S202, obtaining authorization information of a target application, wherein the authorization information comprises two dimensions, a first dimension of the two dimensions is used for limiting the multimedia analysis capability of the target application, and a second dimension is used for indicating the total authorized duration of the target application;
step S204, judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information;
step S206, if the limit in the authorization information is not exceeded, accumulating the use condition of the target application;
and step S208, if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
At this step, the predefined rules may include a wide variety of rules, such as: the running of the application may be stopped; for another example, as a buffering method, the target application may be used for a period of time after the authority is exceeded, wherein the analysis capability of the target application may be further limited during the period of time of running.
Through the steps, the application is limited from two dimensions, on one hand, the analysis capability is limited, on the other hand, the total time length or the total number of processed files is limited, compared with the prior art that the authorization is limited only by natural time, the authorization flexibility is improved, and more refined authorization can be performed.
There are many ways to determine whether the running of the target application (hereinafter also referred to as application or APP) exceeds the limit of the authorization information according to two dimensions, and as an easily-implemented way, it may be determined whether the target application exceeds the limit of the authorization information according to any one of the two dimensions in the authorization information, where the limit exceeding any one of the two dimensions is the limit exceeding the authorization information.
This determination method will be described below with reference to the above-described open platform device.
In an open platform device, the master provides an interface that can be invoked to provide authorization information. The format of the authorization information may be in XML format, and the following is an example of authorization information:
Figure BDA0003580543020000081
of course, the XML file may have other information, which is not listed here. In the following description, the number of paths is taken as an example, and the number of paths is taken as a first dimension.
The main control can check the relevant process information when the APP runs. In addition, the main control program also has an independent thread which is responsible for inquiring the running condition of the current APP, scanning regularly and recording the running time. When the APP stops running or the power is cut off, the main control can not update the running long information. Based on this function, the master can obtain the time that the APP has run. The master control will query every second for instance conditions running on all engines and record them in a database local to the device.
In an alternative embodiment, it is also contemplated that multiple instances may be run by the same application. For multiple instances, the number of paths running in the multiple instances may be comprehensively limited by the number of paths, that is, the number of paths of the analysis video that an application has run is obtained by adding the number of paths of the analysis video running in each of the multiple instances where the application runs, and the number of paths obtained by adding is limited by the first dimension in the authorization information. For example, the number of paths in the authorization information is 6, the application runs 3 instances in total, and the sum of the paths of the 3 instances cannot exceed 6 paths.
Under the condition of limiting by adopting the number of paths, for the case of multi-instance operation, the operation time of each instance is not repeatedly recorded, namely the already-operated time length of one application is obtained by subtracting a second time point from a first time point, wherein the second time point is the start operation time of the earliest instance in the multiple instances, and the first time point is the end operation time of the latest instance in the multiple instances. For example: at time T0, instance 1 runs, and at time T0+20min (minutes), instance 2 starts running, instance 2 ends at time T0+50min, and instance 1 ends at time T0+60min, then the run time record for this APP is 60min, not 90 min. In another example, 3 instances are run, instance 1 starts at time T0, instance 2 starts at time T0+20min, instance 2 ends at time T0+50min, instance 3 starts at time T0+55min, instance 1 ends at time T0+60min, instance 3 ends at time T0+100min, the first time point is T0+100min, the second time point is T0, and the application has been run for a total time period of T0+100min-T0 equal to 100 min.
It should be noted that, the time record of the device is not based on natural time, that is, when the APP stops running and the device is idle due to power failure, the time record does not accumulate the idle time.
The master may also obtain the total number of ways that all instances of APP have been analyzed. The main control of the equipment can record the analysis path number condition of each APP instance in real time, the data are stored in the operation memory, the database cannot be stored, the data disappear after power failure, and the data can be increased and decreased along with the APP operation condition. For example, an APP runs 2 instances, engine 1 has 3 lanes analyzed above, and engine 2 has 2 lanes analyzed above. Then the result returned is 5-way after invoking this interface. In an alternative embodiment, only 1 APP may be allowed to run on one engine, or multiple APPs may be allowed to run. The user runs a plurality of APPs in the same container, and there is not conflict, and the reason is: the container provides a virtual container environment for APP running, which is equivalent to a virtual machine, and for APP, the container environment is exclusive. The container is equivalent to a small operating system with some necessary system resource control programs inside, but the entire container is under the overall control of a device (e.g., NVR).
As an optional embodiment, the master may check the APP authorization by the following steps.
Step 1, inquiring the authorization file information corresponding to the current APPID. Get the authorization time T1, number of ways C1.
Step 2, the time T2 when the current operation is performed is inquired.
And step 3, inquiring the number of paths C2 which are analyzed currently.
Step 4: judging whether T1-T2>0 is true, if so, carrying out error report: when the authorization time is up, the operation is stopped; if true, further determine if C1-C2>0 is true, if true, run directly, if false, make an error: and (4) the authorized road number exceeds the limit, and the operation is stopped.
As an alternative embodiment, after the APP authorization check fails, the next run needs manual intervention to be performed.
In the above judgment, the time is judged first, and then the number of paths is judged, because the authorization judgment is usually carried out during task creation and during task execution, when the task is created, the number of paths is already limited, if 5 paths are allowed to be analyzed, an error is reported when 6 paths are added, therefore, in the subsequent task execution process, the number of paths is in the appointed authorization range and cannot exceed the limit, so the time is judged first, and the efficiency is higher. However, this is not an absolute case, and the effect can be achieved by judging the number of paths first and then judging the time, but only in terms of the overall execution efficiency of the code, in terms of probability, judging the number of paths first and performing comparison once more. For example, a certain APP can implement a function of face analysis, and in the case of sufficient resources, the calculation power required for analyzing 1 channel of real-time video (or also analyzing real-time audio, or analyzing real-time audio and video, which is described here by taking video as an example) is 1T. Then if there is a user, the APP is purchased at the mall and 5-way 1-day authorization information is obtained. Suppose that there are 1 open platform device under the user name, the remaining resources of the current device system are 2 GPUs, and each GPU has 3T computational power. At this time, if the user deploys the APP to the device, then, under the maximum condition, the analysis performance analysis of 5 paths of faces can be realized for 1 day: the first GPU runs an APP example, starts 3 paths of analysis, and uses up the residual computing power of the GPU; when the APP is run on the second GPU, for the creation of the task, although 3T calculation power still remains and 3 paths can be theoretically run for analysis, the maximum number of authorized paths bought by the user is 5 paths, so that 3 paths are used on the first GPU, and only 2 paths can be analyzed after the APP is run on the first GPU.
For special cases occurring in authorization, the following alternative is provided in this embodiment, for example, the authorization road number limit is not cumulative count, in this way, the authorization that the user purchased APP is: the 4-path analysis is performed for 1 hour, while in the actual use process, the user only uses the 1-path analysis for 1 hour, and after the 1 hour, the authorization is still prompted to expire, the unused 3-path authorization cannot be compensated, and the loss is borne by the user.
As another special case in authorization, namely superposition of multiple pieces of authorization information, in this embodiment, an optional manner is provided, in which, when the authorization information is multiple pieces, multiple pieces of authorization information are integrated into one total authorization information, and the total authorization information is used as a basis for determining whether a target application exceeds authorization information limit. There are many ways of integration, two of which are described below by way of example.
In a first mode, under the condition that a second dimension of the multiple pieces of authorization information has an overlapping part at the same position on a time axis, arranging a first duration corresponding to a non-overlapping part and a second duration corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; and adding the first dimensions corresponding to the overlapping parts on the time axis in the plurality of authorization information to be used as the values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information.
An example is described below with reference to a drawing, as shown in fig. 3, in which duplicate grants are accumulated for the number of ways, but not for the time. For example, the user purchased 2 license keys, 3 way 5 days and 2 way 3 days time respectively. The user firstly imports 3 paths of 5-day authorization files, starts to operate, imports the second 2 paths of 3-day authorization files into the equipment after operating for 1 day, and then the authorization for the APP becomes path number superposition and time projection of the two authorization files, namely 5 paths of 3 days and 3 paths of 1 day. If the device does not start to operate, the authorization is changed into 5-way 3-day + 3-way 2-day after the 2 authorization files are imported, namely the authorization time of 3-way is not consumed.
In another example, the user purchases 2 license keys, 3 way 5 day and 2 way 3 day times respectively. The user firstly imports 3 paths of 5-day authorization files, starts to operate, imports the second 2 paths of 3-day authorization files into the equipment after operating for 4 days, and then the authorization for the APP becomes the path number superposition and time projection of two authorization files, namely the unused authorization information becomes 5 paths of 1 day +2 paths of 2 days, and the whole authorization information is 3 paths of 4 days +5 paths of 1 day +2 paths of two days.
In the above example, the user may have more or less loss, and this problem may be solved as another alternative.
In a second mode, in the optional embodiment, one authorization information may be determined from the multiple authorization information as the first authorization information, the remaining authorization information in the multiple authorization information is converted according to the first dimension and the second dimension of the first authorization information, and the total authorization information is obtained according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; and sequentially prolonging the total duration of the first authorization information according to the converted total duration of each authorization information in the rest authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolonging as a second dimension of the total authorization information.
Still take the first dimension as the number of ways and the second dimension as the total time length of authorization as an example for explanation. In an alternative example, when the user performs repeated authorization, the total authorization may also be calculated in a manner of "way number is unchanged, time is increased" (this may be understood as a special case of authorization according to the product), for example, as shown in fig. 4, the user purchases 2 license keys, which are 3 ways, 5 days and 2 ways, 3 days respectively. The user firstly imports 3 paths of 5-day authorization files, starts to operate, imports the second 2 paths of 3-day authorization files into the equipment after operating for 1 day, and then can convert the second authorization file into: after 3 lanes for 2 days (2 lanes for 3 days, which is converted into 3 lanes for 2 days by the area method, i.e., 2 × 3 — 3 × 2), the final authorization after introduction becomes 3 lanes for 5 days +3 lanes for 2 days, which is 3 lanes for 7 days, and the operation is already performed for 1 day, so that 3 lanes remain for 6 days.
In the authorization method, a method of mutually converting the number of ways and the number of days under the condition of unchanging the product is partially adopted, and the method can be called as an area method. In this way, it can be further extended that the calculation is performed by using an area method, that is, in the case that there are a plurality of authorization information, the authorization information is integrated into one total authorization information, and the product of the first dimension and the second dimension in each authorization information is added as the first value. The method can guarantee the benefit of the user to the maximum extent.
To illustrate with an example, a user purchases 2 license keys, which are 3-way 5-day and 2-way 3-day times, respectively. The user has imported 3-way 5-day authorization files, and at this time, the authorization that he actually obtained is the authorization situation of 3 × 5-15-way day, if based on the area method, within the limitation of access path number based on hardware equipment, the maximized analysis of the path number can be realized, if there happens to be an 8-way access performance equipment, then the analysis is performed on this equipment, and the following can be realized: the 8-channel simultaneous analysis was carried out for 15/8-1.875 days. Likewise, when there are multiple grants to import, it becomes easier to compute. As shown in fig. 5, if the client performs analysis in 8 ways, after 1 day of analysis, the second authorization is introduced: and 2-way 3-day authorization, the remaining authorization time is as follows:
15-8 × 1+2 × 3 ═ 13 sunday
Then the customer can then proceed to analyze it according to his own needs until all remaining authorization time is used up.
In this way, the user does not lose the effect when combining a plurality of authorization information and using a single authorization information, and the user experience can be improved to a certain extent.
In the above examples, the path number is used as an example for explanation, and in this embodiment, analysis authorization of non-real-time data such as pictures, videos, audios, videos, and audios and videos may be extended, so that for such data, there is no concept of the path number, and at this time, the first dimension may be understood as the capability of processing multimedia files such as pictures or videos, that is, the first dimension may be expressed as a multiple, where the multiple is used to indicate a multiple of a numerical value in the second dimension, and the second dimension is still the total duration authorized to be used.
For example, in the process of analyzing a video file, the total duration of the second dimension may be the total duration of the video file capable of being analyzed, the first dimension may represent a multiple of the total duration, and finally, the product of the first dimension and the second dimension is used to identify the duration of the video file capable of being analyzed by the authorization information. For example, if the first dimension is 3 and the second dimension is 2 hours, the duration of the video that can be analyzed by the application under the authorization information is 3 × 2 — 6 hours. If the length of one video file is 1 hour, the number of videos that can be analyzed by the application under the authorization information is 6.
In another example, for an analysis scene of a multimedia file (e.g., a picture, a video file or a video file), picture count authorization may be adopted, that is, content information of the picture count may be directly added to a license key file, or information of the total duration of the file may be processed. Judging whether the authorization information comprises a third dimension, wherein the third dimension is used for indicating the total number of the multimedia files capable of being processed and/or the total duration of the multimedia files capable of being processed; and if the authorization information comprises the third dimension, limiting the processing of the multimedia file by the target application according to the third dimension. In an optional embodiment, the authorization information may include a first dimension and a second dimension, or the authorization information may also include the first dimension, the second dimension, and a third dimension, or only the third dimension may be included in the authorization information without including the first dimension and the second dimension. When the authorization information is actually used, the first dimension, the second dimension and/or the third dimension can be flexibly selected and configured in the authorization information according to actual needs.
For example, the authorization information may be:
Figure BDA0003580543020000131
as above, the ValidPic stipulates that 30000 pictures can be analyzed, and 30000 pictures can be obtained by multiplying the first dimension sum and the ValidPic, and then 30000 pictures can be processed by one of the authorization messages.
In this example, the specification of each picture, for example, the resolution size, the format, and the like, may not be particularly limited, and of course, the specification of the picture may be limited.
In another example, in the case where the target application is used to analyze multimedia files (e.g., pictures, audio files, video files, audio-video files, etc.), the first dimension is used to represent a multiple, the total duration in the second dimension is converted into the number of multimedia files that can be processed according to the time for processing one multimedia file, and/or the total duration in the second dimension is used as the duration of multimedia files that can be processed, the product of the multiple and the second dimension is used as the first value, the number of multimedia files that the target application has processed and/or the duration of multimedia files that have been processed is used as the second value, whether the second value exceeds the first value is determined, and if the second value exceeds the first value, the limit of the authorization information is determined to be exceeded.
In this embodiment mode, it is still equivalent to the number of pictures based on the original time limit.
For example, 10 pictures are analyzed, which is equivalent to consuming the analysis time 1s (this is a default value, which is agreed by the application system platform, which is the same for all consumers). Then the user gets 3 APPs authorized for 2 hours, which is equivalent to 216000 pictures at 3 x 2 x 3600 x 10 (agreed equivalent value). Therefore, the computation logic described above can be basically multiplexed, the main control program also focuses on the execution of the analysis task in real time, and if the picture analysis is found, the running time is not used for computation, but the analysis amount is converted and the recording is time-consuming. Note that, at this time, there is no concept of the number of ways, and the number of ways is converted into a multiple. In addition, the authorization time consumed by running 1 APP instance to analyze 10 pictures and 10 APP instances is the same for each APP instance to analyze 1 picture, so the number of instances of one APP run is not considered in this embodiment.
Besides calculation by means of default value conversion, calculation can also be performed in a time-consuming manner by intelligent analysis, and the principle of the method is easy to understand: whether real-time video or pictures are analyzed, the intelligent GPU takes time, that is, the analysis performance is limited, so that when the pictures are analyzed, a concept of 'analysis rate' naturally exists, that is, the situation that 'all pictures are analyzed instantly' cannot occur, and the situation is limited by objective and practical conditions. It is therefore also possible to calculate the authorization residual time based on the analysis rate. Assuming that the rate of analyzing pictures by the GPU of the current hardware device is 10 pieces/S, if 10000 pictures are to be analyzed, 1000S is required if only 1 APP instance is opened, 500S is required if 2 APP instances are opened, and so on, and it should be noted that the time required for analyzing 10000 pictures cumulatively is the same no matter how many instances are opened, which is 1000S. When the main control program counts time, if the current picture analysis is found, the time consumed by all the picture analyses and the same APP is accumulated (note that the time is calculated by accumulation and doubling instead of only recording 1 time like a real-time video), and the final time consumed can also be realized. In this way, with the continuous improvement of hardware performance specification and APP code efficiency, the picture speed that the customer can analyze in practice will be correspondingly increased.
For the video file analysis task, the method can be expanded to use the duration of the video file to calculate the authorization time, that is, the recording duration of different video files is different but certain and unchanged. For example, 1 video file with a duration of 60s, the duration is fixed regardless of the image quality of the video image. Thus, based on this condition, authorization can be achieved. For example, if the user takes 3 passes of an APP authorized for 2 hours, and if the video file analysis is performed, there is no notion of the number of passes, then the time period he can actually use for the analysis is 3 × 2 — 6 hours (in the case of a single APP instance). It should be noted that 1s of real-time video analysis is equivalent to 1s of video recording file. In fact, similar to the picture analysis, there is also an agreed equivalent value N in this way, which is typically 1 for real-time and video: the relation 1, namely 1s of video recording, namely real-time 1s, but with the enhancement of subsequent technologies, the video recording video can be subjected to 'acceleration' analysis, namely 1s video recording file is analyzed, the actual consumed time can be 0.5s, and therefore the equivalent value N still plays a role. Similarly to the picture analysis, with the equivalent time value, the conversion can be performed to calculate the remaining authorized time.
Similarly, the video file analysis task is also suitable for calculating by adopting an intelligent analysis actual time-consuming mode, the principle is the aforementioned 'acceleration' condition, and as the hardware technology and software efficiency are improved, the acceleration analysis is easy to realize, so that the authorized use time can be calculated by actual hardware time-consuming.
It should be noted that, on the other hand, in the case of analyzing a multimedia file such as a non-real-time picture, a video file, an audio file, and the like, if there are multiple pieces of authorization information, the multiple pieces of authorization information are combined by multiplying the first dimension and the second dimension of each piece of authorization information and then adding the multiple pieces of authorization information together to obtain the total authorization information after the multiple pieces of authorization information are combined, and this algorithm is similar to an area method in processing a real-time video and is not described again.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
The programs described above may be run on a processor or may also be stored in memory (or referred to as computer-readable media), which includes both non-transitory and non-transitory, removable and non-removable media, that implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks, and corresponding steps may be implemented by different modules.
Such an apparatus or system is provided in this embodiment. The system is called an application running authorization processing system and comprises: the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring authorization information of a target application, the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the capability of the target application for analyzing multimedia, and the second dimension is used for indicating the total time length of the target application which is authorized; the judging module is used for judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information; a processing module for accumulating usage of the target application if the limit in the authorization information is not exceeded; and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
The system or the apparatus is used for implementing the functions of the method in the foregoing embodiments, and each module in the system or the apparatus corresponds to each step in the method, which has been described in the method and is not described herein again.
For example, the determining module is configured to determine whether the target application exceeds a limit in the authorization information according to any one of two dimensions in the authorization information, where exceeding the limit in any one of the two dimensions is exceeding the limit in the authorization information.
For another example, the method further includes: the merging module is used for merging the authorization information into a total authorization information under the condition that the authorization information is multiple, and the total authorization information is used as a basis for judging whether the target application exceeds the authorization information limit; wherein: under the condition that a second dimension in the plurality of authorization information has an overlapping part at the same position on a time axis, arranging a first time length corresponding to a non-overlapping part and a second time length corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; adding first dimensions corresponding to overlapping parts on a time axis in the multiple authorization information to be used as values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information; or determining one authorization information as a first authorization information from the multiple authorization information, respectively converting the rest authorization information of the multiple authorization information according to a first dimension and a second dimension of the first authorization information, and obtaining total authorization information according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; and sequentially prolonging the total duration of the first authorization information according to the converted total duration of each authorization information in the rest of authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolonging as a second dimension of the total authorization information.
For another example, the determining module includes: the first calculation unit is used for calculating the product of the first dimension and the second dimension to obtain a first value; the second calculation unit is used for multiplying the multimedia analysis capability used by the target application and the running time length to obtain a second value; a first determining unit, configured to determine whether the second value exceeds a first value, and if the second value exceeds the first value, determine that the limit of the authorization information is exceeded. Optionally, the first calculating unit is configured to, if the authorization information is multiple, add a product of the first dimension and the second dimension in each authorization information as the first value.
For another example, the determining module includes: a first processing unit for representing the first dimension as a multiple if the target application is used for analyzing multimedia files, wherein the multiple is used for indicating the multiple of the numerical value in the second dimension; converting the total duration in the second dimension into the total number of the multimedia files capable of being processed according to the time for processing one multimedia file, and/or taking the total duration in the second dimension as the total duration capable of processing the multimedia files; a third calculating unit, configured to use a product of the multiple and the second dimension as the first value, and a second processing unit, configured to use the number of already processed multimedia files and/or the duration of the already processed multimedia files of the target application as the second value; and the second determining unit is used for judging whether the second value exceeds the first value or not, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
Optionally, the determining module is further configured to determine whether the authorization information includes a third dimension, where the third dimension is used to indicate a total number of multimedia files that can be processed, and/or a total duration of the multimedia files that can be processed; the processing module is further configured to, if the authorization information includes the third dimension, restrict processing of the multimedia file by the target application according to the third dimension.
In summary, the embodiment solves the problem of authorization by adopting natural time in the prior art, thereby improving the flexibility of authorization and enabling more precise authorization.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art to which the present application pertains. Any modification, equivalent replacement, improvement or the like made within the spirit and principle of the present application shall be included in the scope of the claims of the present application.

Claims (13)

1. An application operation authorization processing method is characterized by comprising the following steps:
obtaining authorization information of a target application, wherein the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the capability of the target application in analyzing multimedia, and the second dimension is used for indicating the total time length for which the target application is authorized;
judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information;
if the limit in the authorization information is not exceeded, accumulating the use of the target application;
and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
2. The method of claim 1, wherein determining whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information comprises:
and judging whether the target application exceeds the limit in the authorization information according to any one of the two dimensions in the authorization information, wherein the limit exceeding the any one of the two dimensions is the limit exceeding the authorization information.
3. The method of claim 1, further comprising:
when the authorization information is multiple, integrating the multiple authorization information into a total authorization information, wherein the total authorization information is used as a basis for judging whether the target application exceeds the authorization information limit; wherein:
under the condition that a second dimension in the plurality of authorization information has an overlapping part at the same position on a time axis, arranging a first time length corresponding to a non-overlapping part and a second time length corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; adding first dimensions corresponding to overlapping parts on a time axis in the multiple authorization information to be used as values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information;
alternatively, the first and second electrodes may be,
determining one authorization information as a first authorization information from the plurality of authorization information, respectively converting the rest authorization information of the plurality of authorization information according to a first dimension and a second dimension of the first authorization information, and obtaining total authorization information according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; and sequentially prolonging the total duration of the first authorization information according to the converted total duration of each authorization information in the rest of authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolonging as a second dimension of the total authorization information.
4. The method of claim 1, wherein determining whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information comprises:
calculating the product of the first dimension and the second dimension to obtain a first value;
multiplying the multimedia analysis capability used by the target application and the running time length to obtain a second value;
and judging whether the second value exceeds a first value, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
5. The method of claim 4, wherein calculating the product of the first dimension and the second dimension to obtain a first value comprises:
and in the case that the authorization information is multiple, adding the products of the first dimension and the second dimension in each authorization information as the first value.
6. The method according to any one of claims 1 to 5, wherein, in the case where the target application is used to analyze real-time video, the first dimension is a number of ways to analyze video and the second dimension is a total duration authorized for the target application.
7. The method according to claim 6, wherein in a case that the target application runs a plurality of instances, the number of paths of the analysis videos that the target application has run is added according to the number of paths of the analysis videos that run in each instance of the plurality of instances, and the added number of paths is limited by a first dimension in the authorization information; the target application running time is obtained by subtracting a second time point from a first time point, wherein the second time point is the starting running time of the earliest running example in the plurality of examples, and the first time point is the ending running time of the latest running example in the plurality of examples.
8. The method of claim 1, wherein determining whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information comprises:
representing the first dimension as a multiple if the target application is for analyzing multimedia files, wherein the multiple is used to indicate a multiple of a numerical value in the second dimension;
converting the total duration in the second dimension into the total number of the multimedia files capable of being processed according to the time for processing one multimedia file, and/or taking the total duration in the second dimension as the total duration capable of processing the multimedia files;
using a product of the multiple and the second dimension as the first value,
taking the number of the processed multimedia files of the target application and/or the duration of the processed multimedia files as the second value;
and judging whether the second value exceeds a first value, and if the second value exceeds the first value, determining that the limit of the authorization information is exceeded.
9. The method of claim 1, further comprising:
judging whether the authorization information comprises a third dimension, wherein the third dimension is used for indicating the total number of the multimedia files capable of being processed and/or the total duration of the multimedia files capable of being processed;
and under the condition that the authorization information comprises the third dimension, limiting the processing of the multimedia file performed by the target application according to the third dimension.
10. The method of claim 9, wherein if the third dimension is included in the authorization information, the first dimension and the second dimension are not included in the authorization information.
11. An application run authorization processing system, comprising:
the system comprises an acquisition module, a processing module and a display module, wherein the acquisition module is used for acquiring authorization information of a target application, the authorization information comprises two dimensions, the first dimension of the two dimensions is used for limiting the capability of the target application for analyzing multimedia, and the second dimension is used for indicating the total time length of the target application which is authorized;
the judging module is used for judging whether the target application exceeds the limit in the authorization information according to two dimensions of the authorization information;
a processing module for accumulating usage of the target application if the limit in the authorization information is not exceeded; and if the limit in the authorization information is exceeded, limiting the running of the target application according to a predefined rule.
12. The system of claim 11,
the judging module is used for judging whether the target application exceeds the limit in the authorization information according to any one of two dimensions in the authorization information, wherein the limit exceeding any one of the two dimensions is the limit exceeding the authorization information; and/or the presence of a gas in the gas,
further comprising: the merging module is used for merging the authorization information into a total authorization information under the condition that the authorization information is multiple, and the total authorization information is used as a basis for judging whether the target application exceeds the authorization information limit; wherein: under the condition that a second dimension in the plurality of authorization information has an overlapping part at the same position on a time axis, arranging a first time length corresponding to a non-overlapping part and a second time length corresponding to the overlapping part on the time axis to obtain the second dimension of the total authorization information; adding first dimensions corresponding to overlapping parts on a time axis in the multiple authorization information to be used as values of the first dimensions of the overlapping parts, and arranging the values of the first dimensions of the overlapping parts and the values of the first dimensions of the non-overlapping parts according to the time axis to obtain the first dimension of the total authorization information; or determining one authorization information as a first authorization information from the multiple authorization information, respectively converting the rest authorization information of the multiple authorization information according to a first dimension and a second dimension of the first authorization information, and obtaining total authorization information according to the converted first dimension and second dimension; wherein: converting the value of the first dimension of the rest authorization information into a value equal to the value of the first dimension of the first authorization information, and taking the value of the first dimension as the first dimension of the total authorization information, wherein for any one of the rest authorization information: the product of the value of the first dimension and the value of the second dimension of the authorization information before being converted is equal to the product of the value of the first dimension and the value of the second dimension of the authorization information after being converted; sequentially prolonging the total duration of each authorization information in the rest of authorization information according to the converted total duration of each authorization information on the basis of the total duration of the first authorization information, and taking the total duration obtained after the prolongation as a second dimension of the total authorization information; and/or the presence of a gas in the atmosphere,
the judging module comprises: the first calculation unit is used for calculating the product of the first dimension and the second dimension to obtain a first value; the second calculation unit is used for multiplying the multimedia analysis capacity used by the target application and the running time length to obtain a second value; a first determination unit configured to determine whether the second value exceeds a first value, and if the second value exceeds the first value, determine that the limit of the authorization information is exceeded; and/or the presence of a gas in the gas,
the first calculation unit is used for adding the product of the first dimension and the second dimension in each authorization information to be used as the first value when the authorization information is multiple; and/or the presence of a gas in the gas,
the judging module comprises: a first processing unit for representing the first dimension as a multiple if the target application is used for analyzing multimedia files, wherein the multiple is used for indicating the multiple of the numerical value in the second dimension; converting the total duration in the second dimension into the total number of the multimedia files capable of being processed according to the time for processing one multimedia file, and/or taking the total duration in the second dimension as the total duration capable of processing the multimedia files; a third calculating unit, configured to use a product of the multiple and the second dimension as the first value, and a second processing unit, configured to use the number of already processed multimedia files and/or the duration of the already processed multimedia files of the target application as the second value; a second determination unit configured to determine whether the second value exceeds a first value, and if the second value exceeds the first value, determine that the limit of the authorization information is exceeded; and/or the presence of a gas in the atmosphere,
the judging module is further configured to judge whether the authorization information includes a third dimension, where the third dimension is used to indicate a total number of multimedia files that can be processed and/or a total duration of the multimedia files that can be processed; the processing module is further configured to, if the authorization information includes the third dimension, restrict processing of the multimedia file by the target application according to the third dimension; and/or the presence of a gas in the gas,
if the third dimension is included in the authorization information, the first dimension and the second dimension are not included in the authorization information.
13. A device for application run authorization processing, comprising a memory for storing a program and/or a processor for running the program, the program being adapted to perform the method of any of claims 1 to 10.
CN202210351401.6A 2022-04-02 2022-04-02 Application operation authorization processing method, system and equipment Pending CN114676395A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210351401.6A CN114676395A (en) 2022-04-02 2022-04-02 Application operation authorization processing method, system and equipment
PCT/CN2023/084998 WO2023185991A1 (en) 2022-04-02 2023-03-30 Method, system and device for processing application operation licensing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210351401.6A CN114676395A (en) 2022-04-02 2022-04-02 Application operation authorization processing method, system and equipment

Publications (1)

Publication Number Publication Date
CN114676395A true CN114676395A (en) 2022-06-28

Family

ID=82078402

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210351401.6A Pending CN114676395A (en) 2022-04-02 2022-04-02 Application operation authorization processing method, system and equipment

Country Status (2)

Country Link
CN (1) CN114676395A (en)
WO (1) WO2023185991A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023185991A1 (en) * 2022-04-02 2023-10-05 杭州海康威视数字技术股份有限公司 Method, system and device for processing application operation licensing

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737444A (en) * 2018-06-20 2018-11-02 北京玄科技有限公司 Micro services authorization management method and device applied to intelligent robot
CN109063423B (en) * 2018-07-16 2020-12-11 北京知道创宇信息技术股份有限公司 Application software authorization method and system
CN112839006B (en) * 2019-11-22 2023-04-18 Oppo广东移动通信有限公司 Open platform interface calling method and related product
CN112069471B (en) * 2020-09-21 2023-05-23 浪潮云信息技术股份公司 Application system authorization method, device and medium based on domestic CPU
CN114676395A (en) * 2022-04-02 2022-06-28 杭州海康威视数字技术股份有限公司 Application operation authorization processing method, system and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023185991A1 (en) * 2022-04-02 2023-10-05 杭州海康威视数字技术股份有限公司 Method, system and device for processing application operation licensing

Also Published As

Publication number Publication date
WO2023185991A1 (en) 2023-10-05

Similar Documents

Publication Publication Date Title
CN106897206B (en) Service testing method and device
CN111476667A (en) Block chain-based original work transaction method and device and electronic equipment
CN110780882B (en) Method, device, system, electronic equipment and storage medium for processing code file
CN111899008B (en) Resource transfer method, device, equipment and system
CN114676395A (en) Application operation authorization processing method, system and equipment
CN111245897A (en) Data processing method, device, system, storage medium and processor
CN112712125B (en) Event stream pattern matching method and device, storage medium and processor
CN112035156A (en) E-commerce platform docking device, method, equipment and medium
CN111046267A (en) Method, device and medium for processing network rumors based on block chains
CN117194756A (en) Data processing method, device and storage medium
CN111769984A (en) Method for adding nodes in block chain network and block chain system
CN111639998A (en) Method, device and medium for guaranteeing user deposit rights and interests based on block chain
CN111435495A (en) Service processing method, device and equipment
CN114491662B (en) Block chain-based data asset auditing method, system and equipment
CN111131474A (en) Method, device and medium for managing user protocol based on block chain
CN115658785A (en) Financial subject bin construction method, device and medium for government affair data
CN115470264A (en) Data auditing method and device, electronic equipment and storage medium
CN112905449B (en) Target test method, device, equipment and storage medium
CN115134373A (en) Data synchronization method and device, storage medium and electronic equipment
CN113486409A (en) Electronic contract tamper-proof method and device, storage medium and electronic equipment
CN113469814A (en) Method and device for determining transaction duration data
CN111198846A (en) Data exchange method and device based on block chain
CN117349261A (en) Data storage method and system based on data playback
CN113742664B (en) Monitoring and auditing method, equipment and system
CN115270203A (en) Privacy computing system, method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination