Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bullet screen verification method and apparatus based on different modes, terminal and storage medium

A verification method and barrage technology, applied in the field of barrage, can solve problems such as inconvenient expansion and maintenance, low maintainability of barrage verification function, complex logic function of barrage verification function, etc., to improve scalability and maintainability, the effect of simplifying logic functions

Active Publication Date: 2019-03-01
WUHAN DOUYU NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the selection method of this bullet chatting verification method will make the logic function of the bullet chatting verification function very complicated, which in turn leads to a very low maintainability of the bullet chatting verification function, and any bullet chatting verification method Any modification needs to adjust the business function of the barrage verification function, which is not convenient for expansion and maintenance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bullet screen verification method and apparatus based on different modes, terminal and storage medium
  • Bullet screen verification method and apparatus based on different modes, terminal and storage medium
  • Bullet screen verification method and apparatus based on different modes, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 A flow chart of a bullet chatting verification method based on different methods provided in Embodiment 1 of the present invention. This embodiment is applicable to performing bullet chatting data using the target bullet chatting verification method in different bullet chatting verification methods. Integrity verification, especially in the application scenario where the bullet chat data is generated according to the preset bullet chat protocol in the bullet chat server, and the generated bullet chat data is verified, and it can also be used in the Android client In the application scenario where the bullet chat data delivered by the bullet chat server is verified. The method can be performed by a barrage verification device based on different methods, the device can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, For example, intelligent terminals such...

Embodiment 2

[0064] figure 2 It is a flow chart of a bullet chat verification method based on different methods provided by Embodiment 2 of the present invention. On the basis of the above embodiments, the target data structure corresponding to the target bullet chat data is the first preset character in this embodiment The verification process of the target barrage data is described in detail when the string structure is used. The explanations of terms that are the same as or corresponding to those in the foregoing embodiments are not repeated here.

[0065] see figure 2 The barrage verification method based on different methods provided in this embodiment includes the following steps:

[0066] S210. Obtain target barrage data and a target verification identifier corresponding to the target barrage data.

[0067] Wherein, the target data structure corresponding to the target barrage data is the first preset string structure, and the first preset string structure is: the preset start ch...

Embodiment 3

[0095] image 3 A flow chart of a bullet chat verification method based on different methods provided by Embodiment 3 of the present invention. On the basis of the above-mentioned embodiments, the target data structure corresponding to the target bullet chat data is a preset character string embedding When setting the structure, the verification process of the target barrage data is described in detail. The explanations of terms that are the same as or corresponding to those in the foregoing embodiments are not repeated here.

[0096] see image 3 The barrage verification method based on different methods provided in this embodiment includes the following steps:

[0097] S310. Obtain target barrage data and a target verification identifier corresponding to the target barrage data.

[0098]Wherein, the target data structure corresponding to the target barrage data is a preset string nesting structure, and the preset string nesting structure includes: a nesting structure form...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a bullet screen verification method and apparatus based on different modes, a terminal and a storage medium. The method comprises the following steps: acquiring target bullet screen data and a target verification identifier corresponding to the target bullet screen data; determining a target verification class in verification classes according to the target verification identifier, wherein the verification classes are in one-to-one correspondence with the bullet screen verification modes, and each verification class inherits a verification interface protocol in advance; initializing a preset verification protocol object according to the target verification class; and calling a bullet screen verification function in the initialized verification protocol object by using the target bullet screen data as function input parameters, and verifying the target bullet screen data by using the target bullet screen verification mode corresponding to the target verification class. By adoption of the technical scheme of the embodiment of the invention, integrity verification can be performed on the bullet screen data by using the target verification modein different verification modes, the detection logic in the selection means of the existing verification mode can be effectively decoupled, and the code extensibility is improved.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of bullet chatting, and in particular, to a method, device, terminal and storage medium for verifying bullet chatting based on different methods. Background technique [0002] With the rapid development of smart terminals, various application software are developed and applied to smart terminals. Some application software, such as live broadcast software and video playback software, often have bullet chatting functions such as bullet chatting reception, analysis, and push. In the process of developing these application software, it is necessary to conduct relevant tests on the bullet chatting data sent by the server to determine whether the bullet chatting function is operating normally. [0003] At present, in the development of application software based on the Android operating system, after the server completes the bullet chat data according to the preset bullet chat protocol, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/235H04N21/435H04N21/4788H04N21/643
CPCH04N21/235H04N21/435H04N21/4788H04N21/643
Inventor 张磊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products