Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bullet screen verification method, device, terminal and storage medium based on different methods

A technology of barrage and verification functions, applied in the field of barrage, can solve the problems of inconvenient expansion and maintenance, low maintainability of barrage verification functions, complex logical functions of barrage verification functions, etc., to achieve simplified logic functions, The effect of improving scalability and maintainability

Active Publication Date: 2021-02-02
WUHAN DOUYU NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the selection method of this bullet chatting verification method will make the logic function of the bullet chatting verification function very complicated, which in turn leads to a very low maintainability of the bullet chatting verification function, and any bullet chatting verification method Any modification needs to adjust the business function of the barrage verification function, which is not convenient for expansion and maintenance.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bullet screen verification method, device, terminal and storage medium based on different methods
  • Bullet screen verification method, device, terminal and storage medium based on different methods
  • Bullet screen verification method, device, terminal and storage medium based on different methods

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 A flow chart of a bullet chatting verification method based on different methods provided in Embodiment 1 of the present invention. This embodiment is applicable to performing bullet chatting data using the target bullet chatting verification method in different bullet chatting verification methods. Integrity verification, especially in the application scenario where the bullet chat data is generated according to the preset bullet chat protocol in the bullet chat server, and the generated bullet chat data is verified, and it can also be used in the Android client In the application scenario where the bullet chat data delivered by the bullet chat server is verified. The method can be performed by a barrage verification device based on different methods, the device can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, For example, intelligent terminals such...

Embodiment 2

[0064] figure 2 It is a flow chart of a bullet chat verification method based on different methods provided by Embodiment 2 of the present invention. On the basis of the above embodiments, the target data structure corresponding to the target bullet chat data is the first preset character in this embodiment The verification process of the target barrage data is described in detail when the string structure is used. The explanations of terms that are the same as or corresponding to those in the foregoing embodiments are not repeated here.

[0065] see figure 2 The barrage verification method based on different methods provided in this embodiment includes the following steps:

[0066] S210. Obtain target barrage data and a target verification identifier corresponding to the target barrage data.

[0067] Wherein, the target data structure corresponding to the target barrage data is the first preset string structure, and the first preset string structure is: the preset start ch...

Embodiment 3

[0095] image 3 A flow chart of a bullet chat verification method based on different methods provided by Embodiment 3 of the present invention. On the basis of the above embodiments, the target data structure corresponding to the target bullet chat data is a preset character string embedded in this embodiment. When setting the structure, the verification process of the target barrage data is described in detail. The explanations of terms that are the same as or corresponding to those in the foregoing embodiments are not repeated here.

[0096] see image 3 The barrage verification method based on different methods provided in this embodiment includes the following steps:

[0097] S310. Obtain target barrage data and a target verification identifier corresponding to the target barrage data.

[0098]Wherein, the target data structure corresponding to the target barrage data is a preset string nesting structure, and the preset string nesting structure includes: a nesting struc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the present invention discloses a barrage verification method, device, terminal and storage medium based on different methods. The method includes: obtaining target bullet chatting data and a target verification identification corresponding to the target bullet chatting data; determining the target verification class in each verification class according to the target verification identification, wherein the verification class is the same as the bullet chatting verification method One-to-one correspondence, and each verification class inherits the verification interface protocol in advance; initialize the preset verification protocol object according to the target verification class; use the target barrage data as the function input parameter, and call the initialized verification protocol object The bullet chat verification function in , uses the target bullet chat verification method corresponding to the target verification class to verify the target bullet chat data. Through the technical solution of the embodiment of the present invention, the integrity of the barrage data can be verified by using the target verification methods in different verification methods, and the detection logic in the existing verification method selection means can be effectively decoupled, Improved code scalability.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of bullet chatting, and in particular, to a method, device, terminal and storage medium for verifying bullet chatting based on different methods. Background technique [0002] With the rapid development of smart terminals, various application software are developed and applied to smart terminals. Some application software, such as live broadcast software and video playback software, often have bullet chatting functions such as bullet chatting reception, analysis, and push. In the process of developing these application software, it is necessary to conduct relevant tests on the bullet chatting data sent by the server to determine whether the bullet chatting function is operating normally. [0003] At present, in the development of application software based on the Android operating system, after the server completes the bullet chat data according to the preset bullet chat protocol, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/235H04N21/435H04N21/4788H04N21/643
CPCH04N21/235H04N21/435H04N21/4788H04N21/643
Inventor 张磊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products