Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, terminal and storage medium for controlling virtual objects to attack

A technology for virtual objects and target objects, applied in the computer field, can solve the problems of cumbersome steps and single operation methods for virtual objects, and achieve the effects of enriching attack methods, simplifying attack processes, and improving attack efficiency.

Active Publication Date: 2022-06-21
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, a terminal and a storage medium for controlling virtual objects to attack, which can be used to solve the problem of cumbersome and cumbersome steps to kill other virtual objects one by one in related technologies when the number of other virtual objects is large and the distance is relatively short. For the single problem, the technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, terminal and storage medium for controlling virtual objects to attack
  • Method, terminal and storage medium for controlling virtual objects to attack
  • Method, terminal and storage medium for controlling virtual objects to attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Exemplary embodiments will be described in detail herein, examples of which are illustrated in the accompanying drawings. Where the following description refers to the drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the illustrative examples below are not intended to represent all implementations consistent with this application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as recited in the appended claims.

[0037] First, the terms involved in the embodiments of the present application are introduced:

[0038] Virtual environment: is the virtual environment displayed (or provided) by the application when it is run on the terminal. The virtual environment may be a simulated environment of the real world, a semi-simulated and semi-fictional environment, or a purely fictional environment. The virtual ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application relates to a method, terminal and storage medium for controlling virtual objects to attack, and relates to the computer field. The method includes: displaying a user interface, the user interface includes a virtual environment picture and a skill attack control, the virtual environment picture is a picture for observing the virtual environment from the perspective of a virtual object; when receiving the first trigger operation on the skill attack control, The skill release range is displayed around the virtual object; when the second trigger operation on the skill attack control is received, the virtual object is controlled to release the skill within the skill release range; and the target object within the skill release range is knocked back. This method can instantly repel multiple target objects when the number of target objects is large and the distance is close. While enriching the attack methods of virtual objects, it simplifies the attack process of virtual objects and improves the attack efficiency of virtual objects.

Description

technical field [0001] The present application relates to the field of computers, and in particular, to a method, a terminal and a storage medium for controlling a virtual object to attack. Background technique [0002] In applications based on 3D virtual environments, such as first-person shooter games, users can manipulate virtual objects in the virtual environment to perform actions such as walking, running, climbing, shooting, and fighting, and multiple users can team up online at the same time. Collaborate to complete a task in a virtual environment. [0003] In the related art, a virtual object can be equipped with virtual props (such as guns). The user controls the virtual object to use the virtual prop to attack other virtual objects. The user can select appropriate virtual props to attack according to different combat modes. [0004] However, the virtual props in the related art are usually suitable for situations where the number of other virtual objects to be att...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): A63F13/2145A63F13/52A63F13/56A63F13/837
CPCA63F13/52A63F13/2145A63F13/837A63F13/56
Inventor 刘智洪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products