Unlock instant, AI-driven research and patent intelligence for your innovation.

A barrage verification method, computer equipment and storage medium

A technology of barrage and client devices, applied in the computer field, can solve the problem of single processing method of barrage

Active Publication Date: 2020-09-04
WUHAN DOUYU NETWORK TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application solves the problem in the prior art that there is a relatively simple processing method for swiping bullet chatting by providing a bullet chatting verification method, computer equipment and storage media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A barrage verification method, computer equipment and storage medium
  • A barrage verification method, computer equipment and storage medium
  • A barrage verification method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0104] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:

[0105] S101, designing a basic computing unit through NEON instructions;

[0106] S102, designing a NEON encryption algorithm according to the basic computing unit;

[0107] S103, sending the login protocol to the barrage server of the live broadcast platform;

[0108] S104. If the login is successful, receive the token field, random field r and public key pkey field returned by the barrage server;

[0109] S105. Generate a barrage protocol;

[0110] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.

[0111] S106. Encrypt the random field r according to the NEON encryption algorithm and the public key pkey field to obtain the n_r field;

[0112] S107, calculate the k field according to the token field, the room number of the live...

Embodiment 2

[0120] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:

[0121] S201. Receive a login protocol sent by the client device;

[0122] S202. If the login is successful, return a token field, a random field r, and a public key pkey field to the client device;

[0123] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;

[0124] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;

[0125] S205. Find the n_r field in the configuration file;

[0126] Wherein, the n_r field is obtained by encrypting the random field r according to the NEON encryption algorithm and the public key pkey field, and the ...

Embodiment 3

[0132] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:

[0133] S301. The client device designs a basic computing unit through a NEON instruction;

[0134] Among them, NEON instructions include logical operation instructions, such as: VADD bitwise AND instruction, bitwise exclusive OR instruction VEOR, left shift instruction VSHL, right shift instruction VSHR, addition instruction VADD, subtraction instruction VSUB, multiplication instruction VMUL, etc. A complex encryption and decryption algorithm is composed of simple logical arithmetic operations, so the basic calculation units of some basic encryption and decryption algorithms can be constructed through the basic operations provided by NEON instructions. And it needs to be combined with the single instruction multiple data flow of the instruction, which can oper...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a verification method for barrage, computer equipment and a storage medium. The method includes the following steps: a basic operation unit is designed through a NEON instruction; a NEON encryption algorithm is designed according to the basic operation unit; a login protocol is transmitted to a barrage server; if login is successful, a token field, a random field r, and a public key pkey field returned by the barrage server are received; a barrage protocol is generated; a n_r field is obtained after encryption is performed on the r according to the NEON encryption algorithm and the pkey; the k field is calculated according to the token field, a room number of a live broadcast room, a time stamp of the barrage protocol, the sent number the barrage, content of the barrage and the n_r field; the encryption is performed on the k field; the encrypted k field is added to the barrage protocol and is sent to the barrage server; and if the barrage is successfully sent, next r sent by the barrage server is received. Therefore, through the verification method of the invention, illegal users can be discovered through verification of the login protocol, an illegal barrageprotocol can be recognized by verifying the k field, and the way to handle barrage sending is enriched.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a barrage verification method, computer equipment and a storage medium. Background technique [0002] Currently, live streaming is becoming more and more popular. The barrage is a very good interactive method in the live broadcast. For example, when the host is broadcasting live, viewers can post comments and interact with the host by sending barrage. The barrage sent by any viewer can be seen by all users in the live room. [0003] However, some illegal users take advantage of the fact that bullet chatting can be seen by all viewers, and continue to advertise on the live broadcast platform by sending bullet chat, for example, by establishing a link with the live broadcast platform server and forging the bullet chat protocol to Brush barrage, and write automated scripts to brush barrage. The existing practice is to perform barrage filtering and anti-scraping ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/2187H04N21/235H04N21/258H04N21/488H04N21/643H04N21/8547
CPCH04N21/2187H04N21/2351H04N21/25875H04N21/4884H04N21/643H04N21/8547
Inventor 周志刚陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD