A barrage verification method, computer equipment and storage medium
A technology of barrage and client devices, applied in the computer field, can solve the problem of single processing method of barrage
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0104] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:
[0105] S101, designing a basic computing unit through NEON instructions;
[0106] S102, designing a NEON encryption algorithm according to the basic computing unit;
[0107] S103, sending the login protocol to the barrage server of the live broadcast platform;
[0108] S104. If the login is successful, receive the token field, random field r and public key pkey field returned by the barrage server;
[0109] S105. Generate a barrage protocol;
[0110] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.
[0111] S106. Encrypt the random field r according to the NEON encryption algorithm and the public key pkey field to obtain the n_r field;
[0112] S107, calculate the k field according to the token field, the room number of the live...
Embodiment 2
[0120] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:
[0121] S201. Receive a login protocol sent by the client device;
[0122] S202. If the login is successful, return a token field, a random field r, and a public key pkey field to the client device;
[0123] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;
[0124] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;
[0125] S205. Find the n_r field in the configuration file;
[0126] Wherein, the n_r field is obtained by encrypting the random field r according to the NEON encryption algorithm and the public key pkey field, and the ...
Embodiment 3
[0132] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:
[0133] S301. The client device designs a basic computing unit through a NEON instruction;
[0134] Among them, NEON instructions include logical operation instructions, such as: VADD bitwise AND instruction, bitwise exclusive OR instruction VEOR, left shift instruction VSHL, right shift instruction VSHR, addition instruction VADD, subtraction instruction VSUB, multiplication instruction VMUL, etc. A complex encryption and decryption algorithm is composed of simple logical arithmetic operations, so the basic calculation units of some basic encryption and decryption algorithms can be constructed through the basic operations provided by NEON instructions. And it needs to be combined with the single instruction multiple data flow of the instruction, which can oper...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


