Unlock instant, AI-driven research and patent intelligence for your innovation.

A barrage verification method, computer equipment and storage medium

A verification method and bullet screen technology, applied in the computer field, can solve the problem of a single processing method of the bullet screen, and achieve the effect of solving a relatively single processing method.

Active Publication Date: 2020-12-15
WUHAN DOUYU NETWORK TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application solves the problem of relatively simple processing methods for swiping bullet chatting in the prior art by providing a bullet chatting verification method, computer equipment and storage media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A barrage verification method, computer equipment and storage medium
  • A barrage verification method, computer equipment and storage medium
  • A barrage verification method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0092] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:

[0093] S101, sending the login protocol to the barrage server of the live broadcast platform;

[0094] S102. If the login is successful, receive the token field and the random field r returned by the barrage server;

[0095] S103, generating a barrage protocol;

[0096] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.

[0097] S104. Calculate the k field according to the token field, the room number of the live broadcast room, the time stamp of the bullet chatting protocol, the number of times the bullet chatting is sent, the content of the bullet chatting, and the random field r;

[0098] Wherein, the room number of the live broadcast room is obtained by sending a protocol for obtaining room information to the bullet chat server,...

Embodiment 2

[0105] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:

[0106] S201. Receive a login protocol sent by the client device;

[0107] S202. If the login is successful, return a token field and a random field r to the client device;

[0108] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;

[0109] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;

[0110] S205. Calculate the k field according to the token field, the room number of the live broadcast room, the time stamp of the bullet chat protocol, the number of times the bullet chat is sent, the content of the bullet chat, and the random ...

Embodiment 3

[0115] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:

[0116] S301. The client device sends the login protocol to the barrage server of the live broadcast platform;

[0117] Correspondingly, the barrage server receives the login protocol sent by the client device.

[0118]Specifically, for a client device successfully connected to the bullet screen server of the live broadcast platform through TCP, the client device actively logs in through the account password. The client device sends the login protocol to the bullet chat server of the live broadcast platform, and the bullet chat server judges the legitimacy of the login information of the client device and whether it is a registered user. If the login information is illegal or not a registered user, the login fails and the bullet chat The server will actively d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bullet screen verification method, computer equipment and a storage medium. The method includes the following steps that: a login protocol is sent to the bullet screen serverof a live streaming platform; if login is successful, a token field and a random field r which are returned by the bullet screen server are received; a bullet screen protocol is generated; a k field is calculated according to the token field, the room number of a live streaming room, the time stamp of the bullet screen protocol, the number of times of the transmission of bullet screens, bullet screen content and the random field r; the k field is encrypted; the encrypted k field is added into the bullet screen protocol, and the bullet screen protocol with the encrypted k field is sent to the bullet screen server; and if a bullet screen is successfully sent, a next random field r sent by the bullet screen server is received, wherein the next random field r is used for calculating the k field of the next bullet screen protocol. With the bullet screen verification method, the computer equipment and the storage medium of the invention adopted, the login protocol is verified, so that an illegal user can be detected in time; the k field can be verified in time, so that an illegal bullet screen protocol can be identified; and therefore, modes for processing bullet screen transmission canbe enriched.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a barrage verification method, computer equipment and a storage medium. Background technique [0002] Currently, live streaming is becoming more and more popular. The barrage is a very good interactive method in the live broadcast. For example, when the host is broadcasting live, viewers can post comments and interact with the host by sending barrage. The barrage sent by any viewer can be seen by all users in the live room. [0003] However, some illegal users take advantage of the fact that bullet chatting can be seen by all viewers, and continue to advertise on the live broadcast platform by sending bullet chat, for example, by establishing a link with the live broadcast platform server and forging the bullet chat protocol to Brush barrage, and write automated scripts to brush barrage. The existing practice is to perform barrage filtering and anti-scraping ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04N21/2187H04N21/235H04N21/258H04N21/488H04N21/643H04N21/8547
CPCH04N21/2187H04N21/2351H04N21/25875H04N21/4884H04N21/643H04N21/8547
Inventor 周志刚陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD