A barrage verification method, computer equipment and storage medium
A verification method and bullet screen technology, applied in the computer field, can solve the problem of a single processing method of the bullet screen, and achieve the effect of solving a relatively single processing method.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0092] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:
[0093] S101, sending the login protocol to the barrage server of the live broadcast platform;
[0094] S102. If the login is successful, receive the token field and the random field r returned by the barrage server;
[0095] S103, generating a barrage protocol;
[0096] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.
[0097] S104. Calculate the k field according to the token field, the room number of the live broadcast room, the time stamp of the bullet chatting protocol, the number of times the bullet chatting is sent, the content of the bullet chatting, and the random field r;
[0098] Wherein, the room number of the live broadcast room is obtained by sending a protocol for obtaining room information to the bullet chat server,...
Embodiment 2
[0105] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:
[0106] S201. Receive a login protocol sent by the client device;
[0107] S202. If the login is successful, return a token field and a random field r to the client device;
[0108] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;
[0109] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;
[0110] S205. Calculate the k field according to the token field, the room number of the live broadcast room, the time stamp of the bullet chat protocol, the number of times the bullet chat is sent, the content of the bullet chat, and the random ...
Embodiment 3
[0115] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:
[0116] S301. The client device sends the login protocol to the barrage server of the live broadcast platform;
[0117] Correspondingly, the barrage server receives the login protocol sent by the client device.
[0118]Specifically, for a client device successfully connected to the bullet screen server of the live broadcast platform through TCP, the client device actively logs in through the account password. The client device sends the login protocol to the bullet chat server of the live broadcast platform, and the bullet chat server judges the legitimacy of the login information of the client device and whether it is a registered user. If the login information is illegal or not a registered user, the login fails and the bullet chat The server will actively d...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


