Unlock instant, AI-driven research and patent intelligence for your innovation.

Bullet screen verification method, computer equipment and storage medium

A verification method and computer program technology, applied in the computer field, can solve the problem of a single processing method of the bullet screen, and achieve the effect of solving a relatively single processing method.

Active Publication Date: 2018-11-06
WUHAN DOUYU NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application solves the problem of relatively simple processing methods for swiping bullet chatting in the prior art by providing a bullet chatting verification method, computer equipment and storage media

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bullet screen verification method, computer equipment and storage medium
  • Bullet screen verification method, computer equipment and storage medium
  • Bullet screen verification method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0095] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:

[0096] S101, sending the login protocol to the barrage server of the live broadcast platform;

[0097] S102. If the login is successful, receive the token field returned by the barrage server;

[0098] S103. Generate a barrage protocol;

[0099] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.

[0100] S104. Calculate the Hash value of the previous protocol of the barrage protocol;

[0101] Wherein, wherein, the Hash value of the first protocol sent to the barrage server is obtained by performing MD5 calculation on the first protocol, and then the Hash value of each protocol is obtained by comparing each protocol and the The Hash value of the previous protocol of each protocol is obtained by MD5 operation.

[0102] S105. Calcula...

Embodiment 2

[0108] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:

[0109] S201. Receive a login protocol sent by the client device;

[0110] S202. If the login is successful, return a token field to the client device;

[0111] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;

[0112] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;

[0113]S205. Calculate a Hash value of a protocol on the client device;

[0114] Wherein, the Hash value of the first protocol of the client device is obtained by performing an MD5 operation on the first protocol, and then the Hash value of each protocol is obtained...

Embodiment 3

[0120] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:

[0121] S301. The client device sends the login protocol to the barrage server of the live broadcast platform;

[0122] Correspondingly, the barrage server receives the login protocol sent by the client device.

[0123] Specifically, for a client device successfully connected to the bullet screen server of the live broadcast platform through TCP, the client device actively logs in through the account password. The client device sends the login protocol to the bullet chat server of the live broadcast platform, and the bullet chat server judges the legitimacy of the login information of the client device and whether it is a registered user. If the login information is illegal or not a registered user, the login fails and the bullet chat The server will actively ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a bullet screen verification method, computer equipment and a storage medium. The method includes the following steps that: a login protocol is sent to the bullet screen serverof a live streaming platform; if login is successful, a token field returned by the bullet screen server is received; a bullet screen protocol is generated; the Hash value of the previous protocol ofthe bullet screen protocol is calculated; a k field is calculated according to the token field, the room number of a live streaming room, the time stamp of the bullet screen protocol, the number of times of the transmission of bullet screens, bullet screen content and the Hash value of the previous protocol; and the k field is encrypted; the encrypted k field is added into the bullet screen protocol, and the bullet screen protocol with the encrypted k field is sent to the bullet screen server. With the bullet screen verification method, the computer equipment and the storage medium of the invention adopted, the login protocol is verified, so that an illegal user can be detected in time; the k field can be verified, so that an illegal bullet screen protocol can be identified; and therefore,modes for processing bullet screen transmission can be enriched.

Description

technical field [0001] The invention belongs to the technical field of computers, and in particular relates to a barrage verification method, computer equipment and a storage medium. Background technique [0002] Currently, live streaming is becoming more and more popular. The barrage is a very good interactive method in the live broadcast. For example, when the host is broadcasting live, viewers can post comments and interact with the host by sending barrage. The barrage sent by any viewer can be seen by all users in the live room. [0003] However, some illegal users take advantage of the fact that bullet chatting can be seen by all viewers, and continue to advertise on the live broadcast platform by sending bullet chat, for example, by establishing a link with the live broadcast platform server and forging the bullet chat protocol to Brush barrage, and write automated scripts to brush barrage. The existing practice is to perform barrage filtering and anti-scraping ide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/2187H04N21/235H04N21/258H04N21/488H04N21/643H04N21/8547
CPCH04N21/2187H04N21/2351H04N21/25875H04N21/4884H04N21/643H04N21/8547
Inventor 周志刚陈少杰张文明
Owner WUHAN DOUYU NETWORK TECH CO LTD