Bullet screen verification method, computer equipment and storage medium
A verification method and computer program technology, applied in the computer field, can solve the problem of a single processing method of the bullet screen, and achieve the effect of solving a relatively single processing method.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0095] see figure 1 , a barrage verification method provided in this embodiment, the method is applied to a client device, and the method includes the following steps:
[0096] S101, sending the login protocol to the barrage server of the live broadcast platform;
[0097] S102. If the login is successful, receive the token field returned by the barrage server;
[0098] S103. Generate a barrage protocol;
[0099] Wherein, the bullet chatting protocol includes the bullet chatting content and the time stamp of the bullet chatting protocol.
[0100] S104. Calculate the Hash value of the previous protocol of the barrage protocol;
[0101] Wherein, wherein, the Hash value of the first protocol sent to the barrage server is obtained by performing MD5 calculation on the first protocol, and then the Hash value of each protocol is obtained by comparing each protocol and the The Hash value of the previous protocol of each protocol is obtained by MD5 operation.
[0102] S105. Calcula...
Embodiment 2
[0108] see figure 2 , a barrage verification method provided in this embodiment, the method is applied to a barrage server of a live broadcast platform, and the method includes the following steps:
[0109] S201. Receive a login protocol sent by the client device;
[0110] S202. If the login is successful, return a token field to the client device;
[0111] S203. Receive the barrage protocol sent by the client device, where the barrage protocol includes an encrypted k field;
[0112] S204. Determine whether the difference between the timestamp of the bullet chatting protocol and the timestamp of the bullet chatting server is within a preset range, and if so, decrypt the encrypted k field to obtain the k field;
[0113]S205. Calculate a Hash value of a protocol on the client device;
[0114] Wherein, the Hash value of the first protocol of the client device is obtained by performing an MD5 operation on the first protocol, and then the Hash value of each protocol is obtained...
Embodiment 3
[0120] see image 3 , this embodiment provides a bullet chatting verification method from the perspective of interaction between a client device and a bullet chatting server, the method comprising the following steps:
[0121] S301. The client device sends the login protocol to the barrage server of the live broadcast platform;
[0122] Correspondingly, the barrage server receives the login protocol sent by the client device.
[0123] Specifically, for a client device successfully connected to the bullet screen server of the live broadcast platform through TCP, the client device actively logs in through the account password. The client device sends the login protocol to the bullet chat server of the live broadcast platform, and the bullet chat server judges the legitimacy of the login information of the client device and whether it is a registered user. If the login information is illegal or not a registered user, the login fails and the bullet chat The server will actively ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


