Bullet screen data checking method, bullet screen data checking device, terminal and storage medium
A verification method and data technology, applied in the field of bullet screens, can solve problems such as affecting the efficiency of bullet screen testing, verification of bullet screen data, and client system crashes.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0029] figure 1 It is a flow chart of a verification method for bullet chat data provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of performing integrity verification on bullet chat data with a preset string structure, especially for bullet chat data. After the bullet chat data is generated in the bullet chat server according to the preset bullet chat protocol, the generated bullet chat data is verified in the application scenario, and it can also be used in the Android client to verify the bullet chat data sent by the bullet chat server in the tested application scenarios. The method can be performed by a verification device for barrage data, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, such as a smart Smart terminals such as mobile phones, tablets, smart TVs, or laptops. The method specifically includes the fo...
Embodiment 2
[0058] figure 2 It is a flow chart of a method for verifying barrage data provided by Embodiment 2 of the present invention. On the basis of the above-mentioned embodiments, this embodiment provides a method for "determining the target barrage by looping through the character elements in the target character array." The number of preset delimiters and the number of preset joiners in the data" has been optimized. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.
[0059] see figure 2 , the verification method of the barrage data provided in this embodiment includes the following steps:
[0060] S210. Obtain target barrage data with a preset character string structure.
[0061] Among them, the preset character string structure is: use the preset start character as the first character, divide each key-value pair information with the preset separator, connect the key information and value information ...
Embodiment 3
[0081] image 3 It is a flow chart of a verification method for bullet chat data provided by Embodiment 3 of the present invention. This embodiment is optimized on the basis of the above-mentioned embodiments: "Before calling the string conversion function in the bullet chat data object, It also includes: calling the character extraction function in the bullet chat data object, extracting the character information between the first character and the last character in the target bullet chat data, and determining the extracted character information as the first bullet chat data". On this basis, "call the string conversion function in the bullet chat data object to convert the target bullet chat data into the target character array" has been further optimized. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.
[0082] see image 3 , the verification method of the barrage data provided in this embodiment...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com