Bullet screen verification method and bullet screen verification device based on chain table mode, and terminal and storage medium
A bullet screen and linked list technology, applied in the bullet screen field, can solve the problems of client system crash, affecting the bullet screen test efficiency, bullet screen data verification, etc., so as to avoid system crash and improve the bullet screen test efficiency.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0028] figure 1 It is a flow chart of a linked list-based bullet chat verification method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of integrity verification of bullet chat data with a nested string structure, especially It can be used in the bullet chat server to verify the generated bullet chat data after the bullet chat data is generated according to the preset bullet chat protocol, and it can also be used in the Android client to send bullet chat messages to the bullet chat server In the application scenario of verifying the data of the screen. The method can be performed by a barrage verification device based on a linked list method, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, For example, intelligent terminals such as smart phones, tablet computers, smart TVs, or notebook computers. Such as figure...
Embodiment 2
[0053] figure 2 It is a flow chart of a bullet-screen verification method based on a linked list method provided by Embodiment 2 of the present invention. On the basis of the above-mentioned embodiments, this embodiment also includes a first preset identifier in the preset character string nesting structure , the second preset identifier and at least one level of nesting formed by a preset number of preset string structures, the verification process of the target barrage data is described in detail. On this basis, "traverse each node in the first character linked list, delete the nodes corresponding to each preset start character and each preset end character in the first character linked list, and obtain the second character linked list" Optimization, where explanations of terms that are the same as or corresponding to the above-mentioned embodiments are not repeated here.
[0054] see figure 2 , the barrage verification method based on the linked list method provided in ...
Embodiment 3
[0100] image 3 A schematic diagram of the structure of a barrage verification device based on a linked list method provided by Embodiment 3 of the present invention. This embodiment is applicable to the case of performing integrity verification on the barrage data of a preset character string nesting structure. The device may specifically include: a target bullet chat data acquisition module 310 , a character number determination module 320 , a bullet chat data determination module 330 to be tested, and a target bullet chat data verification module 340 .
[0101] Among them, the target barrage data acquisition module 310 is used to acquire the target barrage data of the preset character string nesting structure, wherein the preset character string nesting structure includes at least two preset start symbols and at least two preset end characters character number determination module 320, for calling the string conversion function in the bullet chat data object storing target ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com