Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Bullet screen verification method and bullet screen verification device based on chain table mode, and terminal and storage medium

A bullet screen and linked list technology, applied in the bullet screen field, can solve the problems of client system crash, affecting the bullet screen test efficiency, bullet screen data verification, etc., so as to avoid system crash and improve the bullet screen test efficiency.

Active Publication Date: 2019-02-22
WUHAN DOUYU NETWORK TECH CO LTD
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that neither the server nor the client has performed any verification on the bullet chat data during the existing bullet chat data sending process and receiving process, so when there is an abnormality in the bullet chat data, it will cause the bullet chat test process to appear. errors, and even lead to problems such as system crashes on the client side, seriously affecting the efficiency of barrage testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Bullet screen verification method and bullet screen verification device based on chain table mode, and terminal and storage medium
  • Bullet screen verification method and bullet screen verification device based on chain table mode, and terminal and storage medium
  • Bullet screen verification method and bullet screen verification device based on chain table mode, and terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0028] figure 1 It is a flow chart of a linked list-based bullet chat verification method provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of integrity verification of bullet chat data with a nested string structure, especially It can be used in the bullet chat server to verify the generated bullet chat data after the bullet chat data is generated according to the preset bullet chat protocol, and it can also be used in the Android client to send bullet chat messages to the bullet chat server In the application scenario of verifying the data of the screen. The method can be performed by a barrage verification device based on a linked list method, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, For example, intelligent terminals such as smart phones, tablet computers, smart TVs, or notebook computers. Such as figure...

Embodiment 2

[0053] figure 2 It is a flow chart of a bullet-screen verification method based on a linked list method provided by Embodiment 2 of the present invention. On the basis of the above-mentioned embodiments, this embodiment also includes a first preset identifier in the preset character string nesting structure , the second preset identifier and at least one level of nesting formed by a preset number of preset string structures, the verification process of the target barrage data is described in detail. On this basis, "traverse each node in the first character linked list, delete the nodes corresponding to each preset start character and each preset end character in the first character linked list, and obtain the second character linked list" Optimization, where explanations of terms that are the same as or corresponding to the above-mentioned embodiments are not repeated here.

[0054] see figure 2 , the barrage verification method based on the linked list method provided in ...

Embodiment 3

[0100] image 3 A schematic diagram of the structure of a barrage verification device based on a linked list method provided by Embodiment 3 of the present invention. This embodiment is applicable to the case of performing integrity verification on the barrage data of a preset character string nesting structure. The device may specifically include: a target bullet chat data acquisition module 310 , a character number determination module 320 , a bullet chat data determination module 330 to be tested, and a target bullet chat data verification module 340 .

[0101] Among them, the target barrage data acquisition module 310 is used to acquire the target barrage data of the preset character string nesting structure, wherein the preset character string nesting structure includes at least two preset start symbols and at least two preset end characters character number determination module 320, for calling the string conversion function in the bullet chat data object storing target ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a bullet screen verification method and a bullet screen verification device based on a chain table mode, and a terminal and a storage medium. The method comprises the following steps: acquiring target bullet screen data of a preset character string nested structure; calling a character string conversion function, converting the target bullet screen data into a first character array, traversing character elements in the first character array, and determining the number of preset start symbols and the number of preset end symbols in the target bullet screen data; if the number of the preset start symbols is equal to the number of the preset end symbols, based on a symbol removing mode of a chain table structure, removing each preset start symbol andeach preset end symbol in the first character array, and obtaining to-be-checked bullet screen data; and calling an identifier determination function, determining the number of preset identifiers in the to-be-checked bullet screen data, and when the number of the preset identifiers satisfies a preset verification condition, confirming that target bullet screen data verification is successful. Through the method, the device, the terminal and the storage medium provided by the technical scheme of the embodiment of the invention, the integrity verification can be executed for the bullet screen data of the nested structure.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of bullet chatting, and in particular, to a method, device, terminal, and storage medium for verifying bullet chatting based on a linked list method. Background technique [0002] With the rapid development of smart terminals, various application software are developed and applied to smart terminals. Some application software, such as live broadcast software and video playback software, often have bullet chatting functions such as bullet chatting reception, analysis, and push. In the process of developing these application software, it is necessary to conduct relevant tests on the bullet chatting data sent by the server to determine whether the bullet chatting function is operating normally. [0003] At present, in the development of application software based on the Android operating system, after the server constructs the bullet chat data according to the preset bullet chat proto...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04N21/488G06F17/22
CPCG06F40/126H04N21/4884
Inventor 张磊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products