Verification method and device for barrage data, and terminal

A data and barrage technology, applied in the field of barrage, can solve the problems of barrage data verification, barrage test process errors, client system crashes, etc., to improve verification efficiency, improve test efficiency, and avoid system crashes. Effect

Active Publication Date: 2019-03-01
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that neither the server nor the client has performed any verification on the bullet chat data during the existing bullet chat data sending process and receiving process, so when there is an abnormality in the bullet chat data, it will cause the bullet chat test process to appear. errors, and even lead to problems such as system crashes on the client side, seriously affecting the efficiency of barrage testing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and device for barrage data, and terminal
  • Verification method and device for barrage data, and terminal
  • Verification method and device for barrage data, and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of a verification method for bullet chat data provided by Embodiment 1 of the present invention. This embodiment is applicable to the case of performing integrity verification on bullet chat data with a preset string structure, especially for bullet chat data. After the bullet chat data is generated in the bullet chat server according to the preset bullet chat protocol, the generated bullet chat data is verified in the application scenario, and it can also be used in the Android client to verify the bullet chat data sent by the bullet chat server in the tested application scenarios. The method can be performed by a verification device for barrage data, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, such as a smart Smart terminals such as mobile phones, tablets, smart TVs, or laptops. The method specifically includes the fo...

Embodiment 2

[0054] figure 2 It is a flow chart of a method for verifying bullet chat data provided by Embodiment 2 of the present invention. On the basis of the above-mentioned embodiments, the present embodiment applies to the target bullet that "the preset string structure is the first preset string structure." The verification process of "Screen Data" is described in detail. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.

[0055] see figure 2, the verification method of the barrage data provided in this embodiment includes the following steps:

[0056] S210. Obtain the target barrage data of the first preset character string structure.

[0057] Wherein, the first preset character string structure is: use the preset start symbol as the first character, divide each key-value pair information with the first preset identifier, and connect the key information in the key-value pair information with the second...

Embodiment 3

[0084] image 3 It is a flow chart of a method for verifying barrage data provided by Embodiment 3 of the present invention. On the basis of the above-mentioned embodiments, this embodiment performs a target bullet with "the preset character string structure is the second preset character string structure." "Verification process of subtitle data" has been described in detail. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.

[0085] see image 3 , the verification method of the barrage data provided in this embodiment includes the following steps:

[0086] S310. Obtain the target barrage data of the second preset character string structure.

[0087] Wherein, the second preset character string structure includes: a preset start symbol, a first preset identifier, key-value pair information, a second preset identifier, at least One level of nesting, preset terminator, wherein the value information do...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a verification method and device for barrage data, and a terminal. The method comprises the steps of: acquiring target barrage data with a preset character string structure; calling a character verification function in a barrage data object storing the target barrage data, and carrying out character verification on a first character and a last character inthe target barrage data; if character verification is successful, when each preset identifier only includes one preset character, calling a character string conversion function in the barrage data object, and determining the number of the preset identifiers in the target barrage data; when each preset identifier includes at least two preset characters, calling a character string segmentation function in the barrage data object, and determining the number of the preset identifiers in the target barrage data; and if the number of the preset identifiers meets a preset verification condition, determining that the target barrage data is successfully verified. By the technical scheme of the embodiment of the invention, the barrage data can be subjected to integrity verification so as to ensurethat the barrage data can be normally parsed.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of bullet chatting, and in particular to a method, device and terminal for verifying bullet chatting data. Background technique [0002] With the rapid development of smart terminals, various application software are developed and applied to smart terminals. Some application software, such as live broadcast software and video playback software, often have bullet chatting functions such as bullet chatting reception, analysis, and push. In the process of developing these application software, it is necessary to conduct relevant tests on the bullet chatting data sent by the server to determine whether the bullet chatting function is operating normally. [0003] At present, in the development of application software based on the Android operating system, after the server constructs the bullet chat data according to the preset bullet chat protocol, it often directly sends the constructe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/235H04N21/435H04N21/4788G06F16/9032
CPCH04N21/235H04N21/435H04N21/4788
Inventor 张磊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products