Method and apparatus for verifying bullet screen data, terminal and storage medium

A verification method and data verification technology, applied in the bullet screen field, can solve the problems of bullet screen test process error, bullet screen data verification, client system crash, etc.

Active Publication Date: 2019-03-01
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] It can be seen that neither the server nor the client has performed any verification on the bullet chat data during the existing bullet chat data sending process and receiving process, so when there is an ab...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for verifying bullet screen data, terminal and storage medium
  • Method and apparatus for verifying bullet screen data, terminal and storage medium
  • Method and apparatus for verifying bullet screen data, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] figure 1 It is a flow chart of a bullet chatting data verification method provided by Embodiment 1 of the present invention. This embodiment is applicable to integrity verification of bullet chatting data with a preset string structure containing two preset identifiers In particular, it can be used in the bullet chat server to verify the generated bullet chat data after the bullet chat data is generated according to the preset bullet chat protocol, and it can also be used in the Android client to check the bullet chat server In the application scenario where the delivered barrage data is verified. The method can be performed by a verification device for barrage data, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, such as a smart Smart terminals such as mobile phones, tablets, smart TVs, or laptops. Such as figure 1 As shown, the method specifically ...

Embodiment 2

[0058] figure 2It is a flow chart of a verification method for barrage data provided by Embodiment 2 of the present invention. On the basis of the above embodiments, this embodiment uses the preset character string structure as "use the preset start symbol as the first character, and The first preset identifier divides each key-value pair information, connects the key information and value information in the key-value pair information with the second preset identifier, and uses the preset terminator as the last character "" to check the target barrage data. The verification process is described in detail, and the number of second preset identifiers in the target barrage data is determined by means of cyclic verification. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.

[0059] see figure 2 , the verification method of the barrage data provided in this embodiment includes the following steps:

[...

Embodiment 3

[0093] image 3 A schematic structural diagram of a barrage data verification device provided in Embodiment 3 of the present invention. This embodiment is applicable to the case of performing integrity verification on barrage data with a preset character string structure. The device may specifically include : target barrage data acquisition module 310, character verification module 320, character string array determination module 330, preset identifier quantity determination module 340 and preset identifier quantity verification module 350.

[0094] Wherein, the target barrage data acquisition module 310 is used to acquire target barrage data of a preset character string structure, wherein the preset character string structure includes a first preset identifier and a second preset identifier; a character verification module 320 , used to call the character verification function in the bullet chat data object storing the target bullet chat data, and perform character verificati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a method and apparatus for verifying bullet screen data, a terminal and a storage medium. The method comprises the following steps: obtaining target bullet screen data of a preset character string structure; calling a character verification function in a bullet screen data object storing the target bullet screen data to perform character verification on the first character and the last character in the target bullet screen data; if the character verification is successful, calling a character string segmentation function in the bullet screen data object to segment the target bullet screen data via first preset identifiers, and determining a character string array; determining the number of first preset identifiers and the number of second preset identifiers in the target bullet screen data according to the array information of the character string array; and if the number of first preset identifiers and the number of second preset identifiers meet preset verification conditions, determining that the verification of the target bullet screen data is successful. Through the technical scheme of the embodiment of the invention, integrity verification can be performed on the bullet screen data, thereby ensuring that the bullet screen data can be normally parsed.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of bullet chatting, and in particular to a method, device, terminal and storage medium for verifying bullet chatting data. Background technique [0002] With the rapid development of smart terminals, various application software are developed and applied to smart terminals. Some application software, such as live broadcast software and video playback software, often have bullet chatting functions such as bullet chatting reception, analysis, and push. In the process of developing these application software, it is necessary to conduct relevant tests on the bullet chatting data sent by the server to determine whether the bullet chatting function is operating normally. [0003] At present, in the development of application software based on the Android operating system, after the server constructs the bullet chat data according to the preset bullet chat protocol, it often directly send...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04N21/488G06F16/73G06F17/21G06F17/27
CPCG06F40/117G06F40/205G06F40/279H04N21/4884
Inventor 张磊
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products