Method and apparatus for verifying bullet screen data, terminal and storage medium
A verification method and data verification technology, applied in the bullet screen field, can solve the problems of bullet screen test process error, bullet screen data verification, client system crash, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0030] figure 1 It is a flow chart of a bullet chatting data verification method provided by Embodiment 1 of the present invention. This embodiment is applicable to integrity verification of bullet chatting data with a preset string structure containing two preset identifiers In particular, it can be used in the bullet chat server to verify the generated bullet chat data after the bullet chat data is generated according to the preset bullet chat protocol, and it can also be used in the Android client to check the bullet chat server In the application scenario where the delivered barrage data is verified. The method can be performed by a verification device for barrage data, which can be implemented by software and / or hardware, and can be integrated in a barrage server or a terminal with a barrage function equipped with an Android system, such as a smart Smart terminals such as mobile phones, tablets, smart TVs, or laptops. Such as figure 1 As shown, the method specifically ...
Embodiment 2
[0058] figure 2It is a flow chart of a verification method for barrage data provided by Embodiment 2 of the present invention. On the basis of the above embodiments, this embodiment uses the preset character string structure as "use the preset start symbol as the first character, and The first preset identifier divides each key-value pair information, connects the key information and value information in the key-value pair information with the second preset identifier, and uses the preset terminator as the last character "" to check the target barrage data. The verification process is described in detail, and the number of second preset identifiers in the target barrage data is determined by means of cyclic verification. The explanations of terms that are the same as or corresponding to the above-mentioned embodiments will not be repeated here.
[0059] see figure 2 , the verification method of the barrage data provided in this embodiment includes the following steps:
[...
Embodiment 3
[0093] image 3 A schematic structural diagram of a barrage data verification device provided in Embodiment 3 of the present invention. This embodiment is applicable to the case of performing integrity verification on barrage data with a preset character string structure. The device may specifically include : target barrage data acquisition module 310, character verification module 320, character string array determination module 330, preset identifier quantity determination module 340 and preset identifier quantity verification module 350.
[0094] Wherein, the target barrage data acquisition module 310 is used to acquire target barrage data of a preset character string structure, wherein the preset character string structure includes a first preset identifier and a second preset identifier; a character verification module 320 , used to call the character verification function in the bullet chat data object storing the target bullet chat data, and perform character verificati...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com