Method for controlling virtual object to attack, terminal and storage medium

A virtual object and target object technology, applied in the computer field, can solve problems such as single operation mode and cumbersome virtual object steps, and achieve the effect of simplifying the attack process, enriching attack methods, and improving attack efficiency

Active Publication Date: 2020-01-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF3 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, a terminal and a storage medium for controlling virtual objects to attack, which can be used to solve the problem of cumbersome and cumbersome steps to kill other virtual objects one by one in related technologies when the number of other virtual objects is large and the distance is relatively short. For the single problem, the technical solution is as follows:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for controlling virtual object to attack, terminal and storage medium
  • Method for controlling virtual object to attack, terminal and storage medium
  • Method for controlling virtual object to attack, terminal and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0037] First of all, the nouns involved in the embodiments of this application are introduced:

[0038] Virtual Environment: is the virtual environment displayed (or provided) by the application when it is run on the terminal. The virtual environment can be a simulation environment of the real world, a semi-simulation and semi-fictional environment, or a purely fictitious environment. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for controlling a virtual object to attack, a terminal and a storage medium, and relates to the field of computers. The method comprises the following steps: displaying a user interface, wherein the user interface comprises a virtual environment picture and a skill attack control, and the virtual environment picture is a picture for observing a virtual environmentfrom the perspective of a virtual object; when receiving a first trigger operation on the skill attack control, displaying a skill release range on the peripheral side of the virtual object; when receiving a second trigger operation on the skill attack control, controlling the virtual object to release the skill in the skill release range; and performing knock-out processing on the target objectin the skill release range. According to the method, a plurality of target objects can be instantly knocked out under the condition that the number of the target objects is large and the target objects are close, the attack process of the virtual objects is simplified while the attack modes of the virtual objects are enriched, and the attack efficiency of the virtual objects is improved.

Description

technical field [0001] The present application relates to the computer field, in particular to a method, terminal and storage medium for controlling virtual objects to attack. Background technique [0002] In applications based on 3D virtual environments, such as first-person shooting games, users can manipulate virtual objects in the virtual environment to perform actions such as walking, running, climbing, shooting, fighting, etc., and multiple users can team up online at the same time. Collaborate on a task in a virtual environment. [0003] In related technologies, virtual objects can be equipped with virtual props (such as guns), and users control virtual objects to use virtual props to attack other virtual objects. Users can choose appropriate virtual props to attack according to different combat modes. [0004] However, the virtual props in the related art are generally applicable to the situation where the number of other virtual objects to be attacked is small. Whe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): A63F13/2145A63F13/52A63F13/56A63F13/837
CPCA63F13/52A63F13/2145A63F13/837A63F13/56
Inventor 刘智洪
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products