CN116489413A - Information processing method, device, apparatus and storage medium - Google Patents

Information processing method, device, apparatus and storage medium Download PDF

Info

Publication number
CN116489413A
CN116489413A CN202210551925.XA CN202210551925A CN116489413A CN 116489413 A CN116489413 A CN 116489413A CN 202210551925 A CN202210551925 A CN 202210551925A CN 116489413 A CN116489413 A CN 116489413A
Authority
CN
China
Prior art keywords
target
virtual
identifier
broadcasting room
live broadcasting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210551925.XA
Other languages
Chinese (zh)
Inventor
王明亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dajia Internet Information Technology Co Ltd
Original Assignee
Beijing Dajia Internet Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dajia Internet Information Technology Co Ltd filed Critical Beijing Dajia Internet Information Technology Co Ltd
Priority to CN202210551925.XA priority Critical patent/CN116489413A/en
Publication of CN116489413A publication Critical patent/CN116489413A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0884Network architectures or network communication protocols for network security for authentication of entities by delegation of authentication, e.g. a proxy authenticates an entity to be authenticated on behalf of this entity vis-à-vis an authentication entity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the application provides an information processing method, information processing equipment, information processing device and storage medium. When a user initiates an acquisition request for a virtual object in a living broadcast room, the server can encrypt according to information in the acquisition request and the acquired virtual object information to generate a target token for determining whether a target virtual object configured for the target living broadcast room is effective, so that when the user initiates a configuration request for the target virtual object in the target living broadcast room, whether the identities of the user initiating the acquisition request and the configuration request for the virtual object in the living broadcast room are consistent, whether the living broadcast room where the user is changes and whether the target virtual object configured currently is effective are checked according to the target token. In this way, the encryption, decryption and verification of the interactive data between the client and the server are completed by the server, so that the risk that the encryption algorithm is maliciously cracked by other terminals can be reduced, and the timeliness and safety of the encryption algorithm update are improved.

Description

Information processing method, device, apparatus and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to an information processing method, an information processing device, an information processing apparatus, and a storage medium.
Background
Live broadcast is now popular in various industries, and users can present virtual items to a host in a live broadcast room to express favorites and support for the host. Typically, the virtual items that a user sees in different live rooms are different, as are the virtual items that are seen in different scenes of the same live room, and these visible virtual items can be considered as valid virtual items. However, in a live broadcast scene, other terminals often give invalid virtual articles to a host through a simulation client to request a server so as to achieve the purpose of drainage and influence the ecology of the host; for example, other terminals may simulate users giving to the host virtual items that are not yet online in the testing phase, or virtual items that are not visible in the current scene of the current live room, etc.
Therefore, it is necessary to check the validity of the virtual items presented to the host by the user to determine whether the virtual items presented by the user are valid.
Disclosure of Invention
The application provides an information processing method, equipment, a device and a storage medium, which are used for verifying the effectiveness of virtual articles presented to a host by a user in a live broadcast scene, so as to avoid being attacked by malicious agents and break live broadcast ecology.
The embodiment of the application provides an information processing method, which comprises the following steps: receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room; according to the target live broadcasting room identification, a virtual article list corresponding to the target live broadcasting room and virtual article identifications corresponding to the virtual articles are obtained; encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is valid or not, and returning the target token to the client; receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcast room, and determining whether the target virtual object configured in the target live broadcast room is effective or not according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client; the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
In an alternative embodiment, determining whether the target virtual item configured for the target live room is valid according to the configuration request includes: the target token is analyzed by an encryption algorithm, and a first user identifier, a target live broadcasting room identifier and various virtual object identifiers which are included in the target token are obtained; determining whether a second user identifier, a target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with a first user identifier, a target live broadcasting room identifier and each virtual article identifier in the target token; and if the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid, and if the virtual objects are inconsistent, determining that the virtual objects are invalid and returning virtual object configuration failure information to the client.
In an alternative embodiment, the method further comprises: generating a time stamp corresponding to the acquisition request initiated by the client under the condition that the acquisition request is received; encrypting the first user identification, the target live room identification and each virtual item identification to generate a target token for determining whether the virtual item configured for the target live room is valid, wherein the target token comprises: encrypting the time stamp, the first user identification, the target live broadcasting room identification and each virtual article identification by adopting a first encryption algorithm, and generating a token for determining whether the virtual article configured for the target live broadcasting room is valid or not; or, encrypting the first user identifier and the target live broadcasting room identifier by adopting a second encryption algorithm to generate an initial token; encrypting the time stamp, the initial token and each virtual item identifier by adopting a third encryption algorithm, and generating a token for determining whether the virtual item configured for the target live broadcast room is valid or not; wherein the first encryption algorithm is the same as or different from the second encryption algorithm and the third encryption algorithm, and the second encryption algorithm and the third encryption algorithm are different.
In an alternative embodiment, the method further comprises: if the target token is generated by adopting a first encryption algorithm, the target token is subjected to first encryption algorithm analysis to obtain a first user identifier, a target live broadcasting room identifier, each virtual article identifier and the timestamp in the target token; if the target token is generated by adopting a second encryption algorithm and a third encryption algorithm, the target token is subjected to third encryption algorithm analysis to obtain each virtual article identifier, the time stamp and the initial token in the target token; and if the configuration request is determined to be in the validity period according to the current system time and the timestamp, executing the operation of determining whether the target virtual object configured for the target live broadcasting room is valid according to the configuration request.
In an alternative embodiment, determining whether the target virtual item configured for the target live room is valid according to the configuration request includes: if the target token is generated by adopting a first encryption algorithm, determining whether a second user identifier, a target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with a first user identifier, a target live broadcasting room identifier and each virtual article identifier in the target token; if the target token is generated by adopting a second encryption algorithm and a third encryption algorithm, the initial token is subjected to second encryption algorithm analysis to obtain a first user identifier and a target live broadcasting room identifier in the initial token, and whether a second user identifier, a target live broadcasting room identifier and virtual article identifiers in the configuration request are consistent with the first user identifier and the target live broadcasting room identifier in the initial token and the virtual article identifiers in the target token is determined; or, encrypting a second user identifier and a target live broadcasting room identifier in the configuration request by adopting a second encryption algorithm to obtain a current token, and determining whether each virtual article identifier in the configuration request is consistent with each virtual article identifier in the target token under the condition that the current token is consistent with the initial token; if the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
In an optional embodiment, the obtaining request further includes a target scene identifier corresponding to a target scene where the target live broadcasting room is located, and obtaining, according to the target live broadcasting room identifier, a virtual article list corresponding to the target live broadcasting room and virtual article identifiers corresponding to the virtual articles therein, further includes: according to the target live broadcasting room identification and the target scene identification, a virtual article list corresponding to the target live broadcasting room in the target scene and virtual article identifications corresponding to the virtual articles in the virtual article list are obtained; correspondingly, the target token further comprises the target scene identifier, the configuration request further comprises a second scene identifier, and whether the target virtual object configured for the target live broadcasting room is valid or not is determined according to the configuration request, and the method further comprises the following steps: determining whether a second scene identifier in the configuration request is consistent with a target scene identifier in the target token; if the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
In an alternative embodiment, in case it is determined that the virtual object configured for the target live room is valid, the method further comprises: acquiring scene information corresponding to the target live broadcasting room according to the target scene identifier so as to determine whether the target scene is online; acquiring the stock or configured quantity of the target virtual article according to the target virtual article identifier so as to determine whether the stock of the target virtual article is sufficient or whether the stock of the target virtual article reaches a configured upper limit threshold; and if the target scene is online, the target virtual article inventory is sufficient, and the configuration quantity does not reach the configuration upper limit threshold, executing the operation of configuring the target virtual article to the target live broadcast room, and updating the inventory and the configured quantity of the target virtual article.
The embodiment of the application also provides information processing equipment, which comprises: a display, a processor, and a memory storing a computer program; the processor is configured to execute the computer program for: receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room; according to the target live broadcasting room identification, a virtual article list corresponding to the target live broadcasting room and virtual article identifications corresponding to the virtual articles are obtained; encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is valid or not, and returning the target token to the client; receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcasting room, and determining whether the target virtual object configured in the target live broadcasting room is effective or not according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client; the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
The embodiment of the application also provides an information processing device, which comprises: the device comprises a receiving module, an acquisition module, a first processing module and a second processing module; wherein: the receiving module is used for receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room; the acquisition module is used for acquiring a virtual article list corresponding to the target live broadcasting room and virtual article identifiers corresponding to the virtual articles according to the target live broadcasting room identifier; the first processing module is used for encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token used for determining whether the virtual article configured in the target live broadcasting room is valid or not, and returning the target token to the client; the second processing module is used for receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcast room, and determining whether the target virtual object configured in the target live broadcast room is effective or not according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client; the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
Embodiments also provide a computer-readable storage medium, which when executed by a processor of an information processing apparatus, enables the information processing apparatus to perform the steps of any one of the method embodiments.
Embodiments of the present application also provide a computer program product comprising a computer program/instruction which, when executed by a processor, implements the steps of any of the method embodiments.
In the embodiment of the present application, when receiving a configuration request initiated by a client for configuring a target virtual object in a target living broadcast room, a server may encrypt information such as a user identifier for initiating the configuration request currently, a living broadcast room identifier where a user is located, a scene identifier corresponding to the living broadcast room, and a virtual object identifier corresponding to a current scene, so as to generate a target token for determining whether the virtual object configured in the target living broadcast room is valid, so that when receiving the configuration request initiated by the client for configuring the target virtual object in the target living broadcast room, the server checks whether the user identity for initiating the configuration request for the virtual object list is consistent with the user identity for initiating the configuration request, whether the scene between the living broadcast room where the user is located changes, and whether the currently configured target virtual object is valid according to the information such as the user identifier for initiating the configuration request, the living broadcast room identifier, the scene identifier corresponding to the living broadcast room, and the identifier of the target virtual object. The encryption, decryption and verification of the interactive data between the client and the server are completed by the server, so that the risk that the encryption algorithm is maliciously cracked by other terminals can be reduced, and the timeliness and the safety of the updating of the encryption algorithm are improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application and do not constitute an undue limitation on the application.
FIG. 1a is a flowchart of an information processing method according to an embodiment of the present application;
FIG. 1b is a signaling diagram of an information processing procedure provided in real time in the present application;
fig. 2 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application.
Detailed Description
In order to enable those skilled in the art to better understand the technical solutions of the present application, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that embodiments of the present application described herein may be implemented in sequences other than those illustrated or otherwise described herein. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
In the existing live broadcast scenario, data interacted between a client and a server is generally encrypted and decrypted by the client, and when a user gives a virtual article to a host, the client also checks the validity of the virtual article given by the user. However, other terminals can easily acquire the encryption algorithm and the secret key of the client through a mode of reversely analyzing the encryption algorithm of the client, so that the client is simulated to give invalid gifts to the anchor, and the living broadcast ecology is disturbed. And the encryption, decryption and verification of the data are realized by the client, when the encryption algorithm needs to be modified, the algorithm update can be realized only by depending on the version update of the client application, and during the period, if the encryption algorithm of the client is broken maliciously by other terminals, the encryption algorithm also needs to be modified again. Therefore, the data is encrypted, decrypted and checked in the mode, so that the timeliness is poor and the security is low.
Therefore, the embodiment of the application provides an information processing method, which is suitable for a server, and is used for completing encryption, decryption and verification of interaction data between a client and the server by the server, wherein the client only needs to simply store and forward the data encrypted by the server, does not need to understand the true meaning of the data, and has higher safety for the client.
Fig. 1a is a flowchart of an information verification method provided in an embodiment of the present application, where, as shown in fig. 1a, the method includes:
s1, receiving an acquisition request initiated by a client for a virtual object list in a target live broadcast room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcast room identifier corresponding to the target live broadcast room;
s2, acquiring a virtual article list corresponding to the target living broadcast room and virtual article identifiers corresponding to the virtual articles according to the target living broadcast room identifiers;
s3, encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is effective or not, and returning the target token to the client;
s4, receiving a configuration request initiated by the client for configuring the target virtual object in the target live broadcasting room, and determining whether the target virtual object configured in the target live broadcasting room is effective or not according to the configuration request;
s5, if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client;
the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
In the embodiment of the application, the server can receive an acquisition request initiated by the client for the virtual object in the live broadcasting room, acquire a virtual object list corresponding to the live broadcasting room according to the live broadcasting room identification in the acquisition request, encrypt the user identification in the acquisition request, the live broadcasting room identification and the virtual object identification in the virtual object list, generate a target token for determining whether the virtual object configured for the target live broadcasting room is effective or not, and return the target token to the client so as to check whether the virtual object configured for the target live broadcasting room by the user is effective or not according to the target token when the user configures the virtual object for the target live broadcasting room; the virtual articles are configured to the target living broadcast room by the user, namely the user gives the virtual articles to the anchor corresponding to the target living broadcast room, and the effective virtual articles are any virtual articles in the virtual article list. Further, in the case that the server receives a configuration request initiated by the client for configuring the target virtual object in the target living broadcast room, for example, the user initiates a virtual object gift request to a host broadcast corresponding to the target living broadcast room, the server may determine, according to a target token included in the virtual object gift request, the user who acquires the virtual object list and the living broadcast room to which the virtual object list belongs before acquiring the virtual object list, so as to check whether the virtual object gift request initiated by the client is valid; further, whether the virtual article to be presented is any virtual article in the virtual article list or not can be determined according to the virtual article identifier corresponding to the virtual article to be presented in the virtual article presenting request and the virtual article identifier corresponding to the virtual article list in the target token, so as to determine whether the virtual article to be presented is effective or not.
In general, in live broadcast scenes, virtual articles that a user can see in different live broadcast rooms are different, and virtual articles that a user can see in different scenes in the same live broadcast room are also different. In the embodiment of the application, the specific mode for acquiring the virtual object list in the live broadcasting room is not limited, and can be determined according to the specific situation of the live broadcasting room; for example, in the case where the live broadcasting room only includes one scene, the method in the above embodiment may be adopted to directly obtain the virtual object list corresponding to the live broadcasting room according to the identifier of the live broadcasting room; for another example, when the live broadcasting room includes multiple scenes, the virtual object list corresponding to the different scenes may be acquired for the different scenes. Based on this, in an alternative embodiment of the present application, the acquisition request initiated by the client for the virtual object in the live broadcast room may further include a scene identifier corresponding to the live broadcast room, and if the server receives the acquisition request, the server may parse the corresponding live broadcast room identifier and the scene identifier from the acquisition request, and acquire the virtual object list corresponding to the current scene in the live broadcast room according to the live broadcast room identifier and the scene identifier in the acquisition request.
In the embodiment of the present application, a specific manner of generating the Target Token is not limited. In an optional embodiment, the server may splice the user identifier, the live broadcast room identifier, the scene identifier and the virtual item identifier in the virtual item list in the acquisition request into a character string, and encrypt the spliced character string by using a first encryption algorithm to obtain the target token for checking whether the virtual item to be presented is valid. In another optional embodiment, when the client initiates an acquisition request for a virtual object in the live broadcast room, a timestamp corresponding to the acquisition request initiated by the client can be generated, and the timestamp is carried in the acquisition request and sent to the server; or, the server may also generate a timestamp corresponding to the acquisition request initiated by the client for the virtual object in the live broadcast room when receiving the acquisition request; further, the server may splice the timestamp and the user identifier, the live broadcasting room identifier, the scene identifier, and the virtual item identifier in the virtual item list into a character string, and encrypt the spliced character string by using a first encryption algorithm, so as to obtain a target token for checking whether the virtual item to be presented is valid. In another optional embodiment, the server may further splice the user identifier, the live broadcast room identifier and the scene identifier in the acquisition request into a first string, encrypt the first string with a second encryption algorithm to obtain an initial token, splice the timestamp, the initial token and the virtual item identifier in the virtual item list into a second string, and encrypt the second string with a third encryption algorithm to obtain the target token for checking whether the virtual item to be presented is valid.
It should be noted that, in the above embodiment, which mode is specifically adopted to generate the target token may be flexibly selected according to actual requirements, which is not limited herein; optionally, the first encryption algorithm is the same as or different from the second encryption algorithm and the third encryption algorithm, and the second encryption algorithm and the third encryption algorithm are different; the second encryption algorithm and the third encryption algorithm are adopted for encryption, so that the security of the target token is improved, and the length of the target token is shortened.
In the embodiment of the present application, the specific forms of the first encryption algorithm, the second encryption algorithm and the third encryption algorithm are not limited, and optionally, the first encryption algorithm, the second encryption algorithm and the third encryption algorithm may be symmetric encryption algorithms or asymmetric encryption algorithms; further alternatively, the second encryption algorithm may be an asymmetric encryption algorithm, the third encryption algorithm may be a symmetric encryption algorithm, and the like, without limitation. For example, the first encryption algorithm and the third encryption algorithm are the same, both are symmetric encryption algorithms of an advanced encryption standard algorithm (Advanced Encryption Standard, AES), and the second encryption algorithm is an asymmetric encryption algorithm of a secure hash algorithm (Secure Hash Algorithm, SHA); further alternatively, the first encryption algorithm and the third encryption algorithm may use any one of a 128-bit key, a 192-bit key, or a 256-bit key, and the third encryption algorithm may use any one of a SHA-1, a SHA-224, a SHA-256, a SHA-384, or a SHA-512, and specifically, which manner may be determined according to the length of the concatenated string, which is not limited herein.
Further optionally, after generating the target token for checking whether the virtual article to be presented is valid, the server may return the target token to the client, so as to check whether the virtual article presentation request initiated by the user for the current live broadcast room or the current scene of the live broadcast room is valid according to the target token when the client initiates the virtual article presentation request, and check whether the virtual article presented by the user is valid. Optionally, in the case that the live broadcasting room includes multiple scenes, the virtual article presentation request initiated by the client may further include a scene identifier corresponding to the live broadcasting room, and the server may obtain, when receiving the virtual article presentation request initiated by the client, the user identifier, the live broadcasting room identifier, the virtual article identifier corresponding to the virtual article to be presented, and the target token from the virtual article presentation request.
In an optional embodiment, if the target token is generated by encrypting by a first encryption algorithm and the target token does not include a timestamp corresponding to the request for acquiring the virtual object in the living broadcast room initiated by the client, the server may analyze the target token by the first encryption algorithm when receiving the virtual object gift request initiated by the client, so as to obtain the user identifier, the living broadcast room identifier, the scene identifier and the virtual object identifier in the virtual object list included in the target token. Based on the comparison result of the user identifier, the live broadcasting room identifier and the scene identifier in the virtual article presentation request and the user identifier, the live broadcasting room identifier and the scene identifier in the target token, the server can determine whether the virtual article presentation request is effective or not; and if the virtual article presentation request is valid, checking whether the virtual article to be presented is valid or not according to the virtual article identifier corresponding to the virtual article to be presented and the virtual article identifier in the virtual article list.
In another optional embodiment, if the target token is generated by encrypting by a first encryption algorithm, but the target token includes a timestamp corresponding to the request for initiating the acquisition of the virtual object in the living broadcast room by the client, the server may analyze the target token by the first encryption algorithm when receiving the request for giving the virtual object initiated by the client, so as to obtain a user identifier, a living broadcast room identifier, a scene identifier included in the target token, a virtual object identifier in the virtual object list, and a timestamp corresponding to the request for initiating the acquisition of the virtual object in the living broadcast room by the client; based on the above, the server can determine whether the virtual object to be presented is in the presentation available period according to the difference value of the time stamp in the current system time and the target token, and determine whether the virtual object presentation request is valid according to the comparison result of the user identifier, the live broadcasting room identifier and the scene identifier in the virtual object presentation request and the user identifier, the live broadcasting room identifier and the scene identifier in the target token when the virtual object to be presented is determined to be in the presentation available period; and if the virtual article presentation request is valid, checking whether the virtual article to be presented is valid or not according to the virtual article identifier corresponding to the virtual article to be presented and the virtual article identifier in the virtual article list.
It should be noted that, in the above embodiment, whether the current virtual article gift request is valid is determined from two aspects, that is, whether the virtual article to be gift is within the giftable validity period is determined from determining whether the current virtual article gift request is valid; another aspect is determining whether the current virtual item presentation request is valid from determining whether the identity of the user initiating the virtual item column acquisition request and the virtual item presentation request are consistent and whether the live or live room scene in which the user is located is changed.
In the embodiment of the present application, the specific duration of the donatable valid period of the virtual article to be donated is not limited, and the donatable valid period may be a preset fixed duration, for example, a corresponding donatable valid period is set for each virtual article information when configuring the virtual article information; the maximum allowable duration of each live broadcast may also be, for example, when each live broadcast information is configured, the corresponding maximum live broadcast duration is set for each live broadcast information, or when a unified maximum live broadcast is configured for all live broadcasts, the maximum allowable duration may be specifically determined according to the actual situation. Further optionally, when determining the donation valid period of the virtual article to be donated, the donation valid period corresponding to the information of the virtual article to be donated may be directly obtained, or the maximum duration allowed by the current live broadcast may be obtained, and if the difference between the current system time and the timestamp in the target token is greater than the donation valid period of the virtual article to be donated, it is determined that the virtual article donation request is invalid. And under the condition that the user requesting to acquire the virtual article list is the same as the user currently initiating the virtual article presentation, and the scene of the live broadcast or the live broadcast room where the user is when requesting to acquire the virtual article list is the same as the scene of the live broadcast or the live broadcast room where the user currently initiating the virtual article presentation, determining that the current virtual article presentation request is valid, otherwise determining that the current virtual article presentation request is invalid. Further, in the case that the current virtual article gift request is determined to be invalid, the server may return a prompt message such as a gift failure or a gift invalidation to the client to prompt the user that the virtual article cannot be gift.
In another optional embodiment, if the target token is generated by the second encryption algorithm and the third encryption algorithm and the target token includes a timestamp corresponding to the acquisition request initiated by the client for the virtual article in the living broadcast room, the server may analyze the target token by the third encryption algorithm when receiving the virtual article presentation request initiated by the client, obtain the virtual article identifier in the virtual article list, the timestamp corresponding to the acquisition request initiated by the client for the virtual article in the living broadcast room and the initial token, and determine whether the virtual article to be presented is in the valid presentation period according to the difference between the current system time and the timestamp; further, if the virtual article to be presented is in the valid presentation period, it can be further determined whether the identity of the user initiating the virtual article column acquisition request and the virtual article presentation request is consistent, whether the scene of the live broadcast or the live broadcast room where the user is located is changed, whether the current virtual article presentation request is valid or not, and if the virtual article presentation request is determined to be valid, whether the virtual article to be presented is valid or not is further checked.
In the embodiment of the present application, a specific manner of further determining whether the current virtual article gift request is valid is not limited, and the determination manner may be different according to the difference of the second encryption algorithm. If the second encryption algorithm supports reverse analysis, the server can analyze the initial token through the second encryption algorithm to obtain a user identifier, a live broadcasting room identifier and a scene identifier which are included in the initial token; further, whether the virtual article presentation request is valid or not can be determined according to the comparison result of the user identifier, the live broadcasting room identifier and the scene identifier in the virtual article presentation request and the user identifier, the live broadcasting room identifier and the scene identifier in the initial token. If the second encryption algorithm does not support reverse analysis, the server can splice the user identifier, the live broadcasting room identifier and the scene identifier in the virtual article presentation request into a character string, and encrypt the spliced character string by adopting the second encryption algorithm to obtain the current token; further, comparing the current token with the initial token, if the current token is the same as the initial token, determining that the user identity initiating the acquisition request and the virtual article presentation request aiming at the virtual article list is consistent, and that the scene of the live broadcast or the live broadcast room where the user is not changed, namely that the current virtual article presentation request is effective; if the current token and the initial token are different, determining that the identities of the users initiating the acquisition request and the virtual article presentation request aiming at the virtual article list are inconsistent or the scene of the live broadcast or the live broadcast room where the users are located is changed, namely, the current virtual article presentation request is invalid.
Further, if the virtual article presentation request is determined to be effective, checking whether the virtual article to be presented is effective or not according to the virtual article identifier corresponding to the virtual article to be presented and the virtual article identifier in the virtual article list; if the virtual article to be presented is not in the virtual article list, determining that the virtual article to be presented is invalid, and returning prompt information such as presentation failure or incapability of being presented to the client by the server; if the virtual object to be presented is in the virtual object list, the server determines that the virtual object to be presented is invalid, and can further determine whether other information meets the presentation requirement. For example, for a live scene without online presentation of virtual articles to a host, the server may obtain scene information corresponding to the live broadcasting room according to the scene identifier, and determine whether the current scene corresponding to the live broadcasting room is online; for another example, the number of allowed gifts for different virtual items may be different, the number of gifts for some virtual items may have an upper threshold, the server may obtain an inventory or a number of gifts for the virtual items to be gifted based on the virtual item identification of the virtual items to be gifted, determine whether the inventory of the virtual items to be gifted is sufficient or has reached the upper threshold, and so on. Of course, in the actual live broadcast scene, other information affecting the giving of the virtual article may also be included, and specific verification may be specifically performed according to the actual situation, which is not limited herein. Based on the above, the server may give the virtual articles to be given to the anchor, update the inventory and the given amount of the virtual articles to be given, and return a presentation success prompt message to the client under the conditions that the virtual articles to be given are valid, the current scene corresponding to the living broadcast room is online, the inventory of the virtual articles to be given is sufficient, and the given amount does not reach the presentation upper limit threshold.
In the embodiment of the application, the server comprises a plurality of services, and different services are provided with different data and information. For example, in the above embodiment, the information corresponding to the live room may be stored in the live service, the virtual item list and the detailed information of the virtual item may be stored in the virtual item service, the process of generating the token may be completed by the encryption escrow service, and so on. FIG. 1b shows an overall implementation process of an embodiment of the present application, where, as shown in FIG. 1b, a user accesses a virtual item list in a current scene of a live broadcast room at a client, and may send an acquisition request to a live broadcast service in a server; when the live broadcast service receives the acquisition request, the live broadcast service can access the virtual article service according to the information in the acquisition request, and acquire a corresponding virtual article list and virtual article detailed information; further, the virtual article service may generate a corresponding virtual article list and virtual article information according to the user identifier, the live broadcasting room identifier, and the scene identifier of the live broadcasting room in the acquisition request, and send the received information and the identifier information in the generated virtual article list to the encryption hosting service, so as to acquire a target token for checking whether the virtual article to be presented is valid from the encryption hosting service; the encryption hosting service can encrypt the received information through an encryption algorithm to generate a target token for checking whether the virtual article to be presented is valid or not, and returns information such as a virtual article list, the target token and the like to the client through the virtual article service and the live broadcast service, so that the client can display the virtual article list.
Further, as shown in fig. 1b, when receiving the virtual article presentation request sent by the client, the live broadcast service of the server may send information in the virtual article presentation request to the encrypted hosting service through the live broadcast service and the virtual article service; the encryption hosting service can analyze the received information to obtain information such as a target token, a user identifier, a live broadcasting room scene identifier, an identifier of a virtual object to be presented and the like which are used for initiating a virtual object presentation request currently, and verify the user, the live broadcasting room scene and the virtual object to be presented which are used for initiating the virtual object presentation request previously according to the information in the target token; further, the encryption escrow service may return the verification result to the client through the virtual goods service and the live broadcast service to inform the client that the success of the gift is a failure.
In the embodiment of the present application, when receiving an acquisition request initiated by a client for a virtual object in a living broadcast room, a server may encrypt information such as a user identifier that initiates the acquisition request currently, a living broadcast room identifier that a user is located, a scene identifier that corresponds to the living broadcast room, and a virtual object identifier that corresponds to the current scene, to generate a target token that is used to check whether a virtual object to be given is valid, so as to check, when receiving the virtual object giving request initiated by the client, whether the acquisition request initiated for a virtual object list is consistent with the user identifier that initiates the virtual object giving request, whether a scene change between the living broadcast room that the user is located, or the living broadcast room that the user is located, and whether the virtual object to be given currently is valid, according to the information such as the target token and the user identifier that initiates the virtual object giving request, the living broadcast room identifier that the user is located, the scene identifier that corresponds to the living broadcast room, and the virtual object to be given. The encryption, decryption and verification of the interactive data between the client and the server are completed by the server, so that the risk that the encryption algorithm is maliciously cracked by other terminals can be reduced, and the timeliness and the safety of the updating of the encryption algorithm are improved.
It should be noted that, the specific implementation manner in the overall process may be referred to the above embodiment, which is not described herein. In the above embodiment, the server does not store the target token when generating the target token, but sends the target token to the client to be stored by the client, and when the client initiates the virtual article presentation request, sends the target token to the server together, so that the server can verify the virtual article presentation request according to the target token. Of course, in a specific embodiment, the server may also store the target token, so that the target token can still be checked correctly when the target token is changed during the storage or the storage process of the client, and the specific implementation manner may be determined according to the requirement and is not limited herein. The execution subjects of the steps of the method provided in the above embodiment may be the same device, or the method may be executed by different devices. For example, the execution subject of step S1 to step S5 may be the device a; for another example, the execution subject of step S1 and step S2 may be the device a, and the execution subject of step S3 to step S5 may be the device B; etc.
In addition, in some of the flows described in the above embodiments and the drawings, a plurality of operations appearing in a specific order are included, but it should be clearly understood that the operations may be performed out of the order in which they appear herein or performed in parallel, the sequence numbers of the operations, such as S1, S2, etc., are merely used to distinguish between the various operations, and the sequence numbers themselves do not represent any order of execution. In addition, the flows may include more or fewer operations, and the operations may be performed sequentially or in parallel. It should be noted that, the descriptions of "first" and "second" herein are used to distinguish different messages, devices, modules, etc., and do not represent a sequence, and are not limited to the "first" and the "second" being different types.
The embodiment of the application also provides an information processing device, fig. 2 is a schematic structural diagram of the information processing device provided in the embodiment of the application, and as shown in fig. 2, the information processing device includes: a processor 21, a memory 22 storing a computer program and a display 23. Wherein the processor 21 and the memory 22 may be one or more.
The memory 22 is mainly used for storing computer programs, and the computer programs can be executed by the processor, so that the processor controls the processor 21 to realize corresponding functions, complete corresponding actions or tasks by using the information processing device. In addition to storing computer programs, the memory may be configured to store various other data to support operations on the processor 21 using the information processing device, examples of which include instructions for any application or method operating on the processor 21 using the information processing device.
The memory 22 may be implemented by any type or combination of volatile or nonvolatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disk.
In the embodiment of the present application, the implementation form of the processor 21 is not limited, and may be, for example, but not limited to, a CPU, GPU, MCU, or the like. The processor 21 may be regarded as a control unit of the information processing apparatus and may be used to execute a computer program stored in the memory 22 for controlling the information processing apparatus to perform the respective functions, to perform the respective actions or tasks. It should be noted that, depending on the implementation form of the information processing apparatus and the scene in which the information processing apparatus is located, the functions, actions or tasks to be implemented and completed will be different; accordingly, the computer programs stored in the memory 22 may also be different, and the execution of the different computer programs by the processor 21 may control the information processing apparatus to perform different functions, perform different actions or tasks.
In some alternative embodiments, as shown in fig. 2, the information processing apparatus may further include: communication component 24 and power supply component 25, among other components. Only a part of the components are schematically shown in fig. 2, which does not mean that the information processing apparatus only comprises the components shown in fig. 2, but that the information processing apparatus may also comprise other components for different application needs, depending on the product form of the information processing apparatus.
In the present embodiment, when the processor 21 executes the computer program in the memory 22, it is used to: receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room; according to the target live broadcasting room identification, a virtual article list corresponding to the target live broadcasting room and virtual article identifications corresponding to the virtual articles are obtained; encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is valid or not, and returning the target token to the client; receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcasting room, and determining whether the target virtual object configured in the target live broadcasting room is effective or not according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client; the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
In an alternative embodiment, the processor 21 is configured to, in response to the configuration request, determine whether the target virtual item configured for the target live room is valid: the target token is analyzed by an encryption algorithm, and a first user identifier, a target live broadcasting room identifier and various virtual object identifiers which are included in the target token are obtained; determining whether a second user identifier, a target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with a first user identifier, a target live broadcasting room identifier and each virtual article identifier in the target token; if the virtual objects are consistent, the virtual objects configured in the target live broadcasting room are determined to be valid, if the virtual objects are inconsistent, the virtual objects are determined to be invalid, and virtual object configuration failure information is returned to the client.
In an alternative embodiment, processor 21 is further configured to: generating a time stamp corresponding to the acquisition request initiated by the client under the condition of receiving the acquisition request; encrypting the first user identification, the target live room identification and each virtual item identification to generate a target token for determining whether the virtual item configured for the target live room is valid, including: encrypting the time stamp, the first user identification, the target live broadcast room identification and each virtual article identification by adopting a first encryption algorithm, and generating a token for determining whether the virtual article configured for the target live broadcast room is valid or not; or, encrypting the first user identifier and the target live broadcasting room identifier by adopting a second encryption algorithm to generate an initial token; encrypting the time stamp, the initial token and each virtual item identifier by adopting a third encryption algorithm to generate a token for determining whether the virtual item configured for the target live broadcasting room is valid or not; the first encryption algorithm is the same as or different from the second encryption algorithm and the third encryption algorithm, and the second encryption algorithm and the third encryption algorithm are different.
In an alternative embodiment, processor 21 is further configured to: if the target token is generated by adopting the first encryption algorithm, the target token is analyzed by the first encryption algorithm to obtain a first user identifier, a target live broadcasting room identifier, each virtual article identifier and a time stamp in the target token; if the target token is generated by adopting the second encryption algorithm and the third encryption algorithm, the target token is analyzed by the third encryption algorithm, and each virtual article identifier, time stamp and initial token in the target token are obtained; in the case that the configuration request is determined to be within the validity period according to the current system time and the time stamp, an operation of determining whether the target virtual item configured for the target live broadcasting room is valid according to the configuration request is performed.
In an alternative embodiment, the processor 21 is configured to, in response to the configuration request, determine whether the target virtual item configured for the target live room is valid: if the target token is generated by adopting the first encryption algorithm, determining whether the second user identification, the target live broadcasting room identification and the virtual object identifications in the configuration request are consistent with the first user identification, the target live broadcasting room identification and the virtual object identifications in the target token; if the target token is generated by adopting a second encryption algorithm and a third encryption algorithm, the initial token is subjected to second encryption algorithm analysis to obtain a first user identifier and a target live broadcasting room identifier in the initial token, and whether the second user identifier, the target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with the first user identifier and the target live broadcasting room identifier in the initial token and each virtual article identifier in the target token is determined; or, encrypting the second user identifier and the target live broadcasting room identifier in the configuration request by adopting a second encryption algorithm to obtain a current token, and determining whether each virtual article identifier in the configuration request is consistent with each virtual article identifier in the target token under the condition that the current token is consistent with the initial token; if the virtual objects are consistent, the virtual objects configured in the target live broadcasting room are determined to be effective; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
In an optional embodiment, the obtaining request further includes a target scene identifier corresponding to a target scene where the target live broadcast room is located, and the processor 21 is further configured to, when obtaining, according to the target live broadcast room identifier, a virtual article list corresponding to the target live broadcast room and virtual article identifiers corresponding to the virtual articles therein: according to the target live broadcasting room identification and the target scene identification, a virtual article list corresponding to the target live broadcasting room in the target scene and virtual article identifications corresponding to the virtual articles in the virtual article list are obtained; correspondingly, the target token further comprises a target scene identifier, the configuration request further comprises a second scene identifier, and whether the target virtual object configured for the target live broadcasting room is valid or not is determined according to the configuration request, and the method further comprises the following steps: determining whether the second scene identifier in the configuration request is consistent with the target scene identifier in the target token; if the virtual objects are consistent, the virtual objects configured in the target live broadcasting room are determined to be effective; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
In an alternative embodiment, the processor 21, in the event that it determines to be valid for the target virtual item configured for the target live room, is further configured to: acquiring scene information corresponding to a target live broadcasting room according to the target scene identification so as to determine whether the target scene is online; acquiring the stock or configured quantity of the target virtual article according to the target virtual article identification so as to determine whether the stock of the target virtual article is sufficient or whether the configured upper limit threshold value is reached; and if the target scene is online, the inventory of the target virtual articles is sufficient, and the configuration quantity does not reach the configuration upper limit threshold, executing the operation of configuring the target virtual articles to the target live broadcasting room, and updating the inventory and the configured quantity of the target virtual articles.
The embodiment of the application also provides an information processing device. For example, the information verification device may be implemented as a virtual device, such as an application, in the communication controller (Communication Control Unit, CCU). As shown in fig. 3, the information verification device includes a receiving module 301, an acquiring module 302, a first processing module 303, and a second processing module 304; the receiving module 301 is configured to receive an acquisition request initiated by a client for a virtual object list in a target live broadcast room, where the acquisition request at least includes a first user identifier corresponding to the client that initiates the request and a target live broadcast room identifier corresponding to the target live broadcast room; the acquiring module 302 is configured to acquire a virtual article list corresponding to the target live broadcast room and virtual article identifiers corresponding to the virtual articles therein according to the target live broadcast room identifier; the first processing module 303 is configured to encrypt the first user identifier, the target live broadcast room identifier, and each virtual item identifier, generate a target token for determining whether the virtual item configured for the target live broadcast room is valid, and return the target token to the client; the second processing module 304 is configured to receive a configuration request initiated by the client for configuring the target virtual object in the target live broadcast room, and determine whether the target virtual object configured in the target live broadcast room is valid according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client; the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not. It should be noted that, a specific manner of performing operations with respect to the above-described processor of the information processing apparatus and each module of the information processing device has been described in detail in the embodiments of the related method, and will not be described in detail herein.
Accordingly, the present application also provides a computer-readable storage medium storing a computer program, which when executed can implement the steps in the above-described method embodiments.
Accordingly, embodiments of the present application also provide a computer program product comprising a computer program/instruction which, when executed by a processor, implements the steps of the above-described method embodiments.
The communication assembly of the above embodiments is configured to facilitate wired or wireless communication between the device in which the communication assembly is located and other devices. The device where the communication component is located can access a wireless network based on a communication standard, such as a mobile communication network of WiFi,2G, 3G, 4G/LTE, 5G, etc., or a combination thereof. In one exemplary embodiment, the communication component receives a broadcast signal or broadcast-related information from an external broadcast management system via a broadcast channel. In one exemplary embodiment, the communication component further comprises a Near Field Communication (NFC) module to facilitate short range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, ultra Wideband (UWB) technology, bluetooth (BT) technology, and other technologies.
The display in the above-described embodiments includes a screen, which may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive input signals from a user. The touch panel includes one or more touch sensors to sense touches, swipes, and gestures on the touch panel. The touch sensor may sense not only the boundary of a touch or slide action, but also the duration and pressure associated with the touch or slide operation.
The power supply assembly in the above embodiment provides power for various components of the device in which the power supply assembly is located. The power components may include a power management system, one or more power sources, and other components associated with generating, managing, and distributing power for the devices in which the power components are located.
The audio component of the above embodiments may be configured to output and/or input audio signals. For example, the audio component includes a Microphone (MIC) configured to receive external audio signals when the device in which the audio component is located is in an operational mode, such as a call mode, a recording mode, and a speech recognition mode. The received audio signal may be further stored in a memory or transmitted via a communication component. In some embodiments, the audio assembly further comprises a speaker for outputting audio signals.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises the element.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (10)

1. An information processing method, characterized in that the method comprises:
Receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room;
according to the target live broadcasting room identification, a virtual article list corresponding to the target live broadcasting room and virtual article identifications corresponding to the virtual articles are obtained;
encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is valid or not, and returning the target token to the client;
receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcasting room, and determining whether the target virtual object configured in the target live broadcasting room is effective or not according to the configuration request;
if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client;
the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
2. The method of claim 1, wherein determining whether the target virtual item configured for the target live room is valid based on the configuration request comprises:
the target token is analyzed by an encryption algorithm, and a first user identifier, a target live broadcasting room identifier and various virtual object identifiers which are included in the target token are obtained;
determining whether a second user identifier, a target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with a first user identifier, a target live broadcasting room identifier and each virtual article identifier in the target token;
and if the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid, and if the virtual objects are inconsistent, determining that the virtual objects are invalid and returning virtual object configuration failure information to the client.
3. The method according to claim 2, wherein the method further comprises: generating a time stamp corresponding to the acquisition request initiated by the client under the condition that the acquisition request is received; encrypting the first user identification, the target live room identification and each virtual item identification to generate a target token for determining whether the virtual item configured for the target live room is valid, wherein the target token comprises:
Encrypting the time stamp, the first user identification, the target live broadcasting room identification and each virtual article identification by adopting a first encryption algorithm, and generating a token for determining whether the virtual article configured for the target live broadcasting room is valid or not;
or alternatively, the process may be performed,
encrypting the first user identifier and the target live broadcasting room identifier by adopting a second encryption algorithm to generate an initial token; encrypting the time stamp, the initial token and each virtual item identifier by adopting a third encryption algorithm, and generating a token for determining whether the virtual item configured for the target live broadcast room is valid or not;
wherein the first encryption algorithm is the same as or different from the second encryption algorithm and the third encryption algorithm, and the second encryption algorithm and the third encryption algorithm are different.
4. A method according to claim 3, characterized in that the method further comprises:
if the target token is generated by adopting a first encryption algorithm, the target token is subjected to first encryption algorithm analysis to obtain a first user identifier, a target live broadcasting room identifier, each virtual article identifier and the timestamp in the target token;
if the target token is generated by adopting a second encryption algorithm and a third encryption algorithm, the target token is subjected to third encryption algorithm analysis to obtain each virtual article identifier, the time stamp and the initial token in the target token;
And if the configuration request is determined to be in the validity period according to the current system time and the timestamp, executing the operation of determining whether the target virtual object configured for the target live broadcasting room is valid according to the configuration request.
5. The method of claim 4, wherein determining whether the target virtual item configured for the target live room is valid based on the configuration request comprises:
if the target token is generated by adopting a first encryption algorithm, determining whether a second user identifier, a target live broadcasting room identifier and each virtual article identifier in the configuration request are consistent with a first user identifier, a target live broadcasting room identifier and each virtual article identifier in the target token;
if the target token is generated by adopting a second encryption algorithm and a third encryption algorithm, the initial token is subjected to second encryption algorithm analysis to obtain a first user identifier and a target live broadcasting room identifier in the initial token, and whether a second user identifier, a target live broadcasting room identifier and virtual article identifiers in the configuration request are consistent with the first user identifier and the target live broadcasting room identifier in the initial token and the virtual article identifiers in the target token is determined; or, encrypting a second user identifier and a target live broadcasting room identifier in the configuration request by adopting a second encryption algorithm to obtain a current token, and determining whether each virtual article identifier in the configuration request is consistent with each virtual article identifier in the target token under the condition that the current token is consistent with the initial token;
If the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
6. The method according to any one of claims 1-5, wherein the obtaining request further includes a target scene identifier corresponding to a target scene where the target live broadcast room is located, and obtaining, according to the target live broadcast room identifier, a virtual item list corresponding to the target live broadcast room and virtual item identifiers corresponding to virtual items therein, further includes:
according to the target live broadcasting room identification and the target scene identification, a virtual article list corresponding to the target live broadcasting room in the target scene and virtual article identifications corresponding to the virtual articles in the virtual article list are obtained;
correspondingly, the target token further comprises the target scene identifier, the configuration request further comprises a second scene identifier, and whether the target virtual object configured for the target live broadcasting room is valid or not is determined according to the configuration request, and the method further comprises the following steps:
determining whether a second scene identifier in the configuration request is consistent with a target scene identifier in the target token;
If the virtual objects are consistent, determining that the virtual objects configured in the target live broadcasting room are valid; otherwise, determining invalidation and returning virtual article configuration failure information to the client.
7. The method of claim 6, wherein in the event that a determination is made that the target virtual item configured for the target live room is valid, the method further comprises:
acquiring scene information corresponding to the target live broadcasting room according to the target scene identifier so as to determine whether the target scene is online; acquiring the stock or configured quantity of the target virtual article according to the target virtual article identifier so as to determine whether the stock of the target virtual article is sufficient or whether the stock of the target virtual article reaches a configured upper limit threshold;
and if the target scene is online, the target virtual article inventory is sufficient, and the configuration quantity does not reach the configuration upper limit threshold, executing the operation of configuring the target virtual article to the target live broadcast room, and updating the inventory and the configured quantity of the target virtual article.
8. An information processing apparatus, characterized by comprising: a display, a processor, and a memory storing a computer program;
the processor is configured to execute the computer program for:
Receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room;
according to the target live broadcasting room identification, a virtual article list corresponding to the target live broadcasting room and virtual article identifications corresponding to the virtual articles are obtained;
encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token for determining whether the virtual article configured for the target live broadcasting room is valid or not, and returning the target token to the client;
receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcasting room, and determining whether the target virtual object configured in the target live broadcasting room is effective or not according to the configuration request;
if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client;
the configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
9. An information processing apparatus, characterized by comprising: the device comprises a receiving module, an acquisition module, a first processing module and a second processing module;
the receiving module is used for receiving an acquisition request initiated by a client for a virtual object list in a target live broadcasting room, wherein the acquisition request at least comprises a first user identifier corresponding to the client initiating the request and a target live broadcasting room identifier corresponding to the target live broadcasting room;
the acquisition module is used for acquiring a virtual article list corresponding to the target live broadcasting room and virtual article identifiers corresponding to the virtual articles according to the target live broadcasting room identifier;
the first processing module is used for encrypting the first user identifier, the target live broadcasting room identifier and each virtual article identifier, generating a target token used for determining whether the virtual article configured in the target live broadcasting room is valid or not, and returning the target token to the client;
the second processing module is used for receiving a configuration request initiated by a client for configuring a target virtual object in a target live broadcast room, and determining whether the target virtual object configured in the target live broadcast room is effective or not according to the configuration request; if the target virtual object configured for the target live broadcasting room is determined to be effective, configuring the target virtual object for the target live broadcasting room, and returning configuration success information to the client;
The configuration request at least comprises a second user identifier corresponding to a client side initiating the request, a target live broadcasting room identifier corresponding to a target live broadcasting room, each virtual article identifier in a virtual article list to which a target virtual article belongs, and a target token used for determining whether the target virtual article configured in the target live broadcasting room is effective or not.
10. A computer readable storage medium, characterized in that the computer readable storage medium has stored therein a computer program/instruction which, when executed by a processor of an information processing device, enables the information processing device to perform the steps in the method according to any of claims 1-7.
CN202210551925.XA 2022-05-18 2022-05-18 Information processing method, device, apparatus and storage medium Pending CN116489413A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210551925.XA CN116489413A (en) 2022-05-18 2022-05-18 Information processing method, device, apparatus and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210551925.XA CN116489413A (en) 2022-05-18 2022-05-18 Information processing method, device, apparatus and storage medium

Publications (1)

Publication Number Publication Date
CN116489413A true CN116489413A (en) 2023-07-25

Family

ID=87212513

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210551925.XA Pending CN116489413A (en) 2022-05-18 2022-05-18 Information processing method, device, apparatus and storage medium

Country Status (1)

Country Link
CN (1) CN116489413A (en)

Similar Documents

Publication Publication Date Title
US10223520B2 (en) System and method for integrating two-factor authentication in a device
US10305902B2 (en) Two-channel authentication proxy system capable of detecting application tampering and method therefor
CN111131416B (en) Service providing method and device, storage medium and electronic device
US10657754B1 (en) Contactless card and personal identification system
US20160165442A1 (en) Method for unlocking administration authority and device for authentication
CN104113534A (en) System and method for logging in applications (APPs)
JP2018502524A (en) Encryption control for information, information analysis method, system and terminal
CN107070654B (en) Information acquisition method and device
US11082229B2 (en) System and method for pre-authentication of customer support calls
CN108280369B (en) Cloud document offline access system, intelligent terminal and method
WO2017206524A1 (en) Electronic device control method, terminal and control system
CN111865897A (en) Cloud service management method and device
US10148629B1 (en) User-friendly multifactor authentication
JP5781678B1 (en) Electronic data utilization system, portable terminal device, and method in electronic data utilization system
CN111464295B (en) Bank card making method and device
CN114996694B (en) Data fusion method, device, system and storage medium
CN110602133A (en) Intelligent contract processing method, block chain management device and storage medium
CN116489413A (en) Information processing method, device, apparatus and storage medium
CN116346341A (en) Private key protection and server access method, system, equipment and storage medium
EP3975015B1 (en) Applet package sending method and device and computer readable medium
CN112118210B (en) Authentication key configuration method, device, system and storage medium
CN115118426A (en) Data processing method, device and equipment of block chain system and storage medium
CN112422475B (en) Service authentication method, device, system and storage medium
CN111049787B (en) Information association method, device, system and computer readable storage medium
CN113992353A (en) Login certificate processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination