CN110022483B - Hidden gift information processing method, electronic equipment and readable storage medium - Google Patents

Hidden gift information processing method, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110022483B
CN110022483B CN201810015423.9A CN201810015423A CN110022483B CN 110022483 B CN110022483 B CN 110022483B CN 201810015423 A CN201810015423 A CN 201810015423A CN 110022483 B CN110022483 B CN 110022483B
Authority
CN
China
Prior art keywords
information
gift
encrypted
presenter
bullet screen
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810015423.9A
Other languages
Chinese (zh)
Other versions
CN110022483A (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810015423.9A priority Critical patent/CN110022483B/en
Publication of CN110022483A publication Critical patent/CN110022483A/en
Application granted granted Critical
Publication of CN110022483B publication Critical patent/CN110022483B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4784Supplemental services, e.g. displaying phone caller identification, shopping application receiving rewards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/488Data services, e.g. news ticker
    • H04N21/4884Data services, e.g. news ticker for displaying subtitles

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention provides a hidden gift information processing method, electronic equipment and a readable storage medium, and realizes the barrage information hiding of gifting gifts for objects specified by a user by designing special barrage information which can hide the identity of a presenter aiming at a preset object when gifting gifts to a main broadcast. The method comprises the following steps: under the condition that the gift to be presented is determined to be a gift needing to be hidden in a first preset object, gift information of the gift to be presented is extracted, wherein the gift information comprises information of a presenter; encrypting the presenter information in the gift information to obtain encrypted presenter information; generating encrypted bullet screen information corresponding to the gift to be presented based on the encrypted presenter information; and sending decryption information to a second preset object, and forwarding the encrypted bullet screen information to users of all live broadcast rooms in the live broadcast platform.

Description

Hidden gift information processing method, electronic equipment and readable storage medium
Technical Field
The present invention relates to the field of electronic technologies, and in particular, to a hidden gift information processing method, an electronic device, and a readable storage medium.
Background
With the progress of network technology, live webcasts are increasingly developed and applied. Moreover, live broadcast has better interaction and interestingness through barrage information in the live broadcast. Some users can present the support and the love for the anchor by presenting the anchor gift, and when the users watch the live broadcasts, after presenting a certain anchor gift, all live broadcast rooms in the live broadcasts can display the barrage information of the certain anchor gift presented by the users. Therefore, behavior information of the gift giving user is acquired by the network-wide user, so that the behavior privacy of the gift giving user cannot be protected, and the technical problem that the user privacy is leaked exists.
Disclosure of Invention
The embodiment of the invention provides a hidden gift information processing method, electronic equipment and a readable storage medium, and realizes the barrage information hiding of gifting gifts for objects specified by a user by designing special barrage information which can hide the information of a presenter aiming at a preset object when gifting gifts to a main broadcast.
In a first aspect, the present embodiment provides a hidden gift information processing method, including:
under the condition that the gift to be presented is determined to be a gift needing to be hidden in a first preset object, gift information of the gift to be presented is extracted, wherein the gift information comprises information of a presenter;
encrypting the presenter information in the gift information to obtain encrypted presenter information;
generating encrypted bullet screen information corresponding to the gift to be presented based on the encrypted presenter information;
sending decryption information to a second preset object, wherein the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
and forwarding the encrypted bullet screen information to users of all live broadcasting rooms in the live broadcasting platform, wherein when the second preset object receives the encrypted bullet screen information, the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis.
Optionally, the encrypting the presenter information in the gift information includes:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
Optionally, the first preset object is a user of a preset type in a live broadcast room designated by the presenter who is to present the gift from all live broadcast rooms in the live broadcast platform.
Optionally, the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name used to replace the presenter information, for the first preset object, the presented presenter in the encrypted bullet screen information is the preset stealth name, and for the second preset object, the presented presenter in the encrypted bullet screen information is the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
Optionally, the encrypted bullet screen information includes first identification information for indicating that the encrypted bullet screen information is bullet screen information that needs to be decrypted.
Optionally, when the decryption information for decrypting the encrypted gift information is sent to a second preset object, the method further includes:
and sending second identification information of the gift to be presented to the second preset object, so that the second preset object can position encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
In a second aspect, an embodiment of the present invention provides an electronic device, including:
the device comprises an extracting unit, a judging unit and a control unit, wherein the extracting unit is used for extracting the gift information of the gift to be presented under the condition that the gift to be presented is determined to be the gift needing to be hidden in a first preset object, and the gift information comprises presenter information;
the encryption unit is used for encrypting the presenter information in the gift information to obtain encrypted presenter information;
a generation unit configured to generate encrypted bullet screen information corresponding to the gift to be presented, based on the encrypted presenter information;
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending decryption information to a second preset object, the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
and the second sending unit is used for forwarding the encrypted bullet screen information to users in all live broadcasting rooms in the live broadcasting platform, and the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis when receiving the encrypted bullet screen information.
Optionally, the encryption unit is configured to:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
Optionally, the first preset object is a user of a preset type in a live broadcast room designated by the presenter who is to present the gift from all live broadcast rooms in the live broadcast platform.
Optionally, the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name used to replace the presenter information, for the first preset object, the presented presenter in the encrypted bullet screen information is the preset stealth name, and for the second preset object, the presented presenter in the encrypted bullet screen information is the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
Optionally, the encrypted bullet screen information includes first identification information for indicating that the encrypted bullet screen information is bullet screen information that needs to be decrypted.
Optionally, the first sending unit is further configured to:
when decryption information used for decrypting the encrypted gift information is sent to a second preset object, second identification information of the gift to be presented is sent to the second preset object, so that the second preset object can position the encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
In a third aspect, an embodiment of the present invention provides an electronic device, which includes a processor, and the processor is configured to implement the steps of the hidden gift information processing method described in the foregoing first aspect embodiment when executing a computer program stored in a memory.
In a fourth aspect, an embodiment of the present invention provides a readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the hidden gift information processing method described in the foregoing first aspect embodiment.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
in the technical scheme of the embodiment of the invention, under the condition that the gift to be presented is determined to be the gift needing to be hidden in the first preset object, the gift information of the gift to be presented is extracted, wherein the gift information comprises presenter information, and furthermore, the presenter information in the gift information is encrypted to obtain the encrypted presenter information; and then, based on the encrypted presenter information, generating encrypted barrage information corresponding to the gift to be presented. Further, the electronic device at the server side sends decryption information for decrypting the encrypted presenter information in the encrypted bullet screen information to a second preset object which does not need to be hidden, and finally forwards the encrypted bullet screen information to users in all live broadcasting rooms in the live broadcasting platform. Furthermore, for a first preset object which is specified to be hidden, the presenter of the encrypted bullet screen information cannot be decrypted due to the fact that decryption information is not received in advance, and for a second preset object which does not need identity hiding, the presenter of the encrypted bullet screen information can be decrypted when the encrypted bullet screen information is received due to the fact that decryption information is received in advance, and therefore the function of identity hiding of the specified object is achieved.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. In the drawings:
fig. 1 is a flowchart of a hidden gift information processing method according to a first embodiment of the present invention;
FIG. 2 is a diagram of an electronic device according to a second embodiment of the invention;
fig. 3 is a schematic diagram of an electronic device according to a third embodiment of the invention.
Detailed Description
The embodiment of the invention provides a hidden gift information processing method, electronic equipment and a readable storage medium, and realizes the barrage information hiding of gifting gifts for objects specified by a user by designing special barrage information which can hide the identity of a presenter aiming at a preset object when gifting gifts to a main broadcast. The method comprises the following steps: under the condition that the gift to be presented is determined to be a gift needing to be hidden in a first preset object, gift information of the gift to be presented is extracted, wherein the gift information comprises information of a presenter; encrypting the presenter information in the gift information to obtain encrypted presenter information; generating encrypted bullet screen information corresponding to the gift to be presented based on the encrypted presenter information; sending decryption information to a second preset object, wherein the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform; and forwarding the encrypted bullet screen information to users of all live broadcasting rooms in the live broadcasting platform, wherein when the second preset object receives the encrypted bullet screen information, the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis.
The technical solutions of the present invention are described in detail below with reference to the drawings and specific embodiments, and it should be understood that the specific features in the embodiments and examples of the present invention are described in detail in the technical solutions of the present application, and are not limited to the technical solutions of the present application, and the technical features in the embodiments and examples of the present application may be combined with each other without conflict.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
Examples
Referring to fig. 1, a hidden gift information processing method according to a first embodiment of the present invention includes the following steps:
s101: under the condition that the gift to be presented is determined to be a gift needing to be hidden in a first preset object, gift information of the gift to be presented is extracted, wherein the gift information comprises information of a presenter;
s102: encrypting the presenter information in the gift information to obtain encrypted presenter information;
s103: generating encrypted bullet screen information corresponding to the gift to be presented based on the encrypted presenter information;
s104: sending decryption information to a second preset object, wherein the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
s105: and forwarding the encrypted bullet screen information to users of all live broadcasting rooms in the live broadcasting platform, wherein when the second preset object receives the encrypted bullet screen information, the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis.
The first preset object is a user with a preset type in a designated live broadcast room in all live broadcast rooms in the live broadcast platform of the presenter to present the gift.
Specifically, the method in this embodiment may be applied to a server of a live platform, and the live platform may sell virtual goods in various forms, which are generally called gifts. First, when watching the live broadcast of the live broadcast room through the live broadcast application program of the client, a user purchases a gift sold by the live broadcast platform and presents the gift to the anchor in order to express a favorite of the anchor of the live broadcast room. When gifting a gift, in the prior art, bullet screen information is generally generated, the bullet screen information includes the content of the gift and information related to a presenter and a receiver, and the full live broadcast platform displays the bullet screen information. In this embodiment, when the user wants to present the bullet screen information of the gift hidden from the first preset object, after the user selects the gift to be presented, the live broadcast application may output a prompt message for prompting the user whether the gift needs to be set as the gift to be hidden, or after the user selects the gift to be presented, and after the user performs a preset operation, the user may set the selected gift to be presented as the gift to be hidden.
Further, the method in this embodiment also provides a way for the user to select an object to be hidden, specifically, the user may also display a live broadcast room currently being live broadcast when determining that the selected gift to be presented is a gift to be hidden, and further, the user may select the live broadcast room in which the barrage information of the gift to be presented is hidden as needed, and because there is a user with a higher authority level, such as a VIP user, in the users watching each live broadcast room, the hiding of the barrage information may not be performed for such users. Therefore, the first preset object to be hidden is a common user in a live broadcast room designated by the user. Such as: the live rooms of the current live broadcast include a live room 1, a live room 2 and a live room 3. The bullet screen information of the gift appointed by the user needs to be hidden in the live broadcast room 1, and the live broadcast room 1 comprises a VIP user 1 and a VIP user 2. Therefore, the first preset object is all users except the VIP user 1 and the VIP user 2 who view the live broadcast room 1.
Further, in step S101, when the user presents a gift, if the to-be-presented gift is set as a gift that needs to be hidden in the first preset object, the gift information of the to-be-presented gift is extracted, and the gift information includes presenter information, and of course, the gift information also includes other information, such as: attributes of the gift, recipient information, etc. Such as: when the user A selects the gift A to present to the anchor A, the gift information comprises that the presenter is the user A, the gift is the gift A, and the receiver is the anchor A.
Further, since the user does not want the user' S own identity to be known by the user of another live broadcast room, the presenter information in the gift information is encrypted to obtain encrypted presenter information in step S102, and further encrypted bullet screen information corresponding to the gift to be presented is generated based on the encrypted presenter information in step S103. And step S104 sends the decryption information to a second preset object, where the second preset object is another user than the first preset object among users in all live broadcast rooms in the live broadcast. Such as: the live rooms of the current live broadcast include a live room 1, a live room 2 and a live room 3. The bullet screen information of the gift appointed by the user needs to be hidden in the live broadcast room 1, and the live broadcast room 1 comprises a VIP user 1 and a VIP user 2. Therefore, the first preset object is all users except the VIP user 1 and the VIP user 2 who view the live broadcast room 1. The second preset objects are a VIP user 1 and a VIP user 2 in the live broadcast room 1, a user in the live broadcast room 2, and a user in the live broadcast room 3. Since the electronic device at the server sends the decryption information for decrypting the encrypted presenter information in the encrypted barrage information to the second preset object which does not need to be hidden, the electronic device at the server forwards the encrypted barrage information to the users in all live rooms of the live broadcast platform through step S105. Furthermore, for a first preset object which is specified to be hidden, the presenter of the encrypted bullet screen information cannot be decrypted due to the fact that decryption information is not received in advance, and for a second preset object which does not need identity hiding, the presenter of the encrypted bullet screen information can be decrypted when the encrypted bullet screen information is received due to the fact that decryption information is received in advance, and therefore the function of identity hiding of the specified object is achieved.
Because the user presents gifts to the anchor of a certain live broadcast room, and does not want other users or the anchor of the live broadcast room to watch, the user sets a shielded live broadcast room, the barrage information is invisible to the live broadcast rooms, the barrage presenting gifts by the user cannot be seen, the server can set the barrage information which is not presented to the shielded live broadcast room to be forwarded, and high-level users in the live broadcast room are forwarded. However, due to the architecture of the live broadcast platform, any gift can be searched for a live broadcast room shielded by the gift, some live broadcast rooms are filtered and then forwarded, and meanwhile, special treatment needs to be performed on high-level users, and the high-level users can display stealth gifts, so that excessive computing pressure is caused on a live broadcast platform server. In the embodiment, the gift message needing to be hidden is also used as a special barrage, and meanwhile, the presenter information in the barrage is encrypted, so that the special barrage can be forwarded to all users in a live broadcast room like other barrages, and a server is equivalent to a common barrage and does not have any calculation pressure.
Further, in this embodiment, in step S102, the encrypting the presenter information in the gift information includes the following steps:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
Specifically, in this embodiment, gifts sold by the live broadcast platform correspond to different levels or prices, and in this embodiment, different gifts are only indicated by levels, and considering that some users give gifts frequently, low-level gifts may be given frequently, and a small amount of gifts give high-level gifts, if the same encryption algorithm is used, frequent encryption and decryption by the server and the client is definitely caused, so that a performance bottleneck of the server is caused, and the client is stuck, however, for some low-price gifts, a simple encryption algorithm may be used, and for high-value gifts, a complex encryption algorithm may be used, so that performance problems of the client and the server may be alleviated.
The specific implementation scenario may be that when the user wants to give a stealth gift, the user may first set, in the personal information center of the user, which live rooms are to be stealthed by the gift. After the setup is complete, the user may then present a gift to the anchor. After the electronic equipment at the server side receives the gift-presenting bullet screen information of the user, the information of the gift-presenting presenter is encrypted. In this embodiment, the micro encryption algorithm TEA encryption algorithm may be used to encrypt the name information of the presenter, and the encryption algorithm may use different encryption levels for different levels of gifts. The concrete implementation is as follows:
firstly, the client side obtains the current gift grade from the protocol of the server, if the grade is lower than 5, the gift is regarded as a common low-price gift, a lightweight encryption algorithm is used, and the procedure during encryption is as follows:
encryptSend=Tea.Encrypt(SendName,Key)
among them, TEA is an encryption interface of the encryption algorithm TEA.
Wherein SendName is the name information of the donor needing to be encrypted.
The encrypted Key is a fixed character, and the client and the server use the same value.
When the gift rating is greater than 5, the present embodiment uses a more complicated encryption algorithm, and the procedure for encryption is as follows:
encryptSend=AES.Encrypt(SendName,Key)
and the AES.
Of course, in the specific implementation process, the corresponding encryption algorithm adopted according to the grade of the gift may be set according to actual needs, and the present application is not limited herein. Further, in this embodiment, only the donor information is encrypted, and the receiver information may also be encrypted in a similar manner, which is not described herein again.
Further, in this embodiment, the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name used to replace the presenter information, for the first preset object, the presented presenter in the encrypted bullet screen information is the preset stealth name, and for the second preset object, the presented presenter in the encrypted bullet screen information is the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
Specifically, in this embodiment, for a gift presenter who needs to be hidden, the server may adopt some policies, so that the hiding effect is better, and for a first preset object, the server may use a general hidden name as the name of the presenter in an encrypted bullet screen sent to the user, for example: the encrypted barrage information displayed in the live broadcast room of the first preset object is ' mystery user presents anchor A gift A ', and the mystery user ' is the preset stealth name. Meanwhile, some official name accounts set by the live broadcast platform can be selected as names of the presenter, such as: the encrypted barrage information displayed in the live broadcast room of the first preset object is 'a gift A given by a live broadcast platform user' and 'the live broadcast platform user' is a preset stealth name. Such as: the same user can use a plurality of accounts bound by the mobile phone account, including account A and account B. The user presents the gift to the anchor A through the account A, the encrypted barrage information displayed in the live broadcast room of the first preset object is that the account B presents the gift A of the anchor A, and the account B is the preset stealth name. Therefore, the effect of presenting gifts for the anchor is achieved, and the anchor does not know who presents gifts at the same time, so that the stealth function is realized.
Further, the encrypted bullet screen information includes first identification information for indicating that the encrypted bullet screen information is bullet screen information needing decryption.
Specifically, in this embodiment, for the encrypted bullet screen information, the first identification information corresponding to the encrypted bullet screen information may be set, so as to indicate that the encrypted bullet screen information is the bullet screen information that needs to be decrypted. Furthermore, after the client receives the bullet screen information, whether the bullet screen information needs to be decrypted or not can be determined by extracting the first identification information. Specifically, in order to reuse the existing present gift bullet screen information, in this embodiment, a field is added to the existing present gift bullet screen information to indicate whether the bullet screen information is encrypted bullet screen information. The concrete implementation is as follows:
suppose that the present gift bullet screen information is: type @ ═ gift/giftsend @ SendName/gitfid @ ═ 0125/gifttype @ ═ 1/giftNum @ 2/giftthide @ ═ 1/giftlvel @ 2
Wherein gifthde @ is first identification information of the bullet screen information, and gifthde @ ═ 1 indicates that the bullet screen information is encrypted bullet screen information and has a stealth function, and if gifthde @ ═ 0 indicates that the bullet screen information is common bullet screen information and does not have the stealth function. When the client receives the bullet screen information, whether the currently received bullet screen information needs to be decrypted can be determined by reading the identification information. Because encryption barrage information is distinguished from ordinary barrage information, encryption operation can be carried out on the encryption barrage information, and decryption operation is carried out after the client receives the encryption barrage information, so a field is added to the ordinary barrage information to mark whether the barrage is an encryption barrage, if the barrage information is the encryption barrage information, the barrage is decrypted and displayed for a second preset object, and if the barrage information is the ordinary user, the encryption barrage information is discarded and is not displayed or is displayed by substituted presenter information.
Further, in this embodiment, when the decryption information for decrypting the encrypted gift information is sent to a second preset object, the method further includes:
and sending second identification information of the gift to be presented to the second preset object, so that the second preset object can position encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
Specifically, in this embodiment, each gift has corresponding second identification information, and after encrypting the presenter information of this gift and then generating the encrypted barrage information, when sending the decryption information to the second preset object, the second identification information that this gift corresponds can also be sent to the second preset object so that the second preset object can locate the encrypted barrage information corresponding to the gift to be presented based on the received second identification information quickly, and then decrypt the encrypted barrage information. Thereby displaying the presenter information of the gift of the encrypted bullet screen information.
The hidden gift information processing method in the present embodiment is explained in detail below with a complete example.
The designed bullet screen information is expressed as follows:
type@=gift/giftsend@=SendName/gitfid@=0125/gifttype@=1/giftNum@=2/giftHide@=1/giftlevel@=2
wherein gifthde @ is first identification information of the bullet screen information, and gifthde @ ═ 1 indicates that the bullet screen information is encrypted bullet screen information and has a stealth function, and if gifthde @ ═ 0 indicates that the bullet screen information is common bullet screen information and does not have the stealth function. Wherein giftlevel indicates the gift grade given away, the higher the numerical value is, the higher the grade is, and the higher the grade is, the more complicated the encryption algorithm is.
Thus, a field is added to existing gift protocols to indicate whether such gift messages are stealthy gift messages, and another field is added to indicate the level of the gift.
Further, when the user presents the stealth gift, the server encrypts the presenter information of the gift to produce encrypted bullet screen information.
Specifically, when a user wants to give away a stealth gift, the gift may be first set in the user's personal information center to be stealth for those live rooms. After the setup is complete, the user may then present a gift to the anchor. After receiving the gift-giving message of the user, the server encrypts the information of the gift-giving provider. The encryption algorithm uses different levels of encryption for different levels of gifts. First, the client will obtain the current gift level from the protocol of the server, and if the value of giftlevel is less than 5, the gift is regarded as a common low-price gift, and a lightweight encryption algorithm is used. And if the value of the giftlevel is greater than or equal to 5, encrypting the donor information by using an AES (advanced encryption standard) encryption algorithm to generate encrypted bullet screen information. And sends decryption information (KEY value used for decryption) to users of other live rooms that do not need to be gift-hidden and premium users of the designated live room.
And finally, after the client receives the bullet screen information, judging whether the bullet screen information has the encrypted mark field or not, and if not, directly displaying. If yes, whether a KEY value used for decryption sent by the server is received or not needs to be determined, if yes, the grade of the gift is read, if the gift is of the grade smaller than 5, a TEA decryption algorithm and the KEY value used for decryption sent by the server are called to decrypt the barrage information, and if the gift is of the grade smaller than 5, a more complex AES encryption algorithm and the KEY value used for decryption sent by the server are used for decryption.
If the gift is of a grade less than 5, calling a TEA decryption algorithm and a KEY value for decryption sent by the server to decrypt the bullet screen information, wherein the program is as follows:
Chatmessage=TEA.decrypt(EncryptChatmessage,KEY);
the chat is the original bullet screen information decrypted by the encrypted bullet screen information, the decryption interface is the decryption interface of the TEA algorithm, the EncryptChatmessage is the encrypted bullet screen information, and the KEY is the KEY value used by the decryption algorithm.
If the gift with the grade greater than or equal to 5 is in the gift, calling the AES decryption algorithm and the KEY value used for decryption sent by the server to decrypt the bullet screen information, wherein the procedure is as follows:
Chatmessage=AES.decrypt(EncryptChatmessage,KEY);
the chat is the original bullet screen information decrypted by the encrypted bullet screen information, the decryption interface is the decryption interface of the AES algorithm, the EncryptChatmess is the encrypted bullet screen information, and the KEY is the KEY value used by the decryption algorithm.
Thus, for a first preset object which is specified to be hidden, the presenter of the encrypted bullet screen information cannot be decrypted due to the fact that the decryption information is not received in advance, and for a second preset object which does not need identity hiding, the presenter of the encrypted bullet screen information can be decrypted when the encrypted bullet screen information is received due to the fact that the decryption information is received in advance.
Referring to fig. 2, a second embodiment of the invention provides an electronic device, including:
an extracting unit 201, configured to extract gift information of a gift to be presented, where the gift to be presented is determined to be a gift that needs to be hidden in a first preset object, and the gift information includes presenter information;
an encrypting unit 202, configured to encrypt the presenter information in the gift information to obtain encrypted presenter information;
a generating unit 203 configured to generate encrypted bullet screen information corresponding to the gift to be presented, based on the encrypted presenter information;
a first sending unit 204, configured to send decryption information to a second preset object, where the decryption information is used to decrypt the encrypted presenter information in the encrypted barrage information, and the second preset object includes other users than the first preset object in all users in live broadcasting rooms in a live broadcasting platform;
a second sending unit 205, configured to forward the encrypted bullet screen information to users in all live rooms in the live broadcast platform, where the second preset object, when receiving the encrypted bullet screen information, can obtain, based on the received decryption information, presenter information corresponding to the encrypted bullet screen information through analysis.
The first preset object is a user with a preset type in a live broadcast room appointed by the presenter to present the gift from all live broadcast rooms in the live broadcast platform.
Specifically, the electronic device in this embodiment may be applied to a server of a live platform, and the live platform may sell various forms of virtual goods, which are generally called as gifts. First, when watching the live broadcast of the live broadcast room through the live broadcast application program of the client, a user purchases a gift sold by the live broadcast platform and presents the gift to the anchor in order to express a favorite of the anchor of the live broadcast room. When gifting a gift, in the prior art, bullet screen information is generally generated, the bullet screen information includes the content of the gift and information related to a presenter and a receiver, and the full live broadcast platform displays the bullet screen information. In this embodiment, when the user wants to present the bullet screen information of the gift hidden from the first preset object, after the user selects the gift to be presented, the live broadcast application may output a prompt message for prompting the user whether the gift needs to be set as the gift to be hidden, or after the user selects the gift to be presented, and after the user performs a preset operation, the user may set the selected gift to be presented as the gift to be hidden.
Further, the embodiment also provides a way for the user to select the object to be hidden. Specifically, when determining that the selected gift to be presented is a gift to be hidden, the user may also display the live broadcast room in the live broadcast currently, and then the user may select the live broadcast room in which the barrage information of the gift to be presented is hidden as needed. Therefore, the first preset object to be hidden is a common user in a live broadcast room designated by the user. Such as: the live rooms of the current live broadcast include a live room 1, a live room 2 and a live room 3. The bullet screen information of the gift appointed by the user needs to be hidden in the live broadcast room 1, and the live broadcast room 1 comprises a VIP user 1 and a VIP user 2. Therefore, the first preset object is all users except the VIP user 1 and the VIP user 2 who view the live broadcast room 1.
Furthermore, when the user presents a gift and sets the to-be-presented gift as a gift that needs to be hidden in the first preset object, the extracting unit 201 extracts the gift information of the to-be-presented gift, where the gift information includes presenter information, and of course, the gift information also includes other information, such as: attributes of the gift, recipient information, etc. Such as: when the user A selects the gift A to present to the anchor A, the gift information comprises that the presenter is the user A, the gift is the gift A, and the receiver is the anchor A.
Further, since the user does not want the identity of the user to be known by the user of another live broadcast room, the presenter information in the gift information is encrypted by the encryption unit 202 to obtain encrypted presenter information, and further, the encrypted bullet screen information corresponding to the gift to be presented is generated by the generation unit 203 based on the encrypted presenter information. And sends the decryption information to a second preset object through the first sending unit 204, where the second preset object is a user other than the first preset object among users in all live broadcast rooms in the live broadcast. Such as: the live rooms of the current live broadcast include a live room 1, a live room 2 and a live room 3. The bullet screen information of the gift appointed by the user needs to be hidden in the live broadcast room 1, and the live broadcast room 1 comprises a VIP user 1 and a VIP user 2. Therefore, the first preset object is all users except the VIP user 1 and the VIP user 2 who view the live broadcast room 1. The second preset objects are a VIP user 1 and a VIP user 2 in the live broadcast room 1, a user in the live broadcast room 2, and a user in the live broadcast room 3. Since the electronic device at the server sends the decryption information for decrypting the encrypted presenter information in the encrypted bullet screen information to the second preset object which is not required to be hidden, the encrypted bullet screen information is finally forwarded to the users in all live broadcast rooms of the live broadcast platform through the second sending unit 205. Furthermore, for a first preset object which is specified to be hidden, the presenter of the encrypted bullet screen information cannot be decrypted due to the fact that decryption information is not received in advance, and for a second preset object which does not need identity hiding, the presenter of the encrypted bullet screen information can be decrypted when the encrypted bullet screen information is received due to the fact that decryption information is received in advance, and therefore the function of identity hiding of the specified object is achieved.
Because the user presents gifts to the anchor of a certain live broadcast room, and does not want other users or the anchor of the live broadcast room to watch, the user sets a shielded live broadcast room, the barrage information is invisible to the live broadcast rooms, the barrage presenting gifts by the user cannot be seen, the server can set the barrage information which is not presented to the shielded live broadcast room to be forwarded, and high-level users in the live broadcast room are forwarded. However, due to the architecture of the live broadcast platform, any gift can be searched for a live broadcast room shielded by the gift, some live broadcast rooms are filtered and then forwarded, and meanwhile, special treatment needs to be performed on high-level users, and the high-level users can display stealth gifts, so that excessive computing pressure is caused on a live broadcast platform server. In the embodiment, the gift message needing to be hidden is also used as a special barrage, and meanwhile, the presenter information in the barrage is encrypted, so that the special barrage can be forwarded to all users in a live broadcast room like other barrages, and a server is equivalent to a common barrage and does not have any calculation pressure.
Further, the encryption unit 202 is configured to:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
Specifically, in this embodiment, gifts sold by the live broadcast platform correspond to different levels or prices, and in this embodiment, different gifts are only indicated by the levels, and considering that some users give gifts frequently, low-level gifts may be given frequently, and a small amount of high-level gifts may be given frequently, so that if the same encryption algorithm is used, frequent encryption and decryption by the server and the client is definitely caused, and thus a performance bottleneck of the server is caused, and the client is stuck. Therefore, the encryption unit 202 may use a simple encryption algorithm for some low-priced gifts and a complex encryption algorithm for high-priced gifts, thereby alleviating performance problems of the client and the server.
The specific implementation scenario may be that when the user wants to give a stealth gift, the user may first set, in the personal information center of the user, which live rooms are to be stealthed by the gift. After the setup is complete, the user may then present a gift to the anchor. After the electronic equipment at the server side receives the gift-presenting bullet screen information of the user, the information of the gift-presenting presenter is encrypted. The encryption unit 202 in the present embodiment may employ the micro encryption algorithm TEA encryption algorithm to encrypt the name information of the presenter, while the encryption algorithm uses different encryption levels for different levels of gifts. The concrete implementation is as follows:
firstly, the client side obtains the current gift grade from the protocol of the server, if the grade is lower than 5, the gift is regarded as a common low-price gift, a lightweight encryption algorithm is used, and the procedure during encryption is as follows:
encryptSend=Tea.Encrypt(SendName,Key)
among them, TEA is an encryption interface of the encryption algorithm TEA.
Wherein SendName is the name information of the donor needing to be encrypted.
The encrypted Key is a fixed character, and the client and the server use the same value.
When the gift rating is greater than 5, the encryption unit 202 of the present embodiment uses a more complicated encryption algorithm, and the procedure for encryption is as follows:
encryptSend=AES.Encrypt(SendName,Key)
and the AES.
Of course, in the specific implementation process, the corresponding encryption algorithm adopted according to the grade of the gift may be set according to actual needs, and the present application is not limited herein. Further, in this embodiment, only the donor information is encrypted, and the receiver information may also be encrypted in a similar manner, which is not described herein again.
Further, in this embodiment, the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name used to replace the presenter information, for the first preset object, the presented presenter in the encrypted bullet screen information is the preset stealth name, and for the second preset object, the presented presenter in the encrypted bullet screen information is the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
Specifically, in this embodiment, for a gift presenter who needs to be hidden, the server may adopt some policies, so that the hiding effect is better, and for a first preset object, the server may use a general hidden name as the name of the presenter in an encrypted bullet screen sent to the user, for example: the encrypted barrage information displayed in the live broadcast room of the first preset object is ' mystery user presents anchor A gift A ', and the mystery user ' is the preset stealth name. Meanwhile, some official name accounts set by the live broadcast platform can be selected as names of the presenter, such as: the encrypted barrage information displayed in the live broadcast room of the first preset object is 'a gift A given by a live broadcast platform user' and 'the live broadcast platform user' is a preset stealth name. Such as: the same user can use a plurality of accounts bound by the mobile phone account, including account A and account B. The user presents the gift to the anchor A through the account A, the encrypted barrage information displayed in the live broadcast room of the first preset object is that the account B presents the gift A of the anchor A, and the account B is the preset stealth name. Therefore, the effect of presenting gifts for the anchor is achieved, and the anchor does not know who presents gifts at the same time, so that the stealth function is realized.
Further, the encrypted bullet screen information includes first identification information for indicating that the encrypted bullet screen information is bullet screen information needing decryption.
Specifically, in this embodiment, for the encrypted bullet screen information, the first identification information corresponding to the encrypted bullet screen information may be set, so as to indicate that the encrypted bullet screen information is the bullet screen information that needs to be decrypted. Furthermore, after the client receives the bullet screen information, whether the bullet screen information needs to be decrypted or not can be determined by extracting the first identification information. Specifically, in order to reuse the existing present gift bullet screen information, in this embodiment, a field is added to the existing present gift bullet screen information to indicate whether the bullet screen information is encrypted bullet screen information. The concrete implementation is as follows:
suppose the barrage information of the present gift is: type @ ═ gift/giftsend @ SendName/gitfid @ ═ 0125/gifttype @ ═ 1/giftNum @ 2/giftthide @ ═ 1/giftlvel @ 2
Wherein gifthde @ is first identification information of the bullet screen information, and gifthde @ ═ 1 indicates that the bullet screen information is encrypted bullet screen information and has a stealth function, and if gifthde @ ═ 0 indicates that the bullet screen information is common bullet screen information and does not have the stealth function. When the client receives the bullet screen information, whether the currently received bullet screen information needs to be decrypted can be determined by reading the identification information. Because encryption barrage information is distinguished from ordinary barrage information, encryption operation can be carried out on the encryption barrage information, and decryption operation is carried out after the client receives the encryption barrage information, so a field is added to the ordinary barrage information to mark whether the barrage is an encryption barrage, if the barrage information is the encryption barrage information, the barrage is decrypted and displayed for a second preset object, and if the barrage information is the ordinary user, the encryption barrage information is discarded and is not displayed or is displayed by substituted presenter information.
Further, the first sending unit 204 is further configured to:
when decryption information used for decrypting the encrypted gift information is sent to a second preset object, second identification information of the gift to be presented is sent to the second preset object, so that the second preset object can position the encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
Specifically, in this embodiment, each gift has corresponding second identification information, and after encrypting the presenter information of this gift and then generating the encrypted barrage information, when sending the decryption information to the second preset object, the second identification information that this gift corresponds can also be sent to the second preset object so that the second preset object can locate the encrypted barrage information corresponding to the gift to be presented based on the received second identification information quickly, and then decrypt the encrypted barrage information. Thereby displaying the presenter information of the gift of the encrypted bullet screen information.
Referring to fig. 3, a third embodiment of the present invention provides an electronic device, and includes: a processor 301, a memory 302, and a computer program stored in the memory and operable on the processor, for example, a program corresponding to the hidden gift information processing method in the first embodiment. The processor implements the steps in the detection of each path in the first embodiment described above when executing the computer program. Alternatively, the processor implements the functions of the modules/units in the electronic device of the second embodiment described above when executing the computer program.
Illustratively, the computer program may be partitioned into one or more modules/units that are stored in the memory and executed by the processor to implement the invention. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions, which are used to describe the execution of the computer program in the computer apparatus. For example, the computer program may be divided into functions of an extraction unit, an encryption unit, a generation unit, a first transmission unit, and a second transmission unit, and the specific functions of each unit are as follows:
the device comprises an extracting unit, a judging unit and a judging unit, wherein the extracting unit is used for extracting the gift information of the gift to be presented under the condition that the gift to be presented is determined to be the gift needing to be hidden in a first preset object, and the gift information comprises presenter information;
the encryption unit is used for encrypting the presenter information in the gift information to obtain encrypted presenter information;
a generation unit configured to generate encrypted bullet screen information corresponding to the gift to be presented, based on the encrypted presenter information;
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending decryption information to a second preset object, the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
and the second sending unit is used for forwarding the encrypted bullet screen information to users in all live broadcasting rooms in the live broadcasting platform, and the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis when receiving the encrypted bullet screen information.
The electronic device may include, but is not limited to, a processor, a memory. It will be appreciated by those skilled in the art that the schematic diagram 3 is merely an example of a computer apparatus and is not intended to limit an electronic device, which may include more or less components than those shown, or some components in combination, or different components, for example, the electronic device may also include input and output devices, network access devices, buses, etc.
The Processor 301 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center for the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory 302 may be used to store the computer programs and/or modules, and the processor may implement the various functions of the computer device by running or executing the computer programs and/or modules stored in the memory, as well as by invoking data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, video data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
Further, the electronic device is installed with a live application, and the processor 301 included in the electronic device further has the following functions:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
Further, the first preset object is a user of a preset type in a live broadcast room designated by the presenter who is to present the gift from all live broadcast rooms in the live broadcast platform.
Further, the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name used to replace the presenter information, for the first preset object, the presented presenter in the encrypted bullet screen information is the preset stealth name, and for the second preset object, the presented presenter in the encrypted bullet screen information is the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
Further, the encrypted bullet screen information includes first identification information for indicating that the encrypted bullet screen information is bullet screen information needing decryption.
Further, the processor 301 included in the electronic device also has the following functions:
when decryption information used for decrypting the encrypted gift information is sent to a second preset object, second identification information of the gift to be presented is sent to the second preset object, so that the second preset object can position the encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
A third embodiment of the present invention provides a computer-readable storage medium on which a computer program is stored, and the electronic device integrated functional unit in the second embodiment of the present invention may be stored in one computer-readable storage medium if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, all or part of the flow of the hidden gift information processing method of the first embodiment may be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
In the technical scheme of the embodiment of the invention, the iOS system is installed in the electronic equipment, and the electronic equipment can only determine that the route of the electronic equipment is accessible under the condition that the electronic equipment detects that the network currently connected with the electronic equipment is a wireless local area network through the reality library in the iOS system, namely, the electronic equipment can only establish communication connection with the router. Furthermore, the electronic device needs to send a TCP request to a predetermined network host, establish a TCP connection with the predetermined network host, and when the TCP connection is successfully established, it indicates that the electronic device is still in a host reachable state on the basis of route reachability, thereby accurately determining that the network of the electronic device is reachable.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A hidden gift information processing method, comprising:
under the condition that the gift to be presented is determined to be a gift needing to be hidden in a first preset object, gift information of the gift to be presented is extracted, wherein the gift information comprises information of a presenter;
encrypting the presenter information in the gift information to obtain encrypted presenter information;
generating encrypted bullet screen information corresponding to the gift to be presented based on the encrypted presenter information;
sending decryption information to a second preset object, wherein the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
and forwarding the encrypted bullet screen information to users of all live broadcasting rooms in the live broadcasting platform, wherein when the second preset object receives the encrypted bullet screen information, the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis.
2. The method of claim 1, wherein the encrypting the donor information in the gift information comprises:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
3. The method of claim 1, wherein the first predetermined object is a user of a preset type in a live room designated by the donor of the gift to be gifted from all live rooms being live in the live platform.
4. The method of claim 1, wherein the encrypted bullet screen information includes the encrypted presenter information and a preset stealth name for replacing the presenter information, and wherein for the first preset object, a presenter in the encrypted bullet screen information is shown as the preset stealth name, and for the second preset object, a presenter in the encrypted bullet screen information is shown as the presenter information obtained by decrypting the encrypted presenter information based on the decryption information.
5. The method of claim 1, wherein the encrypted barrage information includes first identification information for indicating that the encrypted barrage information is barrage information that needs to be decrypted.
6. The method of claim 1, wherein when decryption information for decrypting the encrypted gift information is transmitted to a second preset object, the method further comprises:
and sending second identification information of the gift to be presented to the second preset object, so that the second preset object can position encrypted bullet screen information corresponding to the gift to be presented based on the received second identification information to decrypt the encrypted bullet screen information.
7. An electronic device, comprising:
the device comprises an extracting unit, a judging unit and a control unit, wherein the extracting unit is used for extracting the gift information of the gift to be presented under the condition that the gift to be presented is determined to be the gift needing to be hidden in a first preset object, and the gift information comprises presenter information;
the encryption unit is used for encrypting the presenter information in the gift information to obtain encrypted presenter information;
a generation unit configured to generate encrypted bullet screen information corresponding to the gift to be presented, based on the encrypted presenter information;
the system comprises a first sending unit, a second sending unit and a third sending unit, wherein the first sending unit is used for sending decryption information to a second preset object, the decryption information is used for decrypting the encrypted presenter information in the encrypted bullet screen information, and the second preset object comprises other users except the first preset object in all live broadcasting room users in a live broadcasting platform;
and the second sending unit is used for forwarding the encrypted bullet screen information to users in all live broadcasting rooms in the live broadcasting platform, and the second preset object can obtain presenter information corresponding to the encrypted bullet screen information based on the received decryption information analysis when receiving the encrypted bullet screen information.
8. The electronic device of claim 7, wherein the encryption unit is to:
determining the type of the gift to be presented as a first grade;
determining the encryption mode corresponding to the first grade as a first encryption mode;
the donor information is encrypted in the first encryption manner.
9. An electronic device, characterized in that the electronic device comprises a processor for implementing the steps of the hidden gift information processing method of any one of claims 1-7 when executing a computer program stored in a memory.
10. A readable storage medium on which a computer program is stored, the computer program, when being executed by a processor, implementing the steps of the hidden gift information processing method of any one of claims 1-7.
CN201810015423.9A 2018-01-08 2018-01-08 Hidden gift information processing method, electronic equipment and readable storage medium Active CN110022483B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810015423.9A CN110022483B (en) 2018-01-08 2018-01-08 Hidden gift information processing method, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810015423.9A CN110022483B (en) 2018-01-08 2018-01-08 Hidden gift information processing method, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110022483A CN110022483A (en) 2019-07-16
CN110022483B true CN110022483B (en) 2021-04-27

Family

ID=67187496

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810015423.9A Active CN110022483B (en) 2018-01-08 2018-01-08 Hidden gift information processing method, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110022483B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113257059B (en) * 2021-04-06 2022-12-09 江苏康裕企业管理咨询有限公司 Online education training system based on intelligent cloud platform

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008109717A (en) * 2008-01-21 2008-05-08 Fujitsu Ltd Apparatus for providing electronic bulletin board, method for posting message, method for searching posted message, and program
CN104394066A (en) * 2014-12-11 2015-03-04 北京奇虎科技有限公司 Method for sending anonymous information in form of short message and server
CN104796310A (en) * 2014-01-16 2015-07-22 腾讯科技(深圳)有限公司 Social communication method and system
CN105007289A (en) * 2014-04-18 2015-10-28 塞克雷特公司 Displaying comments on a secret in an anonymous social networking application
CN106055598A (en) * 2016-05-20 2016-10-26 广州酷狗计算机科技有限公司 Information display method and apparatus
CN107493283A (en) * 2017-08-18 2017-12-19 广州久邦世纪科技有限公司 A kind of implementation method and its system of the message security encryption based on live platform

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090214034A1 (en) * 2008-02-26 2009-08-27 Rohit Mehrotra Systems and methods for enabling electronic messaging with recipient-specific content
WO2016081715A1 (en) * 2014-11-19 2016-05-26 rocket-fueled, Inc. Systems and methods for maintaining user privacy and security over a compouter network and/or within a related database

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2008109717A (en) * 2008-01-21 2008-05-08 Fujitsu Ltd Apparatus for providing electronic bulletin board, method for posting message, method for searching posted message, and program
CN104796310A (en) * 2014-01-16 2015-07-22 腾讯科技(深圳)有限公司 Social communication method and system
CN105007289A (en) * 2014-04-18 2015-10-28 塞克雷特公司 Displaying comments on a secret in an anonymous social networking application
CN104394066A (en) * 2014-12-11 2015-03-04 北京奇虎科技有限公司 Method for sending anonymous information in form of short message and server
CN106055598A (en) * 2016-05-20 2016-10-26 广州酷狗计算机科技有限公司 Information display method and apparatus
CN107493283A (en) * 2017-08-18 2017-12-19 广州久邦世纪科技有限公司 A kind of implementation method and its system of the message security encryption based on live platform

Also Published As

Publication number Publication date
CN110022483A (en) 2019-07-16

Similar Documents

Publication Publication Date Title
US9521097B2 (en) System and method for management of persistent and irrefutable instant messages
US9767300B2 (en) Managing restricted tagged content elements within a published message
CN106534053B (en) Media file permission control method, server and equipment
WO2017128869A1 (en) Information processing method, first terminal, second terminal, and server
WO2019134303A1 (en) Live stream room popularity processing method and apparatus, server and storage medium
CN104602238A (en) Wireless network connecting method, device and system
CN105490711A (en) Bluetooth automatic connection method, master device, slave device, and system
CN105721903A (en) Method and system for playing online videos
CN105450641A (en) Verification method, verification device and verification system
CN108347629A (en) Video file processing method, device, server and storage medium
EP3051768B1 (en) Secure data transmission
KR102048750B1 (en) Method and system for providing secure message
US20160210596A1 (en) Method, device and system for controlling presentation of application
CN110022483B (en) Hidden gift information processing method, electronic equipment and readable storage medium
CN109218837B (en) Method and equipment for displaying special effect of virtual gift
CN109120576B (en) Data sharing method and device, computer equipment and storage medium
CN110401526B (en) Client information security interaction method based on small program, terminal and server
CN108055271B (en) Encryption and decryption method for electronic mail, storage medium and electronic equipment
CN113542187A (en) File uploading and downloading method and device, computer device and medium
CN110008654B (en) Electronic file processing method and device
CN115567297A (en) Cross-site request data processing method and device
CN111917688B (en) Method, device and system for transmitting encrypted data through cloud platform
CN111314781B (en) Local file encryption method, device, equipment and storage medium
CN113506090A (en) Audit data processing method and device, storage medium and electronic equipment
CN112261040A (en) Online audio and video anti-theft method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant