CN110721469A - Method, terminal and medium for shielding virtual object in virtual environment - Google Patents

Method, terminal and medium for shielding virtual object in virtual environment Download PDF

Info

Publication number
CN110721469A
CN110721469A CN201910961871.2A CN201910961871A CN110721469A CN 110721469 A CN110721469 A CN 110721469A CN 201910961871 A CN201910961871 A CN 201910961871A CN 110721469 A CN110721469 A CN 110721469A
Authority
CN
China
Prior art keywords
prop
bunker
virtual object
virtual
property
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910961871.2A
Other languages
Chinese (zh)
Other versions
CN110721469B (en
Inventor
练建锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910961871.2A priority Critical patent/CN110721469B/en
Publication of CN110721469A publication Critical patent/CN110721469A/en
Application granted granted Critical
Publication of CN110721469B publication Critical patent/CN110721469B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/50Controlling the output signals based on the game progress
    • A63F13/52Controlling the output signals based on the game progress involving aspects of the displayed game scene
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/80Special adaptations for executing a specific game genre or game mode
    • A63F13/837Shooting of targets
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/60Methods for processing data by generating or executing the game program
    • A63F2300/66Methods for processing data by generating or executing the game program for rendering three dimensional images
    • A63F2300/6653Methods for processing data by generating or executing the game program for rendering three dimensional images for altering the visibility of an object, e.g. preventing the occlusion of an object, partially hiding an object
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F2300/00Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game
    • A63F2300/80Features of games using an electronically generated display having two or more dimensions, e.g. on a television screen, showing representations related to the game specially adapted for executing a specific type of game
    • A63F2300/8076Shooting

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Processing Or Creating Images (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a method, a terminal and a medium for shielding a virtual object in a virtual environment, and relates to the field of computers. The method comprises the following steps: displaying a virtual object and a shelter prop in a virtual environment, wherein the shelter prop is used for shielding the virtual object; when the bunker prop is positioned in the picking range of the virtual object and the picking operation of the bunker prop is received, the virtual object is controlled to pick the bunker prop; when equipment operation on the bunker prop is received, the bunker prop is controlled to shield the virtual object from the target shielding direction; when the moving operation of the virtual object is received, the bunker prop is controlled to move in the same direction as the virtual object. The technical scheme provided by the embodiment of the application can provide the virtual prop with the shielding effect for the user, namely the bunker prop, so that the virtual object controlled by the user can be shielded and defended by the bunker prop under the condition that the virtual object is not limited by scene conditions, and the safety of the virtual object in the game process is improved.

Description

Method, terminal and medium for shielding virtual object in virtual environment
Technical Field
The present application relates to the field of computers, and in particular, to a method, a terminal, and a medium for blocking a virtual object in a virtual environment.
Background
In an application program based on a three-dimensional virtual environment, for example, a shooting game for performing remote attack by using hot weapons, a user can control a virtual object in the virtual environment to perform actions such as walking, running, shooting, fighting, driving and the like, and a plurality of users can form a team on line to cooperatively complete a certain task in the same virtual environment. The user can control the virtual object to pick up the virtual item in the virtual environment, and can also control the virtual object to discard the carried or assembled virtual item in the virtual environment.
During the course of a game, it is of paramount importance how to defend against hostile attacks on virtual objects. In an indoor scene, a user can shield by using the inherent elements of the scenes such as walls, oil drums and the like, so that the attack of hostile users is resisted.
In outdoor scenes, users are not easy to hide, and particularly in outdoor scenes such as deserts, lawns and the like, virtual objects controlled by the users are extremely easy to find by enemy virtual objects and to shoot.
Disclosure of Invention
The embodiment of the application provides a method, a device, a terminal and a storage medium for shielding a virtual object in a virtual environment, and can solve the problem that in the related technology, the shielding of a user-controlled virtual object is limited by scene conditions. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a method for blocking a virtual object in a virtual environment, where the method includes:
displaying a virtual object and a bunker prop in a virtual environment, wherein the bunker prop is used for shielding the virtual object;
when the bunker prop is positioned in the picking range of the virtual object and a picking operation of the bunker prop is received, controlling the virtual object to pick the bunker prop;
when equipment operation on the bunker prop is received, the bunker prop is controlled to shield the virtual object from a target shielding direction;
when a moving operation of the virtual object is received, controlling the bunker prop to move in the same direction as the virtual object.
In another aspect, an embodiment of the present application provides an apparatus for blocking a virtual object in a virtual environment, where the apparatus includes:
the property display module is used for displaying a virtual object and a bunker property in a virtual environment, and the bunker property is used for shielding the virtual object;
the property picking module is used for controlling the virtual object to pick up the bunker property when the bunker property is positioned in a picking range of the virtual object and a picking operation of the bunker property is received by a user;
the virtual object shielding module is used for controlling the bunker prop to shield the virtual object from a target shielding direction when equipment operation on the bunker prop is received;
and the movement control module is used for controlling the bunker prop to move in the same direction as the virtual object when the movement operation of the virtual object is received.
On the other hand, an embodiment of the present application provides a terminal, where the terminal includes: a processor and a memory, the memory having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by the processor to implement the method of occluding virtual objects in a virtual environment as described in the above aspect.
In another aspect, a computer-readable storage medium is provided, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which is loaded and executed by the processor to implement the method for occluding virtual objects in a virtual environment as described in the above aspect.
In another aspect, a computer program product is provided, which when run on a computer causes the computer to perform the method of occluding virtual objects in a virtual environment as described in the above aspect.
In the embodiment of the application, when the bunker prop is located in the picking range of the virtual object, the user can control the virtual object to pick the bunker prop, and when the equipment operation on the bunker prop is received, the terminal controls the bunker prop to shield the virtual object from the target shielding direction. In addition, when the terminal receives a moving operation on the virtual object, the bunker prop is controlled to move in the same direction as the virtual object; the technical scheme provided by the embodiment of the application can provide the virtual prop with the shielding effect for the user, namely the bunker prop, so that the virtual object controlled by the user can be shielded and defended by the bunker prop under the condition that the virtual object is not limited by scene conditions, and the safety of the virtual object in the game process is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 illustrates a schematic diagram of an implementation environment provided by an exemplary embodiment of the present application;
FIG. 2 illustrates a flow chart of a method for occluding virtual objects in a virtual environment provided by an exemplary embodiment of the present application;
FIG. 3 is an interface schematic diagram illustrating a process for picking bunker properties in accordance with an exemplary embodiment;
FIG. 4 illustrates a flow chart of a method for occluding virtual objects in a virtual environment provided by another exemplary embodiment of the present application;
FIG. 5 shows a flow chart of a process of determining a virtual object movement speed;
FIG. 6 illustrates a flow chart of a method for occluding virtual objects in a virtual environment provided by another exemplary embodiment of the present application;
FIG. 7 shows a schematic interface diagram of a shield process using a shelter prop;
FIG. 8 illustrates the flow of calculation of bunker prop defense values;
FIG. 9 illustrates a flow of computing a virtual object life value;
FIG. 10 illustrates a flow chart of a method for occluding virtual objects in a virtual environment provided by another exemplary embodiment of the present application;
FIG. 11 shows a schematic of an interface for an attack when a bunker prop is armed;
FIG. 12 illustrates a flow chart of a method of determining whether a first virtual object is discovered by a second virtual object;
FIG. 13 is a block diagram illustrating an apparatus for occluding virtual objects in a virtual environment according to an exemplary embodiment of the present application;
fig. 14 shows a block diagram of a terminal according to an exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
First, terms referred to in the embodiments of the present application are described:
virtual environment: is a virtual environment that is displayed (or provided) when an application is run on the terminal. The virtual environment may be a simulation environment of a real world, a semi-simulation semi-fictional environment, or a pure fictional environment. The virtual environment may be any one of a two-dimensional virtual environment, a 2.5-dimensional virtual environment, and a three-dimensional virtual environment, which is not limited in this application. The following embodiments are illustrated with the virtual environment being a three-dimensional virtual environment.
Virtual object: refers to a movable object in a virtual environment. The movable object can be a virtual character, a virtual animal, an animation character, etc., such as: characters, animals, plants, oil drums, walls, stones, etc. displayed in a three-dimensional virtual environment. Optionally, the virtual object is a three-dimensional volumetric model created based on animated skeletal techniques. Each virtual object has its own shape and volume in the three-dimensional virtual environment, occupying a portion of the space in the three-dimensional virtual environment.
Virtual props: the method refers to props which can be used by virtual objects in a virtual environment, and comprises remote virtual props and short-range virtual props. The remote virtual property refers to a property which can damage a virtual object at a position far away from other virtual objects, such as a common gun, such as a pistol, a rifle, a sniper gun, a rocket tube and the like; the short-range virtual prop refers to a prop which can cause harm to other virtual objects in a short distance, such as a dagger, a sword, a knife, an axe and the like.
The virtual props of "equipping, carrying or assembling" in this application refer to the virtual props that the virtual object owns, and the virtual object owns the knapsack, has the knapsack check in the knapsack, and the virtual props are deposited in the knapsack of virtual object, perhaps, the virtual object is using the virtual props.
The method provided in the present application may be applied to a virtual reality application program, a three-dimensional map program, a military simulation program, a shooting game, a Multiplayer Online Battle Arena game (MOBA), and the like, and the following embodiments are exemplified by applications in Games.
The game based on the virtual environment is often composed of one or more maps of game worlds, the virtual environment in the game simulates the scene of the real world, and a user can control the virtual object in the game to perform actions of walking, running, jumping, shooting, fighting, driving, switching to use the virtual prop, using the virtual prop to hurt other virtual objects and the like in the virtual environment, so that the interactivity is strong.
In the embodiment of the application, when the user controls the virtual object to use the bunker prop in the virtual props, the virtual object can be shielded; when the virtual object controlled by the user moves, defense can be performed through the bunker prop, so that the user controls the virtual object to move to a safe area.
Referring to fig. 1, a schematic diagram of an implementation environment provided by an exemplary embodiment of the present application is shown. The implementation environment comprises: a first terminal 120, a server 140, and a second terminal 160.
The first terminal 120 is installed and operated with an application program supporting a virtual environment. The application program can be any one of a virtual reality application program, a three-dimensional map program, a military simulation program, an FPS game, an MOBA game and a multi-player gun battle type survival game. The first terminal 120 is a terminal used by a first user who uses the first terminal 120 to control a first virtual object located in a virtual environment to perform activities including, but not limited to: adjusting a body posture, crawling, walking, running, riding, jumping, driving, shooting, throwing, switching virtual props, injuring other virtual objects using the virtual props, and picking up shelter props, using the shelter props for at least one of shelter or defense. Illustratively, the first virtual object is a first virtual character, such as a simulated character object or an animated character object.
The first terminal 120 is connected to the server 140 through a wireless network or a wired network.
The server 140 includes at least one of a server, a plurality of servers, a cloud computing platform, and a virtualization center. Illustratively, the server 140 includes a processor 144 and a memory 142. The server 140 is used to provide background services for applications that support a three-dimensional virtual environment. Alternatively, the server 140 undertakes primary computational work and the first and second terminals 120, 160 undertake secondary computational work; alternatively, the server 140 undertakes the secondary computing work and the first terminal 120 and the second terminal 160 undertakes the primary computing work; alternatively, the server 140, the first terminal 120, and the second terminal 160 perform cooperative computing by using a distributed computing architecture.
The second terminal 160 is installed and operated with an application program supporting a virtual environment. The application program can be any one of a virtual reality application program, a three-dimensional map program, a military simulation program, an FPS game, an MOBA game and a multi-player gun battle type survival game. The second terminal 160 is a terminal used by a second user who uses the second terminal 160 to control a second virtual object located in the virtual environment to perform activities including, but not limited to: adjusting a body posture, crawling, walking, running, riding, jumping, driving, shooting, throwing, switching virtual props, injuring other virtual objects using the virtual props, and picking up, using, at least one of, sheltering, or defending.
Optionally, the first virtual character and the second virtual character are in the same virtual environment. Alternatively, the first avatar and the second avatar may belong to the same team, the same organization, have a friend relationship, or have temporary communication rights.
Alternatively, the applications installed on the first terminal 120 and the second terminal 160 are the same, or the applications installed on the two terminals are the same type of application of different control system platforms. The first terminal 120 may generally refer to one of a plurality of terminals, and the second terminal 160 may generally refer to one of a plurality of terminals, and this embodiment is only illustrated by the first terminal 120 and the second terminal 160. The device types of the first terminal 120 and the second terminal 160 are the same or different, and include: at least one of a smartphone, a tablet, an e-book reader, an MP3 player, an MP4 player, a laptop portable computer, and a desktop computer. The following embodiments are illustrated with the terminal comprising a smartphone.
Those skilled in the art will appreciate that the number of terminals described above may be greater or fewer. For example, the number of the terminals may be only one, or several tens or hundreds of the terminals, or more. The number of terminals and the type of the device are not limited in the embodiments of the present application.
Referring to fig. 2, a flowchart of a method for occluding a virtual object in a virtual environment according to an exemplary embodiment of the present application is shown. The embodiment of the present application is described by taking as an example that the method is used for the first terminal 120 or the second terminal 160 in the implementation environment shown in fig. 1 or other terminals in the implementation environment, and the method includes the following steps.
Step 201, displaying a virtual object and a shelter prop in a virtual environment, wherein the shelter prop is used for shielding the virtual object.
In most game scenarios, the user interface displays a virtual environment and virtual props associated with the game scenario. In a real game scene, when a virtual object controlled by a user is attacked by an enemy virtual object, the user controls the virtual object to hide the virtual object or operates the virtual object to attack the enemy virtual object by using a virtual prop.
Compared with an indoor scene with more shelters, the virtual object has higher danger when being in an outdoor scene, and a user cannot easily find the shelters similar to walls or oil drums in the indoor scene for sheltering. Therefore, in order to realize that the user breaks away from the limitation of the scene condition during the game and improve the safety of the virtual object controlled by the user, in the embodiment of the application, the virtual prop includes a bunker prop.
In the embodiment of the application, the bunker prop is a virtual prop with a shielding effect in the virtual props. When the bunker prop is in an equipment state, the shelter is used for sheltering the virtual object in the sheltering direction; and when the user controls the virtual object to attack the virtual object by an enemy, the bunker prop has a defense function and can help the virtual object to defend the attack of the enemy to the virtual object.
Optionally, in an indoor scene, the bunker prop may be a virtual prop with a shielding effect, such as an iron gate and a wood board; in an outdoor scene, the bunker prop can be a virtual prop with a shielding effect, such as a branch, and the server can put the bunker prop into a corresponding area in a virtual environment according to a preset prop refreshing strategy. In the embodiments of the present application, the specific shelter prop is not limited.
Step 202, when the bunker property is located in the picking range of the virtual object and the picking operation of the bunker property is received, the virtual object is controlled to pick the bunker property.
In a possible implementation manner, when the bunker property appears in the game visual field range of the virtual object, the user can control the virtual object to move, and then when the bunker property is located in the pick-up range of the virtual object and the trigger terminal receives a pick-up operation of the bunker property, the terminal controls the virtual object to pick up the bunker property according to the trigger operation of the user.
After the user operates the virtual object to pick up the bunker prop, whether the picked bunker prop is used or not can be selected according to the use requirement of the user. Optionally, when the size of the bunker property is adapted to the backpack, the user manipulates the virtual object to place the picked bunker property in the backpack. Further, when the virtual object controlled by the user needs to continue shielding and defending, the user controls the virtual object to select a shelter prop from the backpack for equipping.
In the embodiment of the application, the bunker props fall randomly in the game scene and are distributed reasonably, and for the bunker props of which the sizes do not adapt to a backpack, a user can control the virtual object to discard the bunker props and pick up the next bunker prop.
In one possible embodiment, when a bunker item appears within the game field of view of the virtual object, the user manipulates the virtual object to pick up the bunker item by triggering a pick-up control.
Schematically, as shown in fig. 3, it is an interface diagram of a process of picking up bunker props according to an exemplary embodiment. In fig. 3, the shelter prop is illustrated as a plank 301. Optionally, when the wood board 301 is located outside the pickup range of the virtual object, the user manipulates the virtual object to move through the movement control 302 of the virtual object in the user interface. When the board 301 is located in the pick-up range of the virtual object, a bunker property pick-up gesture 303 appears above the template 301 in the user interface, and the user operates the virtual object to pick up the board 301 through the touch bunker property pick-up gesture 303.
And step 203, when equipment operation on the shelter prop is received, controlling the shelter prop to shelter the virtual object from the target shelter direction.
In a possible implementation manner, the user operates the virtual object to take the bunker prop out of the backpack for equipment of the bunker prop, or the user operates the virtual object to pick up the bunker prop for equipment, that is, when the terminal receives equipment operation on the bunker prop, the terminal controls the bunker prop to shield the virtual object.
In the process that the shelter prop shelters the virtual object, the sheltered direction is sheltered from the target sheltered direction. Optionally, the target shielding direction may be a front direction of a virtual object controlled by a user, or the user performs a user-defined setting on the shielding direction, so as to determine the target shielding direction.
In one possible implementation mode, when the visual field direction of the enemy virtual object is consistent with the target shielding direction of the bunker prop, the bunker prop can shield the virtual object; when the visual field direction of the enemy virtual object is inconsistent with the target shielding direction of the bunker prop, the virtual object is exposed in the visual field range of the enemy virtual object and is found by the enemy virtual object.
And 204, when the moving operation of the virtual object is received, controlling the bunker prop to move in the same direction as the virtual object.
In a game scene, a user operates a virtual object to temporarily shield the virtual object by using a shelter prop, and when the user determines a next target field, the user operates the virtual object to move to the next target field.
In a possible implementation manner, when the terminal receives a moving operation of a user on a virtual object, the bunker prop and the virtual object in a carrying equipment state are virtually moved in the same direction, that is, the bunker prop and the virtual object are kept relatively still, so that the virtual object in the moving process is shielded.
In the embodiment of the application, when the bunker prop is located in the picking range of the virtual object, the user can control the virtual object to pick the bunker prop, when the equipment operation of the bunker prop is received, the terminal controls the bunker prop to shield the virtual object, and the shielding direction can be set by user definition according to the needs of the user. In addition, when the terminal receives a moving operation on the virtual object, the bunker prop is controlled to move in the same direction as the virtual object; compared with game design in the related art, the technical scheme provided by the embodiment of the application can provide the virtual prop with a shielding effect, namely the bunker prop, for the user to control the virtual object to be shielded and defended by the bunker prop without being limited by scene conditions, so that the safety of the virtual object in the game is improved.
Referring to fig. 4, a flowchart of a method for occluding a virtual object in a virtual environment according to another exemplary embodiment of the present application is shown. The embodiment of the present application is described by taking as an example that the method is used for the first terminal 120 or the second terminal 160 in the implementation environment shown in fig. 1 or other terminals in the implementation environment, and the method includes the following steps.
Step 401, displaying a virtual object and a shelter prop in a virtual environment, where the shelter prop is used for shielding the virtual object.
For details of this step, refer to step 201, and details of this embodiment are not described herein.
Step 402, when the bunker property is located in the picking range of the virtual object and the picking operation of the bunker property is received, the virtual object is controlled to pick the bunker property.
For details of this step, refer to step 202, and details of this embodiment are not described herein.
And step 403, when equipment operation on the shelter prop is received, controlling the shelter prop to shelter the virtual object from the target shelter direction.
For details of this step, refer to step 203, and details of this embodiment are not described herein.
Step 404, when receiving the moving operation of the virtual object, obtaining a target speed attenuation parameter corresponding to the bunker prop, where the target speed attenuation parameter refers to an attenuation influence of the bunker prop on the moving speed of the virtual object.
In fact, when the user manipulates the virtual object to use the bunker property, the bunker property may increase the load of the virtual object, and further may have an attenuating effect on the moving speed of the virtual object. In order to increase the realism of the user game, in one possible embodiment, this step comprises the following.
Acquiring the item integrity of the bunker item and the initial speed attenuation parameter of the bunker item, wherein the item integrity is related to the attack injury suffered by the bunker item.
First, the property integrity and initial velocity decay parameters of the bunker properties are explained.
Prop integrity: for a bunker property, when the bunker property is not picked up or equipped, the property integrity of the bunker property is the highest, as expressed by percentage, i.e. 100%; when the bunker prop in the equipment state is attacked by an enemy virtual object, the bunker prop is damaged, and the prop integrity of the bunker prop is reduced, for example, the prop integrity is reduced from 100% to 80%.
Initial velocity decay parameters: in the above embodiments, it has been described that when a user manipulates and moves a virtual object, the bunker prop generates a load influence on the virtual object, thereby attenuating the moving speed of the virtual object. In the embodiment of the application, the initial speed attenuation parameters of the bunker prop are set, and the initial speed attenuation parameters of different bunker props are different.
Wherein, the prop integrity is related to the attack injury suffered by the dam prop. When the bunker property is attacked by the virtual property with larger attack damage, the property integrity of the bunker property is greatly reduced.
And secondly, determining a target speed attenuation parameter according to the prop integrity and the initial speed attenuation parameter, wherein the target speed attenuation parameter and the prop integrity are in a negative correlation relationship.
Furthermore, when the bunker property in the equipment state is continuously damaged, the property integrity is continuously reduced, so that the load influence on the virtual object is continuously reduced, and the initial speed attenuation parameter of the bunker property is changed, namely the speed attenuation parameter of the bunker property is not fixed to the initial speed attenuation parameter.
Thus, in the process of the constant damage of the bunker property, the speed attenuation parameter of the bunker property is converted from the initial speed attenuation parameter to the target speed attenuation parameter. In one possible implementation mode, a target speed attenuation parameter is determined according to the prop integrity and the initial speed attenuation parameter, and the target speed attenuation parameter and the prop integrity are in a negative correlation relationship.
Step 405, determining a target moving speed according to the initial moving speed of the virtual object and the target speed attenuation parameter.
In a game scene, a virtual object manipulated by a user is set with a moving speed. When the virtual object does not carry the bunker prop, the moving speed of the virtual object is the initial moving speed; when the virtual object carries or is equipped with the bunker prop, the moving speed of the virtual object is not the initial moving speed any more, but the target moving speed is determined according to the initial moving speed of the virtual object and the target speed attenuation parameter.
Schematically, as shown in fig. 5, a flow chart of a process of determining a moving speed of a virtual object is shown. Setting an initial moving speed of a virtual object controlled in a game scene by a user; the terminal judges whether the virtual object carries or is provided with a bunker prop; when the virtual object carries or is provided with the bunker prop, the terminal attenuates the initial moving speed of the virtual object according to the target speed attenuation parameter, and the target moving speed of the virtual object is finally calculated; when the virtual object does not carry or equip the shelter prop, the terminal maintains the initial moving speed of the virtual object.
In an illustrative example, the initial moving speed of the virtual object controlled by the user is 1.2 m/s, the initial speed attenuation parameter of the bunker prop a is set to 1/3 (i.e. 1/3 reducing the initial moving speed of the virtual object), and the prop integrity of the bunker prop is 100%, so that the moving speed of the virtual object controlled by the user is updated from the initial moving speed of 1.2 m/s to the target moving speed of 0.8 m/s.
In the above illustrative example, when the bunker prop is attacked, the prop integrity is reduced to 50%, and bunker prop a is updated from the initial velocity decay parameter to the target velocity decay parameter of 1/6, so that the target moving velocity of the virtual object controlled by the user is updated from 0.8 m/s to 1.0 m/s.
And 406, controlling the bunker prop to move in the same direction with the virtual object according to the target moving speed.
In a possible implementation manner, after the moving speed of the virtual object is updated, the moving speed is changed from the initial moving speed to the target moving speed, so that the terminal controls the bunker prop to move in the same direction as the virtual object according to the target moving speed.
In summary, in consideration of the load influence of the bunker property on the virtual object, in the embodiment of the present application, the bunker property is provided with an initial velocity attenuation parameter, and the initial moving velocity of the virtual object carrying or equipped with the bunker property is determined according to the initial velocity attenuation parameter. In addition, considering from the prop integrity angle of the bunker prop, in the process of reducing the prop integrity, the load influence of the bunker prop on the virtual object is also reduced, so that the terminal determines a target speed attenuation parameter according to the prop integrity and the initial speed attenuation parameter, and determines the target moving speed of the virtual object according to the initial moving speed and the target speed attenuation parameter of the virtual object; on the basis of the embodiment, the scheme provided by the embodiment realizes the updating of the speed attenuation parameter of the bunker prop and the moving speed of the virtual object in the game scene, and enhances the reality of the game.
In the above embodiment, after the bunker prop is damaged, not only the moving speed of the virtual object can be influenced, but also the defense value of the bunker prop itself can be actually influenced.
Referring to fig. 6, a flowchart of a method for occluding a virtual object in a virtual environment according to another exemplary embodiment of the present application is shown. In the embodiment of the present application, the method is used for the first terminal 120 or the second terminal 160 in the implementation environment shown in fig. 1 or other terminals in the implementation environment as an example, and after step 203 and step 403, the following steps are further included.
Step 601, if the bunker property is attacked by the virtual property, updating the defense value of the bunker property according to the damage value of the virtual property.
Based on the explanation of the bunker prop in the above embodiment, the bunker prop in the embodiment of the present application is further provided with a defense value. And when the bunker prop is attacked by the enemy virtual object, updating the defense value according to the received injury value.
In one possible implementation, the virtual object controlled by the user is equipped with a bunker prop, and the bunker prop is attacked by the virtual prop of the enemy user, the injury value of the virtual prop is obtained, and the defense value of the bunker prop is updated according to the real-time injury value.
In an illustrative example, the initial defense value of the bunker prop in the armed state is 100, and the terminal receives a damage value of-30, so that the terminal updates the defense value of the bunker prop to 70 according to the real-time damage value.
Step 602, if the defense value of the bunker prop after updating is less than or equal to zero, the virtual object is controlled to discard the bunker prop.
Accordingly, defense values are decreasing after the bunker property is subjected to multiple attacks. And if the updated defense value of the bunker prop is reduced to be less than or equal to zero, the virtual object is controlled to discard the bunker prop.
In addition, a shelter prop with a defense value of zero exists, and the shelter prop with the defense value of zero only has a shielding function. In one illustrative example, as shown in FIG. 7, an interface diagram illustrating a shield process using shelter props is shown. The virtual object 701 is equipped with a shelter prop, which is a branch 701, and obviously, the shelter prop can only shield the virtual object 701 in an equipped state, but has no defense function when the virtual object 701 is attacked, so that the defense value of the shelter prop is set to 0.
Schematically, as shown in fig. 8, the calculation flow of the defense value of the bunker prop is shown. Judging whether the bunker prop is attacked or not; if the bunker property is not attacked, the calculation process is ended; if the bunker property is attacked, the terminal reduces and updates the defense value of the bunker property according to the damage value of the virtual property; judging whether the defense value of the bunker prop is larger than zero or not; if the defense value of the bunker property is larger than zero, the terminal continues to execute the process of judging whether the bunker property is attacked or not; and if the defense value of the bunker prop is less than or equal to zero, ending the calculation process.
In one possible embodiment, the virtual object manipulated by the user is provided with a life value. If the defense value of the bunker prop equipped by the virtual object is not zero, the life value of the virtual object is not changed when the virtual object is attacked in the defense direction; if the defense value of the bunker prop equipped by the virtual object is less than or equal to zero, the life value of the virtual object is reduced when the virtual object is attacked in the defense direction.
Schematically, as shown in fig. 9, a calculation flow of the virtual object life value is shown. When the virtual object is hit, judging whether a bunker prop is equipped in the hitting direction of the virtual object; if the bunker prop is not equipped, the terminal calculates the life value of the virtual object according to a preset calculation method; if the terminal is provided with the bunker prop, the terminal judges whether the defense value of the bunker prop is larger than zero; if the defense value of the bunker prop is less than or equal to zero, the terminal calculates the life value of the virtual object according to a preset calculation method; and if the defense value of the bunker prop is greater than zero, the terminal keeps the life value of the virtual object.
In addition, after the bunker property is attacked, the defense area, the shape and the like of the bunker property are changed, and in order to improve the reality of the game scene, in a possible implementation mode, the step 601 includes a step 603 and a step 604.
Step 603, if the defense value of the updated bunker prop is greater than zero, determining the prop integrity of the bunker prop according to the defense value of the updated bunker prop.
In a possible implementation mode, the bunker prop is a virtual prop with uniform density distribution and uniform thickness, the defense value and the defense volume are set to be in a direct proportion relationship, and the volume of the bunker prop is correspondingly reduced according to the reduction proportion of the defense value.
In the embodiment of the application, the rule of how to determine the completeness of the property of the bunker property according to the updated defense value of the bunker property is not limited.
And step 604, adjusting a prop model of the shelter prop according to the prop integrity.
In a possible implementation mode, at least two prop models of the bunker prop are preset in the terminal, and different prop models correspond to different prop integrity degrees. And if the bunker prop is attacked by the virtual prop, the terminal updates the defense value of the bunker prop and determines the prop integrity of the bunker prop according to the updated defense value of the bunker prop, so that a prop model matched with the current prop integrity is obtained from preset prop models.
To sum up, in the embodiment of the present application, if the bunker property is attacked by the virtual property, the defense value of the bunker property is updated according to the damage value of the virtual property. If the defense value of the updated bunker prop is less than or equal to zero, the virtual object is controlled to discard the bunker prop; and if the updated defense value of the bunker prop is larger than zero, determining the prop integrity of the bunker prop according to the updated defense value of the bunker prop, and adjusting the prop model of the bunker prop according to the prop integrity. Therefore, on the basis of the embodiment, the reality of the game can be further improved through the scheme of the embodiment.
In the above embodiment, the classification of the bunker property is not described in detail, and the specific game process when the user manipulates a virtual object to equip different types of bunker properties to attack is described below through steps 1001 and 1002.
Referring to FIG. 10, a flowchart of a method for occluding virtual objects in a virtual environment according to another exemplary embodiment of the present application is shown. The embodiment of the present application is described by taking the method as an example for being used in the first terminal 120 or the second terminal 160 in the implementation environment shown in fig. 1 or other terminals in the implementation environment, and includes the following steps.
Step 1001, displaying a virtual object and a shelter prop in a virtual environment, wherein the shelter prop is used for shielding the virtual object.
For details of this step, refer to step 201, and details of this embodiment are not described herein.
Step 1002, when the bunker property is located in the picking range of the virtual object and the picking operation of the bunker property is received, the virtual object is controlled to pick the bunker property.
For details of this step, refer to step 202, and details of this embodiment are not described herein.
And 1003, when equipment operation on the shelter prop is received, controlling the shelter prop to shelter the virtual object from the target shelter direction.
For details of this step, please refer to step 203, which is not detailed here
And 1004, if the bunker prop is the first type bunker prop, displaying an attack control in the user interface, wherein the attack control is used for triggering the use of the virtual prop for attack, and the first type bunker prop refers to a prop which is allowed to attack in an equipment state.
Schematically, as shown in fig. 11, it shows an interface diagram of an attack when a bunker prop is equipped. The user manipulates virtual object 1101 with a pane 1102 and the user interface displays attack controls 1103. The iron plate 1102 is a first type bunker property, and the iron plate 1102 is provided with a shooting hole 1104, so that when a user operates the virtual object 1101 to play a game, the user can be attacked by an enemy when the iron plate 1102 is in an equipment state.
Thus, a first type of bunker property refers to a property that allows an attack in the armed state.
In addition, in a possible implementation mode, the user interface is further provided with a direction control for controlling the defense direction of the bunker prop by the user, the user can conveniently change the defense direction of the bunker prop through the direction control, and multi-directional defense for the virtual object is achieved.
Illustratively, and as further shown in fig. 11, the user interface is provided with a direction control 1105 for the user to manipulate the direction of defense of the bunker prop. After the user triggers the direction control 1105, the movement control 1106 originally used for controlling the movement direction of the virtual object 1101 is changed into a control used for controlling the defense direction of the bunker prop, the user can change the defense direction of the bunker prop by triggering the movement control 1106, and after the user triggers the direction control 1105 again, the movement control 1106 is restored to the function of controlling the movement direction of the virtual object 1101.
In a possible embodiment, step 1005 is further included after step 1003.
Step 1005, if the bunker prop is the second type bunker prop, canceling the attack control displayed in the user interface, wherein the second type bunker prop refers to a prop which is not allowed to attack in the equipment state.
Schematically, a wood board 301 shown in fig. 3 is a second type of bunker property, and unlike the iron board 1101 in fig. 11, the wood board 301 is not provided with a shooting hole 1104, so that when a user manipulates a virtual object to play a game, the bunker property cannot attack the user with an enemy in an outfitted state.
Thus, the second type of bunker property refers to a property that does not allow attacks in the armed state.
Further, whether the first type of bunker prop or the second type of bunker prop is used, the common basic function is to shield the virtual object, and when the virtual object manipulated by the first user is equipped with the bunker prop, and the defense direction of the bunker prop faces the virtual object manipulated by the adversary user, the bunker prop realizes the function of shielding the virtual object manipulated by the first user.
Schematically, as shown in fig. 12, a flow chart of a method of interpreting whether a first virtual object is found by a second virtual object is shown. The first virtual object is controlled by a first user and is provided with a bunker prop, the second virtual object is controlled by a second user and is an enemy of the first virtual object; the terminal acquires the visual field of the second virtual object and judges whether the first shelter prop blocks the first virtual object in the visual field of the second virtual object; if the first virtual object is blocked by the shelter prop, the first virtual object is not found by the second virtual object; if the bunker property blocks the first virtual object, the first virtual object is discovered by the second virtual object.
In summary, in the embodiment of the present application, the types of bunker properties are specifically described. When the type of the bunker prop of the virtual object equipment is the first type of bunker prop, the user can control the virtual object to attack by using the bunker prop in the equipment state; when the type of the bunker prop of the virtual object equipment is the second type of bunker prop, the user cannot control the virtual object to attack by using the bunker prop in the equipment state. Through classifying the type of bunker stage property, can combine together bunker stage property and recreation scene better, improved the authenticity of recreation scene to player's experience sense in the game process has further been improved.
In addition, in each embodiment, if the bunker property is attacked by the virtual property, the striking sound effect corresponding to the bunker property is played, so that the reality sense of the game is further enhanced.
Fig. 13 is a block diagram illustrating a structure of an apparatus for blocking a virtual object in a virtual environment according to an exemplary embodiment of the present application, where the apparatus may be disposed in the first terminal 120 or the second terminal 160 in the implementation environment shown in fig. 1 or another terminal in the implementation environment, and the apparatus includes:
the property display module 1301 is configured to display a virtual object and a bunker property in a virtual environment, where the bunker property is used to shield the virtual object;
a property picking module 1302, wherein when the bunker property is located in the picking range of the virtual object and a picking operation of the bunker property is received by a user, the user controls the virtual object to pick the bunker property;
a virtual object shielding module 1303, configured to control the bunker prop to shield the virtual object from a target shielding direction when receiving an equipment operation on the bunker prop;
a movement control module 1304, configured to, when a movement operation on the virtual object is received, control the bunker prop to move in the same direction as the virtual object.
Optionally, the movement control module 1304 includes:
a parameter obtaining subunit, configured to, when the moving operation on the virtual object is received, obtain a target speed attenuation parameter corresponding to the bunker prop, where the target speed attenuation parameter refers to an attenuation influence of the bunker prop on a moving speed of the virtual object;
the speed determining subunit is used for determining a target moving speed according to the initial moving speed of the virtual object and the target speed attenuation parameter;
and the movement control subunit is used for controlling the bunker prop to move in the same direction as the virtual object according to the target movement speed.
Optionally, the parameter obtaining subunit is configured to:
acquiring the prop integrity of the bunker prop and an initial speed attenuation parameter of the bunker prop, wherein the prop integrity is related to the attack injury suffered by the bunker prop;
and determining the target speed attenuation parameter according to the prop completeness and the initial speed attenuation parameter, wherein the target speed attenuation parameter and the prop completeness are in a negative correlation relationship.
Optionally, the apparatus further comprises:
the defense value updating module is used for updating the defense value of the bunker prop according to the injury value of the virtual prop if the bunker prop is attacked by the virtual prop;
and the prop discarding module is used for controlling the virtual object to discard the bunker prop if the defense value of the bunker prop is less than or equal to zero after updating.
Optionally, the apparatus further comprises:
the prop integrity determination module is used for determining the prop integrity of the bunker prop according to the updated defense value of the bunker prop if the updated defense value of the bunker prop is larger than zero;
and the prop model adjusting module is used for adjusting the prop model of the bunker prop according to the prop integrity.
Optionally, the apparatus further comprises:
and the sound effect playing module is used for playing the striking sound effect corresponding to the bunker prop if the bunker prop is attacked by the virtual prop.
Optionally, the apparatus further comprises:
the attack control display module is used for displaying an attack control in a user interface if the bunker prop is a first type bunker prop, wherein the attack control is used for triggering the attack by using a virtual prop, and the first type bunker prop refers to a prop which is allowed to attack in an equipment state;
and the attack control canceling module is used for canceling the attack control displayed in the user interface if the bunker prop is a second type bunker prop, and the second type bunker prop indicates a prop which is not allowed to attack in an equipment state.
Referring to fig. 14, a block diagram of a terminal 1400 according to an exemplary embodiment of the present application is shown. The terminal 1400 may be a portable mobile terminal such as: smart phones, tablet computers, MP3 players (Moving picture Experts Group Audio Layer III, mpeg Audio Layer IV), MP4 players (Moving picture Experts Group Audio Layer IV, mpeg Audio Layer 4). Terminal 1400 can also be referred to by other names such as user equipment, portable terminal, and the like.
In general, terminal 1400 includes: a processor 1401, and a memory 1402.
Processor 1401 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so forth. The processor 1401 may be implemented in at least one hardware form of DSP (Digital Signal Processing), FPGA (Field-Programmable Gate Array), and PLA (Programmable Logic Array). Processor 1401 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also referred to as a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 1401 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing content that the display screen needs to display. In some embodiments, processor 1401 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 1402 may include one or more computer-readable storage media, which may be tangible and non-transitory. Memory 1402 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 1402 is used to store at least one instruction for execution by processor 1401 to implement a method provided by embodiments of the present application.
In some embodiments, terminal 1400 may further optionally include: a peripheral device interface 1403 and at least one peripheral device. Specifically, the peripheral device includes: at least one of radio frequency circuitry 1404, a touch display 1405, a camera 1406, audio circuitry 1407, a positioning component 1408, and a power supply 1409.
The peripheral device interface 1403 can be used to connect at least one peripheral device related to I/O (Input/Output) to the processor 1401 and the memory 1402. In some embodiments, the processor 1401, memory 1402, and peripheral interface 1403 are integrated on the same chip or circuit board; in some other embodiments, any one or both of the processor 1401, the memory 1402, and the peripheral device interface 1403 may be implemented on a separate chip or circuit board, which is not limited in this embodiment.
The Radio Frequency circuit 1404 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuitry 1404 communicates with communication networks and other communication devices via electromagnetic signals. The rf circuit 1404 converts an electrical signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electrical signal. Optionally, the radio frequency circuit 1404 includes: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 1404 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the radio frequency circuit 1404 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.
The touch display 1405 is used to display a UI (user interface). The UI may include graphics, text, icons, video, and any combination thereof. The touch display 1405 also has the ability to capture touch signals at or above the surface of the touch display 1405. The touch signal may be input to the processor 1401 for processing as a control signal. The touch display 1405 is used to provide virtual buttons and/or virtual keyboards, also referred to as soft buttons and/or soft keyboards. In some embodiments, the touch display 1405 may be one, providing the front panel of the terminal 1400; in other embodiments, the touch display 1405 can be at least two, respectively disposed on different surfaces of the terminal 1400 or in a folded design; in still other embodiments, touch display 1405 can be a flexible display disposed on a curved surface or on a folded surface of terminal 1400. Even the touch display 1405 can be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The touch Display 1405 can be made of LCD (Liquid Crystal Display), OLED (Organic Light-Emitting Diode), and the like.
The camera assembly 1406 is used to capture images or video. Optionally, camera assembly 1406 includes a front camera and a rear camera. Generally, a front camera is used for realizing video call or self-shooting, and a rear camera is used for realizing shooting of pictures or videos. In some embodiments, the number of the rear cameras is at least two, and each of the rear cameras is any one of a main camera, a depth-of-field camera and a wide-angle camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting function and a VR (Virtual Reality) shooting function. In some embodiments, camera assembly 1406 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
Audio circuit 1407 is operative to provide an audio interface between the user and terminal 1400. The audio circuit 1407 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 1401 for processing or inputting the electric signals to the radio frequency circuit 1404 to realize voice communication. For stereo capture or noise reduction purposes, multiple microphones may be provided, each at a different location of terminal 1400. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is then used to convert electrical signals from the processor 1401 or the radio frequency circuit 1404 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio circuit 1407 may also include a headphone jack.
The positioning component 1408 serves to locate the current geographic position of the terminal 1400 for navigation or LBS (location based Service). The positioning component 1408 may be based on the positioning component of the GPS (global positioning System) in the united states, the beidou System in china, or the galileo System in russia.
Power supply 1409 is used to power the various components of terminal 1400. The power source 1409 may be alternating current, direct current, disposable or rechargeable. When the power source 1409 comprises a rechargeable battery, the rechargeable battery can be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, terminal 1400 also includes one or more sensors 1410. The one or more sensors 1410 include, but are not limited to: acceleration sensor 1411, gyroscope sensor 1412, pressure sensor 1413, fingerprint sensor 1414, optical sensor 1415, and proximity sensor 1416.
The acceleration sensor 1411 may detect the magnitude of acceleration on three coordinate axes of a coordinate system established with the terminal 1400. For example, the acceleration sensor 1411 may be used to detect components of the gravitational acceleration in three coordinate axes. The processor 1401 can control the touch display 1405 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal collected by the acceleration sensor 1411. The acceleration sensor 1411 may also be used for the acquisition of motion data of a game or a user.
The gyro sensor 1412 may detect a body direction and a rotation angle of the terminal 1400, and the gyro sensor 1412 and the acceleration sensor 1411 may cooperate to collect a 3D motion of the user on the terminal 1400. The processor 1401 can realize the following functions according to the data collected by the gyro sensor 1412: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
Pressure sensors 1413 may be disposed on the side bezel of terminal 1400 and/or underlying touch display 1405. When the pressure sensor 1413 is disposed at the side frame of the terminal 1400, a user's holding signal of the terminal 1400 can be detected, and left-right hand recognition or shortcut operation can be performed according to the holding signal. When the pressure sensor 1413 is disposed at the lower layer of the touch display screen 1405, it is possible to control an operability control on the UI interface according to a pressure operation of the user on the touch display screen 1405. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 1414 is used for collecting a fingerprint of a user to identify the identity of the user based on the collected fingerprint. Upon recognizing that the user's identity is a trusted identity, processor 1401 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for, and changing settings, etc. Fingerprint sensor 1414 may be disposed on the front, back, or side of terminal 1400. When a physical button or vendor Logo is provided on terminal 1400, fingerprint sensor 1414 may be integrated with the physical button or vendor Logo.
The optical sensor 1415 is used to collect ambient light intensity. In one embodiment, processor 1401 can control the display brightness of touch display 1405 based on the ambient light intensity collected by optical sensor 1415. Specifically, when the ambient light intensity is high, the display luminance of the touch display 1405 is increased; when the ambient light intensity is low, the display brightness of the touch display 1405 is turned down. In another embodiment, the processor 1401 can also dynamically adjust the shooting parameters of the camera assembly 1406 according to the intensity of the ambient light collected by the optical sensor 1415.
Proximity sensors 1416, also known as distance sensors, are typically disposed on the front face of terminal 1400. The proximity sensor 1416 is used to collect the distance between the user and the front surface of the terminal 1400. In one embodiment, when proximity sensor 1416 detects that the distance between the user and the front face of terminal 1400 is gradually decreased, processor 1401 controls touch display 1405 to switch from a bright screen state to a dark screen state; when proximity sensor 1416 detects that the distance between the user and the front face of terminal 1400 is gradually increasing, processor 1401 controls touch display 1405 to switch from a breath-screen state to a bright-screen state.
Those skilled in the art will appreciate that the configuration shown in fig. 14 is not intended to be limiting with respect to terminal 1400 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be employed.
The present application further provides a computer-readable storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored in the computer-readable storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the method for blocking a virtual object in a virtual environment according to any of the foregoing embodiments.
The present application further provides a computer program product, when the computer program product runs on a server, causing a computer to execute the method for blocking a virtual object in a virtual environment provided by the above method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A method of occluding a virtual object in a virtual environment, the method comprising:
displaying a virtual object and a bunker prop in a virtual environment, wherein the bunker prop is used for shielding the virtual object;
when the bunker prop is positioned in the picking range of the virtual object and a picking operation of the bunker prop is received, controlling the virtual object to pick the bunker prop;
when equipment operation on the bunker prop is received, the bunker prop is controlled to shield the virtual object from a target shielding direction;
when a moving operation of the virtual object is received, controlling the bunker prop to move in the same direction as the virtual object.
2. The method of claim 1, wherein the controlling the bunker prop to move in the same direction as the virtual object when the movement operation for the virtual object is received comprises:
when the moving operation of the virtual object is received, obtaining a target speed attenuation parameter corresponding to the bunker prop, wherein the target speed attenuation parameter refers to the attenuation influence of the bunker prop on the moving speed of the virtual object;
determining a target moving speed according to the initial moving speed of the virtual object and the target speed attenuation parameter;
and controlling the bunker prop to move in the same direction as the virtual object according to the target moving speed.
3. The method of claim 2, wherein the obtaining of the target speed attenuation parameter corresponding to the bunker prop comprises:
acquiring the prop integrity of the bunker prop and an initial speed attenuation parameter of the bunker prop, wherein the prop integrity is related to the attack injury suffered by the bunker prop;
and determining the target speed attenuation parameter according to the prop integrity and the initial speed attenuation parameter, wherein the target speed attenuation parameter and the prop integrity are in a negative correlation relationship.
4. The method of any one of claims 1 to 3, wherein after controlling the bunker prop to block the virtual object from a target blocking direction, the method further comprises:
if the bunker prop is attacked by the virtual prop, updating a defense value of the bunker prop according to an injury value of the virtual prop;
and if the updated defense value of the bunker prop is less than or equal to zero, controlling the virtual object to discard the bunker prop.
5. The method of claim 4, wherein after updating the defense value of the bunker prop according to the injury value of the virtual prop, the method further comprises:
if the updated defense value of the bunker prop is larger than zero, determining the prop integrity of the bunker prop according to the updated defense value of the bunker prop;
and adjusting a prop model of the bunker prop according to the prop integrity.
6. The method of claim 4, further comprising:
and if the bunker prop is attacked by the virtual prop, playing a striking sound effect corresponding to the bunker prop.
7. The method of any one of claims 1 to 3, wherein after controlling the bunker prop to block the virtual object from a target blocking direction, the method further comprises:
if the bunker prop is a first type bunker prop, displaying an attack control in a user interface, wherein the attack control is used for triggering the use of a virtual prop for attack, and the first type bunker prop refers to a prop which is allowed to attack in an equipment state;
and if the bunker prop is a second type bunker prop, canceling the attack control from being displayed in the user interface, wherein the second type bunker prop refers to a prop which is not allowed to attack in an equipment state.
8. An apparatus for occluding virtual objects in a virtual environment, the apparatus comprising:
the property display module is used for displaying a virtual object and a bunker property in a virtual environment, and the bunker property is used for shielding the virtual object;
the property picking module is used for controlling the virtual object to pick up the bunker property when the bunker property is positioned in a picking range of the virtual object and a picking operation of the bunker property is received by a user;
the virtual object shielding module is used for controlling the bunker prop to shield the virtual object from a target shielding direction when equipment operation on the bunker prop is received;
and the movement control module is used for controlling the bunker prop to move in the same direction as the virtual object when the movement operation of the virtual object is received.
9. A terminal, characterized in that the terminal comprises: a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the method of occluding virtual objects in a virtual environment as claimed in any one of claims 1 to 7.
10. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the method of occluding virtual objects in a virtual environment of any one of claims 1 to 7.
CN201910961871.2A 2019-10-11 2019-10-11 Method, terminal and medium for shielding virtual object in virtual environment Active CN110721469B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910961871.2A CN110721469B (en) 2019-10-11 2019-10-11 Method, terminal and medium for shielding virtual object in virtual environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910961871.2A CN110721469B (en) 2019-10-11 2019-10-11 Method, terminal and medium for shielding virtual object in virtual environment

Publications (2)

Publication Number Publication Date
CN110721469A true CN110721469A (en) 2020-01-24
CN110721469B CN110721469B (en) 2022-04-15

Family

ID=69220903

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910961871.2A Active CN110721469B (en) 2019-10-11 2019-10-11 Method, terminal and medium for shielding virtual object in virtual environment

Country Status (1)

Country Link
CN (1) CN110721469B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111803933A (en) * 2020-07-22 2020-10-23 网易(杭州)网络有限公司 Property control method in game, terminal, electronic device and readable storage medium
CN111921190A (en) * 2020-08-26 2020-11-13 腾讯科技(深圳)有限公司 Method, device, terminal and storage medium for equipping props of virtual objects
CN112121432A (en) * 2020-09-30 2020-12-25 腾讯科技(深圳)有限公司 Control method, device and equipment of virtual prop and computer readable storage medium
CN112221142A (en) * 2020-11-06 2021-01-15 腾讯科技(深圳)有限公司 Control method and device of virtual prop, computer equipment and storage medium
CN112370785A (en) * 2020-09-22 2021-02-19 腾讯科技(深圳)有限公司 Control method and device of virtual prop, storage medium and electronic equipment
CN112774201A (en) * 2021-01-22 2021-05-11 北京字跳网络技术有限公司 Virtual character masking method and device, computer equipment and storage medium
CN113797557A (en) * 2021-09-24 2021-12-17 网易(杭州)网络有限公司 Game control method and device, electronic equipment and storage medium
CN114272597A (en) * 2021-12-24 2022-04-05 河北奇胜创新智能技术有限公司 Virtual reality training method, device, equipment, system and computer storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106201877A (en) * 2016-07-08 2016-12-07 福州市鼓楼区森林创数文化传播有限公司 A kind of method of testing of FPS game item
CN109350964A (en) * 2018-09-28 2019-02-19 腾讯科技(深圳)有限公司 Control method, apparatus, equipment and the storage medium of virtual role
CN109407959A (en) * 2018-10-31 2019-03-01 腾讯科技(深圳)有限公司 Virtual object control method, equipment and storage medium in virtual scene
JP2019146985A (en) * 2019-04-23 2019-09-05 株式会社バンダイ Toy and game machine
CN110215691A (en) * 2019-07-17 2019-09-10 网易(杭州)网络有限公司 The control method for movement and device of virtual role in a kind of game

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106201877A (en) * 2016-07-08 2016-12-07 福州市鼓楼区森林创数文化传播有限公司 A kind of method of testing of FPS game item
CN109350964A (en) * 2018-09-28 2019-02-19 腾讯科技(深圳)有限公司 Control method, apparatus, equipment and the storage medium of virtual role
CN109407959A (en) * 2018-10-31 2019-03-01 腾讯科技(深圳)有限公司 Virtual object control method, equipment and storage medium in virtual scene
JP2019146985A (en) * 2019-04-23 2019-09-05 株式会社バンダイ Toy and game machine
CN110215691A (en) * 2019-07-17 2019-09-10 网易(杭州)网络有限公司 The control method for movement and device of virtual role in a kind of game

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
小火箭解说: "《绝地求生:超级盾牌首次上线,枪对它攻击无效,捡到就等于吃鸡》", 11 June 2018 *
鲁大能和谌嘉诚: "《在绝地求生中加入防爆盾!会怎么样?我帮蓝洞做游戏#3》", 23 April 2019 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111803933A (en) * 2020-07-22 2020-10-23 网易(杭州)网络有限公司 Property control method in game, terminal, electronic device and readable storage medium
CN111803933B (en) * 2020-07-22 2024-02-09 网易(杭州)网络有限公司 Prop control method in game, terminal, electronic device and readable storage medium
CN111921190A (en) * 2020-08-26 2020-11-13 腾讯科技(深圳)有限公司 Method, device, terminal and storage medium for equipping props of virtual objects
CN111921190B (en) * 2020-08-26 2023-10-03 腾讯科技(深圳)有限公司 Prop equipment method, device, terminal and storage medium for virtual object
CN112370785A (en) * 2020-09-22 2021-02-19 腾讯科技(深圳)有限公司 Control method and device of virtual prop, storage medium and electronic equipment
CN112370785B (en) * 2020-09-22 2022-05-20 腾讯科技(深圳)有限公司 Control method and device of virtual prop, storage medium and electronic equipment
CN112121432A (en) * 2020-09-30 2020-12-25 腾讯科技(深圳)有限公司 Control method, device and equipment of virtual prop and computer readable storage medium
CN112221142B (en) * 2020-11-06 2022-05-17 腾讯科技(深圳)有限公司 Control method and device of virtual prop, computer equipment and storage medium
WO2022095624A1 (en) * 2020-11-06 2022-05-12 腾讯科技(深圳)有限公司 Virtual prop control method and apparatus, computer device, and storage medium
CN112221142A (en) * 2020-11-06 2021-01-15 腾讯科技(深圳)有限公司 Control method and device of virtual prop, computer equipment and storage medium
CN112774201A (en) * 2021-01-22 2021-05-11 北京字跳网络技术有限公司 Virtual character masking method and device, computer equipment and storage medium
CN113797557A (en) * 2021-09-24 2021-12-17 网易(杭州)网络有限公司 Game control method and device, electronic equipment and storage medium
CN114272597A (en) * 2021-12-24 2022-04-05 河北奇胜创新智能技术有限公司 Virtual reality training method, device, equipment, system and computer storage medium

Also Published As

Publication number Publication date
CN110721469B (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN110694261B (en) Method, terminal and storage medium for controlling virtual object to attack
CN110413171B (en) Method, device, equipment and medium for controlling virtual object to perform shortcut operation
CN110721469B (en) Method, terminal and medium for shielding virtual object in virtual environment
CN109126129B (en) Method, device and terminal for picking up virtual article in virtual environment
CN108815851B (en) Interface display method, equipment and storage medium for shooting in virtual environment
CN110755841B (en) Method, device and equipment for switching props in virtual environment and readable storage medium
CN110613938B (en) Method, terminal and storage medium for controlling virtual object to use virtual prop
US20210387087A1 (en) Method for controlling virtual object and related apparatus
CN110585710B (en) Interactive property control method, device, terminal and storage medium
CN110694273A (en) Method, device, terminal and storage medium for controlling virtual object to use prop
CN111389005B (en) Virtual object control method, device, equipment and storage medium
CN111659117B (en) Virtual object display method and device, computer equipment and storage medium
CN110755844B (en) Skill activation method and device, electronic equipment and storage medium
CN111330274B (en) Virtual object control method, device, equipment and storage medium
CN111672106B (en) Virtual scene display method and device, computer equipment and storage medium
CN110448908B (en) Method, device and equipment for applying sighting telescope in virtual environment and storage medium
CN111744186A (en) Virtual object control method, device, equipment and storage medium
CN112221141A (en) Method and device for controlling virtual object to use virtual prop
CN112221142B (en) Control method and device of virtual prop, computer equipment and storage medium
CN110917618A (en) Method, apparatus, device and medium for controlling virtual object in virtual environment
CN110917623A (en) Interactive information display method, device, terminal and storage medium
CN111249726B (en) Operation method, device, equipment and readable medium of virtual prop in virtual environment
CN111330278B (en) Animation playing method, device, equipment and medium based on virtual environment
CN112138374A (en) Virtual object attribute value control method, computer device, and storage medium
CN111330277A (en) Virtual object control method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant