CN110888671A - Configuration method and device of virtual prop, storage medium and electronic device - Google Patents

Configuration method and device of virtual prop, storage medium and electronic device Download PDF

Info

Publication number
CN110888671A
CN110888671A CN201911175797.8A CN201911175797A CN110888671A CN 110888671 A CN110888671 A CN 110888671A CN 201911175797 A CN201911175797 A CN 201911175797A CN 110888671 A CN110888671 A CN 110888671A
Authority
CN
China
Prior art keywords
virtual
target
pendants
group
pendant
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911175797.8A
Other languages
Chinese (zh)
Other versions
CN110888671B (en
Inventor
梁超
刘智洪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911175797.8A priority Critical patent/CN110888671B/en
Publication of CN110888671A publication Critical patent/CN110888671A/en
Application granted granted Critical
Publication of CN110888671B publication Critical patent/CN110888671B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/55Controlling game characters or game objects based on the game progress
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Multimedia (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a configuration method and device of a virtual prop, a storage medium and an electronic device. Wherein, the method comprises the following steps: acquiring a target operation instruction for indicating a target corresponding relation between a configuration target virtual attack prop and a target virtual pendant on a target configuration interface; responding to a target operation instruction, searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, and the naming formats of the filenames of the resource files of the first group of virtual pendants are the same; according to the file name of the resource file of the second group of virtual pendants, the corresponding relation between the target virtual attack prop and each virtual pendant in the second group of virtual pendants is configured and expressed, and the target virtual pendant comprises the second group of virtual pendants, so that the technical problem that the process of configuring the virtual pendant for the virtual prop is complicated in the prior art is solved.

Description

Configuration method and device of virtual prop, storage medium and electronic device
Technical Field
The invention relates to the field of games, in particular to a configuration method and device of a virtual item, a storage medium and an electronic device.
Background
In the current moving end shooting game, the weapon is the core soul of the shooting game, and the weapon is necessarily used as long as the shooting game is entered, and peripheral modules related to the weapon are such as the pendant of the weapon, wherein, the weapon is provided with a sighting telescope, a stock, a capacity expansion clip, a handle, a silencer and the like. Each weapon is a resource, and similarly, each pendant is a resource, because there are hundreds of weapons in the game, and the model sizes of different types of weapons with different purposes are completely different, so that the pendants hung on the weapons are completely different, that is, a weapon needs to correspond to a plurality of pendant reference relations, so that there are very configuration files, which are usually configured by manpower, the workload is very large, and each modification needs a lot of manpower and material resources.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a configuration method and device of a virtual item, a storage medium and an electronic device, and at least solves the technical problem that in the prior art, the process of configuring a virtual pendant on the virtual item is complex.
According to an aspect of an embodiment of the present invention, a method for configuring a virtual item is provided, including: acquiring a target operation instruction on a target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between a target virtual attack prop and a target virtual pendant; searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants in response to the target operation instruction, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop; and configuring the target corresponding relation according to the file name of the resource file of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant in the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants.
According to another aspect of the embodiments of the present invention, there is also provided a configuration device of a virtual item, including: the system comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining a target operation instruction on a target configuration interface, and the target operation instruction is used for indicating a target corresponding relation between a configuration target virtual attack prop and a target virtual pendant; a response unit, configured to respond to the target operation instruction, search, from filenames of resource files of a first group of virtual pendants, filenames of resource files of a second group of virtual pendants, where the filenames of resource files of the second group of virtual pendants include a name of the target virtual attack prop, the filenames of resource files of the first group of virtual pendants have the same naming format, and the filenames of resource files of the first group of virtual pendants all include a name of a virtual pendant and a name of a virtual attack prop; a configuration unit, configured to configure the target correspondence according to a filename of a resource file of the second group of virtual pendants, where the target correspondence is used to represent a correspondence between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant includes the second group of virtual pendants.
According to another aspect of the embodiment of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, where the computer program is configured to execute the configuration method of the virtual prop when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic apparatus, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the method for configuring the virtual prop through the computer program.
In the embodiment of the invention, a target operation instruction is obtained on a target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between a target virtual attack prop and a target virtual pendant; searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants in response to the target operation instruction, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop; and configuring a target corresponding relation according to the file name of the resource file of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant in the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants, so that the aim of configuring the virtual prop according to the same naming format between the target virtual attack prop and the virtual pendant in the configuration process of the virtual prop is fulfilled, the technical effect of configuring the virtual prop after naming each virtual pendant is reduced, and the technical problem that the process of configuring the virtual pendant for the virtual prop is complicated in the prior art is solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is a schematic diagram of an application environment of an alternative method for configuring virtual items, according to an embodiment of the present invention;
FIG. 2 is a flow chart of a method for configuring selectable virtual items, according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of naming an alternative weapon resource file, according to an embodiment of the invention;
FIG. 4 is a schematic diagram of naming an alternative pendant resource file according to an embodiment of the present invention;
FIG. 5 is a schematic illustration of an alternative weapon and pendant correspondence, according to an embodiment of the invention;
FIG. 6 is a schematic diagram of resource files corresponding to an alternative weapon and pendant, according to an embodiment of the invention;
FIG. 7 is a UI interface diagram of an alternative profile generation tool in accordance with embodiments of the invention;
FIG. 8 is a flow chart of an alternative method for automatically generating a weapon configuration in a shooting game in accordance with the preferred embodiment of the present invention;
FIG. 9 is an interface diagram of an alternative configuration-completed resource code file in accordance with a preferred embodiment of the present invention;
FIG. 10 is a schematic structural diagram of an alternative configuration device for virtual props, according to an embodiment of the present invention;
fig. 11 is a schematic structural diagram of an electronic device of a selectable configuration method of a virtual item according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiment of the present invention, a method for configuring a virtual item is provided, and optionally, as an optional implementation manner, the method for configuring a virtual item may be, but is not limited to be, applied to an environment as shown in fig. 1.
Optionally, in this embodiment, the configuration method of the virtual item may be, but is not limited to, applied to the server 104, and is configured to obtain a target operation instruction on a target configuration interface, where the target operation instruction is used to instruct to configure a target corresponding relationship between the target virtual attack item and the target virtual pendant; searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants in response to the target operation instruction, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop; and configuring a target corresponding relation according to the file names of the resource files of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant in the second group of virtual pendants, and the target virtual pendant comprises the mode of the second group of virtual pendants. The application client may be but not limited to run in the user equipment 102, and the user equipment 102 may be but not limited to a mobile phone, a tablet computer, a notebook computer, a PC, and other terminal equipment supporting running of the application client. The server 104 and the user device 102 may, but are not limited to, enable data interaction via a network, which may include, but is not limited to, a wireless network or a wired network. Wherein, this wireless network includes: bluetooth, WIFI, and other networks that enable wireless communication. Such wired networks may include, but are not limited to: wide area networks, metropolitan area networks, and local area networks. The above is merely an example, and this is not limited in this embodiment.
The server 104 achieves the purpose of configuring the virtual item according to the same naming format between the target virtual attack item and the virtual pendant in the configuration process of the virtual item through the step 102 and the step 106, thereby achieving the technical effect of reducing the configuration with the virtual attack item after naming each virtual pendant, and further solving the technical problem of tedious process of configuring the virtual pendant for the virtual item in the prior art.
Optionally, as an optional implementation manner, as shown in fig. 2, the configuration method of the virtual item includes:
step S202, a target operation instruction is obtained on a target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between the target virtual attack prop and the target virtual pendant.
Step S204, responding to the target operation instruction, and searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop.
Step S206, configuring a target corresponding relation according to the file names of the resource files of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants.
Optionally, by applying the method in this embodiment, a pendant may be configured for the virtual item in the game. For example, a gun in the game is provided with a sighting telescope, a gunstock and other pendants, so that a player can shoot an enemy player more accurately in the game, and the good experience of the game of the player is increased.
The games may include, but are not limited to, shooting games, and the shooting games may include first person shooting games, third person shooting games, and the like, including but not limited to all games that use hot weapons for remote attacks.
It should be noted that the target configuration interface is a target corresponding relationship used for configuring the configuration of the target virtual attack prop and the target virtual pendant, that is, a developer in the game may configure the game running code of the virtual pendant of the virtual attack prop for the virtual attack prop in the game based on the configuration interface. For example, a gun in a game is provided with a pendant such as a sighting telescope, a stock, and the like. The target virtual attack prop can include, but is not limited to, a gun weapon, a grenade in a game, the target virtual pendant can be a sighting telescope, a stock, a flash cartridge, a grip, a silencer, etc. configured with a gun, and equipment configured with a throw distance of a grenade, etc. The target virtual attack prop can be a weapon used by a game character in a game, such as a gun weapon, a grenade weapon and the like. The target virtual attack prop can be multiple, namely, one game character in the game can use multiple weapons, but only one weapon can be used at the same time.
The program only concerns naming of the resource catalog after the art is manufactured, the program does not concern what the resources for the art manufacturing are, and the resource of the target attack prop (namely, weapon) is named according to a preset rule before the pairing relation is configured for naming operation of each resource in the program and convenience for configuring the corresponding relation between the target attack prop and the target virtual pendant. I.e., the art is required to comply with the rules of the resource naming specification, as shown in fig. 3, the naming of the weapon resource file is schematically illustrated, as shown in fig. 3, and the naming suffix of the weapon resource file is the name of the weapon.
What is shown in fig. 3 is a catalogue of each weapon, how the prefix is not concerned with the program, what is mainly concerned is the suffix name, the program can obtain the information of the weapon by acquiring the character string of the catalogue, and then the naming specification of the pendant (accessory of the weapon) is shown in fig. 4. That is, the naming convention shown in FIG. 4 is: the prefix is the name of the pendant, and the suffix is the weapon's life corresponding to the pendant. It should be noted that one pendant can correspond to multiple weapons, that is, multiple weapons can use the same pendant. For example, the pendant sighting telescope can be used by the gun 1 and the gun 2, and the gun 1 and the gun 2 can be different models of guns. A plurality of pendants can be arranged and used on one weapon. For example, firearm 1 may be equipped with a sighting telescope and a stock, which may provide a more convenient player to carry out shooting operations with firearm 1.
It should be noted that, a target correspondence relationship is configured according to the filename of the resource file of the second group of virtual pendants, where the target correspondence relationship represents that the second group of virtual pendants is allowed to be assembled to the target virtual attack prop. The resource files of the first group of virtual attack props can be images or models for rendering weapons, and the resource files of the second group of virtual pendants can be images or models for rendering weapon accessories.
Optionally, configuring the target correspondence according to the filename of the resource file of the second group of virtual pendants, including:
s1, acquiring the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants from the filename of the resource file of the second group of virtual pendants;
and S2, generating a target configuration file according to the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants, wherein the target configuration file records information used for representing the target corresponding relation, and the target configuration file is used for allowing the target virtual attack prop to be assembled with each virtual pendant in the second group of virtual pendants in the target shooting application.
When the program reads the weapon catalog and the pendant catalog, all pendants owned by each weapon can be obtained, and then corresponding resources can be generated and configured into a reference relationship list of the weapons and the pendants, as shown in fig. 5, a schematic diagram of the correspondence relationship between the weapons and the pendants is shown in fig. 5, the first column is the ID of the weapon, each weapon has a unique ID, then each pendant also has a unique ID, and each row represents the ID of the pendant owned by the weapon; with the ID, there is naturally a relationship of the model corresponding to the ID.
The application relationship may also be a relationship reference configuration, where the relationship reference configuration is: the related functions or configurations are referred to and automatically generate corresponding references and configurations through automation tools, and the configurations can be excel tables, code files, txt texts and the like.
Optionally, generating a target configuration file according to the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants, where the target configuration file includes:
s1, acquiring a prop identifier corresponding to the name of the target virtual attack prop and identifiers of virtual pendants corresponding to the name of each virtual pendant in the second group of virtual pendants one by one;
and S2, generating a target configuration file, wherein the target configuration file records a property identifier of the target virtual attack property and an identifier of each virtual pendant in the second group of virtual pendants corresponding to the property identifier, and the target correspondence is the correspondence between the property identifier and the identifier of each virtual pendant.
In the embodiment of the invention, a prop identifier corresponding to the name of the target virtual attack prop and identifiers of virtual pendants in the second group of virtual pendants in one-to-one correspondence are obtained, and a target configuration file recording the prop identifier of the target virtual attack prop and the identifiers of the virtual pendants in the second group of virtual pendants corresponding to the prop identifier is generated. That is, after the program reads the weapon directory and the pendant directory, all pendants owned by each weapon can be acquired, and then the corresponding resource configuration can be generated to the reference relationship list of the weapon and the pendant, and the resource file as shown in fig. 6 is automatically generated. That is, the resource can be found through the ID, and the pendant can be loaded on the corresponding weapon when the resource is found. I.e. the weapon is provided with a corresponding pendant.
According to the embodiment, the resource files of the virtual attack props are named according to the preset rules, the resource files of the virtual pendants are named according to the preset rules, the naming formats of the two are the same, the resource files of the virtual attack props are searched from the resource files of the virtual pendants, the corresponding relation used for representing the target virtual attack props and each virtual pendant of the second group of virtual pendants is configured according to the file name of the resource files of the virtual pendants, and the corresponding relation represents that the second group of virtual pendants are allowed to be assembled to the target virtual attack props. The method achieves the purpose that the configuration can be carried out according to the same naming format between the target virtual attack prop and the virtual pendant in the configuration process of the virtual prop, thereby realizing the technical effect of reducing the configuration with the virtual attack prop after naming each virtual pendant, and further solving the technical problem that the process of configuring the virtual pendant for the virtual prop is complicated in the prior art.
It should be noted that the configuration file in the above embodiment may be generated by a generation tool, and a UI interface diagram of the tool is shown in fig. 7.
Through the embodiment, when an art designer makes images or models of weapons or weapon pendants in a game, the images or models can be named according to a uniform rule. And then the program can only concern about the command to the resource catalog after the art is manufactured, and then the renaming of the resource is reduced, so that the work of configuring the pendant on the weapon is reduced, and the time and the labor are saved.
As an optional embodiment, after generating the target configuration file, the method further includes: acquiring information used for representing a target corresponding relation in a target configuration file in a target shooting application; searching a resource file of the target virtual attack prop and a resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information; the method comprises the steps of displaying a target virtual attack prop represented by a resource file of the target virtual attack prop and partial or all virtual pendants represented by resource files of partial or all virtual pendants in a target shooting application, wherein the partial or all virtual pendants are assembled on the target virtual attack prop.
It should be noted that, in the above embodiment, when the configuration file runs in the game, part or all of the virtual on-hook may be assembled in the target virtual attack prop. For example, a gun is a virtual attack prop, and at the beginning of a game, 7 pendants are configured for gun 1, but in the whole game process, a player only acquires 3 pendants, and then can assemble 3 pendants for gun 1, and in the whole game process, a player acquires 7 pendants, and then can assemble 7 pendants for gun 1. Further, the gun 1 is assembled in an optimal state, so that a player can play a game conveniently, and the game experience of the player is improved.
It should be further explained that the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants are searched according to the information representing the target corresponding relationship, including: under the condition that the information comprises a prop identifier of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants, acquiring a resource file of the target virtual attack prop indicated by the prop identifier on a preset first storage path, and acquiring a resource file of part or all of the virtual pendants represented by part or all of the identifiers of each virtual pendant on a preset second storage path.
Searching the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information, wherein the method comprises the following steps:
s1, acquiring a target assembly instruction in the target shooting application, wherein the target assembly instruction is used for requesting part or all of the virtual pendants in the second group of virtual pendants;
and S2, responding to the target assembly instruction, and searching the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information.
As an alternative embodiment, the obtaining the target operation instruction on the target configuration interface includes:
s1, acquiring a first operation instruction in the target configuration interface, wherein the first operation instruction is used for selecting the file name of the resource file of the target virtual attack prop, and the file name of the resource file of the target virtual attack prop comprises the name of the target virtual attack prop;
and S2, acquiring a second operation instruction in the target configuration interface, wherein the second operation instruction is used for indicating the configuration of the target corresponding relation between the target virtual attack prop and the target virtual pendant, and the target operation instruction comprises a first operation instruction and a second operation instruction.
As an alternative embodiment, after configuring the target correspondence according to the filename of the resource file of the second group of virtual pendants, the method may further include: generating a target log in the process of running a target configuration file in a target shooting application; and determining whether the target configuration file is configured correctly through the target log.
When the configuration file in the game is operated, an operation log is generated, and whether the naming error of the weapon name or the naming error of the pendant exists in the file configuration process can be determined according to the log. Thereby facilitating the modification and correction of the developer.
Through the scheme in this embodiment, can be with the easy and simple operation for the gun configuration stores pylon, and then reduce the work load that thinks. The naming format of the target virtual attack prop in the scheme is the same as that of the target virtual pendant, so that when the configuration file has an error, the configuration file can be corrected through the detection log.
In combination with the above embodiments, the present invention also provides a preferred embodiment, a method for automatically generating a weapon configuration in a shooting game.
Referring to fig. 8, a flow chart of an alternative method for automatically generating a weapon configuration in a shooting game according to a preferred embodiment of the present invention is shown. The method comprises the following specific steps.
Step 1, starting;
the configuration file is started in step 1, and an interface for writing codes can be opened by clicking a button.
Step 2, art makers formulate weapons and corresponding pendants according to rules;
step 3, judging whether the suffix of the current pendant catalog has a corresponding weapon, if yes, executing step 4, and if not, returning to step 2;
step 4, acquiring the corresponding relation between the weapon and the pendant and generating the ID of the pendant;
firstly, after an art maker manufactures a weapon and all pendants, dragging a model of the weapon into a tool through a dragging function, and at the moment, the tool can acquire information such as the type and name of the weapon, because the pendants are placed into a fixed directory after being manufactured, traversing all the pendants to find out the directory with the name of the weapon after the suffix, and the traversing algorithm is the same, because the naming rule is as follows AAA _ BBB, the directory name can be acquired after the directory is read, the names are all character strings in a program, the character strings are traversed, when the character is read, the program intercepts the characters in the interval from the beginning to the end of the character, converts the characters into the name of the weapon after the interception, and then compares the names with the weapon in the tool, and the identity indicates that the pendant belongs to the weapon.
Step 5, writing the corresponding relation into a table;
in step 5, after all directories are traversed, all corresponding relations can be found, and then operations such as program simulation opening of an excel table, data writing and the like are performed.
Step 6, entering game to detect whether the generation is successful, and executing step 7 if the generation is successful; if not, returning to the step 2;
in step 6, a game can be entered, whether the corresponding relation between the weapon and the pendant in step 5 has an error is detected according to a log generated by running the game, and if the corresponding relation between the weapon and the pendant has the error, the corresponding relation is set again in step 2.
After the completion, the above steps 1-5 may enter the game for verification, and first enter the bureau to equip the newly developed weapon and pendant, as shown in fig. 9, the completed resource code file is configured, and as shown in fig. 9, the success is indicated.
Step 7, finishing the manufacturing;
in step 7, the configuration of the pendant corresponding to the weapon is completed.
And 8, ending.
And configuring a critical flow for the weapon each time, and continuing to complete other reference relations according to the steps.
Through the preferred embodiment, plans, programs and arts can be liberated from massive and complicated configuration data only by making some simple rules or configurations, the relations between the plans, the programs and the arts are decoupled, and the respective work can be completed independently, so that more energy is not wasted on file configuration, and the plans, the programs and the arts can be transplanted to other projects or other modules very conveniently after the automatic flow arrangement is completed.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the invention, a configuration device of the virtual prop is further provided, wherein the configuration device is used for implementing the configuration method of the virtual prop. As shown in fig. 10, the apparatus includes: a first acquisition unit 1001, a response unit 1003, and a configuration unit 1005.
A first obtaining unit 1001, configured to obtain a target operation instruction on a target configuration interface, where the target operation instruction is used to instruct to configure a target correspondence between a target virtual attack prop and a target virtual pendant;
a response unit 1003, configured to respond to the target operation instruction, search for filenames of resource files of the second group of virtual pendants from filenames of resource files of the first group of virtual pendants, where the filenames of the resource files of the second group of virtual pendants include a name of the target virtual attack prop, the filenames of the resource files of the first group of virtual pendants are in the same naming format, and the filenames of the resource files of the first group of virtual pendants all include a name of one virtual pendant and a name of one virtual attack prop;
a configuration unit 1005, configured to configure a target correspondence according to the filename of the resource file of the second group of virtual pendants, where the target correspondence is used to represent a correspondence between the target virtual attack prop and each virtual pendant in the second group of virtual pendants, and the target virtual pendant includes the second group of virtual pendants.
Optionally, the configuration unit 1005 may include: the device comprises a first obtaining module, a generating module and a target configuration file, wherein the first obtaining module is used for obtaining the name of a target virtual attack prop and the name of each virtual pendant in a second group of virtual pendants from the file name of a resource file of the second group of virtual pendants, the generating module is used for generating the target configuration file according to the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants, information used for representing the target corresponding relation is recorded in the target configuration file, and the target configuration file is used for allowing the target virtual attack prop to be assembled with each virtual pendant in the second group of virtual pendants in a target shooting application.
Wherein, the generating module may include: the obtaining submodule is used for obtaining a prop identifier corresponding to the name of the target virtual attack prop and an identifier of each virtual pendant corresponding to the name of each virtual pendant in the second group of virtual pendants one by one; and the generation submodule is used for generating a target configuration file, wherein the target configuration file records a prop identifier of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants corresponding to the prop identifier, and the target correspondence is the correspondence between the prop identifier and the identifier of each virtual pendant.
Through the embodiment, the first obtaining unit 1001 obtains a target operation instruction on a target configuration interface, where the target operation instruction is used to instruct to configure a target corresponding relationship between a target virtual attack prop and a target virtual pendant; the response unit 1003 responds to the target operation instruction, and searches for the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants, wherein the filename of the resource file of the second group of virtual pendants includes the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants each include the name of one virtual pendant and the name of one virtual attack prop; the configuration unit 1005 configures a target correspondence according to the filename of the resource file of the second group of virtual pendants, where the target correspondence is used to represent a correspondence between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant includes the second group of virtual pendants. The method achieves the purpose that the configuration can be carried out according to the same naming format between the target virtual attack prop and the virtual pendant in the configuration process of the virtual prop, thereby realizing the technical effect of reducing the configuration with the virtual attack prop after naming each virtual pendant, and further solving the technical problem that the process of configuring the virtual pendant for the virtual prop is complicated in the prior art.
As an alternative embodiment, the apparatus further comprises: a second obtaining unit, configured to obtain, in the target shooting application, information indicating a target correspondence in the target configuration file after generating the target configuration file; the searching unit is used for searching the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information; the display unit is used for displaying the target virtual attack prop represented by the resource file of the target virtual attack prop and part or all of the virtual pendants represented by the resource file of the part or all of the virtual pendants in the target shooting application, wherein the part or all of the virtual pendants are assembled on the target virtual attack prop.
Wherein, the search unit may include: and the second obtaining module is used for obtaining the resource file of the target virtual attack prop indicated by the prop identifier on a preset first storage path and obtaining the resource file of part or all of the virtual pendants represented by part or all of the identifiers of each virtual pendant on a preset second storage path under the condition that the information comprises the prop identifier of the target virtual attack prop and the identifier of each virtual pendant in the second group of virtual pendants.
As an optional embodiment, the search unit further includes: the third obtaining module is used for obtaining a target assembling instruction in the target shooting application, wherein the target assembling instruction is used for requesting part or all of the virtual pendants in the second group of virtual pendants; and the response module is used for responding to the target assembly instruction and searching the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information.
As an alternative embodiment, the first obtaining unit 1001 may include: the fourth obtaining module is used for obtaining a first operation instruction in the target configuration interface, wherein the first operation instruction is used for selecting the file name of the resource file of the target virtual attack prop, and the file name of the resource file of the target virtual attack prop comprises the name of the target virtual attack prop; and the fifth obtaining module is used for obtaining a second operation instruction in the target configuration interface, wherein the second operation instruction is used for indicating the configuration of the target corresponding relation between the target virtual attack prop and the target virtual pendant, and the target operation instruction comprises the first operation instruction and the second operation instruction.
According to another aspect of the embodiment of the present invention, there is also provided an electronic device for implementing the configuration method of the virtual prop, as shown in fig. 11, the electronic device includes a memory 1102 and a processor 1104, the memory 1102 stores therein a computer program, and the processor 1104 is configured to execute the steps in any one of the method embodiments through the computer program.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, acquiring a target operation instruction on the target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between the target virtual attack prop and the target virtual pendant;
s2, responding to a target operation instruction, and searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants, wherein the filename of the resource file of the second group of virtual pendants comprises the name of a target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop;
and S3, configuring a target corresponding relation according to the file name of the resource file of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants.
Alternatively, it can be understood by those skilled in the art that the structure shown in fig. 11 is only an illustration, and the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, a Mobile Internet Device (MID), a PAD, and the like. Fig. 11 is a diagram illustrating a structure of the electronic device. For example, the electronic device may also include more or fewer components (e.g., network interfaces, etc.) than shown in FIG. 11, or have a different configuration than shown in FIG. 11.
The memory 1102 may be configured to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for configuring a virtual item in the embodiment of the present invention, and the processor 1104 executes various functional applications and data processing by running the software programs and modules stored in the memory 1102, that is, implements the above-described method for configuring a virtual item. The memory 1102 may include high-speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory 1102 can further include memory located remotely from the processor 1104 and such remote memory can be coupled to the terminal via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory 1102 may be specifically, but not limited to, configured to store information such as attribute information of the target virtual attack prop, attribute information of the target virtual pendant, and a correspondence between the target virtual attack prop and each virtual pendant in the second group of virtual pendants. As an example, as shown in fig. 11, the memory 1102 may include, but is not limited to, a first obtaining unit 1001, a response unit 1003, and a configuration unit 1005 in the configuration device of the virtual item. In addition, the configuration device may further include, but is not limited to, other module units in the configuration device of the virtual item, which is not described in detail in this example.
Optionally, the transmitting device 1106 is used for receiving or transmitting data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device 1106 includes a Network adapter (NIC) that can be connected to a router via a Network cable to communicate with the internet or a local area Network. In one example, the transmission device 1106 is a Radio Frequency (RF) module, which is used for communicating with the internet in a wireless manner.
In addition, the electronic device further includes: a display 1108 for displaying the target configuration interface; and a connection bus 1110 for connecting the respective module parts in the above-described electronic apparatus.
According to a further aspect of an embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the steps of:
s1, acquiring a target operation instruction on the target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between the target virtual attack prop and the target virtual pendant;
s2, responding to a target operation instruction, and searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants, wherein the filename of the resource file of the second group of virtual pendants comprises the name of a target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop;
and S3, configuring a target corresponding relation according to the file name of the resource file of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants.
Alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing one or more computer devices (which may be personal computers, servers, network devices, etc.) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implemented, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (17)

1. A configuration method of a virtual prop is characterized by comprising the following steps:
acquiring a target operation instruction on a target configuration interface, wherein the target operation instruction is used for indicating the configuration of a target corresponding relation between a target virtual attack prop and a target virtual pendant;
searching the filename of the resource file of the second group of virtual pendants from the filename of the resource file of the first group of virtual pendants in response to the target operation instruction, wherein the filename of the resource file of the second group of virtual pendants comprises the name of the target virtual attack prop, the naming formats of the filenames of the resource files of the first group of virtual pendants are the same, and the filenames of the resource files of the first group of virtual pendants comprise the name of one virtual pendant and the name of one virtual attack prop;
and configuring the target corresponding relation according to the file name of the resource file of the second group of virtual pendants, wherein the target corresponding relation is used for representing the corresponding relation between the target virtual attack prop and each virtual pendant in the second group of virtual pendants, and the target virtual pendant comprises the second group of virtual pendants.
2. The method of claim 1, wherein the configuring the target correspondence according to the filename of the resource file of the second set of virtual pendants comprises:
obtaining the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants from the file name of the resource file of the second group of virtual pendants,
and generating a target configuration file according to the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants, wherein the target configuration file records information used for representing the target corresponding relation, and the target configuration file is used for allowing the target virtual attack prop to be assembled with each virtual pendant in the second group of virtual pendants in a target shooting application.
3. The method of claim 2, wherein generating a target profile based on the name of the target virtual attack prop and the name of each virtual pendant of the second set of virtual pendants comprises:
acquiring a prop identifier corresponding to the name of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants, wherein the identifier of each virtual pendant is in one-to-one correspondence with the name of each virtual pendant in the second group of virtual pendants;
and generating the target configuration file, wherein a prop identifier of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants corresponding to the prop identifier are recorded in the target configuration file, and the target correspondence is the correspondence between the prop identifier and the identifier of each virtual pendant.
4. The method of claim 2, wherein after the generating the target profile, the method further comprises:
acquiring information used for representing the target corresponding relation in the target configuration file in the target shooting application;
searching the resource file of the target virtual attack prop and the resource files of part or all of the virtual pendants in the second group of virtual pendants according to the information;
displaying the target virtual attack prop represented by the resource file of the target virtual attack prop and the partial or all virtual pendants represented by the resource file of the partial or all virtual pendants in the target shooting application, wherein the partial or all virtual pendants are assembled on the target virtual attack prop.
5. The method according to claim 4, wherein the searching for the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information representing the target correspondence includes:
and under the condition that the information comprises the prop identification of the target virtual attack prop and the identification of each virtual pendant in the second group of virtual pendants, acquiring the resource file of the target virtual attack prop indicated by the prop identification on a preset first storage path, and acquiring the resource file of part or all of the virtual pendants represented by part or all of the identification of each virtual pendant on a preset second storage path.
6. The method of claim 4, wherein the searching for the resource file of the target virtual attack prop and the resource files of some or all of the virtual pendants in the second set of virtual pendants according to the information comprises:
acquiring a target assembly instruction in the target shooting application, wherein the target assembly instruction is used for requesting part or all of the virtual pendants in the second group of virtual pendants;
and responding to the target assembly instruction, and searching the resource file of the target virtual attack prop and the resource file of the part or all of the virtual pendants in the second group of virtual pendants according to the information.
7. The method according to any one of claims 1 to 6, wherein the obtaining of the target operation instruction on the target configuration interface comprises:
acquiring a first operation instruction in the target configuration interface, wherein the first operation instruction is used for selecting the file name of the resource file of the target virtual attack prop, and the file name of the resource file of the target virtual attack prop comprises the name of the target virtual attack prop;
and acquiring a second operation instruction in the target configuration interface, wherein the second operation instruction is used for indicating the configuration of the target corresponding relation between the target virtual attack prop and the target virtual pendant, and the target operation instruction comprises the first operation instruction and the second operation instruction.
8. The method according to any one of claims 1 to 6, wherein after configuring the target correspondence according to filenames of resource files of the second set of virtual pendants, the method further comprises:
generating a target log in the process of running the target configuration file in a target shooting application;
and determining whether the target configuration file is configured correctly or not through the target log.
9. A configuration device for a virtual prop, comprising:
the system comprises a first obtaining unit, a second obtaining unit and a third obtaining unit, wherein the first obtaining unit is used for obtaining a target operation instruction on a target configuration interface, and the target operation instruction is used for indicating a target corresponding relation between a configuration target virtual attack prop and a target virtual pendant;
a response unit, configured to respond to the target operation instruction, search, from filenames of resource files of a first group of virtual pendants, filenames of resource files of a second group of virtual pendants, where the filenames of resource files of the second group of virtual pendants include a name of the target virtual attack prop, the filenames of resource files of the first group of virtual pendants have the same naming format, and the filenames of resource files of the first group of virtual pendants all include a name of a virtual pendant and a name of a virtual attack prop;
a configuration unit, configured to configure the target correspondence according to a filename of a resource file of the second group of virtual pendants, where the target correspondence is used to represent a correspondence between the target virtual attack prop and each virtual pendant of the second group of virtual pendants, and the target virtual pendant includes the second group of virtual pendants.
10. The apparatus of claim 9, wherein the configuration unit comprises:
a first obtaining module, configured to obtain, from filenames of resource files of the second group of virtual pendants, a name of the target virtual attack prop and a name of each virtual pendant of the second group of virtual pendants,
a generating module, configured to generate a target configuration file according to the name of the target virtual attack prop and the name of each virtual pendant in the second group of virtual pendants, where the target configuration file records information used to represent the target correspondence, and the target configuration file is used to allow the target virtual attack prop to be assembled with each virtual pendant in the second group of virtual pendants in a target shooting application.
11. The apparatus of claim 10, wherein the generating module comprises:
the obtaining submodule is used for obtaining a prop identifier corresponding to the name of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants, wherein the identifier of each virtual pendant is in one-to-one correspondence with the name of each virtual pendant in the second group of virtual pendants;
and a generating submodule, configured to generate the target configuration file, where a prop identifier of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants corresponding to the prop identifier are recorded in the target configuration file, and the target correspondence is a correspondence between the prop identifier and the identifier of each virtual pendant.
12. The apparatus of claim 10, further comprising:
a second obtaining unit, configured to obtain, in the target shooting application, information used for representing the target correspondence in the target configuration file after the target configuration file is generated;
the searching unit is used for searching the resource file of the target virtual attack prop and the resource file of part or all of the virtual pendants in the second group of virtual pendants according to the information;
the display unit is used for displaying the target virtual attack prop represented by the resource file of the target virtual attack prop and the partial or all virtual pendants represented by the resource file of the partial or all virtual pendants in the target shooting application, wherein the partial or all virtual pendants are assembled on the target virtual attack prop.
13. The apparatus of claim 12, wherein the lookup unit comprises:
a second obtaining module, configured to, when the information includes a prop identifier of the target virtual attack prop and an identifier of each virtual pendant in the second group of virtual pendants, obtain, on a predetermined first storage path, a resource file of the target virtual attack prop indicated by the prop identifier, and obtain, on a predetermined second storage path, a resource file of the part or all of the virtual pendants represented by part or all of the identifiers of each virtual pendant.
14. The apparatus of claim 12, wherein the lookup unit further comprises:
a third obtaining module, configured to obtain a target assembly instruction in the target shooting application, where the target assembly instruction is used to request some or all of the virtual pendants in the second group of virtual pendants;
and the response module is used for responding to the target assembly instruction and searching the resource file of the target virtual attack prop and the resource file of the part or all of the virtual pendants in the second group of virtual pendants according to the information.
15. The apparatus according to any one of claims 9 to 14, wherein the first obtaining unit comprises:
a fourth obtaining module, configured to obtain a first operation instruction in the target configuration interface, where the first operation instruction is used to select a filename of a resource file of the target virtual attack prop, and the filename of the resource file of the target virtual attack prop includes a name of the target virtual attack prop;
a fifth obtaining module, configured to obtain a second operation instruction in the target configuration interface, where the second operation instruction is used to instruct to configure the target correspondence between the target virtual attack prop and the target virtual pendant, and the target operation instruction includes the first operation instruction and the second operation instruction.
16. A computer-readable storage medium comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 8.
17. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 8 by means of the computer program.
CN201911175797.8A 2019-11-26 2019-11-26 Configuration method and device of virtual prop, storage medium and electronic device Active CN110888671B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911175797.8A CN110888671B (en) 2019-11-26 2019-11-26 Configuration method and device of virtual prop, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911175797.8A CN110888671B (en) 2019-11-26 2019-11-26 Configuration method and device of virtual prop, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN110888671A true CN110888671A (en) 2020-03-17
CN110888671B CN110888671B (en) 2021-05-11

Family

ID=69748935

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911175797.8A Active CN110888671B (en) 2019-11-26 2019-11-26 Configuration method and device of virtual prop, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN110888671B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103500241A (en) * 2013-09-05 2014-01-08 北京尔宜居科技有限责任公司 Method for automatically adding accessories to bar counter in computer home design
CN104239315A (en) * 2013-06-09 2014-12-24 北京三星通信技术研究有限公司 Picture correlation method
CN104469423A (en) * 2014-11-05 2015-03-25 广州华多网络科技有限公司 Virtual item issuing method and related equipment and system
CN107147955A (en) * 2017-03-31 2017-09-08 武汉斗鱼网络科技有限公司 The method and device of live game
CN108579088A (en) * 2018-04-28 2018-09-28 腾讯科技(深圳)有限公司 The method, apparatus and medium that control virtual objects are picked up virtual objects
CN108671544A (en) * 2018-05-16 2018-10-19 腾讯科技(深圳)有限公司 Firearms assembly method, equipment and storage medium in virtual environment
CN108888956A (en) * 2018-06-27 2018-11-27 腾讯科技(深圳)有限公司 Virtual knapsack shows display methods, equipment and the storage medium at interface

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104239315A (en) * 2013-06-09 2014-12-24 北京三星通信技术研究有限公司 Picture correlation method
CN103500241A (en) * 2013-09-05 2014-01-08 北京尔宜居科技有限责任公司 Method for automatically adding accessories to bar counter in computer home design
CN104469423A (en) * 2014-11-05 2015-03-25 广州华多网络科技有限公司 Virtual item issuing method and related equipment and system
CN107147955A (en) * 2017-03-31 2017-09-08 武汉斗鱼网络科技有限公司 The method and device of live game
CN108579088A (en) * 2018-04-28 2018-09-28 腾讯科技(深圳)有限公司 The method, apparatus and medium that control virtual objects are picked up virtual objects
CN108671544A (en) * 2018-05-16 2018-10-19 腾讯科技(深圳)有限公司 Firearms assembly method, equipment and storage medium in virtual environment
CN108888956A (en) * 2018-06-27 2018-11-27 腾讯科技(深圳)有限公司 Virtual knapsack shows display methods, equipment and the storage medium at interface

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯晓彤 等: "大逃杀手游背包及拾取系统交互设计研究与实践", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Also Published As

Publication number Publication date
CN110888671B (en) 2021-05-11

Similar Documents

Publication Publication Date Title
CN105045611B (en) A kind of upgrade method and device
CN111111174B (en) Operation method and device of virtual prop, storage medium and electronic device
CN110975289B (en) Shooting mode switching control method and device, storage medium and electronic device
CN103884151A (en) Method, refrigerator, user terminal and system for pushing menus according to user requirements
CN112121427B (en) Control method and device of virtual prop and storage medium
CN107592338A (en) More new system, method and the relevant device of a kind of dynamic base
CN105786646B (en) Data backup method and device and electronic equipment
CN104765793A (en) Software recommending method and server
CN104679900A (en) Application program searching method and device
CN103902339A (en) Application installation method, terminal and server
CN103200247A (en) Data downloading method and personal computer (PC) downloading client side
CN111813378B (en) Code base construction system, method and related device
CN111258680A (en) Resource loading method and device, storage medium and electronic device
CN111045893A (en) Method, device and system for executing monitoring task, storage medium and electronic device
CN110888671B (en) Configuration method and device of virtual prop, storage medium and electronic device
CN108874495B (en) Theme resource conversion method and device and electronic equipment
CN102710447B (en) Terminal equipment cloud restorative procedure and system
CN110532016A (en) Method for edition management, method for updating edition and edition management system
CN103778188A (en) Method and equipment for inquiring and/or maintaining data in library file
CN103220327B (en) user information storage method and device
CN112783515B (en) Plug-in control method and device and storage medium
CN105188154B (en) A kind of method, apparatus and system being automatically brought into operation smart machine
CN115113888A (en) Target drone upgrading method and system based on template arrangement
CN111068331A (en) Animation configuration method and device of virtual prop, storage medium and electronic device
CN115671747A (en) Processing method and device of virtual item, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40022231

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant