CN111327914B - Interaction method and related device - Google Patents

Interaction method and related device Download PDF

Info

Publication number
CN111327914B
CN111327914B CN202010104412.5A CN202010104412A CN111327914B CN 111327914 B CN111327914 B CN 111327914B CN 202010104412 A CN202010104412 A CN 202010104412A CN 111327914 B CN111327914 B CN 111327914B
Authority
CN
China
Prior art keywords
target
identity
stealth
target user
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010104412.5A
Other languages
Chinese (zh)
Other versions
CN111327914A (en
Inventor
容启含
林晓鑫
李维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tencent Information Technology Co Ltd
Original Assignee
Shenzhen Tencent Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Tencent Information Technology Co Ltd filed Critical Shenzhen Tencent Information Technology Co Ltd
Priority to CN202010104412.5A priority Critical patent/CN111327914B/en
Publication of CN111327914A publication Critical patent/CN111327914A/en
Application granted granted Critical
Publication of CN111327914B publication Critical patent/CN111327914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/485End-user interface for client configuration

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • General Engineering & Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Databases & Information Systems (AREA)
  • User Interface Of Digital Computer (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an interaction method, when a target user enters a target live broadcast room to watch video live broadcast, a room entering request entering the target live broadcast room is obtained, the room entering request comprises a room identifier of the target live broadcast room and a user identifier of the target user, so that whether a stealth function of the target user is started for the target live broadcast room or not can be determined according to the room identifier and the user identifier, if the stealth function is started, effective time when the identity level of the target user reaches a preset level is determined according to the user identifier, a target stealth identity when the target user enters the target live broadcast room is determined according to the effective time, and the target stealth identity is returned. Due to the fact that the stealth identities unlocked by target users in different effective time may be different, even users with the same identity level may determine different stealth identities, and therefore playability and interestingness are improved. Meanwhile, the different stealthy identities can improve the honor of paying users and meet the real requirement of exposing luxury in low key of users.

Description

Interaction method and related device
Technical Field
The present application relates to the field of data processing, and in particular, to an interaction method and a related apparatus.
Background
The network video live broadcast is a popular live broadcast mode at present, and a user can watch the live broadcast of a main broadcast through a live broadcast room entering a live broadcast platform. A user watching the network video live broadcast in the live broadcast room can interact with a main broadcast, other watching users and the like according to the live broadcast content. The nobody is a welfare system shared by many live Applications (APPs), and satisfies the better live viewing experience of the nobody through the privileges that others do not have.
With the increase of the noble privileges and the increase of the noble paid users, some noble paid users can change psychologically to become resistant to dazzling, do not want other users to know the real identity of the users, and start to have the requirement of entering a live broadcast room with low tone.
Thus, the stealth function becomes an important privilege for the nobody in live APP. However, the stealth method provided in the related art is too single, lacks of playability and interest, is difficult to reflect the honor of the paying user in the low tone, and is difficult to meet the requirement of the paying user when watching the network video live broadcast.
Disclosure of Invention
In order to solve the technical problems, the application provides an interaction method and a related device, so that the playability and the interestingness are improved. Meanwhile, the different stealth identities can improve the honor feeling of paying users and meet the real requirement of exposing luxury in low key of users.
The embodiment of the application discloses the following technical scheme:
in one aspect, an embodiment of the present application provides an interaction method, where the method includes:
acquiring a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
if the target user is determined to start a stealth function for the target live broadcast room according to the room identifier and the user identifier, determining the effective time for the identity level of the target user to reach a preset level according to the user identifier;
determining a target stealth identity of the target user entering the target live broadcast room according to the effective time;
and returning the target stealth identity.
On the other hand, an embodiment of the present application provides an interactive device, where the device includes an obtaining unit, a first determining unit, a second determining unit, and a returning unit:
the acquisition unit is used for acquiring a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the first determining unit is configured to determine, according to the room identifier and the user identifier, effective time for the identity level of the target user to reach a preset level if it is determined that the target user starts a stealth function for the target live broadcast room;
the second determining unit is used for determining a target stealth identity of the target user entering the target live broadcast room according to the effective time;
the return unit is used for returning the target stealth identity.
In another aspect, an embodiment of the present application provides an interaction method, where the method includes:
responding to the operation that a target user enters a target live broadcast room, and generating a room entering request; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
sending the house entering request to a server;
if a target stealth identity returned by the server is received, displaying the target stealth identity when the target user enters the target live broadcast room; and the target stealth identity is determined by the server according to the effective time when the identity level of the target user reaches a preset level after the server determines that the target user starts a stealth function for the target live broadcast room according to the room identifier and the user identifier.
On the other hand, the embodiment of the present application provides an interactive device, the device includes a generating unit, a sending unit and a display unit:
the generation unit is used for responding to the operation that the target user enters the target live broadcast room and generating a room entering request; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the sending unit is used for sending the room entering request to a server;
the display unit is used for displaying the target stealth identity when the target user enters the target live broadcast room if the target stealth identity returned by the server is received; and the target stealth identity is determined according to the effective time when the server determines that the target user starts a stealth function aiming at the target live broadcast room according to the room identifier and the user identifier and the identity level of the target user reaches a preset level.
In another aspect, an embodiment of the present application provides an apparatus for interaction, where the apparatus includes a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of any of the above aspects according to instructions in the program code.
In another aspect, the present application provides a computer-readable storage medium for storing program code, where the program code is configured to execute the method of any one of the above aspects.
According to the technical scheme, when a target user enters a certain live broadcast room, for example, a target live broadcast room watches video live broadcast, a room entering request entering the target live broadcast room is obtained, the room entering request comprises a room identifier of the target live broadcast room and a user identifier of the target user, so whether the target user starts a hiding function for the target live broadcast room or not can be determined according to the room identifier and the user identifier, if the target user is started, the effective time when the identity level of the target user reaches the preset level is determined according to the user identifier, the effective time can embody the payment condition of the target user, the honorable degree of the target user is further embodied, the hidden identity unlocked by the target user can be different in effective time, and the diversity of the hiding identity is realized. Therefore, the target stealth identity of the target user entering the target live broadcast room can be determined according to the effective time, the target stealth identity is returned, and the stealth identities unlocked by the target users in different effective times are possibly different, so that even users with the same identity level can determine different stealth identities, and the playability and the interestingness are improved. Meanwhile, the different stealthy identities can improve the honor of paying users and meet the real requirement of exposing luxury in low key of users.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
FIG. 1 is a diagram illustrating an example of an interaction method in the related art;
fig. 2 is an exemplary diagram of an application scenario of an interaction method according to an embodiment of the present application;
fig. 3 is a signaling interaction diagram of an interaction method according to an embodiment of the present application;
FIG. 4 is an exemplary diagram of an identity level provided by an embodiment of the present application;
fig. 5 is a signaling interaction diagram of a hidden identity setting manner according to an embodiment of the present application;
fig. 6 is an exemplary diagram of a stealth setup interface provided in an embodiment of the present application;
FIG. 7 is an exemplary diagram of a room list cloaking interface provided by an embodiment of the application;
fig. 8 is a flowchart of implementing stealth identity setup using a noble module according to an embodiment of the present application;
fig. 9 is an exemplary diagram of a list display interface provided in an embodiment of the present application;
FIG. 10 is a flow chart of chat room interaction provided by embodiments of the present application;
FIG. 11 is a diagram illustrating an example of a chat room interface provided by embodiments of the present application;
FIG. 12 is an exemplary diagram of a gift red envelope function interface provided by an embodiment of the present application;
fig. 13 is a flowchart illustrating that the list module provided in the embodiment of the present application realizes the above function;
fig. 14 is a structural diagram of an interactive apparatus according to an embodiment of the present disclosure;
fig. 15 is a structural diagram of an interactive apparatus according to an embodiment of the present disclosure;
fig. 16 is a block diagram of an apparatus for interaction according to an embodiment of the present disclosure;
fig. 17 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
The stealth mode that provides among the correlation technique is too single, lacks object for appreciation nature and interest, is difficult to reflect paid user's honor sense in the low tone, is difficult to satisfy the demand of paid user when watching the network video live broadcast.
For example, in the related art, the user has the right to autonomously select a guard board that is not externally displayed, and after the user selects a hidden guard board, the guard board is not displayed behind the name card and the guardian guest seat, and hides his head portrait and nickname, a mystery person default map is displayed, as shown in fig. 1, in which the first display ranked in the contribution chart is "mystery person", i.e., stealth. That is, all users who select the hidden guardian show the mystery human default map as shown in fig. 1.
In order to solve the above technical problem, embodiments of the present application provide an interaction method, which can improve playability and enjoyment. Meanwhile, the different stealthy identities can improve the honor of paying users and meet the real requirement of exposing luxury in low key of users.
The interaction method provided by the embodiment of the application can be applied to data processing equipment, and the data processing equipment can be terminal equipment, such as intelligent terminals, computers, Personal Digital Assistants (PDAs), tablet computers and other equipment.
The data processing device may also be a server, which may be an independent server or a cluster server.
In order to facilitate understanding of the technical solution of the present application, the following describes an interaction method provided in the embodiments of the present application by taking a server as an example in combination with an actual application scenario.
Referring to fig. 2, fig. 2 is a schematic view of an application scenario of the interaction method provided in the embodiment of the present application. The application scenario includes a server 201 and a terminal device 202. Wherein, can install the live APP of video on terminal equipment 202, the user gets into the live room through the live APP of video and watches the live video.
When a target user wishes to watch a video in a certain live broadcast room, for example, a target live broadcast room, the target user may send a room entry request to enter the target live broadcast room through the terminal device 202, where the room entry request includes a room identifier of the target live broadcast room and a user identifier of the target user.
The server 201 may obtain the room entry request from the terminal device 202, and if the server 201 determines that the target user starts the stealth function for the target live broadcast room according to the room identifier and the user identifier in the room entry request, determine, according to the user identifier, an effective time when the identity level of the target user reaches a preset level. The effective time can embody the payment condition of the target user and further embody the honor degree of the target user, the stealth identities unlocked by the target user can be different in the different effective times, and the diversity of the stealth identities is realized.
Therefore, the server 201 may determine the target stealth identity of the target user entering the target live broadcast room according to the valid time, and return the target stealth identity to the terminal device 202, so that the terminal device 202 displays the target stealth identity when entering the target live broadcast room. Because the stealth identities unlocked by the target users in different effective time may be different, the target stealth identities determined by different users may be different, so that the users may have different stealth identities due to different payment conditions even in the same identity level, and the playability and the interestingness are improved. Meanwhile, the different stealthy identities can improve the noble feeling of paying users and meet the luxurious requirement of revealing in low key of the users.
Next, the interaction method provided by the embodiment of the present application will be described in detail with reference to the accompanying drawings.
Referring to fig. 3, fig. 3 shows a signaling interaction diagram of an interaction method, the method comprising:
s301, the terminal device responds to the operation that the target user enters the target live broadcast room, and generates a room entering request.
The target user can watch live video through the live APP installed on the terminal device, when the target user needs to enter a target live broadcast room to watch the live video, the target user can click the target live broadcast room, and the terminal device responds to the operation that the target user enters the target live broadcast room to generate a room entering request. The room entering request comprises a room identifier of a target live broadcast room and a user identifier of a target user.
S302, the terminal equipment sends a room entering request to the server.
And S303, if the server determines that the target user starts a stealth function for the target live broadcast room according to the room identifier and the user identifier, determining the effective time for the identity level of the target user to reach the preset level according to the user identifier.
The users in a video live APP may be classified into different identity levels, and the identity levels may be determined according to whether the users pay fees and how much the users pay fees. For example, the non-paying user may be a general user, and the paying user may be a noble user. The nobody can be classified into different identity classes according to the amount of payment, for example, as shown in fig. 4, the nobody can be classified into identity classes such as knight, princess, earl, duke, monarch, emperor, god, etc. according to the identity classes from low to high. Wherein, the paying user (noble) has privilege, for example, noble has the privilege of stealth, exclusive customer service, popularity addition, etc., and the privilege of different identity levels is different.
For a target user with stealth privilege, a stealth function setting page may be entered, as shown in fig. 4, for example, which live rooms are stealthed and which live rooms are not stealthed may be set, and fig. 4 shows that the target user is not stealthed for 3 live rooms, specifically which three rooms may be clicked to check details, ">". Therefore, it is necessary to determine whether the target user turns on the stealth function for the live broadcast room, so as to determine whether the target user displays the stealth identity when entering the live broadcast room to watch the live broadcast. The room identification can uniquely identify which live broadcast room is, and the user identification can uniquely identify a target user who requests to enter the target live broadcast room, so that whether the target user starts a stealth function aiming at the target live broadcast room or not can be determined according to the room identification and the user identification, if the stealth function is started, the stealth identity needs to be displayed when the target user enters the target live broadcast room, and the target stealth identity needs to be determined.
In the embodiment of the application, the effective time when the identity level of the target user reaches the preset level can be the duration of the identity level exchanged by the target user through payment, and the effective time can embody the payment condition of the target user and further embody the honor degree of the target user. For example, for the same identity level, some users may redeem for 1 month, some users may redeem for 10 months, and the payment for 10 months of redemption is significantly more than that for 1 month of redemption, so that their identity is more respectful for video live APP.
In this embodiment, the preset level may be a emperor, that is, the identity level has stealth privilege only when reaching the emperor, and certainly, the preset level may also be other identity levels; the stealth identity may include a stealth avatar, a nickname, and the like, which is not limited in this embodiment.
In this case, in order to realize diversity of the hidden identities in this embodiment, so as to improve playability and interest, and simultaneously embody the sense of nobility of the paying user, the valid times are different, and the hidden identities unlocked by the target users may be different, so that, in order to determine the hidden identities displayed when the target users enter the target live broadcast room, the valid times when the identity levels of the target users reach the preset levels need to be determined first.
S304, the server determines the target stealth identity of the target user entering the target live broadcast room according to the effective time.
It should be noted that, as the valid time is accumulated, there may be a plurality of stealth identities possessed by the target user, and the target stealth identity may be only one of the stealth identities possessed by the target user. For example, when the target user's identity level is emperor, if the validity time is 1 month (i.e. 1 month emperor is redeemed), the target user may have a stealth identity of "black clothing" (including nickname and avatar); if the effective time is 4 months (namely, exchanging the emperor of 4 months), the target user can have the stealth identity of 'Badao president'; if the valid time is 10 months (namely 10-month emperor is exchanged), the target user can have the stealth identity of ' ten thousands of people's fans '; if the valid time is 12 months (i.e. exchange 12 months emperors), the target user may have the stealth identity of "pig hoof".
In this case, the server may determine the stealth identity that the target user has based on the user identification. Then, the server determines a stealth identity corresponding to the valid time from the stealth identities of the target user as the target stealth identity.
For example, the target user is found to have four stealth identities of the black clothing man, the major, the fan of ten thousand people and the pig hoof according to the user identifier, at this time, the effective time is 12 months, in order to reflect that the target user is different from other users, and further highlight the honor of the target user, the stealth identity corresponding to the effective time can be determined from the four stealth identities of the target user as the target stealth identity. Since the effective time is 12 months, the target user may have the stealth identity of the hoof of the big pig, that is, the stealth identity of the hoof of the big pig corresponds to the effective time of 12 months, and therefore, the stealth identity of the hoof of the big pig is used as the target stealth identity.
Next, a detailed description will be given of a manner of setting the stealth identity possessed by the target user. Referring to fig. 5, fig. 5 shows a signaling interaction diagram of a stealth identity setup manner. The method comprises the following steps:
s501, the terminal device responds to the stealth setting operation of the target user and sends a stealth setting request to the server.
The target user enters the stealth function setup page, which is shown in fig. 4. In some embodiments, the entrance of the stealth function setup page may be set up at a noble page. When a target user clicks 'stealth setting' in the interface shown in fig. 4, triggering equipment on a terminal to send a stealth setting request to a server, wherein the stealth setting request comprises a user identifier of the target user. At this time, the stealth setting operation is such that the target user clicks "stealth setting" in the interface shown in fig. 4.
S502, the server determines whether the identity grade of the target user reaches a preset grade according to the user identification.
S503, if the server determines that the identity level of the target user reaches a preset level according to the user identification, the server sends a stealth confirmation message to the terminal equipment.
In this embodiment, since the users have different identity levels, in a normal case, the stealth function is provided for highlighting the honorable identity of the user, and therefore, in a normal case, when the identity level of a certain user, for example, a target user, reaches a preset level, the target user has the stealth authority, and at this time, the server may send a stealth confirmation message to the terminal device, so as to agree to the target user to open the stealth function. And if the identity level of the target user does not reach the preset level, guiding the user to jump to the recharging page, and increasing the identity level by recharging.
And S504, if the stealth confirmation message sent by the server is received, the terminal equipment displays a stealth interface.
The stealth interface is used for setting different stealth identities according to the duration time of the identity level of the target user reaching a preset level. Referring to fig. 6, when entering the stealth setting interface of fig. 6, the target user may turn on the "enter room stealth" function, thereby turning on the stealth function for the live broadcast room.
In addition, since the users may have contributions such as a reward when watching the live broadcast in the live broadcast room, the contribution condition of each user in the live broadcast room can be counted to form a room list. At this time, the target user may also start the stealth function of the room list so as to display the hidden identity of the target user in the room list. When the room list hiding function is turned on, hiding the room lists of which live broadcast rooms may be set, for example, as shown in fig. 7, where the live broadcast room 1 has the room list hiding function turned on, and the live broadcast rooms 2, 3, and … … have no room list hiding function turned on.
And S505, the server receives the stealth identity opening request sent by the terminal equipment.
S506, if the effective time that the identity level of the target user reaches the preset level meets the opening condition of the to-be-opened stealth identity is determined by the server according to the user identity and the identity, the to-be-opened stealth identity is opened and is used as the stealth identity of the target user.
And after the identity grade of the target user is determined to meet the condition of starting the stealth function, allowing the target user to use the stealth identity. In order to embody the noble degree of a target user and realize the diversity of invisible identities (such as invisible head portraits and nicknames), different invisible identities can be used according to actual conditions, and the playability and the interestingness are improved.
Because the stealth identity opening request comprises the user identification of the target user and the identification of the stealth identity to be opened, the effective time for the identity grade of different users to reach the preset grade is different, and the stealth identities which can be exchanged are different. Therefore, the effective time when the identity level of the target user reaches the preset level can be determined to meet the opening condition of the to-be-opened stealth identity, the to-be-opened stealth identity is opened, and the to-be-opened stealth identity is used as the stealth identity of the target user.
For example, the hidden identity to be opened is "overlord president", the opening condition of the hidden identity to be opened is that the effective time of the identity level reaching the emperor is 4 months (namely, the valid time is exchanged for 4 months emperors), and if the effective time of the identity level reaching the emperor is determined to be 4 months according to the user identification and the identity identification, the "overlord president" is opened and is taken as the hidden identity of the target user.
It should be noted that the hidden identity opened by the target user is synchronized into the user table, meanwhile, the target user may open different hidden identities for different live broadcast rooms, the hidden identity and the live broadcast room with the hidden identity opened are in an n-to-m relationship in the user table, the hidden live broadcast room set by the user is synchronized to the server through a Common Gateway Interface (CGI), and the server associates the identifier of the live broadcast room into the user table, thereby establishing the relationship between the live broadcast room and the hidden identity.
The hidden identity setting can be realized through a noble module, and the hidden identity setting can be realized by using the noble module by taking the preset grade as an example, as shown in fig. 8. S801, judging whether the identity grade reaches emperor (corresponding to S502), if so, executing S802, and if not, executing S806; s802, entering a stealth interface (corresponding to S503); s803, judging whether the valid time meets the opening condition of the stealth identity to be opened or not, if so, executing S804, and if not, executing S807; s804, opening the stealth identity to be opened as a target stealth identity (corresponding to S506); s805, setting a hidden live broadcast room; s806, jumping a recharge interface; s807, the emperor of the charge.
S305, the server returns the target stealth identity to the terminal equipment.
S306, when the target user enters the target live broadcast room, the terminal equipment displays the target stealth identity.
And if the server determines that the target stealth identity required to be used by the target user to enter the target live broadcast room is needed, returning the target stealth identity to the terminal equipment, so that the target stealth identity is displayed instead of the real identity of the target user when the target user enters the live broadcast room.
According to the technical scheme, when a target user enters a certain live broadcast room, for example, a target live broadcast room watches video live broadcast, a room entering request entering the target live broadcast room is obtained, the room entering request comprises a room identifier of the target live broadcast room and a user identifier of the target user, so whether the target user starts a hiding function for the target live broadcast room or not can be determined according to the room identifier and the user identifier, if the target user is started, the effective time when the identity level of the target user reaches the preset level is determined according to the user identifier, the effective time can embody the payment condition of the target user, the honorable degree of the target user is further embodied, the hidden identity unlocked by the target user can be different in effective time, and the diversity of the hiding identity is realized. Therefore, the target stealth identity of the target user entering the target live broadcast room can be determined according to the effective time, the target stealth identity is returned, and the stealth identities unlocked by the target users in different effective times are possibly different, so that even users with the same identity level can determine different stealth identities, and the playability and the interestingness are improved. Meanwhile, the different stealthy identities can improve the honor of paying users and meet the real requirement of exposing luxury in low key of users. In addition, the consumption of the user can be stimulated, the face feeling of the card is improved, and the revenues of the platform are improved.
If the target user turns on the stealth function for the list of the live broadcast room, the target stealth identity of the target user is displayed when the list is displayed, as shown in fig. 9, for example.
Some users may be curious about the target user because the target stealth identity is not the true identity of the target user. In order to meet the curiosity of other users, the other users can better interact with a target user, the brand of a noble user is further improved, in some possible implementation modes, the target user has a corresponding chat room, scene chat room atmospheres with different themes are created by matching different stealth identities, and a common user can well interact with the noble user.
It is understood that a "chat room entry" function key may be displayed when the target stealth identity is displayed, for example, as shown in fig. 9, and a "chat room entry" function key (for example, as shown in S1001 in fig. 10) may be displayed in the upper right corner of the target stealth identity (for example, the stealth avatar) of the list, and when the user clicks the function key, a chat room entry request may be triggered, so that the terminal device enters the chat room of the target user in response to the chat room entry request for the target user; the chat room context of the target user is related to the target stealth identity.
FIG. 11 illustrates an example diagram of an interface for a chat room, exemplifying a stealth identity as a blackman. The ordinary user in the chat room can chat and interact with the target user through simple graphics (for example, S1002 in fig. 10). In addition, the gift red envelope function experience is achieved in the chat room, and the full face feeling of the noble users is met. Whether a homeowner (e.g., a target user) or other user is authenticated into the chat room by a user identification. In the chat room, the homeowner has the right to send a gift red envelope, which may be a diamond gift, a gold gift, or other virtual item in the platform. A non-homeowner user may automatically send a virtual item to the user' S backpack by grabbing a red envelope or a private item within the red envelope by associating the user identification with the identification of the red envelope gift (e.g., as shown in S1003 in fig. 10). The gift red envelope function interface may be seen in fig. 12.
It should be noted that displaying the list and entering the chat room may be implemented by a list module, and a flowchart of the list module implementing the above functions may be shown in fig. 13. S1301, whether the stealth function is started or not is judged, if yes, S1302 is executed, and if not, S1306 is executed; s1302, displaying the stealth identity; s1303, entering a chat room; s1304, judging whether the user entering the chat room is a homeowner, if so, executing S1305, and if not, executing S1307; s1305, red-emitting gift package; s1306, displaying the real identity of the user; and S1307, robbing the gift in the red envelope.
Based on the interaction method provided by the foregoing embodiment, an embodiment of the present application provides an interaction apparatus, referring to fig. 14, the apparatus includes an obtaining unit 1401, a first determining unit 1402, a second determining unit 1403, and a returning unit 1404:
the acquiring unit 1401 is configured to acquire a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the first determining unit 1402 is configured to determine, if it is determined that the target user starts a stealth function for the target live broadcast room according to the room identifier and the user identifier, effective time when the identity level of the target user reaches a preset level according to the user identifier;
the second determining unit 1403 is configured to determine, according to the valid time, a target stealth identity of the target user entering the target live broadcast room;
the returning unit 1404 is configured to return the target stealth identity.
In a possible implementation manner, the second determining unit 1403 is configured to:
determining the stealth identity of the target user according to the user identification; the corresponding relation is the corresponding relation between the user identification and the stealth identity of the target user;
and determining a stealth identity corresponding to the valid time from the stealth identities of the target user as the target stealth identity.
In a possible implementation manner, the setting manner of the stealth identity possessed by the target user is as follows:
receiving a stealth setting request, wherein the stealth setting request comprises a user identifier of the target user;
if the identity grade of the target user reaches a preset grade according to the user identification, sending a stealth confirmation message to terminal equipment;
receiving a stealth identity opening request; the stealth identity opening request comprises a user identifier of the target user and an identity identifier of the stealth identity to be opened;
and if the effective time for the identity grade of the target user to reach the preset grade meets the opening condition of the to-be-opened stealth identity according to the user identification and the identity identification, opening the to-be-opened stealth identity and taking the to-be-opened stealth identity as the stealth identity of the target user.
The embodiment of the present application further provides an interactive apparatus, referring to fig. 15, the apparatus includes a generating unit 1501, a sending unit 1502, and a display unit 1503:
the generation unit 1501 is configured to generate a room entering request in response to an operation of entering a target live broadcast room by a target user; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the sending unit 1502 is configured to send the room entering request to a server;
the display unit 1503 is configured to display the target stealth identity when the target user enters the target live broadcast room if the target stealth identity returned by the server is received; and the target stealth identity is determined by the server according to the effective time when the identity level of the target user reaches a preset level after the server determines that the target user starts a stealth function for the target live broadcast room according to the room identifier and the user identifier.
In a possible implementation manner, the sending unit 1502 is further configured to:
responding to the stealth setting operation of the target user, and sending a stealth setting request to the server; the stealth setting request comprises a user identification of the target user;
the display unit 1503 is further configured to:
if a stealth confirmation message sent by the server is received, displaying a stealth interface; the stealth interface is used for setting different stealth identities according to the effective time when the identity level of the target user reaches a preset level.
In a possible implementation manner, if a list is displayed, the list includes the target stealth identity, and the apparatus further includes a chat room entering unit:
in response to a chat room entry request for the target user, entering a chat room of the target user; the chat room context of the target user is related to the target stealth identity.
The embodiment of the application also provides an interactive device, which is described below with reference to the accompanying drawings. Referring to fig. 16, an embodiment of the present application provides an apparatus 1600 for interaction, where the apparatus 1600 may also be a terminal apparatus, and the terminal apparatus may be any intelligent terminal including a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a Point of Sales (POS), a vehicle-mounted computer, and the terminal apparatus is a mobile phone:
fig. 16 is a block diagram illustrating a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present application. Referring to fig. 16, the handset includes: radio Frequency (RF) circuit 1610, memory 1620, input unit 1630, display unit 1640, sensor 1650, audio circuit 1660, wireless fidelity (WiFi) module 1670, processor 1680, and power supply 1690. Those skilled in the art will appreciate that the handset configuration shown in fig. 16 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 16:
RF circuit 1610 is configured to receive and transmit signals during a message transmission or call, and in particular, receive downlink messages from a base station and process the received downlink messages to processor 1680; in addition, the data for designing uplink is transmitted to the base station. In general, RF circuitry 1610 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuitry 1610 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 1620 may be used to store software programs and modules, and the processor 1680 executes the software programs and modules stored in the memory 1620, thereby executing various functional applications and data processing of the mobile phone. The memory 1620 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program (such as a sound playing function, an image playing function, etc.) required by at least one function, and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 1620 may comprise high speed random access memory, and may also comprise non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 1630 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 1630 may include a touch panel 1631 and other input devices 1632. The touch panel 1631, also referred to as a touch screen, can collect touch operations of a user on or near the touch panel 1631 (e.g., operations of a user on or near the touch panel 1631 using a finger, a stylus, or any other suitable object or accessory), and drive the corresponding connected devices according to a predetermined program. Alternatively, the touch panel 1631 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 1680, and can receive and execute commands sent by the processor 1680. In addition, the touch panel 1631 may be implemented by various types, such as resistive, capacitive, infrared, and surface acoustic wave. The input unit 1630 may include other input devices 1632 in addition to the touch panel 1631. In particular, other input devices 1632 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 1640 may be used to display information input by or provided to the user and various menus of the cellular phone. The Display unit 1640 may include a Display panel 1641, and optionally, the Display panel 1641 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 1631 can cover the display panel 1641, and when the touch panel 1631 detects a touch operation on or near the touch panel, the touch panel is transmitted to the processor 1680 to determine the type of the touch event, and then the processor 1680 provides a corresponding visual output on the display panel 1641 according to the type of the touch event. Although in fig. 16, the touch panel 1631 and the display panel 1641 are implemented as two independent components to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 1631 and the display panel 1641 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 1650, such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 1641 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 1641 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 1660, speaker 1661, and microphone 1662 may provide an audio interface between the user and the cell phone. The audio circuit 1660 can transmit the received electrical signal converted from the audio data to the speaker 1661, and the received electrical signal is converted into an acoustic signal by the speaker 1661 for output; on the other hand, the microphone 1662 converts collected sound signals into electrical signals, which are received by the audio circuitry 1660 and converted into audio data, which are processed by the audio data output processor 1680 and then passed through the RF circuitry 1610 for transmission to, for example, another cell phone, or for output to the memory 1620 for further processing.
WiFi belongs to short-distance wireless transmission technology, and the mobile phone can help a user to receive and send e-mails, browse webpages, access streaming media and the like through the WiFi module 1670, and provides wireless broadband internet access for the user. Although fig. 16 shows the WiFi module 1670, it is understood that it does not belong to the essential constitution of the handset, and may be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 1680 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 1620 and calling data stored in the memory 1620, thereby performing overall monitoring of the mobile phone. Alternatively, processor 1680 may include one or more processing units; preferably, the processor 1680 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communication. It is to be appreciated that the modem processor described above may not be integrated into processor 1680.
The handset also includes a power supply 1690 (e.g., a battery) for powering the various components, which may preferably be logically connected to the processor 1680 via a power management system to manage charging, discharging, and power consumption management functions via the power management system.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In this embodiment, the processor 1680 included in the terminal device further has the following functions:
responding to the operation that a target user enters a target live broadcast room, and generating a room entering request; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
sending the house entering request to a server;
if a target stealth identity returned by the server is received, displaying the target stealth identity when the target user enters the target live broadcast room; and the target stealth identity is determined by the server according to the effective time when the identity level of the target user reaches a preset level after the server determines that the target user starts a stealth function for the target live broadcast room according to the room identifier and the user identifier.
Referring to fig. 17, fig. 17 is a block diagram of a server 1700 provided in this embodiment, and the server 1700 may have a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 1722 (e.g., one or more processors) and a memory 1732, and one or more storage media 1730 (e.g., one or more mass storage devices) storing an application 1742 or data 1744. Memory 1732 and storage medium 1730 may be transient storage or persistent storage, among other things. The program stored in the storage medium 1730 may include one or more modules (not shown), each of which may include a sequence of instructions operating on a server. Further, the central processor 1722 may be configured to communicate with the storage medium 1730 to execute a series of instruction operations in the storage medium 1730 on the server 1700.
The server 1700 may also include one or more power supplies 1726, one or more wired or wireless network interfaces 1750, one or more input-output interfaces 1758, and/or one or more operating systems 1741 such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, etc.
In this embodiment, the processor 1722 included in the terminal device further has the following functions:
acquiring a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
if the target user is determined to start a stealth function for the target live broadcast room according to the room identifier and the user identifier, determining the effective time for the identity level of the target user to reach a preset level according to the user identifier;
determining a target stealth identity of the target user entering the target live broadcast room according to the effective time;
and returning the target stealth identity.
The terms "first," "second," "third," "fourth," and the like in the description of the application and the above-described figures, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in this application, "at least one" means one or more, "a plurality" means two or more. "and/or" is used to describe the association relationship of the associated object, indicating that there may be three relationships, for example, "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one type of logical functional division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. An interactive method, comprising:
acquiring a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
if the target user is determined to start a stealth function for the target live broadcast room according to the room identifier and the user identifier, determining the effective time for the identity level of the target user to reach a preset level according to the user identifier;
determining a target stealth identity of the target user entering the target live broadcast room according to the effective time;
returning the target stealth identity;
wherein the determining the target stealth identity of the target user entering the target live broadcast room according to the valid time comprises:
determining the stealth identity of the target user according to the user identification and a corresponding relation, wherein the corresponding relation is the corresponding relation between the user identification and the stealth identity of the target user;
follow in the stealthy identity that target user has confirm with the stealthy identity that the valid time corresponds is as target stealthy identity, wherein, the valid time that the identity grade of different users reaches preset grade corresponds different stealthy identities, target stealthy identity includes the function key, target user has corresponding chat room for cooperate different stealthy identities to build the scene chat room atmosphere of different themes, the process that gets into the chat room includes: displaying a function key for entering a chat room at the upper right corner of the target stealth identity, triggering a chat room entering request when a non-target user clicks the function key, enabling a terminal device to enter the chat room of the target user in response to the chat room entering request aiming at the target user, enabling the non-target user to perform chat interaction with the target user, enabling the background of the chat room of the target user to be related to the target stealth identity, enabling the target user to have the right of sending a gift red package in the chat room, enabling the non-target user to obtain a virtual article in the red package by robbing the red package, and automatically sending the virtual article to a backpack of the non-target user by associating a user identifier and an identifier of the gift in the red package.
2. The method according to claim 1, wherein the stealth identity of the target user is set in a manner of:
receiving a stealth setting request, wherein the stealth setting request comprises a user identifier of the target user;
if the identity grade of the target user reaches a preset grade according to the user identification, sending a stealth confirmation message to the terminal equipment;
receiving a stealth identity opening request; the stealth identity opening request comprises a user identifier of the target user and an identity identifier of the stealth identity to be opened;
and if the effective time for the identity grade of the target user to reach the preset grade meets the opening condition of the to-be-opened stealth identity according to the user identification and the identity identification, opening the to-be-opened stealth identity and taking the to-be-opened stealth identity as the stealth identity of the target user.
3. An interactive device, characterized in that the device comprises an acquisition unit, a first determination unit, a second determination unit and a return unit:
the acquisition unit is used for acquiring a room entering request for entering a target live broadcast room; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the first determining unit is configured to determine, according to the room identifier and the user identifier, effective time for the identity level of the target user to reach a preset level if it is determined that the target user starts a stealth function for the target live broadcast room;
the second determining unit is configured to determine, according to the valid time, a target stealth identity of the target user entering the target live broadcast room, where the determining, according to the valid time, the target stealth identity of the target user entering the target live broadcast room includes: determining the stealth identity of the target user according to the user identification and a corresponding relation, wherein the corresponding relation is the corresponding relation between the user identification and the stealth identity of the target user; follow in the stealthy identity that target user has confirm with the stealthy identity that the valid time corresponds is as target stealthy identity, wherein, the valid time that the identity grade of different users reaches preset grade corresponds different stealthy identities, target stealthy identity includes the function key, target user has corresponding chat room for cooperate different stealthy identities to build the scene chat room atmosphere of different themes, the process that gets into the chat room includes: displaying a function key for entering a chat room at the upper right corner of the target stealth identity, triggering a chat room entering request when a non-target user clicks the function key, so that a terminal device enters the chat room of the target user in response to the chat room entering request aiming at the target user, so that the non-target user and the target user can carry out chat interaction, wherein the background of the chat room of the target user is related to the target stealth identity, the target user has the right to send a gift red package in the chat room, the non-target user obtains a virtual article in the red package by robbing the red package, and the virtual article is automatically sent to a backpack of the non-target user by associating a user identifier and an identifier of the red package gift;
the return unit is used for returning the target stealth identity.
4. An interactive method, comprising:
responding to the operation that a target user enters a target live broadcast room, and generating a room entering request; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
sending the house entering request to a server;
if a target stealth identity returned by the server is received, displaying the target stealth identity when the target user enters the target live broadcast room; the target stealth identity is determined by the server according to the room identifier and the user identifier, and then according to the valid time when the identity level of the target user reaches a preset level after the server determines that the target user starts a stealth function for the target live broadcast room, wherein the target stealth identity of the target user entering the target live broadcast room is determined according to the valid time, and the method comprises the following steps: determining the stealth identity of the target user according to the user identification and a corresponding relation, wherein the corresponding relation is the corresponding relation between the user identification and the stealth identity of the target user; the hidden identity corresponding to the effective time is determined from the hidden identities of the target user to serve as the target hidden identity, wherein the effective time when the identity levels of different users reach preset levels corresponds to different hidden identities, the target hidden identity comprises function keys, the target user has a corresponding chat room, the chat room is used for cooperating with different hidden identities to create scene chat room atmosphere with different subjects, and the process of entering the chat room comprises the following steps: displaying a function key for chat room entering at the upper right corner of the target stealth identity, triggering a chat room entering request when a non-target user clicks the function key, enabling the terminal device to enter the chat room of the target user in response to the chat room entering request aiming at the target user, so as to enable the non-target user to have chat interaction with the target user, wherein the chat room background of the target user is related to the target stealth identity, the target user has the permission to send a gift red packet in the chat room, the non-target user obtains a virtual article in the red packet by grabbing the red packet, and the virtual article is automatically sent to a backpack of the non-target user by associating a user identifier and an identifier of the red packet gift.
5. The method of claim 4, wherein prior to generating the room entry request in response to the target user entering the target live room, the method further comprises:
responding to the stealth setting operation of the target user, and sending a stealth setting request to the server; the stealth setting request comprises a user identification of the target user;
if a stealth confirmation message sent by the server is received, displaying a stealth interface; the stealth interface is used for setting different stealth identities according to the effective time when the identity level of the target user reaches a preset level.
6. The method of claim 4, wherein if a list is displayed that includes the target stealth identity, the method further comprises:
responding to a chat room entry request for the target user, and entering the chat room of the target user; the chat room context of the target user is related to the target stealth identity.
7. An interactive device, characterized in that the device comprises a generating unit, a transmitting unit and a display unit:
the generation unit is used for responding to the operation that the target user enters the target live broadcast room and generating a room entering request; the room entering request comprises a room identifier of the target live broadcast room and a user identifier of a target user;
the sending unit is used for sending the room entering request to a server;
the display unit is used for displaying the target stealth identity when the target user enters the target live broadcast room if the target stealth identity returned by the server is received; the target stealth identity is determined by the server according to the room identifier and the user identifier, and then according to the valid time when the identity level of the target user reaches a preset level after the server determines that the target user starts a stealth function for the target live broadcast room, wherein the target stealth identity of the target user entering the target live broadcast room is determined according to the valid time, and the method comprises the following steps: determining the stealth identity of the target user according to the user identification and a corresponding relation, wherein the corresponding relation is the corresponding relation between the user identification and the stealth identity of the target user; follow in the stealthy identity that target user has confirm with the stealthy identity that the valid time corresponds is as target stealthy identity, wherein, the valid time that the identity grade of different users reaches preset grade corresponds different stealthy identities, target stealthy identity includes the function key, target user has corresponding chat room for cooperate different stealthy identities to build the scene chat room atmosphere of different themes, the process that gets into the chat room includes: displaying a function key for entering a chat room at the upper right corner of the target stealth identity, triggering a chat room entering request when a non-target user clicks the function key, enabling a terminal device to enter the chat room of the target user in response to the chat room entering request aiming at the target user, enabling the non-target user to perform chat interaction with the target user, enabling the background of the chat room of the target user to be related to the target stealth identity, enabling the target user to have the right of sending a gift red package in the chat room, enabling the non-target user to obtain a virtual article in the red package by robbing the red package, and automatically sending the virtual article to a backpack of the non-target user by associating a user identifier and an identifier of the gift in the red package.
8. An apparatus for interaction, the apparatus comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the method of any of claims 1-2 or 4-6 according to instructions in the program code.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium is configured to store a program code for performing the method of any of claims 1-2 or 4-6.
CN202010104412.5A 2020-02-20 2020-02-20 Interaction method and related device Active CN111327914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010104412.5A CN111327914B (en) 2020-02-20 2020-02-20 Interaction method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010104412.5A CN111327914B (en) 2020-02-20 2020-02-20 Interaction method and related device

Publications (2)

Publication Number Publication Date
CN111327914A CN111327914A (en) 2020-06-23
CN111327914B true CN111327914B (en) 2022-09-20

Family

ID=71168786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010104412.5A Active CN111327914B (en) 2020-02-20 2020-02-20 Interaction method and related device

Country Status (1)

Country Link
CN (1) CN111327914B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112312153B (en) * 2020-10-29 2021-07-16 腾讯科技(深圳)有限公司 Live broadcast interaction realization method and computer readable storage medium
CN112437294B (en) * 2020-11-25 2021-10-12 腾讯科技(深圳)有限公司 Method, device and equipment for testing identity hiding function and storage medium
CN113382274B (en) * 2021-05-31 2023-01-20 北京达佳互联信息技术有限公司 Data processing method and device, electronic equipment and storage medium
CN115150672A (en) * 2022-06-23 2022-10-04 广州方硅信息技术有限公司 Live broadcast interaction method and device for simulated workplace and electronic equipment
CN116033174A (en) * 2022-12-13 2023-04-28 北京字跳网络技术有限公司 Information display method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881929A (en) * 2017-05-10 2018-11-23 武汉斗鱼网络科技有限公司 A kind of method and apparatus that direct broadcasting room login prompt is set
CN108965901A (en) * 2018-07-06 2018-12-07 武汉斗鱼网络科技有限公司 It is a kind of for the display methods and electronic equipment of platform to be broadcast live
CN109640102A (en) * 2017-10-09 2019-04-16 武汉斗鱼网络科技有限公司 The implementation method and device of stealthy anonymous function in a kind of direct broadcasting room

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7146329B2 (en) * 2000-01-13 2006-12-05 Erinmedia, Llc Privacy compliant multiple dataset correlation and content delivery system and methods
CN106899893B (en) * 2017-03-31 2020-07-10 武汉斗鱼网络科技有限公司 Method and system for marking placement of bullet screen information in network live broadcast room
CN108989899B (en) * 2017-06-01 2021-07-23 武汉斗鱼网络科技有限公司 Bullet screen processing method and system
CN108512946B (en) * 2018-03-20 2020-01-14 Oppo广东移动通信有限公司 Identity information display method and device and terminal
CN110460881B (en) * 2019-08-01 2021-12-14 广州虎牙科技有限公司 Method and device for managing attribute tags, computer equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108881929A (en) * 2017-05-10 2018-11-23 武汉斗鱼网络科技有限公司 A kind of method and apparatus that direct broadcasting room login prompt is set
CN109640102A (en) * 2017-10-09 2019-04-16 武汉斗鱼网络科技有限公司 The implementation method and device of stealthy anonymous function in a kind of direct broadcasting room
CN108965901A (en) * 2018-07-06 2018-12-07 武汉斗鱼网络科技有限公司 It is a kind of for the display methods and electronic equipment of platform to be broadcast live

Also Published As

Publication number Publication date
CN111327914A (en) 2020-06-23

Similar Documents

Publication Publication Date Title
CN111327914B (en) Interaction method and related device
CN111294622B (en) Interaction method and related device
CN111182355B (en) Interaction method, special effect display method and related device
CN112468831B (en) Multi-user live broadcast method, device, terminal, server and storage medium
CN112235647B (en) Network data processing method and device, terminal and server
CN106375774B (en) Method, device and system for controlling display content of live broadcast room
US10854009B2 (en) Method, apparatus, and system for obtaining virtual object, and storage medium
CN111918086B (en) Video connection method, device, terminal, server and readable storage medium
CN109200567B (en) Motion data interaction method and device and electronic equipment
CN111318026B (en) Team forming method, device, equipment and storage medium for competitive game
CN110278464A (en) The method and apparatus for showing list
CN109639569B (en) Social communication method and terminal
CN113259703B (en) Interaction method and device for live broadcast task, electronic equipment and storage medium
CN113810732B (en) Live content display method, device, terminal, storage medium and program product
CN109771955B (en) Invitation request processing method, device, terminal and storage medium
CN114125483B (en) Event popup display method, device, equipment and medium
CN108579075B (en) Operation request response method, device, storage medium and system
CN112569607A (en) Display method, device, equipment and medium for pre-purchased prop
CN114130012A (en) User interface display method, device, equipment, medium and program product
CN112995687B (en) Interaction method, device, equipment and medium based on Internet
CN115086737B (en) Data processing method, device, electronic equipment and storage medium
CN112973116B (en) Virtual scene picture display method and device, computer equipment and storage medium
CN114826799B (en) Information acquisition method, device, terminal and storage medium
EP4030765A1 (en) Live broadcast method and apparatus
CN113244628A (en) Resource processing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40024202

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant