CN112131028A - Process interaction method and device, computer equipment and storage medium - Google Patents
Process interaction method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN112131028A CN112131028A CN202011063276.6A CN202011063276A CN112131028A CN 112131028 A CN112131028 A CN 112131028A CN 202011063276 A CN202011063276 A CN 202011063276A CN 112131028 A CN112131028 A CN 112131028A
- Authority
- CN
- China
- Prior art keywords
- user account
- identifier
- service data
- feedback information
- account process
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 385
- 230000008569 process Effects 0.000 title claims abstract description 315
- 230000003993 interaction Effects 0.000 title claims abstract description 32
- 238000012795 verification Methods 0.000 claims abstract description 43
- 238000013507 mapping Methods 0.000 claims description 24
- 230000006854 communication Effects 0.000 abstract description 30
- 238000004891 communication Methods 0.000 abstract description 29
- 238000010586 diagram Methods 0.000 description 15
- 238000004590 computer program Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 244000144730 Amygdalus persica Species 0.000 description 2
- 235000006040 Prunus persica var persica Nutrition 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000002860 competitive effect Effects 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000013468 resource allocation Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 230000026676 system process Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/46—Multiprogramming arrangements
- G06F9/54—Interprogram communication
Landscapes
- Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application provides a process interaction method, a process interaction device, computer equipment and a storage medium. The method comprises the following steps: a first user account process receives an invitation instruction sent by a first client; a first user account process generates a first identifier; the first user account process correspondingly stores the first identifier and the first service data; the first user account process sends a first verification request to the second user account process; the second user account process sends first feedback information to the first user account process; the first user account process acquires first service data according to the first identifier; and the first user account process sends an invitation result and first service data to the first client. According to the technical scheme provided by the embodiment of the application, the first identifier corresponding to the first service data is sent to the second user account process during the inter-process communication, the first service data is prevented from being carried during the inter-process communication, and the flow required during the inter-process communication can be reduced.
Description
Technical Field
The embodiment of the application relates to the technical field of internet, in particular to a process interaction method, a process interaction device, computer equipment and a storage medium.
Background
A process is the basic unit of resource allocation and scheduling for a system process. A computer device typically needs to run multiple processes simultaneously when it completes a task. Interprocess communication can occur when a process needs to utilize data of other processes. Currently, a game application provides a function of a plurality of user accounts for game competition in the same virtual room, and a process of a first user account inviting a second user account to join the same virtual room involves inter-process communication.
In the related technology, when a player a invites a second user account corresponding to a player B to join a same virtual room, the player a triggers a client of the player a to send an invitation request corresponding to the second user account to a server, a first user account process corresponding to the player a in the server sends a first verification request to a second user account process, the second user account process sends a second verification request to a virtual room process, the room process returns a judgment result to the second user account process after judging whether the second user account is allowed to join the virtual room, and the second user account process returns the judgment result to the first user account process. In the inter-process communication process, the service data to be recalled is also sent to a second user account process or a room process.
In the related art, because the service data to be recalled is carried during the inter-process communication, the data volume of the service data is large, and the flow consumed by the inter-process communication is large.
Disclosure of Invention
The embodiment of the application provides a process interaction method and device, computer equipment and a storage medium, which avoid carrying callback data during inter-process communication and reduce flow waste. The technical scheme is as follows:
in one aspect, an embodiment of the present application provides a process interaction method, where the method includes:
a first user account process receives an invitation instruction sent by a first client, wherein the invitation instruction is used for indicating to invite a second user account to participate in a target service;
a first user account process generates a first identifier of first service data;
the first user account process correspondingly stores the first identifier and the first service data;
the first user account process sends a first verification request to a second user account process corresponding to the second user account according to the invitation instruction, wherein the first verification request carries the first identifier;
the second user account process sends first feedback information corresponding to the first verification request to the first user account process, wherein the first feedback information carries a first identifier;
the first user account process acquires the first service data according to the first identifier;
and the first user account process sends an invitation result and the first service data to the first client according to the first feedback information.
In another aspect, an embodiment of the present application provides a process interaction apparatus, where the apparatus includes:
a first process module, configured to receive an invitation instruction sent by a first client, where the invitation instruction is used to instruct a second user account to participate in a target service, generate a first identifier of first service data, store the first identifier and the first service data correspondingly, and send a first verification request to a second user account process corresponding to the second user account according to the invitation instruction, where the first verification request carries the first identifier;
a second process module, configured to send first feedback information corresponding to the first verification request to the first user account process, where the first feedback information carries a first identifier;
the first process module is further configured to obtain the first service data according to the first identifier, and send an invitation result and the first service data to the first client according to the first feedback information.
In yet another aspect, an embodiment of the present application provides a computer device, which includes a processor and a memory, where at least one instruction, at least one program, a code set, or a set of instructions is stored in the memory, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by the processor to implement the above process interaction method.
In yet another aspect, an embodiment of the present application provides a computer-readable storage medium, where at least one instruction, at least one program, a code set, or a set of instructions is stored in the computer-readable storage medium, and the at least one instruction, the at least one program, the code set, or the set of instructions is loaded and executed by a processor to implement the process interaction method.
In yet another aspect, embodiments of the present application provide a computer program product or a computer program, where the computer program product or the computer program includes computer instructions, and the computer instructions are stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to execute the process interaction method.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
the first identification of the first service data is generated before the inter-process communication, and the first identification and the second identification are correspondingly stored, the first identification is sent to the second user account process instead of the first service data during the subsequent inter-process communication, the first service data can be obtained according to the first identification when the subsequent first user account process needs to call back the first service data, the first service data is prevented from being carried during the inter-process communication, and the data volume of the first identification is usually smaller than that of the first service data, so that the flow required during the inter-process communication can be reduced.
Drawings
FIG. 1 is a schematic illustration of an implementation environment shown in an exemplary embodiment of the present application;
FIG. 2 is a flowchart of a process interaction method shown in the related art;
FIG. 3 is a flow diagram illustrating a process interaction method in accordance with an illustrative embodiment of the present application;
FIG. 4 is an interface diagram illustrating an invitation interface in accordance with an exemplary embodiment of the present application;
FIG. 5 is a diagrammatic illustration of an interface for receiving invitation information in accordance with an exemplary embodiment of the present application;
FIG. 6 is a diagrammatic illustration of an invitation failure interface shown in an exemplary embodiment of the present application;
FIG. 7 is an interface diagram illustrating invitation success in accordance with an exemplary embodiment of the present application;
FIG. 8 is a flowchart of a process interaction method, shown in an exemplary embodiment of the present application;
FIG. 9 is a diagram illustrating process interaction in accordance with an illustrative embodiment of the present application;
FIG. 10 is a block diagram illustrating an architecture of a process interaction device, according to an illustrative embodiment of the present application;
FIG. 11 is a block diagram illustrating a computer device according to an exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
FIG. 1 illustrates a schematic diagram of an implementation environment provided by one embodiment of the present application. The implementation environment includes: the system comprises a first terminal 10, a background service system 20 and a second terminal 30.
The first terminal 10 operates a first client, and the first client logs in a first user account. Alternatively, the first terminal 10 is a smartphone, a tablet Computer, a notebook Computer, a Personal Computer (PC), or the like. Optionally, the first client includes, but is not limited to, a game-like client, a live-type client, a voice-like client, and the like. In the embodiment of the present application, only the first client is taken as a game client for example.
The second terminal 30 runs with a second client, and the second client logs in with a second user account. Alternatively, the second terminal 30 is a smartphone, a tablet Computer, a notebook Computer, a Personal Computer (PC), or the like. The second client corresponds to the same application program as the first client.
Optionally, a designated relationship exists between the first user account and the second user account, where the designated relationship is a friend relationship, a focus relationship, a listening relationship, or the like.
The background service system 20 is a background service system corresponding to the first client and the second client. The background service system 20 may run one process or may run a plurality of different processes.
Optionally, a user account process, a virtual room process, etc. are run in the background service system 20. The user account process is used for managing account information of the user account, such as virtual object information corresponding to the user account, virtual prop information used by the user account, and level information of the user account. The virtual room process is used for managing room information of the virtual room, such as admission conditions of the virtual room, corresponding competition modes of the virtual room, competition maps used by the virtual room, and the like.
Optionally, the background service system 20 is a distributed system. Illustratively, the background service system comprises a user account server and a virtual room server, wherein the user account server runs a user account process, and the virtual room server runs a virtual room process.
The first terminal 10 and the background service system 20 establish a communication connection through a wired network or a wireless network. The second terminal 30 and the background service system 20 establish a communication connection through a wired or wireless network.
Optionally, the wireless or wired networks described above use standard communication techniques and/or protocols. The Network is typically the internet, but may be any other Network including, but not limited to, a Local Area Network (LAN), a Metropolitan Area Network (MAN), a Wide Area Network (WAN), a mobile, wireline or wireless Network, a private Network, or any combination of virtual private networks. In some embodiments, data exchanged over a network is represented using techniques and/or formats including Hypertext Mark-up Language (HTML), Extensible Markup Language (XML), and the like. All or some of the links may also be encrypted using conventional encryption techniques such as Secure Socket Layer (SSL), Transport Layer Security (TLS), Virtual Private Network (VPN), Internet Protocol Security (IPsec). In other embodiments, custom and/or dedicated data communication techniques may also be used in place of, or in addition to, the data communication techniques described above.
Fig. 2 is a schematic diagram showing process interaction provided by the related art. The lobby process a is also a user account process corresponding to the user account used by the player a, the lobby process B is also a user account process corresponding to the user account used by the player B, and the virtual room process is a process corresponding to the virtual room in which the user account used by the user a is located. The process interaction process comprises the following steps:
1. and the lobby process A requests the database to acquire a process corresponding to the user account used by the player B.
In the process, the lobby process A sends a query request to the database, and the query request carries the user account number used by the player B.
2. The database returns lobby course B to lobby course a.
The database stores the user account and the mapping table between the user account processes, queries the mapping table to obtain the lobby process B corresponding to the user account used by the player B, and then returns the lobby process B to the lobby process A.
3. Lobby process a sends a first authentication request to lobby process B.
The first judgment request carries first service data and room information of a virtual room in which the user account used by the user a is located, such as an admission virtual driver license level, an admission user account level and the like.
4. The lobby process B sends a second authentication request to the room process.
The second determination request carries second service data, room information of a virtual room where the user account used by the user a is located, and account information of the virtual account used by the user B, such as an account level, a virtual article level corresponding to the account, and the like.
The room process determines based on the room information of the virtual room where the user account used by the user a is located and the account information of the virtual account used by the user B, to determine whether to allow the user account used by the user B to join the virtual room where the user account used by the player a is located (i.e., a determination result).
5. And the virtual room process sends the first judgment result to the lobby B process.
6. And the lobby process B sends a second judgment result to the lobby process A.
The embodiment of the application provides a process interaction method, a first identifier of first service data is generated before inter-process communication, the first identifier and the second identifier are correspondingly stored, the first identifier is sent to a second user account process instead of the first service data during subsequent inter-process communication, the first service data can be obtained according to the first identifier when the subsequent first user account process needs to call back the first service data, and the first service data is prevented from being carried during the inter-process communication.
Fig. 3 is a flowchart illustrating a process interaction method according to an embodiment of the present application. The method is applied to a background service system in the implementation environment shown in fig. 1, and comprises the following steps:
in step 301, a first user account process receives an invitation instruction sent by a first client.
The first user account process is used for managing account information of a first user account logged in by the first client, such as avatar data corresponding to the first user account, account level data of the first user account, virtual article data owned by the first user account, and the like.
The invitation instruction is used for indicating to invite the second user account to participate in the target service. The target services include, but are not limited to, a group of a first user account and a second user account, a virtual room where the second user account joins the first user account, a game play starting between the second user account and the first user account, and the like. In the embodiment of the present application, only the target service is taken as an example to join the virtual room where the second user account is located in the first user account.
The invitation instruction carries the account identifier of the second user account and the room identifier of the virtual room. Optionally, the invitation instruction further carries room information of the virtual room, and an admission condition of the virtual room.
The room information of the virtual room refers to a virtual map, a sports mode, and the like used in the virtual room. Illustratively, the virtual map used by the virtual room is a beach map, and the competitive mode used by the virtual room is an entertainment mode.
The admission conditions for a virtual room include the level requirements of the user account number allowed to enter the virtual room, the virtual item level requirements, and the like. Illustratively, the account requirements corresponding to the virtual room include that a user account allowed to enter the virtual room is a Very Important task (VIP) user account, a virtual driver license owned by the user account allowed to enter the virtual room is a high-hand driver license, and the like.
Optionally, the first client displays an invitation interface, where the invitation interface includes a user account list having a designated relationship with the first user account, and when the first client receives a selection signal corresponding to a second user account in the user account list, the first client sends an invitation instruction to the first user account process in the server. Optionally, the specified relationship is a buddy relationship.
With reference to FIG. 4, an interface diagram of an invitation interface provided by an embodiment of the present application is shown. The invitation interface 41 includes a buddy list, the buddy list has a buddy contact of "one peach", and the first client sends an invitation instruction to the first user account process after receiving a trigger signal of the invitation control 411 corresponding to the buddy contact of "one peach".
Step 302, the first user account process generates a first identifier of the first service data.
The first service data refers to data to be called back by the first user account process, such as data for the first client to perform interface display, and includes but is not limited to avatar data corresponding to the first user account, virtual article data held by the first user account, such as clothing corresponding to an avatar, a virtual vehicle used by the first user account, and the like.
The first identifier of the first service data is used for uniquely identifying the first service data.
Step 303, the first user account process stores the first identifier and the first service data correspondingly.
Optionally, the first user account process stores the first identifier and the first service data in correspondence to the first mapping table. The first mapping table is stored in a location that is allowed to be accessed by the first user account process.
In one example, the first user account process creates a hash table, stores the first service data into the hash table, and determines a hash key generated based on the hash table as the first identifier.
Step 304, the first user account process sends a first verification request to a second user account process corresponding to the second user account according to the invitation instruction.
The first authentication request is used for requesting the second user account process to judge whether the second user account is allowed to participate in the target service. The first authentication request carries a first identifier.
Optionally, the first authentication request further comprises first authentication data. Taking the example that the target service is the second user account and joins the virtual room where the first user account is located, the first verification data includes the room information of the virtual room and the admission condition of the virtual room. Optionally, the first authentication request further carries a process identifier of the first user account process.
In the embodiment of the application, when the first user account process sends the first verification request to the second user account process, the first verification request does not carry the first service data which is not needed to be used by the second user account process when the account verification is performed, but carries the first identifier of the first service data, so that the data volume of data carried during inter-process communication is reduced, and the traffic consumption is reduced.
Correspondingly, the second user account process receives the first verification request sent by the first user account process.
Step 305, the second user account process sends first feedback information corresponding to the first authentication request to the first user account process.
The first feedback information is used for indicating whether the second user account is allowed to participate in the target service, and the first feedback information carries the first identifier.
Optionally, the second user account process performs a judgment according to the first service participation condition to obtain the first feedback information. The first service participation condition comprises that the second client version logged by the second user account is matched with the first client version logged by the first user account, the simulator is not used by the second user account, and the like.
Optionally, when the first feedback information is used to indicate that the second user account is allowed to participate in the target service, the second user account process sends invitation information to the second client, the second client displays the invitation information, and the player B may select to receive or reject the invitation information. Referring collectively to fig. 5, a schematic diagram of an interface for displaying invitation information is shown, according to an embodiment of the present application. The invitation information 511 is displayed on the user interface 51 of the second client.
Step 306, the first user account process obtains the first service data according to the first identifier.
Optionally, the first user account process queries the first mapping table according to the first identifier to obtain the first service data. Optionally, the first user account process finds the corresponding hash table based on the first identifier, and then reads the first service data from the hash table.
Step 307, the first user account process sends the invitation result and the first service data to the first client according to the first feedback information.
The invitation result is used for indicating whether the second user account is successfully invited to participate in the target service.
And when the first feedback information is used for indicating that the second user account is not allowed to participate in the target service, the invitation result is used for indicating that the second user account is not successfully invited to participate in the target service.
With reference to fig. 6, a schematic diagram of an invitation failure interface provided by an embodiment of the present application is shown. Invitation failure prompt information 611 is displayed on the invitation interface 61.
When the first feedback information is used for indicating that the second user account is allowed to participate in the target service, the second user account process sends invitation information to the second client, the second client receives a confirmation instruction corresponding to the invitation information and then sends invitation agreement information to the second user account process, the second user account process sends the invitation agreement information to the first user account process, the first user account process forwards the invitation agreement information to the first client, and at the moment, the second user account participates in the target service.
With reference to fig. 7, a schematic diagram of an invitation success interface provided by an embodiment of the present application is shown. The invitation interface 71 displays a second virtual account for entering the virtual room in which the first user account is located.
To sum up, according to the technical solution provided in the embodiment of the present application, the first identifier of the first service data is generated before the inter-process communication, and the first identifier and the second identifier are stored correspondingly, the first identifier is sent to the second user account process instead of the first service data during the subsequent inter-process communication, and when the subsequent first user account process needs to call back the first service data, the first service data can be obtained according to the first identifier, so that the first service data is prevented from being carried during the inter-process communication.
Fig. 8 is a flowchart illustrating a process interaction method according to an embodiment of the present application. The method is applied to a background service system in the implementation environment shown in fig. 1, and comprises the following steps:
in step 801, a first user account process receives an invitation instruction sent by a first client.
The invitation instruction is used for indicating to invite the second user account to participate in the target service.
Step 802, the first user account process generates a first identifier of the first service data.
Step 803, the first user account process stores the first identifier and the first service data correspondingly.
Step 804, the first user account process sends a first verification request to a second user account process corresponding to the second user account according to the invitation instruction.
The first authentication request carries a first identifier.
In step 805, the second user account process generates a second identifier of the second service data.
The second service data refers to data to be called back by the second user account process. The second service data includes the first identification. Optionally, the second service data further includes a process identifier of the first user account process.
The second identifier of the second service data is used for uniquely identifying the second service data.
In one example, the code for the second user account process to generate the second identifier of the second service data is implemented as:
Function ReadySendRoom(callbackData);
keyB2=createUniqeKey();
valueB2=callbackData;
saveSession(keyB2,valueB2){keyB1,valueB1},{keyB2,valueB2};
End Function.
step 806, the second user account process stores the second identifier corresponding to the second service data.
Optionally, the second user account process stores the second identifier and the second service data in correspondence to the second mapping table. The second mapping table is stored in a location that is allowed to be accessed by the second user account process.
In one example, the second user account process creates a hash table, stores the second service data into the hash table, and determines a hash key generated based on the hash table as the second identifier.
In step 807, the second user account process sends a second authentication request to the virtual room process.
The second authentication request is used for requesting the virtual room process to judge whether the second user account is allowed to participate in the target service. The second authentication request carries a second identifier.
Optionally, the second authentication request further comprises second authentication data. Taking the example that the target service is the virtual room where the second user account joins the first user account, the second verification data includes room information of the virtual room, admission conditions of the virtual room, and account information of the second user account. The account information of the second user account includes, but is not limited to, the level information of the second user account, the level information of the virtual item owned by the second user account, and the like.
Optionally, the second authentication request further carries a process identifier of the second user account process.
In the embodiment of the application, when the second user account process sends the first verification request to the virtual room process, the second user account process does not carry second service data which is not needed to be used when the virtual room process conducts account verification, but carries the second identifier of the second service data, so that the data volume of data carried during inter-process communication is reduced, and the traffic consumption is reduced.
Correspondingly, the virtual room process receives a second verification request sent by the second user account process.
Step 808, the virtual room process sends second feedback information corresponding to the second authentication request to the second user account process.
The second feedback information is used for indicating whether the second user account is allowed to participate in the target service. The second feedback information carries a second identifier.
Optionally, the virtual room process performs judgment according to the second service participation condition to obtain second feedback information. The second service participation condition comprises that the level of the second user account reaches the level required by the virtual room, the level of the virtual article owned by the second user account reaches the level required by the virtual room, and the like.
Correspondingly, the second user account process receives second feedback information sent by the virtual room process.
Step 809, the second user account process obtains the first identifier according to the second identifier.
In one example, the code for the second user account process to obtain the first identifier according to the second identifier is implemented as:
Function GetDataFromRoom(keyB2);
valueB2=GetValue(keyB2){keyB1,valueB1},{keyB2,valueB2};
doOtherJudge(valyeB2);
End Function.
optionally, the second user account process queries the second mapping table according to the second identifier to obtain the second service data. Optionally, the second user account process finds a corresponding hash table based on the second identifier, and then reads the second service data from the hash table. The second service data carries the first identifier.
Step 810, the second user account process sends the first feedback information to the first user account process according to the second feedback information.
The first feedback information carries a first identifier.
In a possible implementation manner, the second user account process sends the second feedback information as the first feedback information to the first user account process.
In another possible implementation manner, the second user account process performs judgment based on the first service participation condition to obtain a first judgment result, and generates the first feedback information based on the first judgment result and a second judgment result indicated in the second feedback information.
When the first judgment result and the second judgment result both indicate that the second user account is allowed to participate in the target service, the first feedback information is also used for indicating that the second user account is allowed to participate in the target service; and when at least one of the first judgment result and the second judgment result indicates that the second user account is not allowed to participate in the target service, the first feedback information is used for indicating that the second user account is not allowed to participate in the target service.
Step 811, the first user account process obtains the first service data according to the first identifier.
In step 812, the first user account process sends the invitation result and the first service data to the first client according to the first feedback information.
Before the first user account process sends the first verification request to the second user account process, the first user account process needs to determine the second user account process.
Optionally, in an alternative embodiment provided based on the embodiment shown in fig. 3 or fig. 8, after step 301, the method further includes the following steps:
in step 401, a first user account process sends a query request to a database.
The query request carries a second user account and a first data identifier.
Optionally, the database stores a mapping table between the user account and the user account process, and after receiving the query request, the database queries the mapping table to determine the second user account process.
Correspondingly, the database receives the query request sent by the first user account process.
And 402, the first user account process is used for receiving fourth feedback information returned by the database according to the query request.
The fourth feedback information carries the first identifier and the process identifier of the second user account process.
In one example, an embodiment of the present application further provides a process interaction method. The method comprises the following steps:
in step 901, the lobby process a requests the database to acquire a process corresponding to the user account used by the player B.
The lobby process a is also the user account process corresponding to the user account used by the player a. The lobby process B is also the user account process corresponding to the user account used by the player B.
In the process, the lobby process A sends a query request to the database, wherein the query request carries the user account used by the player B and the first identifier.
At step 902, the database returns to lobby process a to lobby process B.
The database stores the user account and the mapping table between the user account processes, queries the mapping table to obtain the lobby process B corresponding to the user account used by the player B, and then returns the lobby process B to the lobby process A.
In step 903, lobby process a sends a first authentication request to lobby process B.
The first authentication request carries a first identifier and first authentication data, and the first authentication data is room information of a virtual room in which a user account used by the user a is located, such as an access virtual driver license level, an access user account level, and the like.
At step 904, the lobby process B sends a second authentication request to the virtual room process.
The virtual room process is a process corresponding to a virtual room in which the user account used by the user a is located.
The second verification request carries a second identifier, room information of a virtual room where the user account used by the user a is located, and account information of the virtual account used by the user B, such as an account level, a virtual article level corresponding to the account, and the like.
The virtual room process determines based on the room information of the virtual room where the user account used by the user a is located and the account information of the virtual account used by the user B, so as to determine whether to allow the user account used by the user B to falsely join the virtual room where the user account used by the player a is located (i.e., a determination result).
Step 905, the room process sends the first judgment result to the lobby B process.
The first judgment result carries a second identifier.
In step 906, the lobby process B sends a second decision to lobby process a.
The second judgment result carries the first identifier.
With reference to fig. 9, a schematic diagram of a process interaction method according to an embodiment of the present application is shown.
After receiving an invitation instruction, a lobby process A stores first service data value A in a self transaction list to obtain a data identifier keyA of the first service data, then the lobby process A sends an inquiry request to a database to request a lobby process B, the inquiry request carries keyA, the database sends process B and keyA to the lobby process A, then the lobby process A sends a first verification request to the lobby process B, the first verification request carries keyA, the lobby process B stores account information corresponding to the keyA and the lobby process A as the value B in the self transaction list to obtain a data identifier keyB of second service data, then the lobby process B sends a second verification request to a room process, the second verification request carries the keyB, the room process returns a first judgment result to the lobby process B, the first judgment result carries the lobby B, the lobby process B queries the self transaction list based on the keyB, and obtaining the keyA, and then sending a second judgment result to the lobby process A, wherein the second judgment result carries the keyA.
In the following, embodiments of the apparatus of the present application are described, and for portions of the embodiments of the apparatus not described in detail, reference may be made to technical details disclosed in the above-mentioned method embodiments.
Referring to fig. 10, a block diagram of a process interaction apparatus provided in an exemplary embodiment of the present application is shown. The process interaction means may be implemented as all or part of the terminal in software, hardware or a combination of both. The process interaction device comprises:
a first process module 1010, configured to receive an invitation instruction sent by a first client, where the invitation instruction is used to instruct a second user account to participate in a target service, generate a first identifier of first service data, store the first identifier and the first service data correspondingly, and send a first verification request to a second user account process corresponding to the second user account according to the invitation instruction, where the first verification request carries the first identifier.
A second process module 1020, configured to send first feedback information corresponding to the first verification request to the first user account process, where the first feedback information carries a first identifier.
The first process module 1010 is further configured to obtain the first service data according to the first identifier, and send an invitation result and the first service data to the first client according to the first feedback information.
To sum up, according to the technical solution provided in the embodiment of the present application, the first identifier of the first service data is generated before the inter-process communication, and the first identifier and the second identifier are stored correspondingly, the first identifier is sent to the second user account process instead of the first service data during the subsequent inter-process communication, and when the subsequent first user account process needs to call back the first service data, the first service data can be obtained according to the first identifier, so that the first service data is prevented from being carried during the inter-process communication.
In an alternative embodiment provided based on the embodiment shown in fig. 10, the first process module 1010 is configured to:
correspondingly storing the first identifier and the first service data to a first mapping table;
and searching the first service data in the first mapping table according to the first identifier.
In an alternative embodiment provided based on the embodiment shown in fig. 10, the apparatus further comprises: a virtual room process module (not shown in fig. 10).
The second process module 1020 is further configured to generate a second identifier of second service data, where the second service data includes the first identifier, and store the second identifier and the second service data correspondingly.
The second process module 1020 is further configured to send a second authentication request to the virtual room process, where the second authentication request carries the second identifier.
And the virtual room process module is configured to send second feedback information corresponding to the second verification request to the second user account process, where the second feedback information carries the second identifier.
The second process module 1020 is specifically configured to: and acquiring the first identifier according to the second identifier, and sending the first feedback information to the first user account process according to the second feedback information.
Optionally, the second process module 1020 is specifically configured to:
correspondingly storing the second identifier and the second service data to a second mapping table;
and searching the first identifier in the first mapping table according to the second identifier.
Optionally, the second service data further includes a process identifier of the first user account process.
In an alternative embodiment provided based on the embodiment shown in fig. 10, the first process module 1010 is further configured to:
sending a query request to a database, wherein the query request carries the first identifier and the second user account;
receiving third feedback information returned by the database according to the query request; and the fourth feedback information carries the first identifier and the process identifier of the second user account process.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
Referring to fig. 11, a schematic structural diagram of a server according to an embodiment of the present invention is shown. The server 1100 is a background service system in fig. 1. Specifically, the method comprises the following steps: the server 1100 includes a Central Processing Unit (CPU) 1101, a system Memory 1104 including a Random Access Memory (RAM) 1102 and a Read-Only Memory (ROM) 1103, and a system bus 1105 connecting the system Memory 1104 and the CPU 1101. The server 1100 also includes a basic Input/Output system (I/O) 1106, which facilitates information transfer between devices within the computer, and a mass storage device 1107 for storing an operating system 1113, application programs 1114, and other program modules 1115.
The basic input/output system 1106 includes a display 1108 for displaying information and an input device 1109 such as a mouse, keyboard, etc. for user input of information. Wherein the display 1108 and input device 1109 are connected to the central processing unit 1101 through an input output controller 1110 connected to the system bus 1105. The basic input/output system 1106 may also include an input/output controller 1110 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, input-output controller 1110 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 1107 is connected to the central processing unit 1101 through a mass storage controller (not shown) that is connected to the system bus 1105. The mass storage device 1107 and its associated computer-readable media provide non-volatile storage for the server 1100. That is, the mass storage device 1107 may include a computer-readable medium (not shown) such as a hard disk.
Without loss of generality, the computer-readable media may comprise computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, flash memory or other solid state storage technology, DVD or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices. Of course, those skilled in the art will appreciate that the computer storage media is not limited to the foregoing. The system memory 1104 and mass storage device 1107 described above may be collectively referred to as memory.
The server 1100 may also operate in accordance with various embodiments of the invention by connecting to remote computers over a network, such as the internet. That is, the server 1100 may connect to the network 1112 through the network interface unit 1111 that is coupled to the system bus 1105, or may connect to other types of networks or remote computer systems (not shown) using the network interface unit 1111.
The memory further includes one or more programs, the one or more programs are stored in the memory, and the one or more programs include steps executed by the server for performing the random number generation method provided by the embodiment of the present invention.
In an exemplary embodiment, a computer-readable storage medium is further provided, in which at least one instruction is stored, and the at least one instruction is loaded and executed by a processor of a terminal to implement the process method in the above-described method embodiment.
Alternatively, the computer readable storage medium may be a ROM, a RAM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
In an exemplary embodiment, a computer program product or computer program is also provided, the computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions to cause the computer device to execute the process interaction method.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. As used herein, the terms "first," "second," and the like, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The above description is only exemplary of the present application and should not be taken as limiting the present application, and any modifications, equivalents, improvements and the like that are made within the spirit and principle of the present application should be included in the protection scope of the present application.
Claims (14)
1. A process interaction method, characterized in that the method comprises:
a first user account process receives an invitation instruction sent by a first client, wherein the invitation instruction is used for indicating to invite a second user account to participate in a target service;
a first user account process generates a first identifier of first service data;
the first user account process correspondingly stores the first identifier and the first service data;
the first user account process sends a first verification request to a second user account process corresponding to the second user account according to the invitation instruction, wherein the first verification request carries the first identifier;
the second user account process sends first feedback information corresponding to the first verification request to the first user account process, wherein the first feedback information carries a first identifier;
the first user account process acquires the first service data according to the first identifier;
and the first user account process sends an invitation result and the first service data to the first client according to the first feedback information.
2. The method of claim 1, wherein the storing, by the first user account process, the first identifier in correspondence with the first service data comprises:
the first user account process correspondingly stores the first identifier and the first service data to a first mapping table;
the first user account process obtaining the first service data according to the first identifier, including:
and the first user account process searches the first service data in the first mapping table according to the first identifier.
3. The method according to claim 1, wherein after the first user account process sends the first authentication request to the second user account process corresponding to the second user account according to the invitation instruction, the method further comprises:
a second user account process generates a second identifier of second service data, wherein the second service data comprises the first identifier;
the second user account process correspondingly stores the second identifier and the second service data;
the second user account process sends a second verification request to the virtual room process, wherein the second verification request carries the second identifier;
the virtual room process sends second feedback information corresponding to the second verification request to the second user account process, wherein the second feedback information carries the second identifier;
the second user account process sending first feedback information corresponding to the first verification request to the first user account process, including:
the second user account process acquires the first identifier according to the second identifier;
and the second user account process sends the first feedback information to the first user account process according to the second feedback information.
4. The method according to claim 3, wherein the storing, by the second user account process, the second identifier in correspondence with the second service data comprises:
the second user account process correspondingly stores the second identifier and the second service data to a second mapping table;
the second user account process obtaining the first identifier according to the second identifier, including:
and the second user account process searches the first identifier in the first mapping table according to the second identifier.
5. The method of claim 3, wherein the second service data further comprises a process identification of the first user account process.
6. The method according to any one of claims 1 to 5, wherein before the first user account process sends the first authentication request to the second user account process according to the invitation instruction, further comprising:
the first user account process sends a query request to a database, wherein the query request carries the first identifier and the second user account;
the first user account process receives third feedback information returned by the database according to the query request; and the fourth feedback information carries the first identifier and the process identifier of the second user account process.
7. An apparatus for process interaction, the apparatus comprising:
a first process module, configured to receive an invitation instruction sent by a first client, where the invitation instruction is used to instruct a second user account to participate in a target service, generate a first identifier of first service data, store the first identifier and the first service data correspondingly, and send a first verification request to a second user account process corresponding to the second user account according to the invitation instruction, where the first verification request carries the first identifier;
a second process module, configured to send first feedback information corresponding to the first verification request to the first user account process, where the first feedback information carries a first identifier;
the first process module is further configured to obtain the first service data according to the first identifier, and send an invitation result and the first service data to the first client according to the first feedback information.
8. The apparatus of claim 7, wherein the first process module is configured to:
correspondingly storing the first identifier and the first service data to a first mapping table;
and searching the first service data in the first mapping table according to the first identifier.
9. The apparatus of claim 7, further comprising:
the second process module is further configured to generate a second identifier of second service data, where the second service data includes the first identifier, and store the second identifier and the second service data correspondingly;
the second process module is further configured to send a second verification request to the virtual room process, where the second verification request carries the second identifier;
the virtual room process is used for sending second feedback information corresponding to the second verification request to the second user account process, and the second feedback information carries the second identifier;
the second process module is specifically configured to: and acquiring the first identifier according to the second identifier, and sending the first feedback information to the first user account process according to the second feedback information.
10. The apparatus of claim 9, wherein the second process module is specifically configured to:
correspondingly storing the second identifier and the second service data to a second mapping table;
and searching the first identifier in the first mapping table according to the second identifier.
11. The apparatus of claim 9, wherein the second service data further comprises a process identifier of the first user account process.
12. The apparatus of any of claims 7 to 11, wherein the first process module is further configured to:
sending a query request to a database, wherein the query request carries the first identifier and the second user account;
receiving third feedback information returned by the database according to the query request; and the fourth feedback information carries the first identifier and the process identifier of the second user account process.
13. A computer device comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement a process interaction method as claimed in any one of claims 1 to 6.
14. A computer-readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the process interaction method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011063276.6A CN112131028B (en) | 2020-09-30 | 2020-09-30 | Process interaction method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011063276.6A CN112131028B (en) | 2020-09-30 | 2020-09-30 | Process interaction method and device, computer equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112131028A true CN112131028A (en) | 2020-12-25 |
CN112131028B CN112131028B (en) | 2024-01-30 |
Family
ID=73843624
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011063276.6A Active CN112131028B (en) | 2020-09-30 | 2020-09-30 | Process interaction method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112131028B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023125209A1 (en) * | 2021-12-27 | 2023-07-06 | 北京罗克维尔斯科技有限公司 | Inter-process communication method and apparatus thereof |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120296994A1 (en) * | 2011-05-18 | 2012-11-22 | Nikola Borisov | Method for integrating communication service with multi-player applications |
WO2015062378A1 (en) * | 2013-10-31 | 2015-05-07 | 北京奇虎科技有限公司 | User registration method, mobile terminal and server of client application program |
CN105727558A (en) * | 2014-12-11 | 2016-07-06 | 博雅网络游戏开发(深圳)有限公司 | Interaction invitation processing method and device |
US20160378461A1 (en) * | 2014-03-19 | 2016-12-29 | Huawei Device Co., Ltd | Application data synchronization method and apparatus |
US20180247654A1 (en) * | 2016-12-30 | 2018-08-30 | Google Llc | Device identifier dependent operation processing of packet based data communication |
CN108563521A (en) * | 2018-04-19 | 2018-09-21 | 网易(杭州)网络有限公司 | Applied to the information sharing method of game client, device, processor and terminal |
CN109331467A (en) * | 2018-08-15 | 2019-02-15 | 宏诚盛世(天津)网络科技有限公司 | A kind of game room matching process |
CN111330265A (en) * | 2020-02-10 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Computer system, login method, device, equipment and medium of virtual area |
-
2020
- 2020-09-30 CN CN202011063276.6A patent/CN112131028B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20120296994A1 (en) * | 2011-05-18 | 2012-11-22 | Nikola Borisov | Method for integrating communication service with multi-player applications |
WO2015062378A1 (en) * | 2013-10-31 | 2015-05-07 | 北京奇虎科技有限公司 | User registration method, mobile terminal and server of client application program |
US20160378461A1 (en) * | 2014-03-19 | 2016-12-29 | Huawei Device Co., Ltd | Application data synchronization method and apparatus |
CN105727558A (en) * | 2014-12-11 | 2016-07-06 | 博雅网络游戏开发(深圳)有限公司 | Interaction invitation processing method and device |
US20180247654A1 (en) * | 2016-12-30 | 2018-08-30 | Google Llc | Device identifier dependent operation processing of packet based data communication |
CN108563521A (en) * | 2018-04-19 | 2018-09-21 | 网易(杭州)网络有限公司 | Applied to the information sharing method of game client, device, processor and terminal |
CN109331467A (en) * | 2018-08-15 | 2019-02-15 | 宏诚盛世(天津)网络科技有限公司 | A kind of game room matching process |
CN111330265A (en) * | 2020-02-10 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Computer system, login method, device, equipment and medium of virtual area |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2023125209A1 (en) * | 2021-12-27 | 2023-07-06 | 北京罗克维尔斯科技有限公司 | Inter-process communication method and apparatus thereof |
Also Published As
Publication number | Publication date |
---|---|
CN112131028B (en) | 2024-01-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10065119B2 (en) | Game accessing method and processing method, server, terminal, and system | |
CN105530175B (en) | Message processing method, device and system | |
US8745134B1 (en) | Cross social network data aggregation | |
JP2020017948A (en) | Application realization method based on block chain network, apparatus, device, and storage medium | |
KR101712742B1 (en) | System and method for authenticating user using history of user | |
CN111643907A (en) | Game login method and device, storage medium and electronic equipment | |
CN109002349B (en) | Application program interaction method, implementation method, device, equipment and medium | |
CN104917631B (en) | Prediction initiation, participation and information processing method, apparatus and system | |
WO2019210698A1 (en) | Authentication method | |
JP2018517982A (en) | Automatic recharge system, method and server | |
JP2007148471A (en) | Service notification system | |
WO2015027907A1 (en) | Methods and systems for visiting user groups | |
CN113300933A (en) | Session content management method and device, computer equipment and readable storage medium | |
CN113900764B (en) | Page data acquisition method, page data display method and device | |
JP2018518771A (en) | Transaction processing method and system | |
CN112131028B (en) | Process interaction method and device, computer equipment and storage medium | |
CN109413455B (en) | User information display method and device for voice microphone interaction | |
CN112948804B (en) | Program control method, device and computer readable storage medium | |
CN106941509B (en) | User information flow request method and device | |
US20220210159A1 (en) | Method and apparatus for managing user profile | |
CN114602186A (en) | Cheating behavior identification method and device, storage medium and electronic equipment | |
CN108881344B (en) | Service processing method and device, storage equipment and processing server | |
CN111339189A (en) | Data processing method and device and computer readable storage medium | |
CN113934383B (en) | Method, device, server and storage medium for binding cloud printer and service | |
KR102531826B1 (en) | Method and apparatus for acquiring a random number for blockchain, device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |