CN112437294B - Method, device and equipment for testing identity hiding function and storage medium - Google Patents

Method, device and equipment for testing identity hiding function and storage medium Download PDF

Info

Publication number
CN112437294B
CN112437294B CN202011335973.2A CN202011335973A CN112437294B CN 112437294 B CN112437294 B CN 112437294B CN 202011335973 A CN202011335973 A CN 202011335973A CN 112437294 B CN112437294 B CN 112437294B
Authority
CN
China
Prior art keywords
hidden
display style
display
identity information
live
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011335973.2A
Other languages
Chinese (zh)
Other versions
CN112437294A (en
Inventor
蒋政胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202011335973.2A priority Critical patent/CN112437294B/en
Publication of CN112437294A publication Critical patent/CN112437294A/en
Application granted granted Critical
Publication of CN112437294B publication Critical patent/CN112437294B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N17/00Diagnosis, testing or measuring for television systems or their details
    • H04N17/004Diagnosis, testing or measuring for television systems or their details for digital television systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Biomedical Technology (AREA)
  • General Health & Medical Sciences (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The application discloses a method, a device, equipment and a storage medium for testing an identity hiding function, and belongs to the field of application program testing. The method comprises the following steps: acquiring configuration information, wherein the configuration information comprises a hidden display style of the identity information of the user account, and the hidden display style is used for representing a display style of the identity information in a hidden state; acquiring an actual display style corresponding to the identity information, wherein the actual display style is used for representing the display style of the identity information when a live client executes a simulation behavior event, and the simulation behavior event is used for representing an event corresponding to an interactive behavior generated in the live client under the condition that the simulation identity information is in a hidden state; matching the hidden display style with the actual display style; and determining that the identity hiding function is in an abnormal state in response to the hidden display style not being consistent with the actual display style. The testing efficiency of the application program is improved by matching the hidden display style with the actual display style.

Description

Method, device and equipment for testing identity hiding function and storage medium
Technical Field
The present application relates to the field of application program testing, and in particular, to a method, an apparatus, a device, and a storage medium for testing an identity hiding function.
Background
In order to protect the privacy of the user, the user starts an identity hiding mode when watching the live broadcast in the live broadcast room. In the identity hiding mode, when the user performs some action in the live broadcast, other users in the live broadcast cannot know the identity information of the user.
The identity hiding mode relates to more behavior scenes, such as scenes that a user enters a live broadcast room, scenes that the user enjoys a main broadcast, and the like. Before the live application program is online in the live application program, a tester needs to test whether the identity hiding mode covers all behavior scenes or not so as to ensure that identity information of a user in a live broadcasting room is not leaked. In the related art, a tester is required to play the role of a user, and whether identity information is successfully hidden in each behavior scene is tested in a manual mode.
According to the technical scheme, the tester tests whether the identity information of the user is successfully hidden under a plurality of behavior scenes in a manual mode, the testing process is long, and the new version of the live application program is easy to postpone online.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for testing an identity hiding function, wherein the hidden display style in configuration information is matched with the corresponding actual display style when a live client executes a simulation event, and whether the identity hiding function is in an abnormal state is judged according to a matching result, so that the testing efficiency of an application program is improved. The technical scheme is as follows:
according to an aspect of the present application, there is provided a method for testing an identity hiding function, the method including:
acquiring configuration information, wherein the configuration information comprises a hidden display style of identity information of a user account, and the hidden display style is used for representing a display style of the identity information in a hidden state;
acquiring an actual display style corresponding to the identity information, wherein the actual display style is used for representing the display style of the identity information when a live client executes a simulation behavior event, and the simulation behavior event is used for representing an event corresponding to an interactive behavior generated in the live client under the condition that the simulation identity information is in the hidden state;
matching the hidden display style with the actual display style;
and determining that the identity hiding function is in an abnormal state in response to the hidden display style not being consistent with the actual display style.
According to another aspect of the present application, there is provided a method for displaying identity information, the method including:
displaying a live user interface, wherein the live user interface comprises identity information of a user account;
in response to receiving an identity hiding instruction on the live broadcast user interface, controlling the identity information to be in a hidden state;
and switching and displaying the display style of the identity information into a hidden display style in response to receiving an operation instruction on the live broadcast user interface, wherein the operation instruction is used for generating an event corresponding to an interactive behavior on the live broadcast user interface, and the hidden display style is used for representing the display style of the identity information in the hidden state.
According to another aspect of the present application, there is provided a device for testing an identity hiding function, the device including:
the acquisition module is used for acquiring configuration information, wherein the configuration information comprises a hidden display style of identity information of a user account, and the hidden display style is used for representing a display style of the identity information in a hidden state;
the acquisition module is used for acquiring an actual display style corresponding to the identity information, the actual display style is used for representing the display style of the identity information when a live broadcast client executes a simulation behavior event, and the simulation behavior event is used for representing an event corresponding to an interactive behavior generated in the live broadcast client under the condition that the simulation identity information is in the hidden state;
the matching module is used for matching the hidden display style with the actual display style;
and the matching module is used for responding to the inconsistency between the hidden display style and the actual display style and determining that the identity hiding function is in an abnormal state.
According to another aspect of the present application, there is provided a display apparatus of identity information, the apparatus including:
the display module is used for displaying a live broadcast user interface, and the live broadcast user interface comprises identity information of a user account;
the control module is used for responding to an identity hiding instruction received from the live broadcast user interface and controlling the identity information to be in a hidden state;
the control module is used for responding to an operation instruction received on the live broadcast user interface, switching and displaying the display style of the identity information into a hidden display style, wherein the operation instruction is used for generating an event corresponding to an interactive behavior on the live broadcast user interface, and the hidden display style is used for representing the display style of the identity information under the condition of a hidden state.
According to another aspect of the present application, there is provided a computer device comprising: a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by the processor to implement the method for testing the identity hiding function and the method for displaying the identity information as described above.
According to another aspect of the present application, there is provided a computer-readable storage medium having stored therein a computer program, which is loaded and executed by a processor to implement the method for testing the identity hiding function and the method for displaying the identity information as described above.
According to another aspect of the application, a computer program product or computer program is provided, comprising computer instructions stored in a computer readable storage medium. The computer instructions are read from the computer readable storage medium by a processor of a computer device, and the processor executes the computer instructions to cause the computer device to execute the method for testing the identity hiding function and the method for displaying the identity information as described above.
The beneficial effects brought by the technical scheme provided by the embodiment of the application at least comprise:
by matching the actual display pattern in the behavior log with the hidden display pattern in the configuration information, whether the identity hiding function is in an abnormal state can be determined according to the matching result, a tester does not need to manually detect the state of the identity hiding function aiming at each scene, the testing efficiency and the testing accuracy of the application program are improved, and the testing period is shortened. Meanwhile, the detection method of the identity hiding function is suitable for various scenes only by setting the targeted configuration information according to different scenes, and has universality.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a block diagram of a computer system provided in an exemplary embodiment of the present application;
FIG. 2 is a flowchart of a method for testing an identity hiding function provided in an exemplary embodiment of the present application;
FIG. 3 is a schematic illustration of configuration information provided by an exemplary embodiment of the present application;
FIG. 4 is a flowchart block diagram of a method for testing identity hiding functionality provided by an exemplary embodiment of the present application;
FIG. 5 is a flowchart of a method for testing identity hiding functionality provided by another exemplary embodiment of the present application;
FIG. 6 is a schematic illustration of a display style provided by an exemplary embodiment of the present application;
FIG. 7 is a schematic illustration of a display style provided by another exemplary embodiment of the present application;
FIG. 8 is a schematic illustration of a display style provided by another exemplary embodiment of the present application;
FIG. 9 is a flowchart of a method for testing identity hiding functionality provided in another exemplary embodiment of the present application;
FIG. 10 is an interface diagram of a live user interface provided by another exemplary embodiment of the present application;
FIG. 11 is an interface diagram of a live user interface provided by another exemplary embodiment of the present application;
FIG. 12 is a schematic illustration of a display style provided by another exemplary embodiment of the present application;
FIG. 13 is an interface diagram of a live user interface provided by another exemplary embodiment of the present application;
FIG. 14 is an interface schematic diagram of a live user interface provided by another exemplary embodiment of the present application;
FIG. 15 is an interface schematic diagram of a live user interface provided by another exemplary embodiment of the present application;
FIG. 16 is a schematic illustration of a display style provided by another exemplary embodiment of the present application;
FIG. 17 is a schematic illustration of a display style provided by another exemplary embodiment of the present application;
FIG. 18 is a block diagram of a device for testing identity hiding functionality provided in an exemplary embodiment of the present application;
FIG. 19 is a block diagram of a display device for identity information provided by an exemplary embodiment of the present application;
FIG. 20 is a block diagram of a computer device according to an exemplary embodiment of the present application;
fig. 21 is a schematic device structure diagram of a server according to an exemplary embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
First, terms referred to in the embodiments of the present application are described:
and (4) live broadcast: the method refers to that a user watches videos on different live broadcast platforms in real time through a network, and the video content of the videos is generated or uploaded by a main broadcast in real time. The user can communicate with the anchor in real time by sending the information such as barrage, comments and the like, and the method is a novel social network mode.
Automated testing framework (Quick Test Android, QTA): the test automation tool is a cross-platform test automation tool and is suitable for testing background, native or mixed client applications. The method supports the automated interface test of an Android system (Android), an iOS system, a webpage (Web), a server, a cloud server and a window end. By injecting a test stub into the process of the application program to be tested, control tree information (a control tree refers to a hierarchical control with a tree structure) in the process of the application program, and attributes and methods of related classes and objects are obtained. The test stub is a JAR software package (Java Archive, which is generally used to merge multiple Java class files into one file) developed using a computer programming language (Java language), and mainly acquires instances of classes and objects in a process by using a reflection function of Java. A Socket server is established in the test pile, the client can acquire information such as the identification, coordinates, text, visibility and the like of the control after connection, and through the information, a user can search, acquire the text, set the text, click, slide and the like on the control. In addition, the test stub also provides the capabilities of reflecting and acquiring object attributes, calling functions and the like, so that the automatic test framework has the capability of testing a User Interface (UI).
Live broadcast is an emerging social networking mode, and users can watch different types of live broadcast through different live broadcast platforms (namely live broadcast application programs) on a terminal. Types of live broadcasts include, but are not limited to, the following: talent performance, dating love, outdoor activities, games, events, exhibitions, announcements, animations, quadratic elements, drawings, gourmet meals, movies, voice, radio stations and the like, and the type of live broadcast is not limited in the application. An input box exists on an interface of a live broadcast application program, a user inputs information such as characters, numbers or expressions into the input box to send a barrage or a comment to a main broadcast, and the main broadcast communicates with the user watching the live broadcast in real time by reading the barrage or the comment. Audience users can also enjoy the anchor broadcast in a mode of giving cash to the anchor broadcast or presenting a virtual gift representing a certain amount of cash to the anchor broadcast, each anchor broadcast corresponds to a contribution list, the contribution list comprises a contribution value of the user watching the live broadcast of the anchor broadcast to the anchor broadcast, and the contribution value is a numerical value obtained by converting the virtual gift enjoyed to the anchor broadcast by the user; the anchor may also send a virtual gift (e.g., a red envelope carrying a monetary amount, a gift certificate, a lottery, etc.) in response to the user watching the live broadcast.
The method for testing the identity hiding function provided by the embodiment of the application can be applied to computer equipment with stronger data processing capacity. In a possible implementation manner, the method for testing the identity hiding function provided by the embodiment of the application can be applied to a workstation or a server, and the workstation or the server comprises an automatic testing framework.
As shown in fig. 1, the computer system 100 includes a terminal 110, a test server 121, a configuration information management server 122, and a live server 123, where the live server 123 is a backend server corresponding to a live client. The terminal 110, the test server 121, the configuration information management server 122, and the live server 123 perform data communication via a communication network. Alternatively, the communication network may be a wired network or a wireless network, and the communication network may be at least one of a local area network, a metropolitan area network, and a wide area network.
The terminal 110 is installed and operated with a live client, which may be a client of a live application, a client of a shopping application, a client of a video application (including a short video application), a client of a game application, and the like, and this is not limited in this embodiment of the application. The live broadcast client can record corresponding behavior events when a user interacts with the live broadcast client in the live broadcast process, wherein the behavior events comprise at least one of the following behavior events: the method comprises the following steps that a user enters a behavior event corresponding to a live broadcast room, the user presents the behavior event corresponding to a virtual gift to a main broadcast, the user sends the behavior event corresponding to a bullet screen in the live broadcast room, the behavior event corresponding to a ranking list (such as a contribution list) is checked, and the behavior event corresponding to identity cards of other users is checked. After the user opens the identity hiding function of the live client, when the user executes the behavior event, other users cannot see the real nickname and the real head portrait corresponding to the user account of the user, so that the confidentiality of the user account is achieved. In some embodiments, the terminal 110 may be a mobile terminal such as a smart phone, a tablet computer, a laptop portable notebook computer, or a terminal such as a desktop computer, a projection computer, and the like, and the type of the terminal is not limited in the embodiments of the present application.
The test server 121 is a server including an automated test framework, and the automated test framework is used for testing whether a user account in a live client successfully hides identity information in an identity hiding mode. The automatic testing framework comprises a QTA testing framework, scripts are compiled by using the automatic testing framework, and interaction behaviors of a user and a live client in a live watching process are simulated by sending the scripts to the live client.
The configuration information management server 122 is configured to set a hidden display style in the identity hiding mode, where the hidden display style includes a hidden display nickname and a hidden display avatar, and the configuration information management server 122 stores the hidden display style in the live server 123. Illustratively, the configuration management server 122 is configured with five types of hidden display styles, and the live server 123 calculates display elements specifically displayed on the user interface according to the five types of hidden display styles.
The live broadcast server 123 is configured to send live video frames to each live broadcast client. Illustratively, the live server 123 runs display logic with a live user interface. For example, when a user a performs an operation of entering the live broadcast room 1, a live broadcast client corresponding to the user a sends a synchronization request to the live broadcast server 123, where the synchronization request carries information corresponding to the user a entering the live broadcast room 1, the live broadcast server 123 calculates a display result (such as displaying a special effect, displaying characters, and the like) according to the synchronization request and display logic, the live broadcast server 123 sends the display result to each live broadcast client, and each live broadcast client displays a corresponding live broadcast picture when receiving the display result, where, if a live broadcast user interface of the live broadcast client displays characters: user a enters the live room 1.
Each of the test server 121, the configuration information management server 122, and the live broadcast server 123 may be an independent physical server, may also be a server cluster or a distributed system formed by a plurality of physical servers, and may also be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
As shown in fig. 1, in the embodiment of the present application, a script is sent to the terminal 110 through an automation test framework in the test server 121 to simulate an operation performed on the terminal 110 by a user in a live broadcast viewing process, a live broadcast client in the terminal 110 records behavior data generated by the simulation operation, and outputs a first behavior log according to the behavior data. The test server 121 obtains the first behavior log, and extracts an actual display style of the identity information corresponding to the user account from the first behavior log, where the actual display style includes an actual display nickname and an actual display avatar, the actual display style is a display style corresponding to the identity information of the user account when the live broadcast client executes the simulated behavior event, and the simulated behavior event is an event in which the live broadcast client simulates a user behavior according to the received script. The test server 121 obtains the configuration information from the configuration information management server 122, matches the actual display nickname and the actual display head portrait in the first behavior log with the hidden display nickname and the hidden display head portrait in the configuration information, and indicates that the user account has successfully hidden the identity information if the actual display nickname and the hidden display nickname are consistent and the actual display head portrait and the hidden display head portrait are consistent.
In some embodiments, if the live client fails to output the first behavior log, the test server 121 obtains a second behavior log of the row from the live server 123, extracts an actual display nickname and an actual display head portrait from the second behavior log, matches the actual display nickname and the actual display head portrait in the second behavior log with the hidden display nickname and the hidden display head portrait in the configuration information, and indicates that the user account successfully hides the identity information if the actual display nickname and the hidden display nickname are the same and the actual display head portrait and the hidden display head portrait are the same.
In other embodiments, the video frame is captured by the live broadcast client, and the video frame includes a video frame corresponding to a picture effect displayed on a user interface when the user operates the live broadcast client. Illustratively, the test server 121 includes an image recognition model, and determines whether the actual display head portrait and the actual display nickname displayed by the video frame are consistent with the hidden display head portrait and the hidden display nickname in the configuration information by calling the image recognition model to perform frame-by-frame recognition on the video frame, thereby proving that the identity information of the user account is successfully hidden.
For convenience of description, the following embodiments are described in terms of a method for detecting an identity hiding function applied to a test server.
Fig. 2 is a flowchart illustrating a method for testing an identity hiding function according to an exemplary embodiment of the present application, which may be applied to the test server 121 shown in fig. 1. The method comprises the following steps:
step 201, obtaining configuration information, where the configuration information includes a hidden display style of the identity information of the user account, and the hidden display style is used to represent a display style of the identity information in a hidden state.
The embodiment of the present application takes the example that the identity hiding function is an identity hiding function in a live broadcast client as an example. The configuration information refers to information pre-configured by the configuration information management server for the display style of the identity information, for example, the configuration information management server configures for a nickname and a head portrait display style corresponding to a user account; in another example, the configuration information management server configures the display style of the animation after the live broadcast of the user.
The configuration information management server is used for determining to configure parameters of a certain aspect of the identity information of the user account in the identity hiding mode. Illustratively, a tester can view configuration contents of configuration information, as shown in fig. 3, the configuration information includes a hidden display head portrait 11 and a hidden display nickname 12, the hidden display head portrait 11 is represented by face _ url, the hidden display nickname 12 is represented by nick, a configuration format of the hidden display head portrait 11 in the configuration information is a web page link format, and a configuration format of the hidden display nickname 12 in the configuration information is a character string format.
Step 202, acquiring an actual display style corresponding to the identity information, wherein the actual display style is used for representing the display style of the identity information when the live client executes the simulation behavior event, and the simulation behavior event is used for representing an event corresponding to the interactive behavior generated in the live client under the condition that the simulation identity information of the live client is in a hidden state.
The identity information refers to identity information corresponding to a user account in a live client, and the identity information includes at least one of the following information: the system comprises a user account, a user nickname, a user head portrait, a person concerned by the user, a fan of the user (the person concerned by the user), the level of the user account in a live broadcast client, a seat corresponding to the user account (the special approach effect displayed when the user enters a live broadcast room) and a guard level corresponding to the user account (guard means that the user takes charge of guarding a certain anchor, and the user can exercise part of the power for managing the live broadcast room in the process of the anchor broadcast, such as banning a certain user account).
Illustratively, the simulation behavior event is realized by a Script written by an automated testing framework, and the Script (Script) refers to a program stored in a text format, acts on a computer and is a series of instructions on the computer, and according to the instructions, the computer can automatically complete a series of work.
Illustratively, the test server sends the script to the live client, and the live client executes the operation of the simulation user on the live client according to the script, that is, simulates an operator when the user interacts with the live client, and a behavior event generated by the operation is a simulated behavior event. Illustratively, the simulated behavioral events include at least one of the following events: simulating a behavior event of a user entering a live broadcast room, simulating a behavior event of a user sending a bullet screen, simulating a behavior event of a user presenting a virtual gift to a main broadcast, simulating a behavior event of a user checking identity information of other users, and simulating a behavior event of a user checking a ranking list (the ranking list is obtained by converting the virtual gift presented by the user to the main broadcast).
The actual display style is a display style of the identity information in the live user interface when the live client executes the simulated behavior event. For example, when the live client executes a behavior event simulating that the user enters the live room, the prompt information is displayed on the live user interface: welcome user B to enter the live broadcast room, in some embodiments, the live broadcast user interface also displays an animated special effect as user B enters the live broadcast room. At this time, the style displayed on the live broadcast user interface is the actual display style.
The simulated behavior event in the embodiment of the application is a behavior event simulated in the live broadcast client under the condition that the identity information is in a hidden state. The hidden state refers to a state that the real identity information of the user account is invisible. Illustratively, the identity information is hidden and invisible to other users (i.e. the other users cannot see the identity information in the hidden state at all in the live broadcast user interface), or non-real identity information is displayed instead of real identity information.
Step 203, matching the hidden display style with the actual display style.
And matching the hidden display style in the configuration information with the actual display style of the live client when the simulation event is executed.
Illustratively, the hidden display style includes a hidden display avatar and a hidden display nickname, the actual display style includes an actual display avatar and an actual display nickname, the hidden display avatar and the actual display avatar are matched, and the hidden display nickname are matched.
And step 204, in response to the fact that the hidden display style is inconsistent with the actual display style, determining that the identity hiding function is in an abnormal state.
The identity hiding function is a function of hiding identity information corresponding to a user account by a live client, the real identity information of the user account is invisible to other users in a state that the identity hiding function is opened, and the identity hiding function in an abnormal state is that the live client fails to hide the identity information corresponding to the user account, namely the identity information (complete real identity information or partial real identity information) corresponding to the user account is visible to other users.
Illustratively, the hidden display style includes a hidden display avatar and a hidden display nickname, and the actual display style includes an actual display avatar and an actual display nickname. When any information in the hidden display style is inconsistent with any information in the actual display style, the identity hiding function can be determined not to be in an abnormal state, and the following conditions are included:
1. in response to the hidden display nickname not being consistent with the actual display nickname, determining that the identity hiding function is in an abnormal state.
2. And determining that the identity hiding function is in an abnormal state in response to the fact that the hidden display avatar is inconsistent with the actual display avatar.
3. And determining that the identity hiding function is abnormal in response to the fact that the hidden display nickname is not consistent with the actual display nickname and the hidden display avatar is not consistent with the actual display avatar.
In summary, according to the method provided in this embodiment, by matching the actual display pattern in the behavior log with the hidden display pattern in the configuration information, it can be determined whether the identity hiding function is in an abnormal state according to the matching result, and a tester does not need to manually detect the state of the identity hiding function for each scene, so that the testing efficiency and the testing accuracy of the application program are improved, and the testing period is shortened. Meanwhile, the detection method of the identity hiding function is suitable for various scenes only by setting the targeted configuration information according to different scenes, and has universality.
Fig. 4 is a flowchart of a method for testing an identity hiding function according to an exemplary embodiment of the present application. The method comprises the following steps:
step 401, the automated testing framework sends a script to the live client.
Illustratively, the test server comprises an automatic test framework which is a QTA framework, the test server is connected with a terminal provided with a live broadcast client, the QTA framework sends a written script to the terminal, the live broadcast client executes a simulated behavior event according to an instruction corresponding to the script, and the simulated behavior event is a behavior event when a simulated user interacts with the live broadcast client.
Step 402, the test server pulls configuration information.
Illustratively, the configuration information management server comprises configuration information, and the configuration information management server is used for determining the hidden display style of the identity information in the identity hiding mode. If the configuration information management server is configured with four hidden display styles of identity information, namely a 'mystery' hidden display style, a 'major' hidden display style, a 'Xiao Luo' hidden display style and an 'X identity' hidden display style, different hidden display nicknames and hidden display head images are correspondingly arranged in different hidden display styles.
Step 403, the test server queries the behavior log output by the terminal.
The live broadcast client generates a behavior log related to the simulated behavior event, namely, the live broadcast client records the executed simulated behavior event in the manner of the behavior log. The behavior log comprises an actual display style of the identity information corresponding to the user account, and if the behavior log records an actual display head portrait and an actual display nickname which are displayed when the user sends the bullet screen after the identity hiding function is started, the behavior log simulates the user to send the bullet screen.
Step 404, the test server queries the behavior log output by the live server.
Illustratively, when the live client fails to output the behavior log related to the simulated behavior event for some reason, the test server may detect whether the identity hiding function is abnormal by querying the live server for the behavior log. The live broadcast server is a server corresponding to the live broadcast client, and data transmission exists between the live broadcast client and the live broadcast server, and the data is behavior data when the live broadcast client executes the simulation behavior event. The behavior log also comprises an actual display style of the identity information corresponding to the user account, and if the behavior log records that the identity hiding function is started, the actual display head portrait and the actual display nickname of the user when the user presents the anchor gift are simulated.
Step 405, image recognition.
Illustratively, video frame capture can also be performed on a live user interface of the live client, such as screen recording operation performed on the live user interface. And carrying out image identification on the acquired video frames frame by frame, and determining an actual display head portrait and an actual display nickname from the images. Illustratively, the image recognition model may be trained on sample video frames containing the actual display avatar and the actual display nickname, and the actual display avatar and the actual display nickname may be identified by the image recognition model.
Step 406, testing whether the identity information is in a hidden state.
When the actual display head portrait is not matched with the hidden display head portrait, the identity hiding function is in an abnormal state, namely the identity information of the user account is not hidden; when the actual display nickname is not matched with the hidden display nickname, the identity hiding function is in an abnormal state; and when the actual display head portrait is not matched with the hidden display head portrait and the actual display nickname is not matched with the hidden display nickname, the identity hiding function is in an abnormal state.
When the actual display head portrait displayed in the image is not matched with the hidden display head portrait in the configuration information, the identity hiding function is in an abnormal state; when the actual display nickname displayed in the image is not matched with the hidden display nickname in the configuration information, the identity hiding function is in an abnormal state; and when the actual display head portrait displayed in the image is not matched with the hidden display head portrait in the configuration information and the actual display nickname displayed in the image is not matched with the hidden display nickname in the configuration information, the identity hiding function is in an abnormal state.
Fig. 5 is a flowchart illustrating a method for testing an identity hiding function according to another exemplary embodiment of the present application. The method may be applied in a test server 121 as shown in fig. 1. The method comprises the following steps:
step 501, obtaining configuration information, where the configuration information includes a hidden display style of identity information of a user account.
As shown in fig. 3, after the test server obtains the configuration information, a test person can view configuration contents of the configuration information, where the configuration information includes a hidden display head portrait 11 and a hidden display nickname 12, the hidden display head portrait 11 is represented by face _ url, the hidden display nickname 12 is represented by nick, a configuration format of the hidden display head portrait 11 in the configuration information is a web page link format, and a configuration format of the hidden display nickname 12 is a character string format.
Illustratively, the configuration information management server configures four hidden display styles of identity information, which are a "mystery person" hidden display style, a "major president" hidden display style, a "maolai" hidden display style, and an "X identity" hidden display style, and different hidden display nicknames and hidden display head images are correspondingly arranged in different hidden display styles. The configuration information management server stores the configuration information in a live broadcast server, the live broadcast server is a server corresponding to the live broadcast client, and the live broadcast server calculates display elements or display styles corresponding to each type of configuration information according to the configuration information. For example, for a hidden display style of a mystery person, the live server takes the mask display element as a display element of the hidden display style.
Step 502a, acquiring a behavior log corresponding to a user account, where the behavior log includes an actual display style corresponding to identity information, and the behavior log is used to record behavior data corresponding to the user account when the live client executes a simulated behavior event.
Illustratively, the actual display style corresponding to the identity information is obtained from the behavior log corresponding to the user account, which includes the following two cases:
1. and acquiring a first behavior log from the live client.
Step 502a may be replaced by the following steps:
step 5021, a simulation control instruction is sent to the live broadcast client, and the simulation control instruction is used for controlling the live broadcast client to execute a simulation behavior event.
The test server comprises an automatic test framework, scripts are compiled in the automatic test framework, and the scripts are programs for guaranteeing storage in a text format and act on a series of instructions on the computer. In the embodiment of the application, the instruction corresponding to the script is used for simulating a behavior event generated when the user interacts with the live client. The test server sends the script to the live client, and the live client operates according to the control instruction corresponding to the script after receiving the script so as to simulate the behavior event when the live client interacts with the user.
Illustratively, the script simulates a behavioral event of a user sending a bullet screen. When the live client receives the script, the live client sends at least one barrage in a currently displayed live user interface, and the currently displayed live user interface comprises a video picture which is currently live by the anchor.
Step 5022, receiving a first behavior log output by the live client, wherein the first behavior log is generated by the live client according to the simulated behavior event.
During the development process of the application program, some bugs (bugs) can occur, and the parts and reasons of problems can be determined by printing wrong information into a log file and quickly checking codes or data.
The live broadcast client records the executed simulated behavior event in a first behavior log, where the first behavior log includes behavior data of the live broadcast client when the simulated behavior event is executed, for example, when the live broadcast client executes the simulated behavior event of sending a bullet screen, an actual display nickname and an actual display avatar corresponding to a user account displayed on a live broadcast user interface are recorded, and behavior data of the content of the bullet screen, the display position of the bullet screen, the animation effect corresponding to the bullet screen, and the like are recorded in the first behavior log. The test server calls the live broadcast client to output the first behavior log, illustratively, the test server sends a log printing instruction to the live broadcast client, and the live broadcast client prints the first behavior log after receiving the log printing instruction.
Illustratively, as shown in fig. 6, the output first behavior log includes a code corresponding to the actual display style 13, where the actual display nickname is anonymousNick, the character string after equal sign indicates the assignment (Value) of anonymousNick, the assignment is the major genre, the actual display head is anonymousHeadUrl, and the web address after equal sign indicates the assignment (Value) of anonymousHeadUrl, the assignment indicates that the storage path of the actual display head is http:// shp.
The avatar actually displayed and the nickname actually displayed at runtime of the live client can be determined from the first behavior log.
2. And when the first behavior log is not successfully output in the live client, acquiring a second behavior log from a server corresponding to the live client.
Step 5023, responding to the fact that the live client fails to output the first behavior log, receiving a second behavior log output by a server corresponding to the live client, wherein the second behavior log is generated by the server according to behavior data sent by the live client, and the behavior data is used for representing data corresponding to a user account when the live client executes a simulation behavior event.
Logs are typically written to log files on the disk of a computer device, with less storage space in the disk as more logs are output. In some embodiments, when the storage space of the disk is zero, the output log cannot be stored, so that the log of the client cannot be successfully output.
When the live client cannot successfully output the first behavior log, the test server can call the live server to output a second behavior log, the live server is a server corresponding to the live client, and the live client can perform data transmission with the live server in the operation process, so that behavior data corresponding to the live client is stored in the live server. And the live broadcast server records the behavior data corresponding to the live broadcast client in a second behavior log and outputs the second behavior log. As shown in fig. 7, the output second behavior log includes a code corresponding to the actual display style, where the actual display nickname 14 is nick, the character string after the equal sign indicates the assignment (Value) of nick, the assignment is the main genre of the thoroughfare, the actual display avatar 15 is f, and the website after the equal sign indicates the assignment (Value) of f, and the assignment indicates that the storage path of the actual display avatar is http:// shp.
The avatar actually displayed and the nickname actually displayed during the live client operation can also be determined through the second behavior log.
It can be understood that, in the actual testing process, in order to avoid a situation that log output may fail in the live broadcast server and the live broadcast client, both the live broadcast server and the live broadcast client may be configured to output the second behavior log.
And 502b, acquiring a video frame corresponding to a live user interface of the live client, wherein the video frame comprises an actual display style corresponding to the identity information when the live client executes the simulation behavior event.
When the log output fails both in the live broadcast client and the live broadcast server, the actual display style corresponding to the identity information can be acquired through the image recognition technology. Illustratively, video frames are collected from a live broadcast user interface (for example, screen recording operation is performed on the live broadcast user interface), the collected video frames are framed, a live broadcast server comprises a trained image identification model, each frame of video picture is identified through the image identification model, whether an actual display nickname and an actual display head portrait exist in each frame of video frame picture is determined, if the actual display nickname and the actual display head portrait exist, the actual display nickname and the actual display head portrait can be positioned, and specific display styles of the actual display nickname and the actual display head portrait are output.
Illustratively, the hidden display style includes a hidden display nickname, and the configuration format of the hidden display nickname includes a character string format. The hidden display style comprises a hidden display avatar, and the configuration format of the hidden display avatar comprises a link format, wherein the link is used for representing an actual storage path of an image corresponding to the hidden display avatar.
Step 503, matching the first character string corresponding to the hidden display nickname with the second character string corresponding to the actual display nickname.
As can be seen from the above steps, the behavior log includes the codes of the actual display nicknames and the actual display avatars. And determining whether the actual display nickname and the hidden display nickname are consistent by matching the first character string corresponding to the hidden display nickname with the second character string corresponding to the actual display nickname.
Step 504, matching a first link corresponding to the hidden display avatar with a second link corresponding to the actual display avatar.
Similarly, whether the actual display avatar and the hidden display avatar are consistent or not is determined by matching the first link corresponding to the hidden display nickname with the second link corresponding to the actual display nickname.
As shown in fig. 8, the test server performs matching, and the matching result 16 represents: because the actual display nickname is consistent with the hidden display nickname in the configuration information, the actual display nickname is called as a' major, the actual display head portrait is consistent with the hidden display head portrait, and the storage path of the actual display head portrait is as follows: http:// shp. qpic. cn/pggamehead/0/1585278608_317_120 × 120/0.
And when the actual display head portrait is consistent with the hidden display head portrait and the actual display nickname is consistent with the hidden display nickname, determining that the identity hiding function is in a normal state.
It can be understood that, when any display style inconsistent with the hidden display style exists in the actual display style, the identity hiding function is in an abnormal state. Namely, the identity hiding function is not successfully opened, and the identity information corresponding to the user account is not successfully hidden.
Step 505a, in response to the hidden display nickname not being consistent with the actual display nickname, determining that the identity hiding function is in an abnormal state.
And 505b, in response to the fact that the hidden display head portrait is inconsistent with the actual display head portrait, determining that the identity hiding function is in an abnormal state.
And 505c, in response to the fact that the hidden display nickname is not consistent with the actual display nickname and the hidden display head portrait is not consistent with the actual display head portrait, determining that the identity hiding function is abnormal.
Illustratively, the character strings in the actual display style conforming to the configuration information are determined by regular expressions, which are logical formulas operating on character strings (including common characters (e.g., letters between a and z) and special characters (called "meta characters")), and a "rule character string" is formed by predefining specific characters and combinations of the specific characters, and is used to express a filtering logic for the character strings. The character string corresponding to the hidden display nickname in the configuration information can be used as a regular character string, and the character string in the actual display nickname is filtered through the regular character string.
Illustratively, whether two character strings belong to the same type of character string can also be recognized through a trained character string recognition model. Illustratively, when the tag value of the character string output by the character string recognition model is 1, the character string is consistent with the character string corresponding to the hidden display nickname in the configuration information; and when the label value of the character string output by the character string identification model is 0, the character string is inconsistent with the character string corresponding to the hidden display nickname in the configuration information.
It will be appreciated that the correspondence between the actual display avatar and the hidden display avatar may be determined by comparing each character in the web page link.
In summary, according to the method provided in this embodiment, by matching the actual display pattern in the behavior log with the hidden display pattern in the configuration information, it can be determined whether the identity hiding function is in an abnormal state according to the matching result, and a tester does not need to manually detect the state of the identity hiding function for each scene, so that the testing efficiency and the testing accuracy of the application program are improved, and the testing period is shortened. Meanwhile, the detection method of the identity hiding function is suitable for various scenes only by setting the targeted configuration information according to different scenes, and has universality.
In the method provided by this embodiment, the actual display nickname and the actual display avatar corresponding to the live client when executing a certain simulated behavior event are determined by obtaining the first behavior log from the live client, so that the obtained actual display nickname and actual display avatar are accurate.
In the method provided by the embodiment, when the first behavior log is not successfully output in the live broadcast client, the server corresponding to the live broadcast client is called to output the second behavior log to determine the actual display nickname and the actual display head portrait corresponding to the live broadcast client when the live broadcast client executes a certain simulated behavior event, so that the obtained actual display nickname and the actual display head portrait are accurate, and it is ensured that the test server can always obtain the behavior log under any condition.
In the method provided by the embodiment, the actual display head portrait and the actual display nickname are acquired from the video frame corresponding to the live broadcast user interface, and whether the actual display head portrait and the actual display nickname are consistent with the hidden display head portrait and the hidden display nickname or not is judged more intuitively in an image form, so that the identification accuracy is improved.
In the method provided by this embodiment, the first character string of the hidden display screen name and the second character string of the actual display screen name are compared, the first link of the hidden display avatar and the second link of the actual display avatar are compared, and whether the hidden display style and the actual display style are consistent or not is determined through the character strings and the links, so that the identification of the matching result is more accurate.
The following describes a method for testing the identity hiding function in combination with a live user interface.
Fig. 9 is a flowchart illustrating a method for displaying identity information according to an exemplary embodiment of the present application. The method may be applied in a terminal 110 as shown in fig. 1. The method comprises the following steps:
step 901, displaying a live user interface, where the live user interface includes identity information of a user account.
As shown in fig. 10, a live video frame 18 and live information 19 are displayed in the live user interface 17, which is a user interface displayed in a vertical screen. The live video frame 18 is a video frame during live broadcasting, and the live broadcast information 19 indicates information related to live broadcasting, such as chat information, anchor information, leader board information, and visitors information. The chat information is input by a user watching the live broadcast through the chat input control, the chat information is displayed in a live broadcast user interface, and all users watching the live broadcast can see the message. The anchor information includes the anchor's personal information material, anchor tag, live type, etc. The ranking list information comprises a contribution list for a user watching the live broadcast to enjoy the live broadcast, the contribution list is usually obtained by converting a virtual gift enjoyed to the live broadcast by the user, and a list is generated by the live broadcast server according to the converted numerical value.
And 902, controlling the identity information to be in a hidden state in response to receiving an identity hiding instruction on the live broadcast user interface.
As shown in fig. 11, an identity hiding function control 21 is set in the live broadcast user interface, the state shown in fig. 11 is a state in which the identity hiding function is turned on, an identity hiding instruction is generated by the identity hiding function control 21, and at this time, the identity information corresponding to the user account is in a hidden state, that is, the real identity information corresponding to the user account is not visible to other users.
Step 903, in response to receiving an operation instruction on the live broadcast user interface, switching and displaying the display style of the identity information into a hidden display style, where the operation instruction is used to generate an event corresponding to an interaction behavior on the live broadcast user interface, and the hidden display style is used to represent the display style of the identity information in a hidden state.
When a user only watches live video in a live broadcast room and does not operate on a live broadcast user interface, identity information under a hidden display style cannot be displayed on the live broadcast user interface.
Illustratively, the hidden display style includes a hidden display avatar and a hidden display nickname.
Step 903 may be replaced with the following steps:
step 9031, in response to receiving the operation instruction on the live broadcast user interface, switching and displaying the nickname corresponding to the user account as a hidden display nickname, and switching and displaying the avatar corresponding to the user account as a hidden display avatar.
Illustratively, when the terminal used by the user is a terminal with a touch display screen, such as a smart phone or a tablet computer, the operation instruction includes an instruction generated by a single-click operation, a double-click operation, a long-press operation, a drag operation, a sliding operation, a hovering operation, and a combination thereof.
The operation instruction comprises at least one of the following instructions: the method comprises the steps of entering an operation instruction corresponding to a live broadcast room, presenting an operation instruction corresponding to a virtual gift, and sending an operation instruction corresponding to a bullet screen, wherein the bullet screen corresponds to a user account, displaying an operation instruction corresponding to a ranking list, and the ranking list represents a list generated according to the virtual gift corresponding to a main broadcast account, and displaying an operation instruction corresponding to identity information of the user account.
Entering the live broadcast room means that when a user clicks the live broadcast room which the user wants to watch, the live broadcast user interface jumps to an interface corresponding to the target live broadcast room from the currently displayed interface; presenting a virtual gift means that a user presents the virtual gift to a live anchor, wherein the virtual gift requires the user to pay real money with a certain amount, or is obtained by getting or lottery, and the virtual gift has a certain value; sending the barrage refers to that the barrage is superposed and displayed in any position of a live broadcast picture aiming at the comment subtitles input by a user in the live broadcast picture; displaying the ranking list means that the user clicks the ranking controls shown in fig. 10 and then displays various ranking lists, such as a contribution list, a guard list (e.g., ranking according to the number of guards owned by the anchor), a popularity list, an hour list, a day list, a week list, a month list, and the like; displaying the identity information of the user account means displaying the identity information corresponding to other user accounts, such as a user account, a user nickname, a user head portrait, a user two-dimensional code and the like, when the user views the identity business cards of other users.
Illustratively, when the identity hiding function is in a normal state, the user identity information displayed on the live user interface will be hidden. As shown in fig. 10, when the user enters the live broadcast room, a prompt message 20 is displayed on the live broadcast user interface corresponding to the user, where the prompt message 20 is: you have quietly entered the room. As shown in fig. 12, the behavior log corresponding to the display interface shows that the actual display nickname 21 is "nick": "mystery person", the display content is "content": "you have quietly entered a room," actually show an avatar "fu": the method comprises the steps of http:// shp. qpic. cn/pggamehead/0/1585278608_317_120 _ 120/0, wherein contents output according to a behavior log correspond to contents displayed on a live broadcast user interface one by one, so that the identity hiding function is in a normal state by matching an actual display style in the behavior log with a hidden display style configured by configuration information.
Illustratively, taking the user sending the barrage as an example, as shown in the left diagram of fig. 13, when the user does not turn on the identity hiding function, the first pop-up information 24 and the first chat information 25 of the real identity information of the user are displayed on the live broadcast user interface, and the first pop-up information 24 displays: user C (the user's real nickname) sends a mystery item (the name of the virtual item) while the gift-giving information is displayed in the first chat message 25. The first pop-up message 24 represents an animation effect of the gift-giving message, and disappears after a short dwell time on the live user interface. The user may also see the gift-giving information in the first chat message 25. When the user opens the identity hiding function, the identity information in the hidden state is displayed on the live broadcast user interface, and the identity information comprises second pop-up information 26 and second chat information 27, and the second pop-up information 26 is displayed with: the mystery person (hidden display nickname) sends a mystery item (the name of the virtual item) and the gift giving information is also displayed in the second chat message 27. In some embodiments, after the hidden identity is opened, the given virtual gift or virtual item is also in a hidden state, for example, the gift-giving information is: the mystery sends out an unknown prop (hiding the real name of the virtual prop). This is not limited in the examples of the present application.
Illustratively, as shown in the left diagram of fig. 14, a contribution ranking list is displayed on the live user interface, and in the case of the user C, the user C does not turn on the "stealth function", and the real identity information 28 of the user C, including the real head portrait and the real nickname, is displayed in the contribution ranking list. When the user C turns on the "stealth function", the hidden identity information 29 of the user C, including the hidden display avatar and the hidden display nickname (mystery person), is displayed in the contribution ranking list. Illustratively, the user C displays the corresponding hidden watermark on the ranking list.
As shown in the upper diagram of fig. 15, when the user C does not turn on the "stealth function", other users view the identity card of the user C, and can see the real head portrait 30 of the user C and the real nickname 31 of the user C, and information on the number of people concerned, the number of fans, the achievement medal, the ride, and the like of the user C. In some embodiments, the "stealth function" requires user C to purchase the rights, as shown in the upper right diagram of fig. 15, and prompts the user on the rights purchase page to turn on the identity hiding function after purchase. As shown in the lower diagram of fig. 15, when the user has the authority of the "stealth function" and turns on the "stealth" function, the avatar of the user C is displayed as the hidden display avatar 33, and the nickname of the user C is displayed as the hidden display nickname 34. In some embodiments, other identity information of user C, such as the number of people in focus, fans, medals of achievements, rides, etc., is also switched to be displayed in a state invisible to other users.
Taking the first behavior log output by the live broadcast client as an example, when the user C does not start the "stealth function", the live broadcast user interface displays the real user avatar and the real user nickname, and the actual display nickname 35 and the actual display avatar 36 are displayed in the first behavior log, as shown in fig. 16, the behavior log corresponds to the content displayed on the live broadcast user interface one to one.
Similarly, when the user C turns on the "stealth function", the live user interface displays a false user avatar and a false user nickname, and a hidden display nickname 37 and a hidden display avatar 38 are displayed in the first behavior log, as shown in fig. 17, the behavior logs are in one-to-one correspondence with the contents displayed on the live user interface.
In summary, in the method provided in this embodiment, the hidden display style in which the identity information is in the hidden state is displayed on the live broadcast user interface, and the user is notified in an intuitive manner, so that other users cannot know the identity information of the user when the user account is in the hidden state, and the privacy and security of the user account are ensured.
In the method provided by this embodiment, the hidden display style of the identity information is switched and displayed to be the hidden display nickname and the hidden display head portrait to hide the identity information corresponding to the user account, so that the privacy security of the user account is ensured.
The method provided by the embodiment further ensures that the test process covers more scenes by enumerating the identity information corresponding to the user account seen in various scenes, so that the test effect is more complete.
Illustratively, as can be seen from the foregoing embodiments, in the embodiments of the present application, identity information of a user account in a podcast client is "hidden". In one example, the identity hiding function is applied to a user with a local tyrant identity in a live client, namely privacy protection is performed for a user with a special identity. The local tyrant identity refers to the fact that a user gives a virtual gift to a certain anchor and purchases a noble identity, the consumption is finally converted into a contribution value of the anchor, ranking is carried out according to the contribution value to obtain a ranking list, and the user located in the preset ranking of the ranking list is the user with the local tyrant identity, namely the high-consumption user. In some embodiments, users with a local tyrant identity are more inclined to hide identity information to ensure their privacy security.
In one example, the configuration information management server configures a hidden display style for the local tyrant identity, the hidden display style including a hidden display avatar and a hidden display nickname, the hidden display nickname being a mystery person, the hidden display avatar being an avatar corresponding to the mystery person, as shown in the right diagram of fig. 17. The hidden display screen name is represented by a character string, and the hidden display avatar is represented by an image link.
Illustratively, the testing server simulates a user with a local tyrant identity to interact with the live client through a QTA testing framework, and the live client outputs a first behavior log, wherein the first behavior log comprises behavior data and an actual display style when the live client executes a simulation behavior event. The actual display style includes an actual display avatar and an actual display nickname. And matching the actual display head portrait with the hidden display head portrait, matching the actual display nickname with the hidden display nickname, wherein if the actual display style and the hidden display style are both consistent, the identity hiding function is in a normal state, and if any part of the actual display style and the hidden display style is not consistent, the identity hiding function is in an abnormal state.
To sum up, the method provided by the embodiment of the application automatically simulates all the scenes to be hidden of the user operation through the one-key QTA, then performs content verification matching on the head portrait link and the nickname returned by the live broadcast server, and if the field content returned to the server for the identity hiding information is a hiding display style consistent with the configuration information, the content displayed on the live broadcast user interface meets the effect of the hiding state.
The following are embodiments of the apparatus of the present application, and for details that are not described in detail in the embodiments of the apparatus, reference may be made to corresponding descriptions in the above method embodiments, and details are not described herein again.
Fig. 18 is a block diagram illustrating a test apparatus for an identity hiding function according to an exemplary embodiment of the present application. The apparatus can be implemented as all or a part of a terminal by software, hardware or a combination of both, and includes:
an obtaining module 1810, configured to obtain configuration information, where the configuration information includes a hidden display style of identity information of a user account, and the hidden display style is used to represent a display style of the identity information in a hidden state;
the obtaining module 1810 is configured to obtain an actual display style corresponding to the identity information, where the actual display style is used to represent a display style of the identity information when a live broadcast client executes a simulated behavior event, and the simulated behavior event is used to represent an event corresponding to an interactive behavior generated in the live broadcast client when the simulated behavior event simulates that the identity information is in the hidden state;
a matching module 1820, configured to match the hidden display style with the actual display style;
the matching module 1820 is configured to determine that the identity hiding function is in an abnormal state in response to the hidden display pattern not being consistent with the actual display pattern.
In an optional embodiment, the obtaining module 1810 is configured to obtain a behavior log corresponding to the user account, where the behavior log includes an actual display style corresponding to the identity information, and the behavior log is used to record behavior data corresponding to the user account when the live broadcast client executes the simulated behavior event.
In an optional embodiment, the obtaining module 1810 is configured to send a simulation control instruction to the live client, where the simulation control instruction is used to control the live client to execute the simulation behavior event; and receiving a first behavior log output by the live client, wherein the first behavior log is generated by the live client according to the simulated behavior event.
In an optional embodiment, the obtaining module 1810 is configured to, in response to that the live client fails to output the first behavior log, receive a second behavior log output by a server corresponding to the live client, where the second behavior log is generated by the server according to behavior data sent by the live client, and the behavior data is used to represent data corresponding to the user account when the live client executes the simulated behavior event.
In an optional embodiment, the obtaining module 1810 is configured to obtain a video frame corresponding to a live user interface of the live client, where the video frame includes an actual display style corresponding to the identity information when the live client executes the simulated behavior event.
In an alternative embodiment, the hidden display style includes a hidden display nickname and a hidden display avatar, and the actual display style includes an actual display nickname and an actual display avatar;
the matching module 1820 is configured to determine that the identity hiding function is in the abnormal state in response to the hidden display nickname not being consistent with the actual display nickname; or, in response to the fact that the hidden display avatar is inconsistent with the actual display avatar, determining that the identity hiding function is in the abnormal state; or, in response to the fact that the hidden display nickname is not consistent with the actual display nickname and the hidden display avatar is not consistent with the actual display avatar, determining that the identity hiding function is in the abnormal state.
In an alternative embodiment, the hidden display style comprises a hidden display nickname, the configuration format of the hidden display nickname comprises a string format, and the actual display style comprises an actual display nickname;
the matching module 1820 is configured to match the first character string corresponding to the hidden display nickname with the second character string corresponding to the actual display nickname.
In an optional embodiment, the hidden display style comprises a hidden display avatar, the configuration format of the hidden display avatar comprises a link format, and the actual display style comprises an actual display avatar;
the matching module 1820 is configured to match a first link corresponding to the hidden display avatar with a second link corresponding to the actual display avatar.
In summary, in the apparatus provided in this embodiment, the actual display pattern in the behavior log is matched with the hidden display pattern in the configuration information, and whether the identity hiding function is in an abnormal state can be determined according to the matching result, and a tester does not need to manually detect the state of the identity hiding function for each scene, so that the testing efficiency and the testing accuracy of the application program are improved, and the testing period is shortened. Meanwhile, the detection method of the identity hiding function is suitable for various scenes only by setting the targeted configuration information according to different scenes, and has universality. By establishing the first matching relation between the quality magnitude of the virtual article and the sound effect, when the quality of the virtual article carried by the virtual character meets a certain quality magnitude, the client plays the sound effect corresponding to the quality magnitude of the virtual article, so that the sound effects corresponding to the virtual character when carrying virtual articles with different qualities are different, the simulation of the real world is realized, and the sound effect of the client is diversified.
The device provided by this embodiment further determines the actual display nickname and the actual display avatar corresponding to the live client when executing a certain simulated behavior event by acquiring the first behavior log from the live client, so that the acquired actual display nickname and actual display avatar are accurate.
The device provided by the embodiment further determines the actual display screen name and the actual display head portrait corresponding to the live broadcast client executing a certain simulated behavior event by calling the server corresponding to the live broadcast client to output the second behavior log when the first behavior log is not successfully output in the live broadcast client, so that the obtained actual display screen name and the obtained actual display head portrait are accurate, and it is ensured that the test server can always obtain the behavior log under any condition.
The device provided by the embodiment further obtains the actual display head portrait and the actual display nickname from the video frame corresponding to the live user interface, and judges whether the actual display head portrait and the actual display nickname are consistent with the hidden display head portrait and the hidden display nickname more intuitively in an image form, so that the identification accuracy is improved.
The device provided by the embodiment also compares the first character string of the hidden display screen name with the second character string of the actual display screen name, compares the first link of the hidden display avatar with the second link of the actual display avatar, and determines whether the hidden display style and the actual display style are consistent or not through the character strings and the links, so that the identification of the matching result is more accurate.
It should be noted that: the testing apparatus for identity hiding function provided in the above embodiment is only illustrated by the division of the above functional modules, and in practical application, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the apparatus is divided into different functional modules to complete all or part of the above described functions. In addition, the embodiment of the device for testing the identity hiding function and the embodiment of the method for testing the identity hiding function provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Fig. 19 is a block diagram illustrating a display apparatus of identity information provided in an exemplary embodiment of the present application. The apparatus can be implemented as all or a part of a terminal by software, hardware or a combination of both, and includes:
a display module 1910 configured to display a live user interface, where the live user interface includes identity information of a user account;
a control module 1920, configured to control the identity information to be in a hidden state in response to receiving an identity hiding instruction on the live user interface;
the control module 1920 is configured to switch and display the display style of the identity information into a hidden display style in response to receiving an operation instruction on the live broadcast user interface, where the operation instruction is used to generate an event corresponding to an interaction behavior on the live broadcast user interface, and the hidden display style is used to represent the display style of the identity information in the hidden state.
In an alternative embodiment, the hidden display style includes a hidden display nickname and a hidden display avatar;
the control module 1920 is configured to switch and display the nickname corresponding to the user account as the hidden display nickname and switch and display the avatar corresponding to the user account as the hidden display avatar in response to receiving the operation instruction on the live user interface.
In an optional embodiment, the operation instruction includes at least one of the following instructions:
entering an operation instruction corresponding to the live broadcast room;
presenting an operation instruction corresponding to the virtual gift;
sending an operation instruction corresponding to a bullet screen, wherein the bullet screen corresponds to the user account;
displaying an operation instruction corresponding to a ranking list, wherein the ranking list represents a list generated according to a virtual gift corresponding to a main broadcast account;
and displaying an operation instruction corresponding to the identity information of the user account.
In summary, the device provided in this embodiment notifies the user in an intuitive manner by displaying the hidden display style in the hidden state of the identity information on the live user interface, so that other users cannot know the identity information of the user when the user account is in the hidden state, thereby ensuring the privacy and security of the user account.
The device provided by the embodiment also hides the identity information corresponding to the user account by switching and displaying the hidden display style of the identity information into the hidden display nickname and the hidden display head image, so that the privacy safety of the user account is ensured.
The device provided by the embodiment also ensures that the test process covers more scenes by enumerating the identity information corresponding to the user account seen in various scenes, so that the test effect is more complete.
It should be noted that: the display device of the identity information provided in the above embodiment is only exemplified by the division of the above functional modules, and in practical applications, the above function distribution may be completed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to complete all or part of the above described functions. In addition, the display apparatus of the identity information and the display method embodiment of the identity information provided by the above embodiments belong to the same concept, and specific implementation processes thereof are detailed in the method embodiments and are not described herein again.
Referring to fig. 20, a block diagram of a computer device 2000 according to an exemplary embodiment of the present application is shown. The computer device 2000 may be a terminal installed with a live client in the above embodiment, and the computer device may be: smart phones, tablet computers, MP3 players (Moving Picture Experts Group Audio Layer III, motion video Experts compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, motion video Experts compression standard Audio Layer 4). The computer device 2000 may also be referred to by other names such as user equipment, portable terminal, smart watch, smart robot, smart speaker, etc.
Generally, the computer device 2000 includes: a processor 2001 and a memory 2002.
The processor 2001 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and so on. The processor 2001 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 2001 may also include a main processor and a coprocessor, the main processor being a processor for Processing data in an awake state, also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 2001 may be integrated with a GPU (Graphics Processing Unit) that is responsible for rendering and drawing the content that the display screen needs to display. In some embodiments, the processor 2001 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
The memory 2002 may include one or more computer-readable storage media, which may be tangible and non-transitory. The memory 2002 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in the memory 2002 is used to store at least one instruction for execution by the processor 2001 to implement the test method for identity hiding function and the display method for identity information provided herein.
In some embodiments, the computer device 2000 may further optionally include: a peripheral interface 2003 and at least one peripheral. Specifically, the peripheral device includes: at least one of radio frequency circuitry 2004, touch display 2005, camera assembly 2006, audio circuitry 2007, positioning assembly 2008, and power supply 2009.
The peripheral interface 2003 may be used to connect at least one peripheral related to I/O (Input/Output) to the processor 2001 and the memory 2002. In some embodiments, the processor 2001, memory 2002 and peripheral interface 2003 are integrated on the same chip or circuit board; in some other embodiments, any one or two of the processor 2001, the memory 2002, and the peripheral interface 2003 may be implemented on separate chips or circuit boards, which is not limited by this embodiment.
The Radio Frequency circuit 2004 is used for receiving and transmitting RF (Radio Frequency) signals, also called electromagnetic signals. The radio frequency circuit 2004 communicates with a communication network and other communication devices via electromagnetic signals. The radio frequency circuit 2004 converts an electric signal into an electromagnetic signal to transmit, or converts a received electromagnetic signal into an electric signal. Optionally, the radio frequency circuit 2004 comprises: an antenna system, an RF transceiver, one or more amplifiers, a tuner, an oscillator, a digital signal processor, a codec chipset, a subscriber identity module card, and so forth. The radio frequency circuit 2004 may communicate with other terminals via at least one wireless communication protocol. The wireless communication protocols include, but are not limited to: the world wide web, metropolitan area networks, intranets, generations of mobile communication networks (2G, 3G, 4G, and 5G), Wireless local area networks, and/or WiFi (Wireless Fidelity) networks. In some embodiments, the rf circuit 2004 may further include NFC (Near Field Communication) related circuits, which are not limited in this application.
The touch display screen 2005 is used to display a UI (User Interface). The UI may include graphics, text, icons, video, and any combination thereof. The touch display screen 2005 also has the ability to capture touch signals on or over the surface of the touch display screen 2005. The touch signal may be input to the processor 2001 as a control signal for processing. The touch display 2005 is used to provide virtual buttons and/or a virtual keyboard, also referred to as soft buttons and/or a soft keyboard. In some embodiments, the touch display 2005 can be one, providing the front panel of the computer device 2000; in other embodiments, the touch display screens 2005 can be at least two, respectively disposed on different surfaces of the computer device 2000 or in a folded design; in other embodiments, the touch display 2005 can be a flexible display disposed on a curved surface or a folded surface of the computer device 2000. Even more, the touch display screen 2005 can be arranged in a non-rectangular irregular figure, i.e., a shaped screen. The touch Display screen 2005 can be made of a material such as an LCD (Liquid Crystal Display) or an OLED (Organic Light-Emitting Diode).
Camera assembly 2006 is used to capture images or video. Optionally, camera assembly 2006 includes a front camera and a rear camera. Generally, a front camera is used for realizing video call or self-shooting, and a rear camera is used for realizing shooting of pictures or videos. In some embodiments, the number of the rear cameras is at least two, and each of the rear cameras is any one of a main camera, a depth-of-field camera and a wide-angle camera, so that the main camera and the depth-of-field camera are fused to realize a background blurring function, and the main camera and the wide-angle camera are fused to realize a panoramic shooting function and a VR (Virtual Reality) shooting function. In some embodiments, camera assembly 2006 may also include a flash. The flash lamp can be a monochrome temperature flash lamp or a bicolor temperature flash lamp. The double-color-temperature flash lamp is a combination of a warm-light flash lamp and a cold-light flash lamp, and can be used for light compensation at different color temperatures.
The audio circuit 2007 is used to provide an audio interface between the user and the computer device 2000. The audio circuitry 2007 may include a microphone and a speaker. The microphone is used for collecting sound waves of a user and the environment, converting the sound waves into electric signals, and inputting the electric signals to the processor 2001 for processing or inputting the electric signals to the radio frequency circuit 2004 so as to realize voice communication. For stereo sound acquisition or noise reduction purposes, the microphones may be multiple and located at different locations on the computer device 2000. The microphone may also be an array microphone or an omni-directional pick-up microphone. The speaker is used to convert electrical signals from the processor 2001 or the radio frequency circuit 2004 into sound waves. The loudspeaker can be a traditional film loudspeaker or a piezoelectric ceramic loudspeaker. When the speaker is a piezoelectric ceramic speaker, the speaker can be used for purposes such as converting an electric signal into a sound wave audible to a human being, or converting an electric signal into a sound wave inaudible to a human being to measure a distance. In some embodiments, the audio circuitry 2007 may also include a headphone jack.
The Location component 2008 is configured to locate a current geographic Location of the computer device 2000 to implement navigation or LBS (Location Based Service). The Positioning component 2008 may be a Positioning component based on a Global Positioning System (GPS) in the united states, a beidou System in china, or a galileo System in russia.
A power supply 2009 is used to power the various components of the computer device 2000. The power supply 2009 may be an alternating current, a direct current, a disposable battery, or a rechargeable battery. When the power supply 2009 includes a rechargeable battery, the rechargeable battery may be a wired rechargeable battery or a wireless rechargeable battery. The wired rechargeable battery is a battery charged through a wired line, and the wireless rechargeable battery is a battery charged through a wireless coil. The rechargeable battery may also be used to support fast charge technology.
In some embodiments, the computer device 2000 also includes one or more sensors 2010. The one or more sensors 2010 include, but are not limited to: acceleration sensor 2011, gyro sensor 2012, pressure sensor 2013, fingerprint sensor 2014, optical sensor 2015, and proximity sensor 2016.
The acceleration sensor 2011 is configured to detect acceleration in three coordinate axes of the coordinate system established by the computer apparatus 2000. For example, the acceleration sensor 2011 is used for detecting the components of the gravitational acceleration on three coordinate axes. The processor 2001 may control the touch display screen 2005 to display a user interface in a landscape view or a portrait view according to the gravitational acceleration signal of the acceleration sensor 2011 set. The acceleration sensor 2011 may be used for acquisition of motion data of a game or a user.
The gyro sensor 2012 can detect the body direction and the rotation angle of the computer device 2000, and the gyro sensor 2012 and the acceleration sensor 2011 can collect the 3D motion of the user on the computer device 2000. The processor 2001 may implement the following functions according to the data collected by the gyro sensor 2012: motion sensing (such as changing the UI according to a user's tilting operation), image stabilization at the time of photographing, game control, and inertial navigation.
The pressure sensors 2013 may be disposed on the side bezel of the computer device 2000 and/or underneath the touch screen display 2005. When the pressure sensor 2013 is disposed on the side frame of the computer device 2000, a holding signal of the user to the computer device 2000 may be detected, and left-right hand recognition or shortcut operation may be performed according to the holding signal. When the pressure sensor 2013 is arranged on the lower layer of the touch display screen 2005, the operability control on the UI interface can be controlled according to the pressure operation of the user on the touch display screen 2005. The operability control comprises at least one of a button control, a scroll bar control, an icon control and a menu control.
The fingerprint sensor 2014 is used for collecting a fingerprint of the user to identify the identity of the user according to the collected fingerprint. Upon identifying that the user's identity is a trusted identity, the processor 2001 authorizes the user to perform relevant sensitive operations including unlocking the screen, viewing encrypted information, downloading software, paying for and changing settings, etc. The fingerprint sensor 2014 may be disposed on a front, back, or side of the computer device 2000. When a physical key or vendor Logo is provided on the computer device 2000, the fingerprint sensor 2014 may be integrated with the physical key or vendor Logo.
The optical sensor 2015 is used to collect ambient light intensity. In one embodiment, the processor 2001 may control the display brightness of the touch display 2005 according to the ambient light intensity collected by the optical sensor 2015. Specifically, when the ambient light intensity is high, the display brightness of the touch display screen 2005 is increased; when the ambient light intensity is low, the display brightness of the touch display screen 2005 is turned down. In another embodiment, the processor 2001 may also dynamically adjust the shooting parameters of the camera assembly 2006 according to the ambient light intensity collected by the optical sensor 2015.
The proximity sensor 2016, also known as a distance sensor, is typically disposed on the front side of the computer device 2000. The proximity sensor 2016 is used to capture the distance between a user and the front of the computer device 2000. In one embodiment, the touch display screen 2005 is controlled by the processor 2001 to switch from a bright screen state to a dark screen state when the proximity sensor 2016 detects that the distance between the user and the front of the computer device 2000 is gradually decreasing; when the proximity sensor 2016 detects that the distance between the user and the front of the computer device 2000 is gradually increasing, the touch display 2005 is controlled by the processor 2001 to switch from a breath-screen state to a bright-screen state.
Those skilled in the art will appreciate that the configuration shown in FIG. 20 is not intended to be limiting of the computer device 2000 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components may be used.
Fig. 21 is a schematic structural diagram of a server according to an exemplary embodiment of the present application. The server may be a test server 121, a configuration information management server 122, and a live server 123 in the computer system 100 shown in fig. 1.
The server 2100 includes a Central Processing Unit (CPU) 2101, a system Memory 2104 including a Random Access Memory (RAM) 2102 and a Read Only Memory (ROM) 2103, and a system bus 2105 connecting the system Memory 2104 and the Central Processing Unit 2101. The server 2100 also includes a basic Input/Output System (I/O System)2106 that facilitates transfer of information between devices within the computer, and a mass storage device 2107 for storing an operating System 2113, application programs 2114, and other program modules 2115.
The basic input/output system 2106 includes a display 2108 for displaying information and an input device 2109, such as a mouse, a keyboard, etc., for a user to input information. Wherein a display 2108 and input devices 2109 are connected to the central processing unit 2101 via an input-output controller 2110 connected to the system bus 2105. The basic input/output system 2106 may also include an input/output controller 2110 for receiving and processing input from a number of other devices, such as a keyboard, mouse, or electronic stylus. Similarly, the input-output controller 2110 also provides output to a display screen, a printer, or other type of output device.
The mass storage device 2107 is connected to the central processing unit 2101 through a mass storage controller (not shown) connected to the system bus 2105. The mass storage device 2107 and its associated computer-readable media provide non-volatile storage for the server 2100. That is, the mass storage device 2107 may include a computer-readable medium (not shown) such as a hard disk or Compact disk Read Only Memory (CD-ROM) drive.
Computer-readable media may include computer storage media and communication media. Computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data. Computer storage media includes RAM, ROM, Erasable Programmable Read-Only Memory (EPROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Solid State Memory technology, CD-ROM, Digital Versatile Disks (DVD), or Solid State Drives (SSD), other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage, or other magnetic storage devices. The Random Access Memory may include a resistive Random Access Memory (ReRAM) and a Dynamic Random Access Memory (DRAM). Of course, those skilled in the art will appreciate that computer storage media is not limited to the foregoing. The system memory 2104 and mass storage device 2107 described above may be collectively referred to as memory.
The server 2100 may also operate with remote computers connected to a network via a network, such as the internet, according to various embodiments of the present application. That is, the server 2100 may be connected to the network 2112 through the network interface unit 2111 coupled to the system bus 2105 or the network interface unit 2111 may be used to connect to other types of networks or remote computer systems (not shown).
The memory further includes one or more programs, and the one or more programs are stored in the memory and configured to be executed by the CPU.
In an alternative embodiment, a computer device is provided, which includes a processor and a memory, wherein the memory stores at least one instruction, at least one program, code set or instruction set, and the at least one instruction, at least one program, code set or instruction set is loaded and executed by the processor to implement the test method of the identity hiding function and the display method of the identity information as described above.
In an alternative embodiment, a computer readable storage medium is provided, in which at least one instruction, at least one program, code set, or instruction set is stored, and the at least one instruction, at least one program, code set, or instruction set is loaded and executed by a processor to implement the method for testing the identity hiding function and the method for displaying the identity information as described above.
Optionally, the computer-readable storage medium may include: a Read Only Memory (ROM), a Random Access Memory (RAM), a Solid State Drive (SSD), or an optical disc. The Random Access Memory may include a resistive Random Access Memory (ReRAM) and a Dynamic Random Access Memory (DRAM). The above-mentioned serial numbers of the embodiments of the present application are for description only and do not represent the merits of the embodiments.
The embodiment of the present application further provides a computer device, where the computer device includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the test method for the identity hiding function and the display method for the identity information provided in the above method embodiments.
The embodiment of the present application further provides a computer-readable storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by a processor to implement the method for testing the identity hiding function and the method for displaying the identity information provided in the foregoing method embodiments.
The embodiment of the present application further provides a computer-readable storage medium, where a computer program is stored in the storage medium, and the computer program is loaded and executed by a processor to implement the method for testing the identity hiding function and the method for displaying the identity information provided in the above method embodiments.
Embodiments of the present application also provide a computer program product or a computer program, which includes computer instructions stored in a computer-readable storage medium. The computer instructions are read from the computer readable storage medium by a processor of a computer device, and the processor executes the computer instructions to cause the computer device to execute the method for testing the identity hiding function and the method for displaying the identity information as described above.
It should be understood that reference to "a plurality" herein means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only exemplary of the present application and should not be taken as limiting, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (15)

1. A method for testing an identity hiding function, the method comprising:
acquiring configuration information, wherein the configuration information comprises a hidden display style of identity information of a user account, and the hidden display style is used for representing a display style of the identity information in a hidden state;
acquiring an actual display style corresponding to the identity information, wherein the actual display style is used for representing the display style of the identity information when a live client executes a simulation behavior event, and the simulation behavior event is used for representing an event corresponding to an interactive behavior generated in the live client under the condition that the simulation identity information is in the hidden state;
matching the hidden display style with the actual display style;
and determining that the identity hiding function is in an abnormal state in response to the hidden display style not being consistent with the actual display style.
2. The method according to claim 1, wherein the obtaining of the actual display style corresponding to the identity information comprises:
and acquiring a behavior log corresponding to the user account, wherein the behavior log comprises an actual display style corresponding to the identity information, and the behavior log is used for recording behavior data corresponding to the user account when the live client executes the simulation behavior event.
3. The method of claim 2, wherein the obtaining the behavior log corresponding to the user account comprises:
sending a simulation control instruction to the live broadcast client, wherein the simulation control instruction is used for controlling the live broadcast client to execute the simulation behavior event;
and receiving a first behavior log output by the live client, wherein the first behavior log is generated by the live client according to the simulated behavior event.
4. The method of claim 3, further comprising:
and responding to the fact that the live client side does not successfully output the first behavior log, receiving a second behavior log output by a server corresponding to the live client side, wherein the second behavior log is generated by the server according to behavior data sent by the live client side, and the behavior data is used for representing data corresponding to the user account when the live client side executes the simulation behavior event.
5. The method according to claim 1, wherein the obtaining of the actual display style corresponding to the identity information comprises:
and acquiring a video frame corresponding to a live broadcast user interface of the live broadcast client, wherein the video frame comprises an actual display style corresponding to the identity information when the live broadcast client executes the simulation behavior event.
6. The method according to any one of claims 1 to 5, wherein the hidden display style comprises a hidden display nickname and a hidden display avatar, and the actual display style comprises an actual display nickname and an actual display avatar;
the determining that the identity hiding function is in an abnormal state in response to the hidden display pattern not being consistent with the actual display pattern comprises:
determining that the identity hiding function is in the abnormal state in response to the hidden display nickname not being consistent with the actual display nickname;
or the like, or, alternatively,
in response to the hidden display avatar not being consistent with the actual display avatar, determining that the identity hiding function is in the abnormal state;
or the like, or, alternatively,
and in response to the hidden display nickname not being consistent with the actual display nickname and the hidden display avatar not being consistent with the actual display avatar, determining that the identity hiding function is in the abnormal state.
7. The method according to any one of claims 1 to 5, wherein the hidden display style comprises a hidden display nickname, the configuration format of the hidden display nickname comprises a character string format, and the actual display style comprises an actual display nickname;
the matching the hidden display style with the actual display style comprises:
and matching the first character string corresponding to the hidden display nickname with the second character string corresponding to the actual display nickname.
8. The method according to any one of claims 1 to 5, wherein the hidden display style comprises a hidden display avatar, the configuration format of the hidden display avatar comprises a link format, and the actual display style comprises an actual display avatar;
the matching the hidden display style with the actual display style comprises:
and matching the first link corresponding to the hidden display head portrait with the second link corresponding to the actual display head portrait.
9. A method for displaying identity information, the method comprising:
displaying a live user interface, wherein the live user interface comprises identity information of a user account;
in response to receiving an identity hiding instruction on the live broadcast user interface, controlling the identity information to be in a hidden state;
switching and displaying the display style of the identity information into a hidden display style in response to receiving an operation instruction on the live user interface, the operation instruction is used for generating an event corresponding to an interactive behavior on the live broadcast user interface, the hidden display style is used for representing the display style of the identity information in the hidden state, and the hidden display style is also used for matching with an actual display style, in the case where the hidden display pattern is not identical to the actual display pattern, the identity hiding function is determined to be in an abnormal state, the actual display style is used for representing the display style of the identity information when the live client executes the simulated behavior event, the simulation behavior event is used for representing an event corresponding to an interactive behavior generated in the live broadcast client under the condition that the simulation identity information is in the hidden state.
10. The method of claim 9, wherein the hidden display style comprises a hidden display nickname and a hidden display avatar;
the switching and displaying the display style of the identity information into a hidden display style in response to receiving the operation instruction on the live broadcast user interface comprises:
and in response to receiving an operation instruction on the live broadcast user interface, switching and displaying the nickname corresponding to the user account as the hidden display nickname, and switching and displaying the avatar corresponding to the user account as the hidden display avatar.
11. The method of claim 10, wherein the operation instruction comprises at least one of:
entering an operation instruction corresponding to the live broadcast room;
presenting an operation instruction corresponding to the virtual gift;
sending an operation instruction corresponding to a bullet screen, wherein the bullet screen corresponds to the user account;
displaying an operation instruction corresponding to a ranking list, wherein the ranking list represents a list generated according to a virtual gift corresponding to a main broadcast account;
and displaying an operation instruction corresponding to the identity information of the user account.
12. A device for testing identity hiding function, the device comprising:
the acquisition module is used for acquiring configuration information, wherein the configuration information comprises a hidden display style of identity information of a user account, and the hidden display style is used for representing a display style of the identity information in a hidden state;
the acquisition module is further configured to acquire an actual display style corresponding to the identity information, where the actual display style is used to represent a display style of the identity information when a live broadcast client executes a simulated behavior event, and the simulated behavior event is used to represent an event corresponding to an interactive behavior generated in the live broadcast client when the identity information is simulated to be in the hidden state;
the matching module is used for matching the hidden display style with the actual display style;
the matching module is further configured to determine that the identity hiding function is in an abnormal state in response to the hidden display pattern not being consistent with the actual display pattern.
13. An apparatus for displaying identity information, the apparatus comprising:
the display module is used for displaying a live broadcast user interface, and the live broadcast user interface comprises identity information of a user account;
the control module is used for responding to an identity hiding instruction received from the live broadcast user interface and controlling the identity information to be in a hidden state;
the control module is further configured to switch and display a display style of the identity information into a hidden display style in response to receiving an operation instruction on the live broadcast user interface, where the operation instruction is used to generate an event corresponding to an interactive behavior on the live broadcast user interface, the hidden display style is used to represent a display style of the identity information in the hidden state, the hidden display style is further used to match with an actual display style, and when the hidden display style is inconsistent with the actual display style, an identity hiding function is determined to be in an abnormal state, the actual display style is used to represent a display style of the identity information when a live broadcast client executes a simulated behavior event, and the simulated behavior event is used to represent that the identity information is in the hidden state, and generating an event corresponding to the interactive behavior in the live client.
14. A computer device, characterized in that the computer device comprises a processor and a memory, in which at least one instruction, at least one program, a set of codes, or a set of instructions is stored, which is loaded and executed by the processor to implement a test method of an identity hiding function according to any one of claims 1 to 8 and a display method of identity information according to any one of claims 9 to 11.
15. A computer-readable storage medium, in which a computer program is stored, the computer program being loaded and executed by a processor to implement the method for testing an identity hiding function according to any one of claims 1 to 8 and the method for displaying identity information according to any one of claims 9 to 11.
CN202011335973.2A 2020-11-25 2020-11-25 Method, device and equipment for testing identity hiding function and storage medium Active CN112437294B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011335973.2A CN112437294B (en) 2020-11-25 2020-11-25 Method, device and equipment for testing identity hiding function and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011335973.2A CN112437294B (en) 2020-11-25 2020-11-25 Method, device and equipment for testing identity hiding function and storage medium

Publications (2)

Publication Number Publication Date
CN112437294A CN112437294A (en) 2021-03-02
CN112437294B true CN112437294B (en) 2021-10-12

Family

ID=74698269

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011335973.2A Active CN112437294B (en) 2020-11-25 2020-11-25 Method, device and equipment for testing identity hiding function and storage medium

Country Status (1)

Country Link
CN (1) CN112437294B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113613028B (en) * 2021-08-03 2023-08-08 北京达佳互联信息技术有限公司 Live broadcast data processing method, device, terminal, server and storage medium
CN113784161B (en) * 2021-09-09 2023-11-24 广州方硅信息技术有限公司 User mark transmission method and device, equipment and medium thereof
CN114826803B (en) * 2022-04-26 2023-10-31 北京字跳网络技术有限公司 Conference state processing method and device, electronic equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794052A (en) * 2015-04-01 2015-07-22 努比亚技术有限公司 Encryption display testing method and device
CN107454392A (en) * 2017-09-22 2017-12-08 上海帆声图像科技有限公司 Direct-detecting mode television set HDCP encryption detection methods

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104579825A (en) * 2014-12-18 2015-04-29 百度在线网络技术(北京)有限公司 Method and device for monitoring server of application in real time and computer equipment
CN105608005B (en) * 2015-12-23 2018-05-25 深圳创维-Rgb电子有限公司 The test method and system of a kind of television system
CN111327914B (en) * 2020-02-20 2022-09-20 深圳市腾讯信息技术有限公司 Interaction method and related device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104794052A (en) * 2015-04-01 2015-07-22 努比亚技术有限公司 Encryption display testing method and device
CN107454392A (en) * 2017-09-22 2017-12-08 上海帆声图像科技有限公司 Direct-detecting mode television set HDCP encryption detection methods

Also Published As

Publication number Publication date
CN112437294A (en) 2021-03-02

Similar Documents

Publication Publication Date Title
CN112437294B (en) Method, device and equipment for testing identity hiding function and storage medium
CN109660855B (en) Sticker display method, device, terminal and storage medium
CN109582579A (en) Applied program testing method, device, electronic equipment and storage medium
CN111064655B (en) Template message pushing method, device, equipment and storage medium
CN111966275B (en) Program trial method, system, device, equipment and medium
CN112235647B (en) Network data processing method and device, terminal and server
CN112016941A (en) Virtual article pickup method, device, terminal and storage medium
CN112181573A (en) Media resource display method, device, terminal, server and storage medium
CN112416485A (en) Information guiding method, device, terminal and storage medium
CN111770354B (en) Information interaction method, device, terminal and storage medium
CN113259702A (en) Data display method and device, computer equipment and medium
CN111031391A (en) Video dubbing method, device, server, terminal and storage medium
CN112416207A (en) Information content display method, device, equipment and medium
CN113055724A (en) Live broadcast data processing method, device, server, terminal, medium and product
CN114302160B (en) Information display method, device, computer equipment and medium
CN110768843B (en) Network problem analysis method, device, terminal and storage medium
CN113190302A (en) Information display method and device, electronic equipment and storage medium
CN112231666A (en) Illegal account processing method, device, terminal, server and storage medium
CN112023403A (en) Battle process display method and device based on image-text information
CN113837709A (en) Online processing method and device of business process, terminal and readable storage medium
CN111013154A (en) Method, device and system for substituting for prize drawing
CN114222155B (en) Resource recommendation method, device, electronic equipment and storage medium
CN114816600B (en) Session message display method, device, terminal and storage medium
CN112188268B (en) Virtual scene display method, virtual scene introduction video generation method and device
CN113393608A (en) Service processing method, device, terminal and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40040524

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant