CN116870482A - Game control method, game control device, electronic equipment and storage medium - Google Patents

Game control method, game control device, electronic equipment and storage medium Download PDF

Info

Publication number
CN116870482A
CN116870482A CN202310957062.0A CN202310957062A CN116870482A CN 116870482 A CN116870482 A CN 116870482A CN 202310957062 A CN202310957062 A CN 202310957062A CN 116870482 A CN116870482 A CN 116870482A
Authority
CN
China
Prior art keywords
game
character
role
target
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310957062.0A
Other languages
Chinese (zh)
Inventor
丁栋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Migu Cultural Technology Co Ltd
China Mobile Communications Group Co Ltd
MIGU Interactive Entertainment Co Ltd
Original Assignee
Migu Cultural Technology Co Ltd
China Mobile Communications Group Co Ltd
MIGU Interactive Entertainment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Migu Cultural Technology Co Ltd, China Mobile Communications Group Co Ltd, MIGU Interactive Entertainment Co Ltd filed Critical Migu Cultural Technology Co Ltd
Priority to CN202310957062.0A priority Critical patent/CN116870482A/en
Publication of CN116870482A publication Critical patent/CN116870482A/en
Pending legal-status Critical Current

Links

Classifications

    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/55Controlling game characters or game objects based on the game progress
    • A63F13/58Controlling game characters or game objects based on the game progress by computing conditions of game characters, e.g. stamina, strength, motivation or energy level
    • AHUMAN NECESSITIES
    • A63SPORTS; GAMES; AMUSEMENTS
    • A63FCARD, BOARD, OR ROULETTE GAMES; INDOOR GAMES USING SMALL MOVING PLAYING BODIES; VIDEO GAMES; GAMES NOT OTHERWISE PROVIDED FOR
    • A63F13/00Video games, i.e. games using an electronically generated display having two or more dimensions
    • A63F13/50Controlling the output signals based on the game progress
    • A63F13/53Controlling the output signals based on the game progress involving additional visual information provided to the game scene, e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game
    • A63F13/533Controlling the output signals based on the game progress involving additional visual information provided to the game scene, e.g. by overlay to simulate a head-up display [HUD] or displaying a laser sight in a shooting game for prompting the player, e.g. by displaying a game menu

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Theoretical Computer Science (AREA)
  • Human Computer Interaction (AREA)
  • Physics & Mathematics (AREA)
  • Optics & Photonics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure relates to a game control method, apparatus, electronic device, and storage medium, the method including: in a first target game scene, receiving control operation information of a first user on a first game role, controlling the first game role based on the first control operation information, and acquiring current combat data of the first game role; and receiving control operation information of the second user on the second game role, controlling the second game role based on the second control operation information, and determining the attack range of the second game role based on the current combat data of the first game role. In the game process, the second game role is an auxiliary role of the first game role, so that the auxiliary role can attach to and follow the main role, and the fight data of the main role is always changed, so that the attack range of the auxiliary role can be changed along with the change of the fight data of the main role, the main role can be better protected, and the auxiliary role can be controlled more flexibly and accurately.

Description

Game control method, game control device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of cloud games, and in particular, to a game control method, a device, an electronic apparatus, and a storage medium.
Background
The cloud game is based on a cloud computing technology, an input instruction provided by a remote client is transmitted to a game server through a network and the game is executed at the game server, so that dependence on hardware conditions of the client is eliminated, and the user threshold of the game is reduced. Thus, cloud gaming technology can allow more players without a host, high-end PC to enjoy a high-quality gaming experience.
In the related art, for a game in which a master character and an auxiliary character exist, the auxiliary character is a robot character, the auxiliary character is automatically controlled by a system to follow the master character, and the auxiliary character automatically participates in a battle. Therefore, in the related art, the control of the subordinate character is fixed and single.
Disclosure of Invention
The present disclosure provides a game control method, a game control device, an electronic device, and a storage medium.
According to a first aspect of the present disclosure, there is provided a game control method, the method comprising:
in a first target game scene, receiving first control operation information of a first user on a first game role, controlling the first game role based on the first control operation information, and acquiring current combat data of the first game role;
Receiving control operation information of a second user on a second game role, controlling the second game role based on the second control operation information, and determining an attack range of the second game role based on current combat data of the first game role; wherein the first game character has an affiliation with the second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
According to a second aspect of the present disclosure, there is provided a game control apparatus, the apparatus comprising:
the combat data acquisition module is used for receiving first control operation information of a first user on a first game role in a first target game scene, controlling the first game role based on the first control operation information and acquiring current combat data of the first game role;
the first attack range determining module is used for receiving control operation information of a second user on a second game role, controlling the second game role based on the second control operation information, and determining the attack range of the second game role based on current combat data of the first game role; wherein the first game character has an affiliation with the second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
According to a third aspect of the present disclosure, there is provided an electronic device comprising: a memory and a processor, the memory having stored thereon a computer program, the processor implementing the method as described above when executing the program.
According to a fourth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor implements the above-described method of the present disclosure.
In a first target game scene, receiving control operation information of a first user on a first game role, controlling the first game role based on the first control operation information, and acquiring current combat data of the first game role; and receiving control operation information of a second user on the second game role, controlling the second game role based on the second control operation information, and determining the attack range of the second game role based on the current combat data of the first game role. In the embodiment, the first game role belongs to the master role, the second game role belongs to the auxiliary role, so that the auxiliary role can attach to and follow the master role, the attack range of the auxiliary role is determined based on the current combat data of the master role, and the combat data of the master role are always changed in the game process, so that the attack range of the auxiliary role can be changed along with the change of the combat data of the master role, the master role can be better protected, and the auxiliary role can be controlled more flexibly and accurately.
Drawings
Further details, features and advantages of the present disclosure are disclosed in the following description of exemplary embodiments, with reference to the following drawings, wherein:
FIG. 1 is a flow chart of a game control method provided by an exemplary embodiment of the present disclosure;
FIG. 2 is a schematic block diagram of functional blocks of a game control apparatus provided in an exemplary embodiment of the present disclosure;
FIG. 3 is a block diagram of an electronic device provided in an exemplary embodiment of the present disclosure;
fig. 4 is a block diagram of a computer system according to an exemplary embodiment of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure have been shown in the accompanying drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but are provided to provide a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be understood that the various steps recited in the method embodiments of the present disclosure may be performed in a different order and/or performed in parallel. Furthermore, method embodiments may include additional steps and/or omit performing the illustrated steps. The scope of the present disclosure is not limited in this respect.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below. It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
It will be appreciated that prior to using the technical solutions disclosed in the embodiments of the present disclosure, the user should be informed and authorized of the type, usage range, usage scenario, etc. of the personal information related to the present disclosure in an appropriate manner according to the relevant legal regulations.
For example, in response to receiving an active request from a user, a prompt is sent to the user to explicitly prompt the user that the operation it is requesting to perform will require personal information to be obtained and used with the user. Thus, the user can autonomously select whether to provide personal information to software or hardware such as an electronic device, an application program, a server or a storage medium for executing the operation of the technical scheme of the present disclosure according to the prompt information.
As an alternative but non-limiting implementation, in response to receiving an active request from a user, the manner in which the prompt information is sent to the user may be, for example, a popup, in which the prompt information may be presented in a text manner. In addition, a selection control for the user to select to provide personal information to the electronic device in a 'consent' or 'disagreement' manner can be carried in the popup window. It will be appreciated that the above-described notification and user authorization process is merely illustrative and not limiting of the implementations of the present disclosure, and that other ways of satisfying relevant legal regulations may be applied to the implementations of the present disclosure.
The cloud game is based on a cloud computing technology, an input instruction provided by a remote client is transmitted to a game server through a network and the game is executed at the game server, so that dependence on hardware conditions of the client is eliminated, and the user threshold of the game is reduced. Thus, cloud gaming technology can allow more players without a host, high-end PC to enjoy a high-quality gaming experience.
In the related art, for a game having a master character and an auxiliary character, the auxiliary character is a robot character, and the auxiliary character is automatically controlled by a system to follow the master character, and the auxiliary character automatically participates in a battle. Therefore, in the related art, the control of the subordinate character is fixed and single.
Accordingly, in order to solve the above technical problems in the related art, embodiments of the present disclosure provide a game control method, apparatus, electronic device, and storage medium.
For clarity of description of the solution, the technical solution of the embodiments of the disclosure is first introduced in connection with a specific application scenario.
Specifically, the application scenario according to the embodiment of the present disclosure is a game scenario, and two types of game characters, namely a main character and an auxiliary character, exist. Also, one master role may correspond to one or more subordinate roles, which the embodiments of the present disclosure do not specifically limit.
In practical application, a game account is first required to be created, and the creation of a master role and an auxiliary role is included in the process of creating the game account. Specifically, the user a participating in the game may submit registration information to the game server through the game terminal, and after receiving the registration information, the game server generates a master role Id and an auxiliary role Id at the same time, where the master role Id may be an mcuserid, and the auxiliary role Id may be a subtuserid. mUserId is used as the unique number of the master role under the account, and subtuseId is used as the unique number of the subordinate role under the account. The master character and the subordinate character can log in the game through the same account number and password.
After generating the master character Id and the subordinate character Id, the game service end pops up the creation account page to provide a character image of the master character (mUserId) and the subordinate character (subtuseId) for the user A to select. The master role has authority to add and delete the auxiliary role, if the user A selects the master role, after the game terminal clicks the auxiliary role adding button, the game server generates a corresponding auxiliary role subtuseId as a unique number of the auxiliary role B under the account, and after clicking the auxiliary role deleting button, the created auxiliary role can be selected to be deleted. Also, the master role may add multiple subordinate roles. For example, if user C wants to act as an accessory role for user A, user C can inform user A to recreate an accessory role subUserId for use by user C. If the user C wants to make a master role, the user C registers an account number of the user C in a game server, then creates an accessory role of the user C for other users to join and select, and can also vacate the master role position by unbinding the bound master role device, and the user C uses the account number and the password of the user A to log in and select the master role.
After creating the game account, the game user may then log into the game server through the already registered account and password. The specific process of logging in the game can be as follows:
the main character user and/or the auxiliary character user logs in the game service end through the registered account passwords, and the game service end inquires the user information of the registered user according to the account and returns the user information to the main character information and the auxiliary character list information under the account; after the main character user and/or the auxiliary character user inputs the account number and the password to log in the game, the game client jumps to a game character selection page which displays the main character image and the auxiliary character image which are created when the account is registered.
After the main character user selects the main character, the game server can bind the game with the device Id, namely the deviceId, of the main character user, and the unbinding function of the main character Id and the device Id can be provided in the game setting. Thus, if the clicking device exits the game after unbinding, and then the clicking device logs in the game, the game server side returns the unbound character information under the account again for the player to select.
As is apparent from the above description, there are two cases of the main character registration and the subordinate character registration at the time of registering the game, and the processes of registering the main character registration game and the subordinate character registration game will be described in detail below, respectively.
The process of logging in the game by the master role is as follows: assuming that a user A logs in through a game terminal with equipment information of deviceIdA, after the user A inputs an account number and a password into the game terminal, the game terminal sends a login request to a game server, wherein the login request carries the login account number and the equipment information of deviceIdA; after receiving the login request, the game server analyzes the login request to obtain a login account number and equipment information deviceIdA carried by the login request.
If the equipment information deviceIdA is not bound with the roles, the game server returns all the role information under the account to the game terminal so that the user A can select the main role to enter the game, and the game server binds the equipment information deviceIdA to the main role Id, namely mUserId, and meanwhile the user A enters the game. If the device information deviceIdA is already bound with the main role mUserId, the game server can directly return the device bound Id, namely mUserId, and the user A enters the game.
The process of the auxiliary character logging in the game is as follows: assuming that the user B logs in to the game through the device whose device information is deviceIdB, the user B may log in to the game server using the account number and the password of the user a. If the device information deviceIdB is not bound with the auxiliary role, the game server returns the unbound auxiliary role information under the account to be selected by the user B, the user B can select one of the auxiliary roles to enter the game, and the device information deviceIdB is bound with the selected role information subAUseId to the auxiliary role. If the deviceIdB of the user B is already bound with the auxiliary role, after the user B logs in the game, the game server directly returns the auxiliary role information bound with the equipment information, and the user B directly enters the game. Similarly, the unbinding function of the accessory role Id and the device Id can be provided in the game setting, namely, the unbinding function of the device can be used to unbinding the binding relationship between the device and the accessory role.
In addition, in the practical application, if the master character is online in the process of logging in the subordinate character, the subordinate character enters a game page of the master character. If the master character is not online, the subordinate character may enter another non-competing game page dedicated to the subordinate character.
Specifically, in the process of the auxiliary character login, if the main character is in the first target game scene, the auxiliary character enters a game page of the main character after the auxiliary character is logged in, and the user B controls the auxiliary character to be in a game picture of the main character. The auxiliary character can help the main character to play a strange role in the game by using the first view angle of the auxiliary character, can also use the knapsack medicine to enrich the blood of the main character, and can help the main character picking equipment and the synthesizing equipment at any time. When the main character dies, the auxiliary characters can also die together, so the only mission of the auxiliary character is to protect the main character. The master role can revive the subordinate role by consuming gold coins. In practical application, the main character processes the injury-free state within 0.5s of the reviving of the auxiliary character. As the level of the subordinate character is higher, the main character increases by 0.1s injury-free time per one level of the subordinate character, and the maximum injury-free time of the corresponding main character can be 3s.
If the master role is not in the first target game scene, the auxiliary role enters a non-fight second target game scene which is exclusive to the auxiliary role after logging successfully, and in the second target game scene, the auxiliary role can upgrade by completing tasks, for example, warehouse capacity can be enlarged, gold coins can be earned, and the auxiliary roles of different grades correspond to different blood tanks, attack values and visual fields.
After the application scenario of the embodiments of the present disclosure is approximately described, a game control method provided by the embodiments of the present disclosure will be described in detail below. As shown in fig. 1, the method may include the steps of:
in step S110, in the first target game scenario, first control operation information of the first user on the first game character is received, the first game character is controlled based on the first control operation information, and current combat data of the first game character is acquired.
In step S120, control operation information of the second user on the second game character is received, the second game character is controlled based on the second control operation information, and an attack range of the second game character is determined based on current combat data of the first game character.
Wherein the first game character has an affiliation with a second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
Specifically, the first target game scene may be any game scene in which a master character and an auxiliary character exist, the first game character refers to the master character in the first target game scene, and the second game character may be the auxiliary character in the first target game scene. Since the primary role of the subordinate character is to protect the main character, the subordinate character follows the main character in the case where the main character appears in the first target game scene. For clarity of the scheme description, in the following description, a first game character is referred to as a master character, and a second game character is referred to as an accessory character.
In order to accurately determine an attack range of an auxiliary character in a first target game scene, in the first target game scene, current combat data of the first game character is acquired to determine the attack range of the auxiliary character according to the current combat data of a master character, wherein the combat data of the master character can include the attack range of the master character, blood volume of the master character, attack values of the master character and the like, and the combat data of the master character is not particularly limited in the embodiment of the present disclosure.
In practical application, the larger the attack range of the master role is, the larger the attack range of the subordinate role is; the smaller the blood volume of the main role, the larger the attack range of the subordinate role; the larger the attack value of the master role, the larger the attack scope of the subordinate role.
Wherein the subordinate character can have the following authorities in the game:
1. the authority of the main character picking equipment is set in the game.
2. And operating the authority of equipment in the warehouse.
3. The authority to check the equipment in the master role warehouse is available, and the authority to check the equipment in the master role warehouse is not available.
4. The new equipment authority is synthesized by utilizing equipment in the main character warehouse, and the main character equipment authority is not used.
5. The drugs in the warehouse are used in games to give the authority of the principal character to enrich the blood.
According to the technical scheme provided by the embodiment of the disclosure, in a game scene with the main role and the auxiliary role, the auxiliary role is attached to the main role, the auxiliary role follows the main role, and the attack range of the auxiliary role is determined based on the current combat data of the main role.
In the embodiment provided by the present disclosure, the first game role is a master role, and the second game role is an accessory role; the method further comprises the steps of:
s111, an account creation request of the first user is received.
S112, responding to the account creation request, and creating a target account. Wherein the target account number includes a created master role and at least one accessory role.
In practical application, a game account is first required to be created, and a target account is created for a first user by receiving an account creation request of the first user. For example, creation of a master character and an accessory character is involved in creating a game account. Specifically, a first user participating in the game may submit registration information to the game server through the game terminal, and the game server receives the registration information and then generates the master role Id and the accessory role Id at the same time. The master character and the subordinate character can log in the game through the same account number and password. And the number of master roles is one, and the number of subordinate roles may be one or more. Reference may be made specifically to the above embodiments, and details are not repeated here.
Based on the above embodiments, in the embodiments provided in the present disclosure, the method further includes the steps of:
S113, receiving login information which is sent by the first user through the first terminal and used for logging in the target account.
And S114, when the first terminal is not bound with the game role, receiving operation information generated by the first terminal when the first user selects the game role, distributing a corresponding main role or auxiliary role for the first user based on the operation information, and entering a first target game scene.
S115, under the condition that the first terminal binds the game roles, acquiring the target game roles bound by the first terminal, distributing the target game roles to the first user, and entering a first target game scene. Wherein the target game character comprises a master character or an accessory character.
In an embodiment, a first user may log in through a first terminal as a game terminal, and after the first user inputs a corresponding target account number and a corresponding password, the game terminal sends a login request to a game server, where the login request carries a login account number and device information of the first terminal. After receiving the login request, the game server analyzes the login request to obtain a login account number and equipment information carried by the login request.
If the first terminal does not bind the game role, the game server returns all role information under the account number, including a master role and an auxiliary role, to the first terminal so that the first user can select the master role to enter the game, and the game server binds the equipment information with the master role, and meanwhile the first user enters the game. If the device information is already bound to the main character or the auxiliary character, the game service side can directly return to the main character or the auxiliary character bound to the device, and the first user enters the game scene through the main character or the auxiliary character.
Based on the above embodiments, in the embodiments provided in the present disclosure, the method further includes the steps of:
s116, receiving login information which is sent by the second user through the second terminal and used for logging in the target account.
S117, when the second terminal does not bind the game roles, receiving operation information generated by the second terminal when the second user selects the auxiliary roles, distributing the corresponding auxiliary roles for the second user based on the operation information, and entering the first target game scene.
S118, under the condition that the second terminal binds the game roles, the auxiliary roles bound by the second terminal are acquired, the auxiliary roles are distributed for the second user, and the first target game scene is accessed.
In the embodiment, it is assumed that the second user logs in to the game through the second terminal, and the second user may log in to the game server using the account number and the password of the first user. If the auxiliary role is not bound by the second terminal, the game server returns the unbound auxiliary role information under the account number for the second user to select, and the second user can select one of the auxiliary roles to enter the game and bind the second terminal to the selected auxiliary role to the auxiliary role. If the second terminal has bound the auxiliary role, the game server directly returns the auxiliary role information bound by the equipment information after the second user logs in the game, and the second user directly enters the game. Similarly, an unbinding function may be provided in the embodiment to unbinding the device from the game character.
Based on the embodiment shown in fig. 1, in one implementation, S120, determining the attack range of the second game character based on the current combat data of the first game character may include the following steps:
s121, acquiring a current attack value, an attack range and blood volume of the first game character.
S122, determining the attack range of the second game role based on the current attack value, the attack range and the blood volume of the first game role.
Wherein the first game character is a master character and the second game character is an accessory character.
Specifically, the subordinate character strongly depends on the main character, and the attack range of the subordinate character is the blood volume L of the main character and the attack value G of the main character 1 Attack scope R of master role 1 In practical application, the maximum value of the blood volume L of the master role can be 100, and the attack value G of the master role 1 The maximum value of (2) may be 1000, and the attack range of the master character may be set by the game. Of course, the blood volume L of the master character and the attack value G of the master character 1 And the attack range of the master character can be set according to different game scenes, and the embodiment of the disclosure is not particularly limited.
Let the attack scope of the subordinate character be denoted as R 2 Then R is 2 The specific calculation mode of (a) can be as follows:
as can be seen from the foregoing description, in the embodiment of the present disclosure, the impact factors of the attack scope of the subordinate role include: the attack value of the master character, the attack range of the master character and the blood volume of the master character, that is, the subordinate character strongly depends on the master character, and the attack range of the subordinate character is influenced by the current combat data of the master character, unlike the related art, the subordinate character is automatically controlled by the system, so that the embodiment of the disclosure can realize more flexible and accurate control of the subordinate character.
The attack range of the subordinate character can be determined through the technical scheme of the embodiment, and in an actual game scene, the activity range of the subordinate character needs to be determined, and in the following embodiment, a specific implementation manner of determining the activity range of the subordinate character will be described in detail.
Based on the above embodiment, in one implementation manner, the game control method may further include the following steps:
s130, acquiring an attack range of a third game role in the first target game scene.
Wherein the third game character has a antagonistic relationship with the first game character and the second game character, respectively.
Specifically, the third game character may refer to a monster character in the first target game scene, in which the attack range of the monster character is determined, so that the attack range of the monster character may be directly obtained, and the attack range of the monster character may be denoted as R 3
S140, determining the maximum activity radius of the second game role from the first game role based on the attack ranges respectively corresponding to the first game role, the second game role and the third game role, and the current blood volume and attack value of the first game role.
Specifically, in the attack range R where the dominant role is acquired 1 Attack scope R of subordinate character 2 And scope of attack R for monster character 3 And the current blood volume L and attack value G of the master character 1 Thereafter, it can pass through R 1 、R 2 、R 3 L and G 1 To calculate the maximum active distance R of the secondary character from the primary character, that is, the secondary character must not be further than R from the primary character during the course of its activity. Wherein:
let the coordinates of the master character be (x 1 ,y 1 ,z 1 ) The coordinates of the subordinate character are (x 2 ,y 2 ,z 2 ) Then, in the three-dimensional space, the movement range between the two points of the subordinate character and the main character can be calculated according to the Euclidean distance:
according to the formula, the movable range of the auxiliary character is in a circle with the coordinate point of the main character as the circle center and R as the radius, and the lower the blood volume of the main character is, the more the movable range of the auxiliary character is close to the main character, so that the auxiliary character can better protect the main character under the condition of lower combat power of the main character.
In the technical solution provided in this embodiment, the influence factors of the activity range of the subordinate character include: the attack range of the main character, the attack range of the auxiliary character, the attack range of the monster, the attack value of the main character and the blood volume of the main character can be determined more accurately, and the lower the blood volume of the main character is, the movable range of the auxiliary character is approximately close to the main character, so that the auxiliary character can protect the main character better.
Also, in order to enable the subordinate character to better protect the main character, in one embodiment, the second game character is located within a spherical range centered on the first game character with the maximum active distance as a radius, and the spherical range is positively correlated with the current blood volume of the first game character.
Specifically, the role of the subordinate character is to protect the main character, so that the subordinate character is located in a spherical range with the first game character as a center and the maximum movement distance as a radius, namely, the subordinate character follows the main character, the lower the current blood volume of the main character is, the lower the current combat power of the main character is, the smaller the spherical range is, and the subordinate character is closer to the main character, so that the subordinate character can better protect the main character. Similarly, the higher the current blood volume of the master character, the stronger the attack of the master character, and the larger the sphere range, i.e. the larger the area where the accessory character can move.
Therefore, according to the technical scheme of the embodiment, the movement range of the subordinate character near the main character is related to the current blood volume of the main character, the lower the blood volume of the main character is, the smaller the sphere range is, namely, the closer the subordinate character is to the main character under the condition that the battle force of the main character is lower, and the subordinate character can better protect the main character.
Based on the above embodiment, in one implementation manner, the game control method may further include the following steps:
in the case where the second game character is out of the sphere range, the second game character is controlled to move toward the first game character until the second game character is within the sphere range.
Alternatively, in a case where the second game character is located within the spherical range, a control operation for the second game character is received, and the second game character performs an action corresponding to the control operation in response to the control operation.
Specifically, in the first target game scene, the subordinate character follows the main character with its first view angle, and the maximum distance between the subordinate character and the main character is R. The game server calculates the distance r between the master role and the subordinate role in real time. The auxiliary role can automatically help the main role pick up equipment in the game process, and can be put into a warehouse of the main role, and the main role can view and use the equipment in the auxiliary role warehouse at any time.
If the distance R between the main character and the auxiliary character is larger than R, the auxiliary character is controlled to move towards the main character, the auxiliary character moves along the direction of the straight line with the main character, if an obstacle is encountered, the auxiliary character automatically bypasses, and the forced movement is stopped automatically until the distance R between the auxiliary character and the main character is smaller than or equal to R. During the forced movement of the accessory character, the attack of the accessory character on the monster character is not stopped if the monster character is within the attack range of the accessory character.
The process of controlling the movement of the subordinate character to the master character may be: if the blood volume of the master character is less than 20%, the skill of the subordinate character transient may appear, and the initial transient time may be 3 seconds. With the improvement of the level of the subordinate character, the shorter the transient time is, the shortest transient time for moving to the side of the main character can be 0.1 second, and the subordinate character can simultaneously block the attack of the current monster character on the main character.
And if the distance R between the master role and the subordinate roles is less than or equal to R, the user corresponding to the subordinate roles can freely control the subordinate roles, and the subordinate roles are controlled to move towards the corresponding subordinate roles by triggering the control operation on the subordinate roles. Move in any direction.
Therefore, through the technical scheme provided by the embodiment, the moving range of the subordinate role can be determined in real time, and when the subordinate role moves out of the spherical range, the subordinate role can be controlled to enter the spherical range in time, so that the subordinate role can protect the main role higher. When the subordinate character is active in the sphere, the user corresponding to the subordinate character can freely control the subordinate character, thereby realizing flexible control of the subordinate character.
Based on the above embodiment, in one implementation manner, the game control method may further include the following steps:
And increasing the protection value of the first game role under the condition that the target distance between the second game role and the first game role is smaller than the threshold value.
Wherein the guard value of the first game character is inversely related to the target distance.
Specifically, when the distance between the subordinate character and the main character is smaller than the threshold value, the protection value of the main character may be increased, for example, the protection value may be increased by 5% when the distance between the subordinate character and the main character is smaller than R/4. And, the higher the level of the subordinate character is, the more the protection value of the main character can be increased, and the protection value for increasing 20% of the main character can be set at the highest.
In addition, in practical applications, a situation may occur that the master character is not in the first target game scene, and at this time, the game control method may further include the following steps:
in the event that the first game character does not appear in the first target game scene, the second game character is controlled to enter the second target game scene.
Wherein the first target game scene comprises a combat scene and the second target game scene comprises a non-combat game scene.
Specifically, if the master character is not in the first target game scenario, the subordinate character enters a non-competing second target game scenario specific to the subordinate character. In a second target game scenario, the subordinate character may be upgraded. Wherein, different grades correspond to different blood tanks, attack values and visual fields. The subordinate character may specifically perform the following operations:
a. The subordinate role selects to do task upgrading and can earn gold coins.
b. Operate self and primary role warehouse equipment, purchase, compose, etc.
c. The accessory roles may be exchanged or purchased with other master roles.
In the case of dividing each functional module with corresponding each function, the embodiments of the present disclosure provide a game control device, which may be a server or a chip applied to the server. Fig. 2 is a schematic block diagram of functional modules of a game control apparatus according to an exemplary embodiment of the present disclosure. As shown in fig. 2, the game control device includes:
a combat data obtaining module 10, configured to receive first control operation information of a first user on a first game character in a first target game scene, control the first game character based on the first control operation information, and obtain current combat data of the first game character;
a first attack range determining module 20, configured to receive control operation information of a second user on a second game role, control the second game role based on the second control operation information, and determine an attack range of the second game role based on current combat data of the first game role; wherein the first game character has an affiliation with the second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
In yet another embodiment provided by the present disclosure, the first game character is a master character and the second game character is a subordinate character; the apparatus further comprises:
the request receiving module is used for receiving an account creation request of the first user;
and the account creation module is used for responding to the account creation request and creating a target account, wherein the target account comprises the created master role and at least one auxiliary role.
In yet another embodiment provided by the present disclosure, the apparatus further comprises:
the first login information receiving module is used for receiving login information for logging in the target account sent by the first user through the first terminal;
the second selection operation receiving module is used for receiving operation information generated by the first terminal when the first terminal selects the game role under the condition that the first terminal is not bound with the game role, distributing a corresponding main role or auxiliary role for the first user based on the operation information, and entering the first target game scene;
the first character acquisition module is used for acquiring a target game character bound by the first terminal under the condition that the first terminal is bound with the game character, distributing the target game character for the first user and entering the first target game scene; wherein the target game character comprises a master character or an accessory character.
And/or the device further comprises:
the second login information receiving module is used for receiving login information for logging in the target account sent by the second user through the second terminal;
the second selection operation receiving module is used for receiving operation information generated by the second user when the second user selects the auxiliary role under the condition that the second terminal is not bound with the game role, distributing the corresponding auxiliary role for the second user based on the operation information, and entering the first target game scene;
and the second role acquisition module is used for acquiring the auxiliary role bound by the second terminal, distributing the auxiliary role for the second user and entering the first target game scene under the condition that the second terminal is bound with the game role.
In yet another embodiment provided by the present disclosure, the first attack range determination module is specifically configured to:
acquiring a current attack value, an attack range and blood volume of the first game character;
and determining the attack range of the second game role based on the current attack value, the attack range and the blood volume of the first game role.
In yet another embodiment provided by the present disclosure, the apparatus further comprises:
The second attack range determining module is used for acquiring the attack range of a third game role in the first target game scene; the third game character has a countermeasure relationship with the first game character and the second game character, respectively;
the distance determining module is used for determining the maximum activity distance of the second game role from the first game role based on the attack ranges respectively corresponding to the first game role, the second game role and the third game role, and the current blood volume and the attack value of the first game role.
In yet another embodiment provided by the present disclosure, the second game character is located within a sphere about the first game character and about the maximum distance of movement as a radius, and the sphere is positively correlated with the current blood volume of the first game character, the apparatus further comprising:
a control module for controlling the second game character to move toward the first game character until the second game character is located within the spherical range, in a case where the second game character is located outside the spherical range; or,
an action execution module configured to receive a control operation for the second game character in a case where the second game character is located within the spherical range, the second game character executing an action corresponding to the control operation in response to the control operation; or,
A protection value increasing module, configured to increase a protection value of the first game character when a target distance between the second game character and the first game character is smaller than a threshold value; wherein the guard value of the first game character is inversely related to the target distance.
In yet another embodiment provided by the present disclosure, the apparatus further comprises:
a processing module, configured to control the second game character to enter a second target game scene in a case where the first game character does not appear in the first target game scene; wherein the first target game scene comprises a combat scene and the second target game scene comprises a non-combat game scene.
The device portion corresponds to the method portion, and detailed description of the corresponding method embodiment is referred to herein, which is not repeated herein.
In the game control device provided by the embodiment of the disclosure, current combat data of a first game role is acquired in a first target game scene; and determining the attack range of the second game role based on the current combat data of the first game role. Because the subordinate character attaches to and follows the main character, and the attack scope of the subordinate character is determined based on the current fight data of the main character, the fight data of the main character is not always fixed but continuously changed in the game process, so that the attack scope of the subordinate character can be changed along with the change of the fight data of the main character, the main character can be better protected, and the subordinate character can be controlled more flexibly and accurately.
The embodiment of the disclosure also provides an electronic device, including: at least one processor; a memory for storing the at least one processor-executable instruction; wherein the at least one processor is configured to execute the instructions to implement the above-described methods disclosed by embodiments of the present disclosure.
Fig. 3 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present disclosure. As shown in fig. 3, the electronic device 1800 includes at least one processor 1801 and a memory 1802 coupled to the processor 1801, the processor 1801 may perform corresponding steps in the above-described methods disclosed by embodiments of the present disclosure.
The processor 1801 may also be referred to as a central processing unit (central processing unit, CPU), which may be an integrated circuit chip with signal processing capabilities. The steps of the above-described methods disclosed in the embodiments of the present disclosure may be accomplished by instructions in the form of integrated logic circuits or software in hardware in the processor 1801. The processor 1801 may be a general purpose processor, a digital signal processor (digital signal processing, DSP), an ASIC, an off-the-shelf programmable gate array (field-programmable gate array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the embodiments of the present disclosure may be embodied directly in hardware, in a decoded processor, or in a combination of hardware and software modules in a decoded processor. The software modules may reside in a memory 1802 such as random access memory, flash memory, read only memory, programmable read only memory, or electrically erasable programmable memory, registers, etc. as is well known in the art. The processor 1801 reads the information in the memory 1802 and, in combination with its hardware, performs the steps of the method described above.
In addition, various operations/processes according to the present disclosure, when implemented by software and/or firmware, may be installed from a storage medium or network to a computer system having a dedicated hardware structure, such as computer system 1900 shown in fig. 4, which is capable of performing various functions including functions such as those described previously, and the like, when various programs are installed. Fig. 4 is a block diagram of a computer system according to an exemplary embodiment of the present disclosure.
Computer system 1900 is intended to represent various forms of digital electronic computing devices, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other suitable computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 4, the computer system 1900 includes a computing unit 1901, and the computing unit 1901 may perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 1902 or a computer program loaded from a storage unit 1908 into a Random Access Memory (RAM) 1903. In the RAM 1903, various programs and data required for the operation of the computer system 1900 may also be stored. The computing unit 1901, ROM 1902, and RAM 1903 are connected to each other via a bus 1904. An input/output (I/O) interface 1905 is also connected to bus 1904.
Various components in computer system 1900 are connected to I/O interface 1905, including: an input unit 1906, an output unit 1907, a storage unit 1908, and a communication unit 1909. The input unit 1906 may be any type of device capable of inputting information to the computer system 1900, and the input unit 1906 may receive input numeric or character information and generate key signal inputs related to user settings and/or function controls of the electronic device. The output unit 1907 may be any type of device capable of presenting information and may include, but is not limited to, a display, speakers, video/audio output terminals, vibrators, and/or printers. Storage unit 1908 may include, but is not limited to, magnetic disks, optical disks. The communication unit 1909 allows the computer system 1900 to exchange information/data with other devices over a network, such as the internet, and may include, but is not limited to, modems, network cards, infrared communication devices, wireless communication transceivers and/or chipsets, such as bluetooth (TM) devices, wiFi devices, wiMax devices, cellular communication devices, and/or the like.
The computing unit 1901 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 1901 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various dedicated Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, etc. The computing unit 1901 performs the various methods and processes described above. For example, in some embodiments, the above-described methods disclosed by embodiments of the present disclosure may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 1908. In some embodiments, some or all of the computer programs may be loaded and/or installed onto electronic device 1900 via ROM 1902 and/or communication unit 1909. In some embodiments, the computing unit 1901 may be configured to perform the above-described methods of the disclosed embodiments by any other suitable means (e.g., by means of firmware).
The disclosed embodiments also provide a computer-readable storage medium, wherein instructions in the computer-readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the above-described method disclosed by the disclosed embodiments.
A computer readable storage medium in embodiments of the present disclosure may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium described above can include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specifically, the computer-readable storage medium described above may include one or more wire-based electrical connections, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The disclosed embodiments also provide a computer program product comprising a computer program, wherein the computer program, when executed by a processor, implements the above-described methods of the disclosed embodiments.
In an embodiment of the present disclosure, computer program code for performing the operations of the present disclosure may be written in one or more programming languages, including but not limited to an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of remote computers, the remote computers may be connected to the user computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to external computers.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules, components or units referred to in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a module, component or unit does not in some cases constitute a limitation of the module, component or unit itself.
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
The above description is merely illustrative of some embodiments of the present disclosure and of the principles of the technology applied. It will be appreciated by persons skilled in the art that the scope of the disclosure referred to in this disclosure is not limited to the specific combinations of features described above, but also covers other embodiments which may be formed by any combination of features described above or equivalents thereof without departing from the spirit of the disclosure. Such as those described above, are mutually substituted with the technical features having similar functions disclosed in the present disclosure (but not limited thereto).
Although some specific embodiments of the present disclosure have been described in detail by way of example, it should be understood by those skilled in the art that the above examples are for illustration only and are not intended to limit the scope of the present disclosure. It will be appreciated by those skilled in the art that modifications may be made to the above embodiments without departing from the scope and spirit of the disclosure. The scope of the present disclosure is defined by the appended claims.

Claims (10)

1. A game control method, the method comprising:
in a first target game scene, receiving first control operation information of a first user on a first game role, controlling the first game role based on the first control operation information, and acquiring current combat data of the first game role;
receiving control operation information of a second user on a second game role, controlling the second game role based on the second control operation information, and determining an attack range of the second game role based on current combat data of the first game role; wherein the first game character has an affiliation with the second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
2. The method of claim 1, wherein the first game character is a master character and the second game character is a subordinate character; the method further comprises the steps of:
receiving an account creation request of the first user;
and responding to the account creation request, and creating a target account, wherein the target account comprises the created master role and at least one auxiliary role.
3. The method according to claim 2, wherein the method further comprises:
receiving login information which is sent by the first user through a first terminal and used for logging in the target account;
receiving operation information generated by the first terminal when the first terminal selects a game role, distributing a corresponding main role or auxiliary role for the first user based on the operation information, and entering the first target game scene;
under the condition that the first terminal binds the game role, acquiring a target game role bound by the first terminal, distributing the target game role for the first user, and entering the first target game scene; wherein the target game character comprises a master character or an accessory character;
and/or, the method further comprises:
receiving login information for logging in the target account sent by the second user through a second terminal;
receiving operation information generated by the second terminal when the second terminal selects the auxiliary role under the condition that the second terminal does not bind the game role, distributing the corresponding auxiliary role for the second user based on the operation information, and entering the first target game scene;
And under the condition that the second terminal binds the game role, acquiring the auxiliary role bound by the second terminal, distributing the auxiliary role for the second user, and entering the first target game scene.
4. The method of claim 1, wherein the determining the scope of attack of the second game character based on the current combat data of the first game character comprises:
acquiring a current attack value, an attack range and blood volume of the first game character;
and determining the attack range of the second game role based on the current attack value, the attack range and the blood volume of the first game role.
5. The method according to claim 4, wherein the method further comprises:
acquiring an attack range of a third game role in the first target game scene; the third game character has a countermeasure relationship with the first game character and the second game character, respectively;
and determining the maximum activity distance of the second game role from the first game role based on the attack ranges respectively corresponding to the first game role, the second game role and the third game role and the current blood volume and attack value of the first game role.
6. The method of claim 5, wherein the second game character is located within a sphere centered on the first game character and having a radius of the maximum range of motion, and wherein the sphere is positively correlated with a current blood volume of the first game character, the method further comprising:
controlling the second game character to move toward the first game character until the second game character is located within the spherical range, in a case where the second game character is located outside the spherical range;
or, in a case where the second game character is located within the spherical range, receiving a control operation for the second game character, the second game character performing an action corresponding to the control operation in response to the control operation;
or, in the case that the target distance between the second game character and the first game character is smaller than a threshold value, increasing the protection value of the first game character, wherein the protection value of the first game character is inversely related to the target distance.
7. The method according to any one of claims 1 to 6, further comprising:
Controlling the second game character to enter a second target game scene in the case that the first game character does not appear in the first target game scene; wherein the first target game scene comprises a combat scene and the second target game scene comprises a non-combat game scene.
8. A game control device, the device comprising:
the combat data acquisition module is used for receiving first control operation information of a first user on a first game role in a first target game scene, controlling the first game role based on the first control operation information and acquiring current combat data of the first game role;
the first attack range determining module is used for receiving control operation information of a second user on a second game role, controlling the second game role based on the second control operation information, and determining the attack range of the second game role based on current combat data of the first game role; wherein the first game character has an affiliation with the second game character, the second game character following the first game character in the event that the first game character appears in the first target game scene.
9. An electronic device, comprising:
at least one processor;
a memory for storing the at least one processor-executable instruction;
wherein the at least one processor is configured to execute the instructions to implement the method of any of claims 1-7.
10. A computer readable storage medium, characterized in that instructions in the computer readable storage medium, when executed by a processor of an electronic device, enable the electronic device to perform the method of any one of claims 1-7.
CN202310957062.0A 2023-07-31 2023-07-31 Game control method, game control device, electronic equipment and storage medium Pending CN116870482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310957062.0A CN116870482A (en) 2023-07-31 2023-07-31 Game control method, game control device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310957062.0A CN116870482A (en) 2023-07-31 2023-07-31 Game control method, game control device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116870482A true CN116870482A (en) 2023-10-13

Family

ID=88262114

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310957062.0A Pending CN116870482A (en) 2023-07-31 2023-07-31 Game control method, game control device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116870482A (en)

Similar Documents

Publication Publication Date Title
US10029179B2 (en) Touch control with dynamic zones and displayed elements
CN110141859B (en) Virtual object control method, device, terminal and storage medium
US12029975B2 (en) Action execution method and apparatus, storage medium, and electronic device
US9901824B2 (en) User control of objects and status conditions
US10362158B2 (en) Appliance control system and method
CN111228811B (en) Virtual object control method, device, equipment and medium
CN109445662A (en) Method of controlling operation thereof, device, electronic equipment and the storage medium of virtual objects
US10792568B1 (en) Path management for virtual environments
CN111905370A (en) Method and device for controlling virtual character in game, electronic equipment and storage medium
CN110795336A (en) Application program control method, device, equipment and readable storage medium
CN112107857B (en) Control method and device of virtual prop, storage medium and electronic equipment
US20170161011A1 (en) Play control method and electronic client
US10825261B2 (en) Method and device for determining and adjusting spatial attribute of virtual character in virtual reality applications
CN110215710B (en) In-game event determination method and device, electronic equipment and storage medium
WO2023103615A1 (en) Virtual object switching method and apparatus, device, medium and program product
TW202235135A (en) Contact person message display method, device, electronic apparatus, computer readable storage medium, and computer program product
JP2023548922A (en) Virtual object control method, device, electronic device, and computer program
US11729173B2 (en) Apparatus and method for online service access control
CN116870482A (en) Game control method, game control device, electronic equipment and storage medium
CN108427505A (en) Sense of touch control method, electronic device and computer readable storage medium
US11358056B2 (en) Method, device, and storage medium for controlling object
CN114210051A (en) Carrier control method, device, equipment and storage medium in virtual scene
US20160236098A1 (en) Systems and methods for providing extended in-game chat
US20160346696A1 (en) Telemetry based interactive content generation
US12120121B2 (en) Apparatus and method for online service access control

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination