CN110139114A - Processing method, device, computer equipment and the storage medium of fictitious assets data - Google Patents

Processing method, device, computer equipment and the storage medium of fictitious assets data Download PDF

Info

Publication number
CN110139114A
CN110139114A CN201910372355.6A CN201910372355A CN110139114A CN 110139114 A CN110139114 A CN 110139114A CN 201910372355 A CN201910372355 A CN 201910372355A CN 110139114 A CN110139114 A CN 110139114A
Authority
CN
China
Prior art keywords
fictitious assets
user
assets data
data
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910372355.6A
Other languages
Chinese (zh)
Other versions
CN110139114B (en
Inventor
杨子国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Cubesili Information Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN201910372355.6A priority Critical patent/CN110139114B/en
Publication of CN110139114A publication Critical patent/CN110139114A/en
Application granted granted Critical
Publication of CN110139114B publication Critical patent/CN110139114B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • G06Q30/0212Chance discounts or incentives
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Multimedia (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Databases & Information Systems (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Graphics (AREA)
  • Game Theory and Decision Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Transfer Between Computers (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides processing method, device, the computer equipment, storage medium of a kind of fictitious assets data, which comprises the processing of the fictitious assets data sent by the user that unified external interface receives each direct broadcasting room of live streaming platform is requested;The mission bit stream for the request processing requested in response to the processing, and carried according to processing request carries out corresponding processing to the fictitious assets data of user;Fictitious assets data processed result is back to the user by the external interface, and the fictitious assets data of the user are updated according to the fictitious assets data processed result, different types of fictitious assets data are handled by unified external interface and processing system, the overlapping development work occurred in fictitious assets data handling procedure can be effectively reduced, treatment effeciency is improved.

Description

Processing method, device, computer equipment and the storage medium of fictitious assets data
Technical field
The present invention relates to direct seeding technique fields, specifically, the present invention relates to a kind of processing method of fictitious assets data, Device, computer equipment and storage medium.
Background technique
With the continuous development of network technology, network direct broadcasting is increasingly liked by user, and user can pass through a variety of ends End viewing live streaming.The playing method business of network direct broadcasting is numerous, and a variety of different business are corresponding with different fictitious assets data, such as Good fortune card, competition certificate, gold coin, energy value etc., all there is the data processings such as distribution, consumption for the fictitious assets data of different business.
The processing of the fictitious assets data of corresponding different business at present, is provided with different fictitious assets data systems, but Since fictitious assets data type is numerous, the fictitious assets data of every kind of business all develop a set of processing system, cause virtually to provide It produces and occurs a large amount of overlapping development work in data handling procedure, affect treatment effeciency.
Summary of the invention
The purpose of the present invention is intended at least can solve above-mentioned one of technological deficiency, especially fictitious assets data processing and imitates The low technological deficiency of rate.
The present invention provides a kind of processing method of fictitious assets data, includes the following steps:
The fictitious assets data of user's transmission of each direct broadcasting room of live streaming platform are received by unified external interface Processing request;Wherein the processing request carries the mission bit stream of request processing;
It is carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user opposite The processing answered;
Fictitious assets data processed result is back to the user by the external interface, and according to the virtual money Produce the fictitious assets data that data processed result updates the user.
In one embodiment, the processing request also carries user information;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user Before the step of corresponding processing, further includes:
The mission bit stream in the processing request is extracted, school is carried out to the validity of the task type in the mission bit stream It tests;
If the task type is effective, the legitimacy of the user information is verified.
In one embodiment, the processing request further includes the verifying encryption information of user's input;
The step of legitimacy of the verifying user information includes:
By the verifying encryption information of user's input and prestores encryption information and match;
If the verifying encryption information matches with the encryption information that prestores, determine that the user information is legal, it is no Then return to the illegal response of the user information.
In one embodiment, the task type in the mission bit stream is that fictitious assets data distribute task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of corresponding processing, comprising:
The type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of the processing request;
Corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of the request distribution and quantity;
In the fictitious assets data for the corresponding types that the fictitious assets data to be allocated are added to the user.
In one embodiment, the task type in the mission bit stream is fictitious assets data consumption task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of corresponding processing, comprising:
The type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of the processing request, described in inspection The type of fictitious assets data to be consumed and the legitimacy of quantity;
The fictitious assets data to be consumed of corresponding types and corresponding number are deducted from the fictitious assets of user.
In one embodiment, the step of the legitimacy of the type for examining the fictitious assets data to be consumed and quantity Suddenly, comprising:
The type of the fictitious assets data to be consumed is verified;
If the type of the fictitious assets data to be consumed is effective, by the quantity of the fictitious assets data to be consumed and The quantity of the fictitious assets data of user compares;
If the quantity of the fictitious assets data of user is not less than the quantity of the fictitious assets data to be consumed, sentence The quantity of the fixed fictitious assets data to be consumed is legal.
In one embodiment, the task type in the mission bit stream is fictitious assets data migration task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of corresponding processing, comprising:
The quantity of fictitious assets data to be migrated is extracted from the mission bit stream of the processing request and receives the account of user Family;
The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of the user;
The fictitious assets data to be migrated are increased in the account for receiving user.
In one embodiment, the task type in the mission bit stream is that fictitious assets data exchange task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of corresponding processing, comprising:
The first kind of user fictitious assets data to be exchanged is extracted from the mission bit stream of the processing request With the first quantity;
Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of the user;
The fictitious assets data of the first kind of the first quantity are deducted from the fictitious assets data of user, and are increased The fictitious assets data of the Second Type of second quantity.
In one embodiment, the Second Type and the second number for the fictitious assets data that the target for obtaining user is exchanged The step of amount, comprising:
The Second Type of the fictitious assets data of the target exchange of user is extracted from the mission bit stream of the processing request;
It is obtained according to the first kind and the Second Type wait exchange between the fictitious assets data of target exchange Exchange ratio;
According to first quantity and second quantity exchanged than calculating the fictitious assets data that target is exchanged.
A kind of processing unit of fictitious assets data, comprising:
Module is obtained, the void sent for receiving the user of each direct broadcasting room of live streaming platform by unified external interface The processing request of quasi- asset data;Wherein the processing request carries the mission bit stream of request processing;
Processing module, for requesting and according to the mission bit stream in response to the processing to the fictitious assets of the user Data carry out corresponding processing;
Update module, for fictitious assets data processed result to be back to the user by the external interface, and The fictitious assets data of the user are updated according to the fictitious assets data processed result.
The present invention also provides a kind of computer equipment, including memory and processor, calculating is stored in the memory Machine readable instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as any implementation The step of processing method of the example fictitious assets data.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one When a or multiple processors execute, so that one or more processors execute the processing of fictitious assets data described in any embodiment The step of method.
Processing method, system, computer equipment and the storage medium of above-mentioned fictitious assets data pass through the external of unification The processing request for the fictitious assets data that the user that each direct broadcasting room of platform is broadcast live in interface sends;In response to the processing Request, and the mission bit stream of the request processing carried according to processing request carries out corresponding place to the fictitious assets data of user Reason;Fictitious assets data processed result is back to the user by the external interface, and according to the fictitious assets number The fictitious assets data that the user is updated according to processing result, by unified external interface and processing system to different types of Fictitious assets data are handled, and can be effectively reduced the overlapping development work occurred in fictitious assets data handling procedure, be mentioned High treatment efficiency.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the application environment schematic diagram of the processing method of fictitious assets data in one embodiment;
Fig. 2 is the system architecture diagram of Vcion in one embodiment;
Fig. 3 is the flow chart of the processing method of fictitious assets data in one embodiment;
Fig. 4 is the flow chart of the processing method of fictitious assets data in another embodiment;
Fig. 5 is that fictitious assets data distribute timing diagram in one embodiment;
Fig. 6 is fictitious assets data consumption timing diagram in one embodiment;
Fig. 7 is that fictitious assets data consumption migrates timing diagram in one embodiment;
Fig. 8 is the processing method flow diagram of fictitious assets data in an application example;
Fig. 9 is the processing device structure diagram of fictitious assets data in one embodiment;
Figure 10 is the schematic diagram of internal structure of computer equipment in one embodiment.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here To explain.
The processing method of fictitious assets data provided by the present application, can be applied in application environment as shown in Figure 1.Base The processing platform of fictitious assets data can be built in this method, which can permit on the server, and platform passes through unification External interface receive live streaming platform each direct broadcasting room main broadcaster user and spectators user send fictitious assets data place Reason request;Wherein processing request carries the mission bit stream of request processing;Server is requested in response to processing and is believed according to task It ceases and corresponding processing is carried out to the fictitious assets data of user;Server passes through fictitious assets data processed result to external Mouth is back to user, and the fictitious assets data of user are updated according to fictitious assets data processed result.For fictitious assets number According to will be illustrated by taking the ideal money that the various businesses of current direct broadcasting room are related to as an example in following embodiment, such as vice card, gold Coin, energy value, competition certificate etc..
Those skilled in the art of the present technique are appreciated that server used herein above can be with independent server either The server cluster of multiple servers composition is realized.
The processing method of the fictitious assets data of the application in one embodiment can use a kind of software system of customization Realized on system Vcoin system form server shown in Fig. 1, with fictitious assets data that various different business are related to it is unified into Row processing, as shown in Fig. 2, Vcion system is divided into third party's operation layer, RPC (remote procedure call) channel layer, application service Layer, storage and streaming computing layer, Vcion functions are specific as follows:
(1) third party's operation layer is the external business of all calling Vcoin services, the SDK that each business is provided by Vcoin The calling of (Software Development Kit) in server API (application programming interface) related to user terminal initiation Vcoin service;
(2) RPC channel layer is protocol channel of third party's calling service using RPC request Vcoin service, passes through at present The super agreement of Http (text transfer protocol) is supported in (network) prefecture Web, provides thrift agreement by the channel Service prefecture (a kind of interface description language and binary system communications protocol);
(3) Vcoin application service cluster layer is the service layer for receiving each service request, across computer room deployment, third-party application The Vcoin application service of same computer room is routed automatically to by RPC channel layer;Vcoin provides configuration management platform, third party simultaneously The operation personnel of business can configure various ideal moneys and other service logic numbers within the scope of the service application having permission According to;
(4) storage and real-time computation layer, Mysql (a kind of Relational DBMS) store perdurable data, lead to Excessive library, the dynamic capacity-expanding for dividing table to realize data;Redis (a kind of database) stores the data cached of user account, improves and visits Ask performance;Spark Stream (Stream Processing frame supports expansible, high-throughput, fault-tolerant real time data stream process) is real When computing cluster be used to count the ranking list of each business, generate the real-time report of data, Mysql can be written in the data finally counted And Redis, it is called for third party's service request.
In one embodiment, it as shown in figure 3, providing a kind of processing method of fictitious assets data, answers in this way For being illustrated for the server in Fig. 1, may comprise steps of:
Step S202, the virtual money sent by the user that unified external interface receives each direct broadcasting room of live streaming platform Produce the processing request of data;Wherein processing request carries the mission bit stream of request processing.
Wherein, the user of each direct broadcasting room includes the main broadcaster user and spectators user of direct broadcasting room;Mission bit stream includes request The task type of processing, e.g. consumption task, task of transferring accounts, exchange task dispatching etc., each user can request to fictitious assets Data such as are consumed, transferred accounts and are exchanged at the processing.
In the specific implementation process, server between unified external interface and each direct broadcasting room that platform is broadcast live by carrying out Network connection, so that a variety of fictitious assets data to each direct broadcasting room are uniformly handled.
Step S204 is carried out corresponding in response to processing request and according to fictitious assets data of the mission bit stream to user Processing.
Different mission bit streams is correspondingly arranged on different treatment processes.
By the task type in mission bit stream be fictitious assets data consumption task for, corresponding treatment process be from The fictitious assets data that user need to consume are deducted in the fictitious assets data of user;Again for example when the task type in mission bit stream For fictitious assets data transfer accounts task when, corresponding treatment process be the fictitious assets Data Migration to be transferred of user is arrived In the fictitious assets data for receiving user.
In one embodiment, processing request also carries user information;As shown in figure 4, step S204 in response to place Reason request and before carrying out corresponding processing to the fictitious assets data of user according to mission bit stream, further includes:
Step S203, the mission bit stream in extraction process request, carries out the validity of the task type in mission bit stream Verification;If task type is effective, the legitimacy of user information is verified.
In this step, detailed process that the validity of task type is verified are as follows: inquiry is corresponding with user to be prestored Task type, task type and the corresponding task type prestored of user will match in the mission bit stream of processing request, When in processing request task type and the task type that prestores accordingly of user match when, determine that task type is effective;When When the task type that task type and user in processing request prestore accordingly mismatches, then the invalid sound of task type is returned It answers.
For example, the task type in the processing request of user is task of transferring accounts, prestoring for task corresponding with user is inquired Type, the task type inquired includes exchange task, task dispatching of transferring accounts etc., then the task type in the processing request of user Meet the task type of inquired user, i.e. user can request to carry out task of transferring accounts, then determine that user applies for processing The task of transferring accounts is effective.
In one embodiment, processing request further includes the verifying encryption information of user's input;Verifying in step S203 The step of legitimacy of user information includes:
(1) it by the verifying encryption information of user's input and prestores encryption information and matches.
Wherein, the verifying encryption information of user's input can be the cryptogram form of number or letter, be also possible to face knowledge Not, the cryptogram forms such as fingerprint recognition;Verifying encryption information is when can also be user's open-authentication, the identifying code etc. that real-time reception arrives Form.
(2) if verifying encryption information matches with encryption information is prestored, determine that user information is legal, otherwise return to user The illegal response of information.
Further, it when the task type for determining user's request is effective, needs to carry out further school to the identity of user It tests, that is, examine the verifying encryption information of user's input and prestores whether encryption information matches;If the verifying of user's input encrypts letter It ceases and prestores encryption information and match, that is, can determine that user information is legal;If user input verifying encryption information and prestore plus Confidential information mismatches, then returns to the verifying illegal response of encryption information.
Fictitious assets data processed result is back to user by external interface by step S206, and according to fictitious assets The fictitious assets data of data processed result update user.
The processing method of above-mentioned fictitious assets data receives each live streaming of live streaming platform by unified external interface Between user send fictitious assets data processing request;For the mission bit stream of different request processing, to breath to user Fictitious assets data carry out corresponding processing, consumption, distribution, migration and exchange of fictitious assets data etc. can be carried out Then fictitious assets data processed result is back to user by external interface by different types of task, and according to virtual money The fictitious assets data that data processed result updates user are produced, by unified external interface and processing system to different types of Fictitious assets data are handled, and can be effectively reduced the overlapping development work occurred in fictitious assets data handling procedure, be mentioned High treatment efficiency.
Embodiments described above illustrate by unified external interface and processing system to different types of fictitious assets data The scheme handled.For the processing method of fictitious assets data, the virtual money of current multiple-task type can handle Produce data, distribution, consumption, migration and exchange including fictitious assets data etc.;Above four kinds of task types are directed to, below will Embodiment is further elaborated in conjunction with attached drawing.
Task is distributed for fictitious assets data;In a kind of implementation process, step S204's requests simultaneously in response to processing Corresponding processing is carried out according to fictitious assets data of the mission bit stream to user, may include as follows:
(1) type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of processing request.
In the specific implementation process, whether the type for needing to verify the fictitious assets data of request distribution is legal, that is, verifies Request whether the type of the fictitious assets data of distribution meets the fictitious assets data type prestored.
(2) corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of request distribution and quantity.
When the type of the fictitious assets data of request distribution is legal, then obtain corresponding fictitious assets data;Work as request When the type of the fictitious assets data of distribution is illegal, then the illegal sound of fictitious assets data type of request distribution is returned It answers.
(3) fictitious assets data to be allocated are added in the fictitious assets data of corresponding types of user.
It is illustrated below in conjunction with Fig. 5 process distributed fictitious assets data:
A, user is in business service side's transmission fictitious assets data distribution request to Vcoin application service, figure with biz generation Table distribution request carries user information in request and requests the key of token, and Vcoin application service is virtual to request distribution Asset data type is judged, when application message is invalid, returns to illegal, that is, the response being not present;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to Business service side, and store in token to the Mysql database, business service side initiates the granting of fictitious assets data (distribution) It requests, carries serial number (account information of user) in request, also carry token, verification business service side is sent Whether the token cached in token with Mysql database is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent In the presence of then whether the account of verification user is frozen;If the account of user is frozen, lost then fictitious assets data are sent It loses;If the account of user is not frozen, then further carrying out air control verification to account;If the account of user is high risk Account, then fictitious assets data granting (distribution) failure;
If d, the account of user freezes verification, air control verification by token verification, account, fictitious assets data are executed Granting task, and local cache is updated, user cache is updated, asynchronous refresh Mysql database caches execute reconciliation, virtual to provide Data distribution (granting) task is produced to complete.
In above-described embodiment, for the distribution task of fictitious assets data, the fictitious assets data of first verification request distribution Type it is whether legal, when the fictitious assets data type of request distribution is legal, will request distribution fictitious assets data point It is fitted in the fictitious assets data of the respective type of user, a variety of different types of fictitious assets data can be allocated, Improve treatment effeciency.
For the consumption task of fictitious assets data, in a kind of implementation process, step S204's requests in response to processing And corresponding processing is carried out according to fictitious assets data of the mission bit stream to user, comprising:
(1) type and quantity that fictitious assets data to be consumed are extracted from the mission bit stream of processing request, are examined wait disappear Take the type of fictitious assets data and the legitimacy of quantity;
Specifically, examine fictitious assets data to be consumed type and quantity legitimacy the step of, comprising:
A, the type of fictitious assets data to be consumed is verified;
Likewise, whether the type for needing to verify the fictitious assets data of requesting consumption is effective, that is, verify requesting consumption Whether the type of fictitious assets data meets the fictitious assets data type prestored.
If B, the type of fictitious assets data to be consumed is effective, by the quantity of fictitious assets data to be consumed and user The quantity of fictitious assets data compares;
Because fictitious assets data needs to be consumed are deducted from the fictitious assets data of user, it can first verify Whether the fictitious assets data of user are able to satisfy the condition for deducting fictitious assets data to be consumed.
If C, the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine wait disappear The quantity for taking fictitious assets data is legal.
If the quantity of the fictitious assets data of user is less than the quantity of fictitious assets data to be consumed, void to be consumed is returned The illegal response of quantity of quasi- asset data.
(2) the fictitious assets data to be consumed of corresponding types and corresponding number are deducted from the fictitious assets of user.
For example, user thinks that the lottery ticket of consumption 2000 is drawn a lottery, then first verifying this type of lottery ticket to be consumed Whether effectively;When the type of lottery ticket this fictitious assets data is effective, the lottery ticket remaining sum verified in the account of user is It is no to be greater than or equal to 2000, such as the lottery ticket remaining sum of user is 1500, then returning to the response that Sorry, your ticket has not enough value of user's lottery ticket.
It is illustrated below in conjunction with process of the Fig. 6 to fictitious assets data consumption:
A, user is in business service side's transmission fictitious assets data consumption request to Vcoin application service, figure with biz generation Table consumer requests carry user information in request and request the key of token, and Vcoin application service is virtual to request distribution Asset data type is judged, when application message is invalid, returns to illegal, that is, the response being not present;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to Business service side, and store in token to the Mysql database, business service side initiates the request of fictitious assets data consumption, asks Serial number is carried in asking, and is also carried token, is cached in token the and Mysql database that verification business service side is sent Whether token is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent In the presence of then whether the account of verification user is frozen;If the account of user is frozen, lost then fictitious assets data are sent It loses;If the account of user is not frozen, then further carrying out air control verification to account;If the account of user is high risk Account, then fictitious assets data consumption fails;
If d, the account of user freezes verification, air control verification by token verification, account, fictitious assets data are executed Whether consumption task, the real-time balance for withholding to judge user by remaining sum can satisfy consumption;If Sorry, your ticket has not enough value, more than return The insufficient response of volume, the failure of fictitious assets data consumption;
If e, remaining sum can satisfy consumption, consumption task is executed, and update local cache, more new user account caching is different Step updates Mysql database caches, executes reconciliation, and fictitious assets data consumption task is completed.
In above-described embodiment, for the consumption task of fictitious assets data, the fictitious assets data of requesting consumption are first verified Type it is whether legal, when the fictitious assets data type of requesting consumption is legal, judge whether remaining sum meets consumption, and execute Consumption is deducted, and can be executed consumption task to a variety of different types of fictitious assets data, be improved treatment effeciency.For virtually providing Data migration task is produced, in a kind of implementation process, step S204's is requested in response to processing and according to mission bit stream to user Fictitious assets data carry out corresponding processing, comprising:
(1) quantity of fictitious assets data to be migrated is extracted from the mission bit stream of processing request and receives the account of user Family;
(2) the fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;
(3) fictitious assets data to be migrated are increased in the account for receiving user.
Likewise, whether the type for needing to verify the fictitious assets data of request migration is effective, that is, verify request migration Whether the type of fictitious assets data meets the fictitious assets data type prestored.
When request migration fictitious assets data type it is effective when, need first to verify user fictitious assets data whether It is able to satisfy the condition for deducting fictitious assets data to be migrated, i.e. whether the quantity of the fictitious assets data of user is greater than void to be migrated The quantity of quasi- asset data, when the quantity of the fictitious assets data of user is greater than or equal to the quantity of fictitious assets data to be migrated When, execute migration task;When the quantity of the fictitious assets data of user is less than the quantity of fictitious assets data to be migrated, return The illegal response of quantity of fictitious assets data to be migrated.
For example, user's first wants to shift 3000 energy values into the account of user's second, then first verifying energy value to be transferred Whether this type is effective;When the type of energy value this fictitious assets data is effective, the energy in the account of user's first is verified Whether magnitude remaining sum is greater than or equal to 3000, such as the energy value remaining sum of user's first is 5500, then from the energy value of user's first Middle to deduct 3000, in the account for moving to user's second, the number of the energy value of user's first is updated to 2500.
It is illustrated below in conjunction with process of the Fig. 7 to fictitious assets Data Migration:
A, user sends (migration) request of transferring accounts of fictitious assets data in business service side and arrives Vcoin application service, in figure (migration) request of transferring accounts is represented with biz, is carried user information in request and is requested the key of token, Vcoin application service pair The fictitious assets data type of request distribution is judged, when application message is invalid, returns to illegal, that is, the sound being not present It answers;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to Business service side, and store in token to the Mysql database, business service side initiates fictitious assets data and transfers accounts (migration) It requests, serial number and token is carried in request, is cached in token the and Mysql database that verification business service side is sent Whether token is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent In the presence of then whether the user that user and reception that verification initiation is transferred accounts transfer accounts is frozen;If the account of a certain user is frozen, So fictitious assets data are transferred accounts unsuccessfully;If the account for the user that user and reception that initiation is transferred accounts transfer accounts is all no frozen, The account of the user so further to transfer accounts to the user and reception that initiate to transfer accounts carries out air control verification;If the account of a certain user For high risk account, then fictitious assets data are transferred accounts unsuccessfully;
If the account for the user that user and reception that d, initiation is transferred accounts transfer accounts freezes verification, wind by token verification, account Control verification, then execute fictitious assets data and transfer accounts task, and whether the real-time balance for withholding to judge user by remaining sum can expire Foot consumption;If Sorry, your ticket has not enough value, the response that Sorry, your ticket has not enough value, consumption failure are returned;
If e, remaining sum can satisfy consumption, number limitation of transferring accounts is inquired in Vcoin application service;If receiving the user to transfer accounts to connect Number of being transferred accounts is more than limited number of times, then return to that number of transferring accounts transfinites system is responsive to business service side;What if reception was transferred accounts User's number that receives to transfer accounts is not above limited number of times, and execution is transferred accounts task, and updates local cache, updates the use for initiating to transfer accounts Family and the account caching for receiving the user to transfer accounts, asynchronous refresh Mysql database caches execute reconciliation, and fictitious assets data turn Account (migration) task is completed.
In above-described embodiment, for the consumption task of fictitious assets data, the fictitious assets data of requesting consumption are first verified Type it is whether legal, when the fictitious assets data type of requesting consumption is legal, the user that transfers accounts is initiated by token verification Then identity judges whether the user for initiating to transfer accounts about meets and transfers accounts;If remaining sum satisfaction is transferred accounts, further verifying number of transferring accounts is The no system of transfiniting, then executes the task of transferring accounts again, is held by unified Vcoin system to a variety of different types of fictitious assets data Capable task of transferring accounts, improves treatment effeciency.
In another implementation process, task type can also exchange task for fictitious assets data;The sound of step S204 Corresponding processing should be carried out in processing request and according to fictitious assets data of the mission bit stream to user, comprising:
(1) first kind and first of user's fictitious assets data to be exchanged is extracted from the mission bit stream of processing request Quantity;
(2) Second Type and the second quantity of the fictitious assets data of the target exchange of user are obtained;
In the specific implementation process, it obtains the Second Type for the fictitious assets data that target is exchanged and the second quantity is specifically wrapped Include following steps:
A, the Second Type of the fictitious assets data of the target exchange of user is extracted from the mission bit stream of processing request;
B, it is obtained according to the first kind and Second Type wait exchange the exchange between the fictitious assets data of target exchange Than;
C, the second quantity according to the first quantity and exchange than calculating the fictitious assets data that target is exchanged.
(3) the fictitious assets data of the first kind of the first quantity are deducted from the fictitious assets data of user, and are increased The fictitious assets data of the Second Type of second quantity.
Likewise, needing first to verify the type of fictitious assets data to be exchanged and fictitious assets data that target is exchanged Whether type is effective, when the type of type and target exchange fictitious assets data wait exchange fictitious assets data is all effective, The target exchange fictitious assets that fictitious assets data to be exchanged can be exchanged into how much quantity is calculated again.
The above are the distribution of fictitious assets data, consumption, the embodiments for migrating and transferring accounts etc., through the foregoing embodiment can be with Find out, technical solution of the present invention, by unified Vcoin system, a variety of different fictitious assets data can be executed and be divided The multiple-tasks such as match, consume and transfer accounts, can be avoided and different fictitious assets data are respectively processed using multiple systems The wasting of resources caused by and, and data-handling efficiency can be improved.
As shown in connection with fig. 8, the above method in order to better understand, one detailed below fictitious assets number of the invention According to processing method application example:
1) user opens direct broadcasting room by user terminal, is sent by unified external interface 1000 gold coins converting to prize drawing Certificate processes request to server;
2) after server receives redemption request, the type of gold coin to be exchanged and the lottery ticket class of target exchange are verified Whether type is effective;
If 3) type of gold coin and lottery ticket is effective, dynamic token is sent to user terminal, receives the token that user terminal returns It is verified;
4) token that if user returns is effective, the gold coin remaining sum of user and 1000 are compared;
If 5) the gold coin remaining sum of user is not less than 1000, calculating 1000 gold coins can exchange to obtain 500 lottery tickets;
6) the current gold coin remaining sum of user is deducted 1000, and the remaining sum of the lottery ticket of user is increased by 500;
7) the remaining sum modification information of gold coin and lottery ticket is sent to by external interface the direct broadcasting room of user.
In above-mentioned application example, whether the type for the lottery ticket that the type and target for first verifying gold coin to be exchanged are exchanged has Effect verifies dynamic token if the type of gold coin and lottery ticket is effective;If token verification is effectively, gold coin remaining sum to be exchanged is calculated Whether redemption of conditional is met;If gold coin remaining sum meets redemption of conditional, the exchange ratio between gold coin and lottery ticket is calculated, exchange is executed Task;It is exchanged, is mentioned between a variety of different types of fictitious assets data by unified fictitious assets data processing system High data-handling efficiency.
As shown in figure 9, Fig. 9 is the structural schematic diagram of the processing unit of fictitious assets data in one embodiment, this implementation A kind of processing unit of fictitious assets data is provided in example, including obtains module 902, processing module 904 and update module 906, Wherein:
Module 902 is obtained, is sent for receiving the user of each direct broadcasting room of live streaming platform by unified external interface Fictitious assets data processing request;Wherein processing request carries the mission bit stream of request processing;
Processing module 904, for being carried out in response to processing request and according to fictitious assets data of the mission bit stream to user Corresponding processing;
Update module 906, for fictitious assets data processed result to be back to user by external interface, and according to void Quasi- asset data processing result updates the fictitious assets data of user.
The specific restriction of processing unit about fictitious assets data may refer to above for fictitious assets data The restriction of processing method, details are not described herein.Modules in the processing unit of above-mentioned fictitious assets data can whole or portion Divide and is realized by software, hardware and combinations thereof.Above-mentioned each module can be embedded in the form of hardware or independently of computer equipment In processor in, can also be stored in a software form in the memory in computer equipment, in order to processor calling hold The corresponding operation of the above modules of row.
As shown in Figure 10, Figure 10 is the schematic diagram of internal structure of computer equipment in one embodiment.The computer equipment Including processor, non-volatile memory medium, memory and the network interface connected by device bus.Wherein, the computer The non-volatile memory medium of equipment is stored with operating device, database and computer-readable instruction, can be stored in database Control information sequence when the computer-readable instruction is executed by processor, may make processor to realize a kind of fictitious assets data Processing method.The processor of the computer equipment supports the fortune of entire computer equipment for providing calculating and control ability Row.Computer-readable instruction can be stored in the memory of the computer equipment, which is executed by processor When, it may make processor to execute a kind of processing method of fictitious assets data.The network interface of the computer equipment is used for and end Hold connection communication.It will be understood by those skilled in the art that structure shown in Figure 10, only portion relevant to application scheme The block diagram of separation structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer Equipment may include perhaps combining certain components or with different component cloth than more or fewer components as shown in the figure It sets.
In one embodiment it is proposed that a kind of computer equipment, computer equipment include memory, processor and storage On a memory and the computer program that can run on a processor, processor realize following steps when executing computer program: Pass through the processing request for the fictitious assets data that the user that unified external interface receives each direct broadcasting room of live streaming platform sends; Wherein processing request carries the mission bit stream of request processing;In response to processing request and according to mission bit stream to the virtual of user Asset data carries out corresponding processing;Fictitious assets data processed result is back to user by external interface, and according to The fictitious assets data of fictitious assets data processed result update user.
Processing request also carries user information when processor executes computer program in one of the embodiments,;It rings Before the step of should being requested in processing and carrying out corresponding processing according to fictitious assets data of the mission bit stream to user, also wrap Include: the mission bit stream in extraction process request verifies the validity of the task type in mission bit stream;If task type Effectively, then the legitimacy of user information is verified.
Processing request further includes the verifying of user's input when processor executes computer program in one of the embodiments, Encryption information;The step of verifying the legitimacy of user information includes: by the verifying encryption information of user's input and to prestore encryption letter Breath is matched;If verifying encryption information matches with encryption information is prestored, determines that user information is legal, otherwise return to user The illegal response of information.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money It produces data and distributes task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user The step of reason, comprising: the type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of processing request;Root Corresponding fictitious assets to be allocated is obtained according to the type and quantity of the fictitious assets data of request distribution;By fictitious assets to be allocated Data are added in the fictitious assets data of the corresponding types of user.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money Produce data consumption task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user The step of reason, comprising: the type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of processing request, examine to Consume the type of fictitious assets data and the legitimacy of quantity;Corresponding types and corresponding number are deducted from the fictitious assets of user Fictitious assets data to be consumed.
The type of fictitious assets data to be consumed is examined when processor executes computer program in one of the embodiments, The step of with the legitimacy of quantity, comprising: the type of fictitious assets data to be consumed is verified;If fictitious assets to be consumed The type of data is effective, then carries out the quantity of the quantity of fictitious assets data to be consumed and the fictitious assets data of user pair Than;If the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine to be consumed virtual The quantity of asset data is legal.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money Produce data migration task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user The step of reason, comprising: extract the quantity of fictitious assets data to be migrated from the mission bit stream of processing request and receive user's Account;The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;By fictitious assets to be migrated Data increase in the account for receiving user.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money It produces data and exchanges task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user The step of reason, comprising: extracted from the mission bit stream of processing request user's fictitious assets data to be exchanged the first kind and First quantity;Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of user;From the virtual money of user The fictitious assets data for deducting the first kind of the first quantity in data are produced, and increase the virtual money of the Second Type of the second quantity Produce data.
The fictitious assets that the target of user is exchanged is obtained when processor executes computer program in one of the embodiments, The step of Second Type and the second quantity of data, comprising: the target that user is extracted from the mission bit stream of processing request is exchanged Fictitious assets data Second Type;It is obtained according to the first kind and Second Type wait exchange the fictitious assets exchanged with target Exchange ratio between data;According to the first quantity and exchange the second quantity than calculating the fictitious assets data that target is exchanged.
In one embodiment it is proposed that a kind of storage medium for being stored with computer-readable instruction, this is computer-readable When instruction is executed by one or more processors, so that one or more processors execute following steps: passing through the external of unification The processing request for the fictitious assets data that the user that each direct broadcasting room of platform is broadcast live in interface sends;Wherein processing request is taken Mission bit stream with request processing;Phase is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user Corresponding processing;Fictitious assets data processed result is back to user by external interface, and according to fictitious assets data at Manage the fictitious assets data that result updates user.
Processing request also carries user's letter when computer-readable instruction is executed by processor in one of the embodiments, Breath;The step of in response to processing request and corresponding processing is carried out to the fictitious assets data of user according to mission bit stream it Before, further includes: the mission bit stream in extraction process request verifies the validity of the task type in mission bit stream;If Task type is effective, then verifies the legitimacy of user information.
Processing request further includes user's input when computer-readable instruction is executed by processor in one of the embodiments, Verifying encryption information;The step of verifying the legitimacy of user information includes: by the verifying encryption information of user's input and to prestore Encryption information is matched;If verifying encryption information matches with encryption information is prestored, determines that user information is legal, otherwise return Return the illegal response of user information.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is Fictitious assets data distribute task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite The step of processing answered, comprising: from processing request mission bit stream in extract request distribution fictitious assets data type and Quantity;Corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of request distribution and quantity;It will be to be allocated Fictitious assets data are added in the fictitious assets data of the corresponding types of user.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is Fictitious assets data consumption task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite The step of processing answered, comprising: the type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of processing request, Examine the type of fictitious assets data to be consumed and the legitimacy of quantity;Corresponding types and right are deducted from the fictitious assets of user Answer the fictitious assets data to be consumed of quantity.
Fictitious assets data to be consumed are examined when computer-readable instruction is executed by processor in one of the embodiments, Type and quantity legitimacy the step of, comprising: the type of fictitious assets data to be consumed is verified;If void to be consumed The type of quasi- asset data is effective, then by the quantity of the quantity of fictitious assets data to be consumed and the fictitious assets data of user into Row comparison;If the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine to be consumed The quantity of fictitious assets data is legal.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is Fictitious assets data migration task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite The step of processing answered, comprising: the quantity and reception of fictitious assets data to be migrated are extracted from the mission bit stream of processing request The account of user;The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;By void to be migrated Quasi- asset data increases in the account for receiving user.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is Fictitious assets data exchange task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite The step of processing answered, comprising: the first of user's fictitious assets data to be exchanged is extracted from the mission bit stream of processing request Type and the first quantity;Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of user;From user's The fictitious assets data of the first kind of the first quantity are deducted in fictitious assets data, and increase the Second Type of the second quantity Fictitious assets data.
The void that the target of user is exchanged is obtained when computer-readable instruction is executed by processor in one of the embodiments, The step of Second Type and the second quantity of quasi- asset data, comprising: the mesh of user is extracted from the mission bit stream of processing request Mark the Second Type for the fictitious assets data exchanged;It is obtained according to the first kind and Second Type wait exchange the void exchanged with target Exchange ratio between quasi- asset data;According to the first quantity and exchange the second number than calculating the fictitious assets data that target is exchanged Amount.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that those skilled in the art are come It says, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should be regarded as Protection scope of the present invention.

Claims (12)

1. a kind of processing method of fictitious assets data, which comprises the steps of:
Pass through the processing for the fictitious assets data that the user that unified external interface receives each direct broadcasting room of live streaming platform sends Request;Wherein the processing request carries the mission bit stream of request processing;
It is carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user corresponding Processing;
Fictitious assets data processed result is back to the user by the external interface, and according to the fictitious assets number The fictitious assets data of the user are updated according to processing result.
2. the method according to claim 1, wherein processing request also carries user information;
It is described to be carried out relatively in response to the processing request and according to fictitious assets data of the mission bit stream to the user Before the step of processing answered, further includes:
The mission bit stream in the processing request is extracted, the validity of the task type in the mission bit stream is verified;
If the task type is effective, the legitimacy of the user information is verified.
3. according to the method described in claim 2, it is characterized in that, the processing request further includes the verifying encryption of user's input Information;
The step of legitimacy of the verifying user information includes:
By the verifying encryption information of user's input and prestores encryption information and match;
If the verifying encryption information matches with the encryption information that prestores, determines that the user information is legal, otherwise return Return the illegal response of the user information.
4. the method according to claim 1, wherein the task type in the mission bit stream is fictitious assets number According to distribution task;
It is described to be carried out relatively in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of processing answered, comprising:
The type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of the processing request;
Corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of the request distribution and quantity;
In the fictitious assets data for the corresponding types that the fictitious assets data to be allocated are added to the user.
5. the method according to claim 1, wherein the task type in the mission bit stream is fictitious assets number According to consumption task;
It is described to be carried out relatively in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of processing answered, comprising:
The type and quantity that fictitious assets data to be consumed are extracted from the mission bit stream of the processing request are examined described wait disappear Take the type of fictitious assets data and the legitimacy of quantity;
The fictitious assets data to be consumed of corresponding types and corresponding number are deducted from the fictitious assets of user.
6. according to the method described in claim 5, it is characterized in that, the type for examining the fictitious assets data to be consumed The step of with the legitimacy of quantity, comprising:
The type of the fictitious assets data to be consumed is verified;
If the type of the fictitious assets data to be consumed is effective, by the quantity of the fictitious assets data to be consumed and user The quantity of the fictitious assets data compare;
If the quantity of the fictitious assets data of user is not less than the quantity of the fictitious assets data to be consumed, institute is determined The quantity for stating fictitious assets data to be consumed is legal.
7. the method according to claim 1, wherein the task type in the mission bit stream is fictitious assets number According to migration task;
It is described to be carried out relatively in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of processing answered, comprising:
The quantity of fictitious assets data to be migrated is extracted from the mission bit stream of the processing request and receives the account of user;
The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of the user;
The fictitious assets data to be migrated are increased in the account for receiving user.
8. the method according to claim 1, wherein the task type in the mission bit stream is fictitious assets number According to the task of exchange;
It is described to be carried out relatively in response to the processing request and according to fictitious assets data of the mission bit stream to the user The step of processing answered, comprising:
The first kind and the of user fictitious assets data to be exchanged is extracted from the mission bit stream of the processing request One quantity;
Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of the user;
The fictitious assets data of the first kind of the first quantity are deducted from the fictitious assets data of user, and increase by second The fictitious assets data of the Second Type of quantity.
9. according to the method described in claim 8, it is characterized in that, the fictitious assets data that the target for obtaining user is exchanged Second Type and the step of the second quantity, comprising:
The Second Type of the fictitious assets data of the target exchange of user is extracted from the mission bit stream of the processing request;
It is obtained according to the first kind and the Second Type wait exchange converting between the fictitious assets data of target exchange Change ratio;
According to first quantity and second quantity exchanged than calculating the fictitious assets data that target is exchanged.
10. a kind of processing unit of fictitious assets data characterized by comprising
Module is obtained, the virtual money sent for receiving the user of each direct broadcasting room of live streaming platform by unified external interface Produce the processing request of data;Wherein the processing request carries the mission bit stream of request processing;
Processing module, for requesting and according to the mission bit stream in response to the processing to the fictitious assets data of the user Carry out corresponding processing;
Update module, for fictitious assets data processed result to be back to the user by the external interface, and according to The fictitious assets data processed result updates the fictitious assets data of the user.
11. a kind of computer equipment, including memory and processor, it is stored with computer-readable instruction in the memory, Be characterized in that, when the computer-readable instruction is executed by the processor so that the processor execute as claim 1 to Described in any one of 9 the step of the processing method of fictitious assets data.
12. a kind of storage medium for being stored with computer-readable instruction, which is characterized in that the computer-readable instruction is by one Or multiple processors are when executing, so that one or more processors execute the fictitious assets as described in any one of claims 1 to 9 The step of processing method of data.
CN201910372355.6A 2019-05-06 2019-05-06 Virtual asset data processing method and device, computer equipment and storage medium Active CN110139114B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910372355.6A CN110139114B (en) 2019-05-06 2019-05-06 Virtual asset data processing method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910372355.6A CN110139114B (en) 2019-05-06 2019-05-06 Virtual asset data processing method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110139114A true CN110139114A (en) 2019-08-16
CN110139114B CN110139114B (en) 2021-09-10

Family

ID=67576389

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910372355.6A Active CN110139114B (en) 2019-05-06 2019-05-06 Virtual asset data processing method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110139114B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111951111A (en) * 2020-08-21 2020-11-17 上海浦东发展银行股份有限公司 Virtual asset integrated management system and method thereof
CN113032057A (en) * 2019-12-09 2021-06-25 北京搜狗科技发展有限公司 Interaction method and device and electronic equipment
CN113283914A (en) * 2020-02-18 2021-08-20 北京沃东天骏信息技术有限公司 Virtual asset checking method and device, electronic equipment and storage medium
CN114245149A (en) * 2020-09-09 2022-03-25 腾讯科技(深圳)有限公司 Virtual resource allocation method, device and system, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102346895A (en) * 2010-07-30 2012-02-08 李嘉辉 Virtual article conversion method and virtual article conversion system
CN105976197A (en) * 2016-04-13 2016-09-28 广州酷狗计算机科技有限公司 Method and device for presenting virtual goods
CN108540862A (en) * 2017-03-01 2018-09-14 武汉斗鱼网络科技有限公司 Virtual objects presentation method based on net cast and device
US20180310031A1 (en) * 2017-04-24 2018-10-25 Facebook, Inc. Providing a start trigger for a live video broadcast
CN109685487A (en) * 2018-12-21 2019-04-26 北京潘达互娱科技有限公司 It handles the method, apparatus of the first ideal money, calculate equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102346895A (en) * 2010-07-30 2012-02-08 李嘉辉 Virtual article conversion method and virtual article conversion system
CN105976197A (en) * 2016-04-13 2016-09-28 广州酷狗计算机科技有限公司 Method and device for presenting virtual goods
CN108540862A (en) * 2017-03-01 2018-09-14 武汉斗鱼网络科技有限公司 Virtual objects presentation method based on net cast and device
US20180310031A1 (en) * 2017-04-24 2018-10-25 Facebook, Inc. Providing a start trigger for a live video broadcast
CN109685487A (en) * 2018-12-21 2019-04-26 北京潘达互娱科技有限公司 It handles the method, apparatus of the first ideal money, calculate equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113032057A (en) * 2019-12-09 2021-06-25 北京搜狗科技发展有限公司 Interaction method and device and electronic equipment
CN113283914A (en) * 2020-02-18 2021-08-20 北京沃东天骏信息技术有限公司 Virtual asset checking method and device, electronic equipment and storage medium
CN111951111A (en) * 2020-08-21 2020-11-17 上海浦东发展银行股份有限公司 Virtual asset integrated management system and method thereof
CN114245149A (en) * 2020-09-09 2022-03-25 腾讯科技(深圳)有限公司 Virtual resource allocation method, device and system, electronic equipment and storage medium
CN114245149B (en) * 2020-09-09 2024-02-27 腾讯科技(深圳)有限公司 Virtual resource allocation method, device and system, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110139114B (en) 2021-09-10

Similar Documents

Publication Publication Date Title
CN110139114A (en) Processing method, device, computer equipment and the storage medium of fictitious assets data
CN110808989B (en) HTTPS acceleration method and system based on content distribution network
CN110134531A (en) Processing method, device and the computer equipment of fictitious assets circulation data
CN108287758A (en) A kind of application resource management method, application method and device
CN111309745B (en) Virtual resource processing method and device, electronic equipment and storage medium
CN109327627A (en) Telephone number recognition methods, device and storage medium based on block chain
CN107493291A (en) A kind of identity identifying method and device based on safety element SE
CN112767135B (en) Configuration method and device of rule engine, storage medium and computer equipment
CN111416709B (en) Voting method, device, equipment and storage medium based on block chain system
CN111210270B (en) Service processing method, device, service cluster, computer equipment and storage medium
CN111163130A (en) Network service system and data transmission method thereof
CN113342838B (en) Data processing method, device and equipment based on block chain and readable storage medium
Xiao et al. Edgetoll: A blockchain-based toll collection system for public sharing of heterogeneous edges
CN112767133A (en) Service decision method and device, storage medium and computer equipment
CN105871888A (en) Identity authentication method, device and system
CN110852748A (en) Group transaction method, device and storage medium
CN116055052A (en) Block chain-based data processing method, device, equipment and readable storage medium
CN111222885B (en) Data processing request endorsement method and device, computer equipment and storage medium
CN109558710A (en) User login method, device, system and storage medium
CN109150746A (en) A kind of overall situation flow control method and device
CN112788555B (en) Cross-operator telephone charge transfer settlement method, device and computing equipment
CN112529709A (en) Ether house intelligent contract implementation method based on multi-sign technology
CN111124672A (en) Data distribution method based on Redis cluster and related equipment
CN111709857A (en) House resource sharing method and device and electronic equipment
CN114785526B (en) Multi-user multi-batch weight distribution calculation and storage processing system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210113

Address after: 511442 3108, 79 Wanbo 2nd Road, Nancun Town, Panyu District, Guangzhou City, Guangdong Province

Applicant after: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Address before: 511442 29 floor, block B-1, Wanda Plaza, Huambo business district, Panyu District, Guangzhou, Guangdong.

Applicant before: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190816

Assignee: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000054

Denomination of invention: Processing method, device, computer equipment and storage medium of virtual asset data

License type: Common License

Record date: 20210208

EE01 Entry into force of recordation of patent licensing contract
GR01 Patent grant
GR01 Patent grant