Summary of the invention
The purpose of the present invention is intended at least can solve above-mentioned one of technological deficiency, especially fictitious assets data processing and imitates
The low technological deficiency of rate.
The present invention provides a kind of processing method of fictitious assets data, includes the following steps:
The fictitious assets data of user's transmission of each direct broadcasting room of live streaming platform are received by unified external interface
Processing request;Wherein the processing request carries the mission bit stream of request processing;
It is carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user opposite
The processing answered;
Fictitious assets data processed result is back to the user by the external interface, and according to the virtual money
Produce the fictitious assets data that data processed result updates the user.
In one embodiment, the processing request also carries user information;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user
Before the step of corresponding processing, further includes:
The mission bit stream in the processing request is extracted, school is carried out to the validity of the task type in the mission bit stream
It tests;
If the task type is effective, the legitimacy of the user information is verified.
In one embodiment, the processing request further includes the verifying encryption information of user's input;
The step of legitimacy of the verifying user information includes:
By the verifying encryption information of user's input and prestores encryption information and match;
If the verifying encryption information matches with the encryption information that prestores, determine that the user information is legal, it is no
Then return to the illegal response of the user information.
In one embodiment, the task type in the mission bit stream is that fictitious assets data distribute task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user
The step of corresponding processing, comprising:
The type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of the processing request;
Corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of the request distribution and quantity;
In the fictitious assets data for the corresponding types that the fictitious assets data to be allocated are added to the user.
In one embodiment, the task type in the mission bit stream is fictitious assets data consumption task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user
The step of corresponding processing, comprising:
The type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of the processing request, described in inspection
The type of fictitious assets data to be consumed and the legitimacy of quantity;
The fictitious assets data to be consumed of corresponding types and corresponding number are deducted from the fictitious assets of user.
In one embodiment, the step of the legitimacy of the type for examining the fictitious assets data to be consumed and quantity
Suddenly, comprising:
The type of the fictitious assets data to be consumed is verified;
If the type of the fictitious assets data to be consumed is effective, by the quantity of the fictitious assets data to be consumed and
The quantity of the fictitious assets data of user compares;
If the quantity of the fictitious assets data of user is not less than the quantity of the fictitious assets data to be consumed, sentence
The quantity of the fixed fictitious assets data to be consumed is legal.
In one embodiment, the task type in the mission bit stream is fictitious assets data migration task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user
The step of corresponding processing, comprising:
The quantity of fictitious assets data to be migrated is extracted from the mission bit stream of the processing request and receives the account of user
Family;
The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of the user;
The fictitious assets data to be migrated are increased in the account for receiving user.
In one embodiment, the task type in the mission bit stream is that fictitious assets data exchange task;
It is described to be carried out in response to the processing request and according to fictitious assets data of the mission bit stream to the user
The step of corresponding processing, comprising:
The first kind of user fictitious assets data to be exchanged is extracted from the mission bit stream of the processing request
With the first quantity;
Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of the user;
The fictitious assets data of the first kind of the first quantity are deducted from the fictitious assets data of user, and are increased
The fictitious assets data of the Second Type of second quantity.
In one embodiment, the Second Type and the second number for the fictitious assets data that the target for obtaining user is exchanged
The step of amount, comprising:
The Second Type of the fictitious assets data of the target exchange of user is extracted from the mission bit stream of the processing request;
It is obtained according to the first kind and the Second Type wait exchange between the fictitious assets data of target exchange
Exchange ratio;
According to first quantity and second quantity exchanged than calculating the fictitious assets data that target is exchanged.
A kind of processing unit of fictitious assets data, comprising:
Module is obtained, the void sent for receiving the user of each direct broadcasting room of live streaming platform by unified external interface
The processing request of quasi- asset data;Wherein the processing request carries the mission bit stream of request processing;
Processing module, for requesting and according to the mission bit stream in response to the processing to the fictitious assets of the user
Data carry out corresponding processing;
Update module, for fictitious assets data processed result to be back to the user by the external interface, and
The fictitious assets data of the user are updated according to the fictitious assets data processed result.
The present invention also provides a kind of computer equipment, including memory and processor, calculating is stored in the memory
Machine readable instruction, when the computer-readable instruction is executed by the processor, so that the processor executes such as any implementation
The step of processing method of the example fictitious assets data.
The present invention also provides a kind of storage mediums for being stored with computer-readable instruction, and the computer-readable instruction is by one
When a or multiple processors execute, so that one or more processors execute the processing of fictitious assets data described in any embodiment
The step of method.
Processing method, system, computer equipment and the storage medium of above-mentioned fictitious assets data pass through the external of unification
The processing request for the fictitious assets data that the user that each direct broadcasting room of platform is broadcast live in interface sends;In response to the processing
Request, and the mission bit stream of the request processing carried according to processing request carries out corresponding place to the fictitious assets data of user
Reason;Fictitious assets data processed result is back to the user by the external interface, and according to the fictitious assets number
The fictitious assets data that the user is updated according to processing result, by unified external interface and processing system to different types of
Fictitious assets data are handled, and can be effectively reduced the overlapping development work occurred in fictitious assets data handling procedure, be mentioned
High treatment efficiency.
The additional aspect of the present invention and advantage will be set forth in part in the description, these will become from the following description
Obviously, or practice through the invention is recognized.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, and for explaining only the invention, and is not construed as limiting the claims.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, " one
It is a ", " described " and "the" may also comprise plural form.It is to be further understood that being arranged used in specification of the invention
Diction " comprising " refer to that there are the feature, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition
Other one or more features, integer, step, operation, element, component and/or their group.
Those skilled in the art of the present technique are appreciated that unless otherwise defined, all terms used herein (including technology art
Language and scientific term), there is meaning identical with the general understanding of those of ordinary skill in fields of the present invention.Should also
Understand, those terms such as defined in the general dictionary, it should be understood that have in the context of the prior art
The consistent meaning of meaning, and unless idealization or meaning too formal otherwise will not be used by specific definitions as here
To explain.
The processing method of fictitious assets data provided by the present application, can be applied in application environment as shown in Figure 1.Base
The processing platform of fictitious assets data can be built in this method, which can permit on the server, and platform passes through unification
External interface receive live streaming platform each direct broadcasting room main broadcaster user and spectators user send fictitious assets data place
Reason request;Wherein processing request carries the mission bit stream of request processing;Server is requested in response to processing and is believed according to task
It ceases and corresponding processing is carried out to the fictitious assets data of user;Server passes through fictitious assets data processed result to external
Mouth is back to user, and the fictitious assets data of user are updated according to fictitious assets data processed result.For fictitious assets number
According to will be illustrated by taking the ideal money that the various businesses of current direct broadcasting room are related to as an example in following embodiment, such as vice card, gold
Coin, energy value, competition certificate etc..
Those skilled in the art of the present technique are appreciated that server used herein above can be with independent server either
The server cluster of multiple servers composition is realized.
The processing method of the fictitious assets data of the application in one embodiment can use a kind of software system of customization
Realized on system Vcoin system form server shown in Fig. 1, with fictitious assets data that various different business are related to it is unified into
Row processing, as shown in Fig. 2, Vcion system is divided into third party's operation layer, RPC (remote procedure call) channel layer, application service
Layer, storage and streaming computing layer, Vcion functions are specific as follows:
(1) third party's operation layer is the external business of all calling Vcoin services, the SDK that each business is provided by Vcoin
The calling of (Software Development Kit) in server API (application programming interface) related to user terminal initiation Vcoin service;
(2) RPC channel layer is protocol channel of third party's calling service using RPC request Vcoin service, passes through at present
The super agreement of Http (text transfer protocol) is supported in (network) prefecture Web, provides thrift agreement by the channel Service prefecture
(a kind of interface description language and binary system communications protocol);
(3) Vcoin application service cluster layer is the service layer for receiving each service request, across computer room deployment, third-party application
The Vcoin application service of same computer room is routed automatically to by RPC channel layer;Vcoin provides configuration management platform, third party simultaneously
The operation personnel of business can configure various ideal moneys and other service logic numbers within the scope of the service application having permission
According to;
(4) storage and real-time computation layer, Mysql (a kind of Relational DBMS) store perdurable data, lead to
Excessive library, the dynamic capacity-expanding for dividing table to realize data;Redis (a kind of database) stores the data cached of user account, improves and visits
Ask performance;Spark Stream (Stream Processing frame supports expansible, high-throughput, fault-tolerant real time data stream process) is real
When computing cluster be used to count the ranking list of each business, generate the real-time report of data, Mysql can be written in the data finally counted
And Redis, it is called for third party's service request.
In one embodiment, it as shown in figure 3, providing a kind of processing method of fictitious assets data, answers in this way
For being illustrated for the server in Fig. 1, may comprise steps of:
Step S202, the virtual money sent by the user that unified external interface receives each direct broadcasting room of live streaming platform
Produce the processing request of data;Wherein processing request carries the mission bit stream of request processing.
Wherein, the user of each direct broadcasting room includes the main broadcaster user and spectators user of direct broadcasting room;Mission bit stream includes request
The task type of processing, e.g. consumption task, task of transferring accounts, exchange task dispatching etc., each user can request to fictitious assets
Data such as are consumed, transferred accounts and are exchanged at the processing.
In the specific implementation process, server between unified external interface and each direct broadcasting room that platform is broadcast live by carrying out
Network connection, so that a variety of fictitious assets data to each direct broadcasting room are uniformly handled.
Step S204 is carried out corresponding in response to processing request and according to fictitious assets data of the mission bit stream to user
Processing.
Different mission bit streams is correspondingly arranged on different treatment processes.
By the task type in mission bit stream be fictitious assets data consumption task for, corresponding treatment process be from
The fictitious assets data that user need to consume are deducted in the fictitious assets data of user;Again for example when the task type in mission bit stream
For fictitious assets data transfer accounts task when, corresponding treatment process be the fictitious assets Data Migration to be transferred of user is arrived
In the fictitious assets data for receiving user.
In one embodiment, processing request also carries user information;As shown in figure 4, step S204 in response to place
Reason request and before carrying out corresponding processing to the fictitious assets data of user according to mission bit stream, further includes:
Step S203, the mission bit stream in extraction process request, carries out the validity of the task type in mission bit stream
Verification;If task type is effective, the legitimacy of user information is verified.
In this step, detailed process that the validity of task type is verified are as follows: inquiry is corresponding with user to be prestored
Task type, task type and the corresponding task type prestored of user will match in the mission bit stream of processing request,
When in processing request task type and the task type that prestores accordingly of user match when, determine that task type is effective;When
When the task type that task type and user in processing request prestore accordingly mismatches, then the invalid sound of task type is returned
It answers.
For example, the task type in the processing request of user is task of transferring accounts, prestoring for task corresponding with user is inquired
Type, the task type inquired includes exchange task, task dispatching of transferring accounts etc., then the task type in the processing request of user
Meet the task type of inquired user, i.e. user can request to carry out task of transferring accounts, then determine that user applies for processing
The task of transferring accounts is effective.
In one embodiment, processing request further includes the verifying encryption information of user's input;Verifying in step S203
The step of legitimacy of user information includes:
(1) it by the verifying encryption information of user's input and prestores encryption information and matches.
Wherein, the verifying encryption information of user's input can be the cryptogram form of number or letter, be also possible to face knowledge
Not, the cryptogram forms such as fingerprint recognition;Verifying encryption information is when can also be user's open-authentication, the identifying code etc. that real-time reception arrives
Form.
(2) if verifying encryption information matches with encryption information is prestored, determine that user information is legal, otherwise return to user
The illegal response of information.
Further, it when the task type for determining user's request is effective, needs to carry out further school to the identity of user
It tests, that is, examine the verifying encryption information of user's input and prestores whether encryption information matches;If the verifying of user's input encrypts letter
It ceases and prestores encryption information and match, that is, can determine that user information is legal;If user input verifying encryption information and prestore plus
Confidential information mismatches, then returns to the verifying illegal response of encryption information.
Fictitious assets data processed result is back to user by external interface by step S206, and according to fictitious assets
The fictitious assets data of data processed result update user.
The processing method of above-mentioned fictitious assets data receives each live streaming of live streaming platform by unified external interface
Between user send fictitious assets data processing request;For the mission bit stream of different request processing, to breath to user
Fictitious assets data carry out corresponding processing, consumption, distribution, migration and exchange of fictitious assets data etc. can be carried out
Then fictitious assets data processed result is back to user by external interface by different types of task, and according to virtual money
The fictitious assets data that data processed result updates user are produced, by unified external interface and processing system to different types of
Fictitious assets data are handled, and can be effectively reduced the overlapping development work occurred in fictitious assets data handling procedure, be mentioned
High treatment efficiency.
Embodiments described above illustrate by unified external interface and processing system to different types of fictitious assets data
The scheme handled.For the processing method of fictitious assets data, the virtual money of current multiple-task type can handle
Produce data, distribution, consumption, migration and exchange including fictitious assets data etc.;Above four kinds of task types are directed to, below will
Embodiment is further elaborated in conjunction with attached drawing.
Task is distributed for fictitious assets data;In a kind of implementation process, step S204's requests simultaneously in response to processing
Corresponding processing is carried out according to fictitious assets data of the mission bit stream to user, may include as follows:
(1) type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of processing request.
In the specific implementation process, whether the type for needing to verify the fictitious assets data of request distribution is legal, that is, verifies
Request whether the type of the fictitious assets data of distribution meets the fictitious assets data type prestored.
(2) corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of request distribution and quantity.
When the type of the fictitious assets data of request distribution is legal, then obtain corresponding fictitious assets data;Work as request
When the type of the fictitious assets data of distribution is illegal, then the illegal sound of fictitious assets data type of request distribution is returned
It answers.
(3) fictitious assets data to be allocated are added in the fictitious assets data of corresponding types of user.
It is illustrated below in conjunction with Fig. 5 process distributed fictitious assets data:
A, user is in business service side's transmission fictitious assets data distribution request to Vcoin application service, figure with biz generation
Table distribution request carries user information in request and requests the key of token, and Vcoin application service is virtual to request distribution
Asset data type is judged, when application message is invalid, returns to illegal, that is, the response being not present;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to
Business service side, and store in token to the Mysql database, business service side initiates the granting of fictitious assets data (distribution)
It requests, carries serial number (account information of user) in request, also carry token, verification business service side is sent
Whether the token cached in token with Mysql database is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent
In the presence of then whether the account of verification user is frozen;If the account of user is frozen, lost then fictitious assets data are sent
It loses;If the account of user is not frozen, then further carrying out air control verification to account;If the account of user is high risk
Account, then fictitious assets data granting (distribution) failure;
If d, the account of user freezes verification, air control verification by token verification, account, fictitious assets data are executed
Granting task, and local cache is updated, user cache is updated, asynchronous refresh Mysql database caches execute reconciliation, virtual to provide
Data distribution (granting) task is produced to complete.
In above-described embodiment, for the distribution task of fictitious assets data, the fictitious assets data of first verification request distribution
Type it is whether legal, when the fictitious assets data type of request distribution is legal, will request distribution fictitious assets data point
It is fitted in the fictitious assets data of the respective type of user, a variety of different types of fictitious assets data can be allocated,
Improve treatment effeciency.
For the consumption task of fictitious assets data, in a kind of implementation process, step S204's requests in response to processing
And corresponding processing is carried out according to fictitious assets data of the mission bit stream to user, comprising:
(1) type and quantity that fictitious assets data to be consumed are extracted from the mission bit stream of processing request, are examined wait disappear
Take the type of fictitious assets data and the legitimacy of quantity;
Specifically, examine fictitious assets data to be consumed type and quantity legitimacy the step of, comprising:
A, the type of fictitious assets data to be consumed is verified;
Likewise, whether the type for needing to verify the fictitious assets data of requesting consumption is effective, that is, verify requesting consumption
Whether the type of fictitious assets data meets the fictitious assets data type prestored.
If B, the type of fictitious assets data to be consumed is effective, by the quantity of fictitious assets data to be consumed and user
The quantity of fictitious assets data compares;
Because fictitious assets data needs to be consumed are deducted from the fictitious assets data of user, it can first verify
Whether the fictitious assets data of user are able to satisfy the condition for deducting fictitious assets data to be consumed.
If C, the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine wait disappear
The quantity for taking fictitious assets data is legal.
If the quantity of the fictitious assets data of user is less than the quantity of fictitious assets data to be consumed, void to be consumed is returned
The illegal response of quantity of quasi- asset data.
(2) the fictitious assets data to be consumed of corresponding types and corresponding number are deducted from the fictitious assets of user.
For example, user thinks that the lottery ticket of consumption 2000 is drawn a lottery, then first verifying this type of lottery ticket to be consumed
Whether effectively;When the type of lottery ticket this fictitious assets data is effective, the lottery ticket remaining sum verified in the account of user is
It is no to be greater than or equal to 2000, such as the lottery ticket remaining sum of user is 1500, then returning to the response that Sorry, your ticket has not enough value of user's lottery ticket.
It is illustrated below in conjunction with process of the Fig. 6 to fictitious assets data consumption:
A, user is in business service side's transmission fictitious assets data consumption request to Vcoin application service, figure with biz generation
Table consumer requests carry user information in request and request the key of token, and Vcoin application service is virtual to request distribution
Asset data type is judged, when application message is invalid, returns to illegal, that is, the response being not present;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to
Business service side, and store in token to the Mysql database, business service side initiates the request of fictitious assets data consumption, asks
Serial number is carried in asking, and is also carried token, is cached in token the and Mysql database that verification business service side is sent
Whether token is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent
In the presence of then whether the account of verification user is frozen;If the account of user is frozen, lost then fictitious assets data are sent
It loses;If the account of user is not frozen, then further carrying out air control verification to account;If the account of user is high risk
Account, then fictitious assets data consumption fails;
If d, the account of user freezes verification, air control verification by token verification, account, fictitious assets data are executed
Whether consumption task, the real-time balance for withholding to judge user by remaining sum can satisfy consumption;If Sorry, your ticket has not enough value, more than return
The insufficient response of volume, the failure of fictitious assets data consumption;
If e, remaining sum can satisfy consumption, consumption task is executed, and update local cache, more new user account caching is different
Step updates Mysql database caches, executes reconciliation, and fictitious assets data consumption task is completed.
In above-described embodiment, for the consumption task of fictitious assets data, the fictitious assets data of requesting consumption are first verified
Type it is whether legal, when the fictitious assets data type of requesting consumption is legal, judge whether remaining sum meets consumption, and execute
Consumption is deducted, and can be executed consumption task to a variety of different types of fictitious assets data, be improved treatment effeciency.For virtually providing
Data migration task is produced, in a kind of implementation process, step S204's is requested in response to processing and according to mission bit stream to user
Fictitious assets data carry out corresponding processing, comprising:
(1) quantity of fictitious assets data to be migrated is extracted from the mission bit stream of processing request and receives the account of user
Family;
(2) the fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;
(3) fictitious assets data to be migrated are increased in the account for receiving user.
Likewise, whether the type for needing to verify the fictitious assets data of request migration is effective, that is, verify request migration
Whether the type of fictitious assets data meets the fictitious assets data type prestored.
When request migration fictitious assets data type it is effective when, need first to verify user fictitious assets data whether
It is able to satisfy the condition for deducting fictitious assets data to be migrated, i.e. whether the quantity of the fictitious assets data of user is greater than void to be migrated
The quantity of quasi- asset data, when the quantity of the fictitious assets data of user is greater than or equal to the quantity of fictitious assets data to be migrated
When, execute migration task;When the quantity of the fictitious assets data of user is less than the quantity of fictitious assets data to be migrated, return
The illegal response of quantity of fictitious assets data to be migrated.
For example, user's first wants to shift 3000 energy values into the account of user's second, then first verifying energy value to be transferred
Whether this type is effective;When the type of energy value this fictitious assets data is effective, the energy in the account of user's first is verified
Whether magnitude remaining sum is greater than or equal to 3000, such as the energy value remaining sum of user's first is 5500, then from the energy value of user's first
Middle to deduct 3000, in the account for moving to user's second, the number of the energy value of user's first is updated to 2500.
It is illustrated below in conjunction with process of the Fig. 7 to fictitious assets Data Migration:
A, user sends (migration) request of transferring accounts of fictitious assets data in business service side and arrives Vcoin application service, in figure
(migration) request of transferring accounts is represented with biz, is carried user information in request and is requested the key of token, Vcoin application service pair
The fictitious assets data type of request distribution is judged, when application message is invalid, returns to illegal, that is, the sound being not present
It answers;
If b, application message is legal, Vcoin application service generates dynamic token (token), sends the token of generation to
Business service side, and store in token to the Mysql database, business service side initiates fictitious assets data and transfers accounts (migration)
It requests, serial number and token is carried in request, is cached in token the and Mysql database that verification business service side is sent
Whether token is consistent;
If c, the token that business service side is sent is not present, then providing failure;If the token that business service side is sent
In the presence of then whether the user that user and reception that verification initiation is transferred accounts transfer accounts is frozen;If the account of a certain user is frozen,
So fictitious assets data are transferred accounts unsuccessfully;If the account for the user that user and reception that initiation is transferred accounts transfer accounts is all no frozen,
The account of the user so further to transfer accounts to the user and reception that initiate to transfer accounts carries out air control verification;If the account of a certain user
For high risk account, then fictitious assets data are transferred accounts unsuccessfully;
If the account for the user that user and reception that d, initiation is transferred accounts transfer accounts freezes verification, wind by token verification, account
Control verification, then execute fictitious assets data and transfer accounts task, and whether the real-time balance for withholding to judge user by remaining sum can expire
Foot consumption;If Sorry, your ticket has not enough value, the response that Sorry, your ticket has not enough value, consumption failure are returned;
If e, remaining sum can satisfy consumption, number limitation of transferring accounts is inquired in Vcoin application service;If receiving the user to transfer accounts to connect
Number of being transferred accounts is more than limited number of times, then return to that number of transferring accounts transfinites system is responsive to business service side;What if reception was transferred accounts
User's number that receives to transfer accounts is not above limited number of times, and execution is transferred accounts task, and updates local cache, updates the use for initiating to transfer accounts
Family and the account caching for receiving the user to transfer accounts, asynchronous refresh Mysql database caches execute reconciliation, and fictitious assets data turn
Account (migration) task is completed.
In above-described embodiment, for the consumption task of fictitious assets data, the fictitious assets data of requesting consumption are first verified
Type it is whether legal, when the fictitious assets data type of requesting consumption is legal, the user that transfers accounts is initiated by token verification
Then identity judges whether the user for initiating to transfer accounts about meets and transfers accounts;If remaining sum satisfaction is transferred accounts, further verifying number of transferring accounts is
The no system of transfiniting, then executes the task of transferring accounts again, is held by unified Vcoin system to a variety of different types of fictitious assets data
Capable task of transferring accounts, improves treatment effeciency.
In another implementation process, task type can also exchange task for fictitious assets data;The sound of step S204
Corresponding processing should be carried out in processing request and according to fictitious assets data of the mission bit stream to user, comprising:
(1) first kind and first of user's fictitious assets data to be exchanged is extracted from the mission bit stream of processing request
Quantity;
(2) Second Type and the second quantity of the fictitious assets data of the target exchange of user are obtained;
In the specific implementation process, it obtains the Second Type for the fictitious assets data that target is exchanged and the second quantity is specifically wrapped
Include following steps:
A, the Second Type of the fictitious assets data of the target exchange of user is extracted from the mission bit stream of processing request;
B, it is obtained according to the first kind and Second Type wait exchange the exchange between the fictitious assets data of target exchange
Than;
C, the second quantity according to the first quantity and exchange than calculating the fictitious assets data that target is exchanged.
(3) the fictitious assets data of the first kind of the first quantity are deducted from the fictitious assets data of user, and are increased
The fictitious assets data of the Second Type of second quantity.
Likewise, needing first to verify the type of fictitious assets data to be exchanged and fictitious assets data that target is exchanged
Whether type is effective, when the type of type and target exchange fictitious assets data wait exchange fictitious assets data is all effective,
The target exchange fictitious assets that fictitious assets data to be exchanged can be exchanged into how much quantity is calculated again.
The above are the distribution of fictitious assets data, consumption, the embodiments for migrating and transferring accounts etc., through the foregoing embodiment can be with
Find out, technical solution of the present invention, by unified Vcoin system, a variety of different fictitious assets data can be executed and be divided
The multiple-tasks such as match, consume and transfer accounts, can be avoided and different fictitious assets data are respectively processed using multiple systems
The wasting of resources caused by and, and data-handling efficiency can be improved.
As shown in connection with fig. 8, the above method in order to better understand, one detailed below fictitious assets number of the invention
According to processing method application example:
1) user opens direct broadcasting room by user terminal, is sent by unified external interface 1000 gold coins converting to prize drawing
Certificate processes request to server;
2) after server receives redemption request, the type of gold coin to be exchanged and the lottery ticket class of target exchange are verified
Whether type is effective;
If 3) type of gold coin and lottery ticket is effective, dynamic token is sent to user terminal, receives the token that user terminal returns
It is verified;
4) token that if user returns is effective, the gold coin remaining sum of user and 1000 are compared;
If 5) the gold coin remaining sum of user is not less than 1000, calculating 1000 gold coins can exchange to obtain 500 lottery tickets;
6) the current gold coin remaining sum of user is deducted 1000, and the remaining sum of the lottery ticket of user is increased by 500;
7) the remaining sum modification information of gold coin and lottery ticket is sent to by external interface the direct broadcasting room of user.
In above-mentioned application example, whether the type for the lottery ticket that the type and target for first verifying gold coin to be exchanged are exchanged has
Effect verifies dynamic token if the type of gold coin and lottery ticket is effective;If token verification is effectively, gold coin remaining sum to be exchanged is calculated
Whether redemption of conditional is met;If gold coin remaining sum meets redemption of conditional, the exchange ratio between gold coin and lottery ticket is calculated, exchange is executed
Task;It is exchanged, is mentioned between a variety of different types of fictitious assets data by unified fictitious assets data processing system
High data-handling efficiency.
As shown in figure 9, Fig. 9 is the structural schematic diagram of the processing unit of fictitious assets data in one embodiment, this implementation
A kind of processing unit of fictitious assets data is provided in example, including obtains module 902, processing module 904 and update module 906,
Wherein:
Module 902 is obtained, is sent for receiving the user of each direct broadcasting room of live streaming platform by unified external interface
Fictitious assets data processing request;Wherein processing request carries the mission bit stream of request processing;
Processing module 904, for being carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
Corresponding processing;
Update module 906, for fictitious assets data processed result to be back to user by external interface, and according to void
Quasi- asset data processing result updates the fictitious assets data of user.
The specific restriction of processing unit about fictitious assets data may refer to above for fictitious assets data
The restriction of processing method, details are not described herein.Modules in the processing unit of above-mentioned fictitious assets data can whole or portion
Divide and is realized by software, hardware and combinations thereof.Above-mentioned each module can be embedded in the form of hardware or independently of computer equipment
In processor in, can also be stored in a software form in the memory in computer equipment, in order to processor calling hold
The corresponding operation of the above modules of row.
As shown in Figure 10, Figure 10 is the schematic diagram of internal structure of computer equipment in one embodiment.The computer equipment
Including processor, non-volatile memory medium, memory and the network interface connected by device bus.Wherein, the computer
The non-volatile memory medium of equipment is stored with operating device, database and computer-readable instruction, can be stored in database
Control information sequence when the computer-readable instruction is executed by processor, may make processor to realize a kind of fictitious assets data
Processing method.The processor of the computer equipment supports the fortune of entire computer equipment for providing calculating and control ability
Row.Computer-readable instruction can be stored in the memory of the computer equipment, which is executed by processor
When, it may make processor to execute a kind of processing method of fictitious assets data.The network interface of the computer equipment is used for and end
Hold connection communication.It will be understood by those skilled in the art that structure shown in Figure 10, only portion relevant to application scheme
The block diagram of separation structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer
Equipment may include perhaps combining certain components or with different component cloth than more or fewer components as shown in the figure
It sets.
In one embodiment it is proposed that a kind of computer equipment, computer equipment include memory, processor and storage
On a memory and the computer program that can run on a processor, processor realize following steps when executing computer program:
Pass through the processing request for the fictitious assets data that the user that unified external interface receives each direct broadcasting room of live streaming platform sends;
Wherein processing request carries the mission bit stream of request processing;In response to processing request and according to mission bit stream to the virtual of user
Asset data carries out corresponding processing;Fictitious assets data processed result is back to user by external interface, and according to
The fictitious assets data of fictitious assets data processed result update user.
Processing request also carries user information when processor executes computer program in one of the embodiments,;It rings
Before the step of should being requested in processing and carrying out corresponding processing according to fictitious assets data of the mission bit stream to user, also wrap
Include: the mission bit stream in extraction process request verifies the validity of the task type in mission bit stream;If task type
Effectively, then the legitimacy of user information is verified.
Processing request further includes the verifying of user's input when processor executes computer program in one of the embodiments,
Encryption information;The step of verifying the legitimacy of user information includes: by the verifying encryption information of user's input and to prestore encryption letter
Breath is matched;If verifying encryption information matches with encryption information is prestored, determines that user information is legal, otherwise return to user
The illegal response of information.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money
It produces data and distributes task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
The step of reason, comprising: the type and quantity of the fictitious assets data of request distribution are extracted from the mission bit stream of processing request;Root
Corresponding fictitious assets to be allocated is obtained according to the type and quantity of the fictitious assets data of request distribution;By fictitious assets to be allocated
Data are added in the fictitious assets data of the corresponding types of user.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money
Produce data consumption task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
The step of reason, comprising: the type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of processing request, examine to
Consume the type of fictitious assets data and the legitimacy of quantity;Corresponding types and corresponding number are deducted from the fictitious assets of user
Fictitious assets data to be consumed.
The type of fictitious assets data to be consumed is examined when processor executes computer program in one of the embodiments,
The step of with the legitimacy of quantity, comprising: the type of fictitious assets data to be consumed is verified;If fictitious assets to be consumed
The type of data is effective, then carries out the quantity of the quantity of fictitious assets data to be consumed and the fictitious assets data of user pair
Than;If the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine to be consumed virtual
The quantity of asset data is legal.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money
Produce data migration task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
The step of reason, comprising: extract the quantity of fictitious assets data to be migrated from the mission bit stream of processing request and receive user's
Account;The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;By fictitious assets to be migrated
Data increase in the account for receiving user.
Task type when processor executes computer program in one of the embodiments, in mission bit stream is virtual money
It produces data and exchanges task;Corresponding place is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
The step of reason, comprising: extracted from the mission bit stream of processing request user's fictitious assets data to be exchanged the first kind and
First quantity;Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of user;From the virtual money of user
The fictitious assets data for deducting the first kind of the first quantity in data are produced, and increase the virtual money of the Second Type of the second quantity
Produce data.
The fictitious assets that the target of user is exchanged is obtained when processor executes computer program in one of the embodiments,
The step of Second Type and the second quantity of data, comprising: the target that user is extracted from the mission bit stream of processing request is exchanged
Fictitious assets data Second Type;It is obtained according to the first kind and Second Type wait exchange the fictitious assets exchanged with target
Exchange ratio between data;According to the first quantity and exchange the second quantity than calculating the fictitious assets data that target is exchanged.
In one embodiment it is proposed that a kind of storage medium for being stored with computer-readable instruction, this is computer-readable
When instruction is executed by one or more processors, so that one or more processors execute following steps: passing through the external of unification
The processing request for the fictitious assets data that the user that each direct broadcasting room of platform is broadcast live in interface sends;Wherein processing request is taken
Mission bit stream with request processing;Phase is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user
Corresponding processing;Fictitious assets data processed result is back to user by external interface, and according to fictitious assets data at
Manage the fictitious assets data that result updates user.
Processing request also carries user's letter when computer-readable instruction is executed by processor in one of the embodiments,
Breath;The step of in response to processing request and corresponding processing is carried out to the fictitious assets data of user according to mission bit stream it
Before, further includes: the mission bit stream in extraction process request verifies the validity of the task type in mission bit stream;If
Task type is effective, then verifies the legitimacy of user information.
Processing request further includes user's input when computer-readable instruction is executed by processor in one of the embodiments,
Verifying encryption information;The step of verifying the legitimacy of user information includes: by the verifying encryption information of user's input and to prestore
Encryption information is matched;If verifying encryption information matches with encryption information is prestored, determines that user information is legal, otherwise return
Return the illegal response of user information.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is
Fictitious assets data distribute task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite
The step of processing answered, comprising: from processing request mission bit stream in extract request distribution fictitious assets data type and
Quantity;Corresponding fictitious assets to be allocated is obtained according to the type of the fictitious assets data of request distribution and quantity;It will be to be allocated
Fictitious assets data are added in the fictitious assets data of the corresponding types of user.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is
Fictitious assets data consumption task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite
The step of processing answered, comprising: the type and quantity of fictitious assets data to be consumed are extracted from the mission bit stream of processing request,
Examine the type of fictitious assets data to be consumed and the legitimacy of quantity;Corresponding types and right are deducted from the fictitious assets of user
Answer the fictitious assets data to be consumed of quantity.
Fictitious assets data to be consumed are examined when computer-readable instruction is executed by processor in one of the embodiments,
Type and quantity legitimacy the step of, comprising: the type of fictitious assets data to be consumed is verified;If void to be consumed
The type of quasi- asset data is effective, then by the quantity of the quantity of fictitious assets data to be consumed and the fictitious assets data of user into
Row comparison;If the quantity of the fictitious assets data of user is not less than the quantity of fictitious assets data to be consumed, determine to be consumed
The quantity of fictitious assets data is legal.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is
Fictitious assets data migration task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite
The step of processing answered, comprising: the quantity and reception of fictitious assets data to be migrated are extracted from the mission bit stream of processing request
The account of user;The fictitious assets data to be migrated of corresponding number are deducted from the fictitious assets data of user;By void to be migrated
Quasi- asset data increases in the account for receiving user.
Task type when computer-readable instruction is executed by processor in one of the embodiments, in mission bit stream is
Fictitious assets data exchange task;It is carried out in response to processing request and according to fictitious assets data of the mission bit stream to user opposite
The step of processing answered, comprising: the first of user's fictitious assets data to be exchanged is extracted from the mission bit stream of processing request
Type and the first quantity;Obtain the Second Type and the second quantity of the fictitious assets data of the target exchange of user;From user's
The fictitious assets data of the first kind of the first quantity are deducted in fictitious assets data, and increase the Second Type of the second quantity
Fictitious assets data.
The void that the target of user is exchanged is obtained when computer-readable instruction is executed by processor in one of the embodiments,
The step of Second Type and the second quantity of quasi- asset data, comprising: the mesh of user is extracted from the mission bit stream of processing request
Mark the Second Type for the fictitious assets data exchanged;It is obtained according to the first kind and Second Type wait exchange the void exchanged with target
Exchange ratio between quasi- asset data;According to the first quantity and exchange the second number than calculating the fictitious assets data that target is exchanged
Amount.
It should be understood that although each step in the flow chart of attached drawing is successively shown according to the instruction of arrow,
These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
Execution there is no stringent sequences to limit, can execute in the other order.Moreover, at least one in the flow chart of attached drawing
Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps
Completion is executed, but can be executed at different times, execution sequence, which is also not necessarily, successively to be carried out, but can be with other
At least part of the sub-step or stage of step or other steps executes in turn or alternately.
The above is only some embodiments of the invention, it is noted that those skilled in the art are come
It says, various improvements and modifications may be made without departing from the principle of the present invention, these improvements and modifications also should be regarded as
Protection scope of the present invention.