Virtual object control method and apparatus, device, and storage medium

ABSTRACT

This application provides a virtual object control method performed by a computer device. The method includes: displaying a virtual battle interface; obtaining a first operation signal corresponding to a function triggering control; and receiving a first trigger operation on the function triggering control, and determining a first virtual object in n virtual objects as an attack target based on operation information of the first trigger operation when the first trigger operation meets an activation condition. According to the technical solutions provided in the embodiments of this application, an attack target is directly determined by using a target aiming function of a function triggering control and attribute information of an operation signal, thereby providing the attack target with directivity and stability for different virtual scenes.

CROSS-REFERENCE TO RELATED APPLICATIONS

This application is a continuation application of PCT Patent ApplicationNo. PCT/CN2021/078458, entitled “VIRTUAL OBJECT CONTROL METHOD ANDAPPARATUS, DEVICE, AND STORAGE MEDIUM” filed on Mar. 1, 2021, whichclaims priority to Chinese Patent Application No. 202010297051.0, filedwith the State Intellectual Property Office of the People's Republic ofChina on Apr. 15, 2020, and entitled “VIRTUAL OBJECT CONTROL METHOD ANDAPPARATUS, DEVICE, AND STORAGE MEDIUM”, all of which are incorporatedherein by reference in their entirety.

FIELD OF THE TECHNOLOGY

Embodiments of this application relate to the field of computertechnologies, and in particular, to a virtual object control method andapparatus, a device, and a storage medium.

BACKGROUND OF THE DISCLOSURE

A battle game is a game in which a plurality of user accounts compete inthe same scene. For example, the battle game may be a multiplayer onlinebattle arena (MOBA) game.

In the related art, during a game battle, a target virtual object issearched for in real time according to a preset enemy selection rule andused as an attack target. Each time a target virtual object isdetermined in real time according to a virtual scene at the current timepoint, and target virtual objects determined in different virtual scenesmay be different. As such, a target selection result according to therelated art does not have directivity and stability.

SUMMARY

Embodiments of this application provide a virtual object control methodand apparatus, a device, and a storage medium, to provide a targetselection result with directivity and stability. The technical solutionsare as follows:

According to an aspect, an embodiment of this application provides avirtual object control method performed by a computer device, the methodincluding:

displaying a virtual battle interface, the virtual battle interfaceincluding n virtual objects and a function triggering control, thefunction triggering control being configured to trigger an attackfunction against one of the virtual objects, n being a positive integer;

receiving a first trigger operation on the function triggering control;and

determining a first virtual object in the n virtual objects as an attacktarget based on operation information of the first trigger operationwhen the first trigger operation meets an activation condition, theoperation information being information obtained based on an activatedtarget aiming function associated with the function triggering control,the target aiming function being used for selecting an attack virtualtarget for the attack function.

According to another aspect, an embodiment of this application providesa computer device, including a processor and a memory, the memorystoring at least one program, the at least one program being loaded andexecuted by the processor to implement the virtual object control methoddescribed in the foregoing aspect.

The computer device includes a terminal and a server.

According to another aspect, an embodiment of this application providesa non-transitory computer-readable storage medium, storing at least oneprogram, the at least one program being loaded and executed by aprocessor of a computer device to implement the virtual object controlmethod described in the foregoing aspect.

The technical solutions provided in the embodiments of this applicationmay include the following beneficial effects:

A virtual object used as an attack target is determined from a pluralityof virtual objects by activating a target aiming function of a functiontriggering control and according to attribute information of anoperation signal associated with the function triggering control.Compared with the related art in which each time a target virtual objectis determined in real time according to a virtual scene at the currenttime point, and target virtual objects determined in different virtualscenes may be different, according to the technical solutions providedin the embodiments of this application, the attack target is directlydetermined by using the target aiming function of the functiontriggering control and the attribute information of the operationsignal, so that the determined attack target can be kept unchanged fordifferent virtual scenes, thereby providing the attack target withdirectivity and stability.

BRIEF DESCRIPTION OF THE DRAWINGS

To describe the technical solutions in embodiments of this applicationmore clearly, the following briefly describes the accompanying drawingsrequired for describing the embodiments. Apparently, the accompanyingdrawings in the following description show merely some embodiments ofthis application, and a person of ordinary skill in the art may stillderive other accompanying drawings from these accompanying drawingswithout creative efforts.

FIG. 1 is a schematic diagram of an implementation environment accordingto an embodiment of this application.

FIG. 2 is a schematic structural diagram of a terminal according to anembodiment of this application.

FIG. 3 is a flowchart of a virtual object control method according to anembodiment of this application.

FIG. 4 is an exemplary schematic diagram of a function triggeringcontrol according to this application.

FIG. 5 is an exemplary schematic diagram of a virtual battle interfaceaccording to this application.

FIG. 6 is a flowchart of a virtual object control method according toanother embodiment of this application.

FIG. 7 is an exemplary schematic diagram of another virtual battleinterface according to this application.

FIG. 8 is an exemplary schematic diagram of a target cancellationcontrol according to this application.

FIG. 9 is an exemplary schematic diagram of still another virtual battleinterface according to this application.

FIG. 10 is an exemplary schematic diagram of still another virtualbattle interface according to this application.

FIG. 11 is an exemplary flowchart of a virtual object control methodaccording to an embodiment of this application.

FIG. 12 is an exemplary flowchart of a virtual object control methodaccording to another embodiment of this application.

FIG. 13 is a block diagram of an attack target determining apparatusaccording to an embodiment of this application.

FIG. 14 is a block diagram of an attack target determining apparatusaccording to another embodiment of this application.

FIG. 15 is a structural block diagram of a terminal according to anembodiment of this application.

FIG. 16 is a schematic structural diagram of a server according to anembodiment of this application.

DESCRIPTION OF EMBODIMENTS

To make objectives, technical solutions, and advantages of thisapplication clearer, the following further describes implementations ofthis application in detail with reference to the accompanying drawings.

First, terms involved in the embodiments of this application are brieflyintroduced as follows:

1. Virtual Scene

A virtual scene may also be referred to as a virtual environment, and isa scene displayed (or provided) when a client of an application (such asa game application) runs on a terminal. The virtual scene refers to ascene created for a virtual object to perform activities (such as gamecompetition). The virtual scene may be, for example, a virtual house, avirtual island, or a virtual map. The virtual scene may be a simulatedscene of the real world, or may be a semi-simulated semi-fictionalscene, or may be an entirely fictional scene. The virtual scene may be atwo-dimensional virtual scene, a 2.5-dimensional virtual scene, or athree-dimensional virtual scene. This is not limited in the embodimentsof this application.

2. Virtual Object

A virtual object is a virtual character controlled by a user account inan application. For example, the application is a game application. Thevirtual object is a game character controlled by the user account in thegame application. The virtual object may be in a human form or animal,cartoon, or other forms. This is not limited in the embodiments of thisapplication. The virtual object may be presented in a three-dimensionalform or a two-dimensional form. This is not limited in the embodimentsof this application.

In different game applications, operations that can be performed by thevirtual object controlled by the user account may be different. Forexample, in a shooting game application, the user account may controlthe virtual object to perform operations such as shooting, running,jumping, gun picking up, gun replacing, and bullet loading.

Certainly, in addition to the game applications, the virtual object mayalso be presented to a user and provided with a corresponding functionin applications of another type, for example, an augmented reality (AR)application, a social application, or an interactive entertainmentapplication. This is not limited in the embodiments of this application.Besides, the form and corresponding function of the virtual object varywith different applications, and may be preset according to an actualrequirement. This is not limited in the embodiments of this application.

3. Ordinary Attack

An attack is a case in which a virtual object in a virtual environmenttriggers a function of another virtual object to cause attribute valuesof the another virtual object to change. For example, attribute valuesof virtual objects include hit points, and an attack is a case in whichafter a virtual object triggers a function of another virtual object,resulting a decrease in hit points of the virtual object whose functionis triggered. An ordinary attack is an attack manner carried by virtualobjects by default in a virtual scene. That is, the ordinary attack doesnot need to be triggered through skill configuration, and no additionalattributes such as an energy value and a mana value need to be consumedduring the triggering. In some embodiments, the ordinary attack does nothave a cooldown time, and can be continuously triggered. In someembodiments, a virtual object can also trigger a skill attack in avirtual scene, and an attack impact produced by the skill attack isgreater than that produced by the ordinary attack.

FIG. 1 is a schematic diagram of an implementation environment accordingto an embodiment of this application. The implementation environment mayinclude a terminal 10 and a server 20.

The terminal 10 may be a mobile phone, a personal computer, a tabletcomputer, an e-book reader, a video game console, a Moving PictureExperts Group Audio Layer IV (MP4) player, or the like.

A client of a game application, for example, a client of a shooting gameapplication, may be installed in the terminal 10. The shooting gameapplication may be any one of a first-person shooting (FPS) gameapplication, a third-person shooting (TPS) game application, a MOBA gameapplication, a multiplayer gunfight survival game application, and thelike. In some embodiments, the game application may be a standaloneapplication, such as a standalone 3D game application, or may be anetwork online application.

The server 20 is configured to provide a backend service to a client ofan application (for example, a game application) in the terminal 10. Forexample, the server 20 may be a backend server of the application (forexample, the game application). The server 20 may be one server, aserver cluster including a plurality of servers, or a cloud computingservice center.

The terminal 10 may communicate with the server 20 through a network 30.The network 30 may be a wired network or a wireless network.

In the method embodiments of this application, an execution entity ofeach step may be a terminal. FIG. 2 is a schematic structural diagram ofa terminal according to an embodiment of this application. The terminal10 may include a mainboard 110, an external output/input device 120, amemory 130, an external interface 140, a touch system 150, and a powersupply 160.

Processing elements such as a processor and a controller are integratedin the mainboard 110.

The external output/input device 120 may include a display component(for example, a display screen), a sound playback component (forexample, a speaker), a sound collecting component (for example, amicrophone), and various buttons.

The memory 130 stores program code and data.

The external interface 140 may include an earphone interface, a charginginterface, a data interface, and the like.

The touch system 150 may be integrated in the display component or thebuttons of the external output/input device 120, and the touch system150 is configured to detect touch operations performed by a user on thedisplay component or the buttons.

The power supply 160 is configured to supply power to other componentsin the terminal 10.

In the embodiments of this application, the processor in the mainboard110 may generate a user interface (UI) (for example, a game interface)by executing or invoking the program code and data stored in the memory,and present the generated UI (for example, the game interface) by usingthe external output/input device 120. During presentation of the UI (forexample, the game interface), a touch operation performed duringinteraction between the user and the UI (for example, the gameinterface) may be detected by using the touch system 150, and a responseis made to the touch operation.

The technical solutions of this application are described below by usingseveral embodiments.

FIG. 3 is a flowchart of a virtual object control method according to anembodiment of this application. An example in which the method isapplied to the terminal shown in FIG. 1 is used for description. Forexample, the method is applied to a game application installed andrunning on the terminal. The method includes the following steps:

Step 301: Display a virtual battle interface.

In some embodiments, a user runs the game application installed in theterminal. The virtual battle interface is displayed in the gameapplication. The virtual battle interface is configured to display aninteraction game environment provided by the game for the user tocontrol a virtual object. That is, the virtual battle interface is agame battle interface displayed in the game application.

The virtual battle interface includes a virtual environment pictureobtained by observing a virtual environment and a control layer on thevirtual environment picture. The virtual environment picture includes nvirtual objects in a game scene, n being a positive integer. The controllayer includes a function triggering control. In some embodiments, thefunction triggering control is configured to trigger an ordinary attackagainst a virtual object. The function triggering control is configuredto trigger an ordinary attack of a main controlled virtual objectagainst another virtual object. The main controlled virtual object is avirtual object controlled by the current terminal.

In some embodiments, the virtual environment picture further includesother elements in the virtual environment, such as a virtual building, avirtual prop, and a virtual item. The control layer further includesother operation controls such as a joystick control and a skill castingcontrol. The joystick control is an operation control configured tocontrol the main controlled virtual object to move. The skill castingcontrol is an operation control configured to control the maincontrolled virtual object to cast a skill. There may be a plurality ofskill casting controls.

In some embodiments, the n virtual objects are divided into differentteams (or camps, groups, or the like). Virtual objects belonging todifferent teams are hostile to each other. Conversely, virtual objectsbelonging to the same team are teammates to each other. For example, 10users participate the same game battle, and the 10 users may form aplurality of different teams. For example, each team may include fiveusers. For a team, virtual objects controlled by five users in the teamare hostile to virtual objects controlled by users in the other team.Conversely, the virtual objects controlled by the five users in the teamare teammates to each other.

Step 302: Receive a first trigger operation on the function triggeringcontrol.

In some embodiments, the user operates the function triggering controlin the virtual battle interface. Correspondingly, the game applicationobtains an operation signal corresponding to the function triggeringcontrol.

In some embodiments, the first trigger operation includes at least oneof a single-click/tap operation, double-click/tap operation, a pressoperation, a drag operation, a slide operation, and the like. This isnot limited in this embodiment of this application.

Step 303: Determine a first virtual object in the n virtual objects asan attack target based on operation information of the first triggeroperation when the first trigger operation meets an activationcondition.

In some embodiments, when the first trigger operation is received, atarget aiming function is activated when the first trigger operationmeets the activation condition. That is, the operation information isinformation obtained based on the activated target aiming function. Thetarget aiming function is used for selecting an attack target for anordinary attack. Aiming is a process of providing an attack withdirectivity during the attack in the virtual environment. The aiming maybe performed for a virtual object in the virtual environment, that is,the main controlled virtual object specifies a direction or an objectbefore an attack. Alternatively, the aiming may be performed for avirtual item in the virtual environment, that is, the main controlledvirtual object specifies a virtual item to be attacked. A target for theattack is not limited in this embodiment of this application. In thisembodiment of this application, the target aiming function is used forspecifying an object before an attack, that is, clearly specifying avirtual object to which the attack points. The target aiming functionmay target one or at least two virtual objects. This is not limited inthis embodiment of this application.

In some embodiments, the function triggering control includes anactivation region and an aiming region. When a touch operation of theuser on the function triggering control is within the activation region,the function triggering control can be activated for use; and when thetouch operation of the user on the function triggering control isoutside the activation region and within the aiming region, the targetaiming function of the function triggering control can be used. That is,the first virtual object is determined as the attack target based on theoperation information of the first trigger operation when an operationposition of the first trigger operation is moved from the activationregion to the aiming region.

In some embodiments, the activation region and the aiming region are twoconcentric circles, and a diameter of a circle corresponding to theactivation region is less than a diameter of a circle corresponding tothe aiming region. That is, the activation region is an inner circle inthe concentric circles, and the aiming region is an annular region of anouter circle corresponding to the concentric circles.

For example, FIG. 4 is an exemplary schematic diagram of a functiontriggering control. The function triggering control may include anactivation region 41 and an aiming region 42. As shown in a part (a) inFIG. 4, when the user touches the activation region with a finger, thefunction triggering control may be activated for use. As shown in a part(b) in FIG. 4, when the user touches a position outside the activationregion 41 and within the aiming region 42 with a finger, the targetaiming function of the function triggering control can be used.

In this case, that the target aiming function is activated when a firstoperation signal meets the condition may include: activating the targetaiming function of the function triggering control when the firstoperation signal is moved from the activation region to the aimingregion. In other words, when the finger of the user slides from theactivation region to the aiming region, the target aiming function isactivated.

After the target aiming function of the function triggering control isactivated, the first virtual object is determined from the n virtualobjects as an attack target for an ordinary attack according tooperation information of the first trigger operation. The operationinformation of the first trigger operation is used for indicatingrelated information corresponding to the first trigger operation, forexample, direction information of the first trigger operation.

The first virtual object is a virtual object hostile to a maincontrolled virtual object controlled by a target user account.

In a possible implementation, the determining a first virtual object inthe n virtual objects as an attack target based on operation informationof the first trigger operation may include the following steps:

(1) displaying a target selection region in the virtual battle interfacebased on the direction information of the first trigger operation; and

(2) determining the first virtual object within the target selectionregion as the attack target when the first trigger operation ends.

The direction information is a direction of a real-time touch point ofthe first operation signal relative to a center point of the functiontriggering control. The real-time touch point is a touch point of theuser on the virtual battle interface in real time. After obtaining thedirection information of the first trigger operation, a client maydetermine the target selection region according to the direction of thereal-time touch point relative to the center point of the functiontriggering control that is indicated by the direction information, anddisplay the target selection region in the virtual battle interface. Thetarget selection region is a region used for selecting an attack target.

Subsequently, when it is detected that the first trigger operation ends,that is, the finger of the user leaves a screen of the terminal, theclient directly determines the first virtual object in the targetselection region as the attack target.

For example, FIG. 5 is an exemplary schematic diagram of a virtualbattle interface. In the virtual battle interface 50, the directioninformation of the first trigger operation is a direction of thereal-time touch point 51 of the first trigger operation relative to thecenter point 52 of the function triggering control. The target selectionregion 53 may be displayed in the virtual battle interface 50 accordingto the direction information. Subsequently, the finger of the userleaves the screen of the terminal, and the clients detects that thefirst trigger operation ends, and determines the first virtual object 54in the target selection region 53 as the attack target.

In another possible implementation, the determining a first virtualobject in the n virtual objects as an attack target based on operationinformation of the first trigger operation includes: determining anoperation type of the first trigger operation; and determining the firstvirtual object in the n virtual objects as the attack target accordingto the operation type.

The operation type may include a single-click/tap operation,double-click/tap operation, a press operation, a drag operation, a slideoperation, and the like. Different types of operations correspond todifferent manners of determining an attack target. For example, when theoperation type is a double-click/tap operation, a virtual object closestto a target virtual object is selected and determined as an attacktarget; and when the operation type is a press operation, a virtualobject having lowest hit points is selected and determined as an attacktarget.

In still another possible implementation, the determining a firstvirtual object in the n virtual objects as an attack target based onoperation information of the first trigger operation may include:determining a quantity of operation times of the first triggeroperation; and determining the first virtual object in the n virtualobjects as the attack target according to the quantity of operationtimes.

The quantity of operation times is a quantity of operation comboscorresponding to the first trigger operation. When a quantity of thecombos is different, a virtual object selected as an attack target isalso different. For example, when a quantity of the combos is two, avirtual object closest to the target virtual object is selected anddetermined as an attack target; and when a quantity of the combos isthree, a virtual object relatively close to the target virtual object isselected and determined as an attack target.

In still another possible implementation, the determining a firstvirtual object in the n virtual objects as an attack target based onoperation information of the first trigger operation may include:determining press information of the first trigger operation; anddetermining the first virtual object in the n virtual objects as theattack target according to the press information.

The press information may include a pressing pressure value. When thepressure value is in a different pressure range, a virtual objectselected as an attack target is also different. For example, when thepressure value is in a first pressure range, a virtual object closest tothe target virtual object is selected and determined as an attacktarget; and when the pressure value is in a second pressure range, avirtual object relatively close to the target virtual object is selectedand determined as an attack target.

In still another possible implementation, the determining a firstvirtual object in the n virtual objects as an attack target based onoperation information of the first trigger operation may include:determining duration information of the first trigger operation; anddetermining the first virtual object in the n virtual objects as theattack target according to the duration information.

The duration information is an operation press duration corresponding tothe first trigger operation. When the press duration is different, avirtual object selected as an attack target is also different. Forexample, when the press duration is longer than 0 and shorter than afirst duration, a virtual object closest to the target virtual object isselected and determined as an attack target; and when the press durationis longer than the first duration and shorter than a second duration, avirtual object relatively close to the target virtual object is selectedand determined as an attack target.

In some other possible implementations, the determining a first virtualobject in the n virtual objects as an attack target based on operationinformation of the first trigger operation may be in another manner.This is not limited in this embodiment of this application.

In some embodiments, when the target selection region includes aplurality of virtual objects, the client may determine all the pluralityof virtual objects as attack targets, or may select one virtual objectfrom the plurality of virtual objects and determine the virtual objectas an attack target. When one virtual object is selected from theplurality of virtual objects and determined as an attack target, any oneof the following selection manners may be used: determining a virtualobject having lowest hit points in the plurality of virtual objects isdetermined as an attack target, and a virtual object closest to thetarget virtual object in the plurality of virtual objects is determinedas an attack target. The target virtual object is a virtual objectcorresponding to the target user account, a virtual object is randomlyselected from the plurality of virtual objects as an attack target, andthe like. The selection manner is not limited in this embodiment of thisapplication.

For example, the target selection region is an arc-shaped region with aposition of a target virtual object as a vertex, and a center linedirection of the target selection region corresponds to the directioninformation.

The target virtual object is a virtual object corresponding to(controlled by) a target user account. The target user account may be auser account logged in to in the client.

In this case, the target selection region may be arc-shaped, and takes aposition of the target virtual object as a vertex. A center linedirection of the arc shape corresponds to the direction information,that is, the direction of the real-time touch point of the first triggeroperation relative to the center point of the function triggeringcontrol.

The arc shape may be a fan shape, fan ring, or the like. In some otherexamples, the target selection region may alternatively be sword-shapedor other shapes. This is not limited in this embodiment of thisapplication.

For example, as shown in FIG. 5, the target selection region 53 isfan-shaped, and a center line direction 55 of the target selectionregion corresponds to the direction information 56.

In another example, a relative direction between a center point of thetarget selection region and the position of the target virtual objectcorresponds to the direction information, and a distance between thecenter point of the target selection region and the position of thetarget virtual object corresponds to a distance between the real-timetouch point and the center point of the function triggering control.

In this case, the target selection region may be a closed pattern, suchas a circle or a polygon. The relative direction between the centerpoint of the target selection region and the position of the targetvirtual object corresponds to the direction information, that is, thedirection of the real-time touch point of the first trigger operationrelative to the center point of the function triggering control. Inaddition, a distance between the center point of the target selectionregion and the position of the target virtual object corresponds to adistance between the real-time touch point and the center point of thefunction triggering control. For example, a ratio of the distancebetween the center point of the target selection region and the positionof the target virtual object to the distance between the real-time touchpoint and the center point of the function triggering control is a fixedvalue.

After the distance between the real-time touch point and the centerpoint of the function triggering control is greater than a specifieddistance, the distance between the center point of the target selectionregion and the position of the target virtual object no longer varieswith the distance between the real-time touch point and the center pointof the function triggering control.

Based on the above, according to the technical solution provided in thisembodiment of this application, a virtual object used as an attacktarget is determined from a plurality of virtual objects by activating atarget aiming function of a function triggering control and according toattribute information of an operation signal. Compared with the relatedart in which each time a target virtual object is determined in realtime according to a virtual scene at the current time point, and targetvirtual objects determined in different virtual scenes may be different,according to the technical solution provided in this embodiment of thisapplication, the attack target is directly determined by using thetarget aiming function of the function triggering control and theattribute information of the operation signal, so that the determinedattack target can be kept unchanged for different virtual scenes,thereby providing the attack target with directivity and stability.

FIG. 6 is a flowchart of a virtual object control method according toanother embodiment of this application. An example in which the methodis applied to the terminal shown in FIG. 1 is used for description. Asshown in FIG. 6, the method includes the following steps:

Step 601: Display a virtual battle interface.

This step is the same as or similar to the content of step 301 in theforegoing embodiment of FIG. 3, and therefore details are not describedherein again.

The virtual battle interface includes a virtual environment picture anda control layer on the virtual environment picture. The virtualenvironment picture includes n virtual objects in a game scene, n beinga positive integer. The control layer includes a function triggeringcontrol. The function triggering control is configured to trigger anordinary attack of a virtual object.

Step 602: Determine m candidate virtual objects meeting a selectioncondition from the n virtual objects, m being a positive integer, andm≤n.

A client detects virtual objects meeting the selection condition in then virtual objects, and determines the virtual objects meeting theselection condition as candidate virtual objects.

The selection condition includes: a virtual object is alive, the virtualobject is not in the virtual battle interface, and a distance betweenthe virtual object and a target virtual object is greater than a presetdistance, the target virtual object being a virtual object correspondingto a target user account.

In other words, when the virtual object is alive and enters a certainrange near the target virtual object, and there is a field of view ofthe virtual object in the virtual battle interface, the virtual objectmay be determined as a candidate virtual object.

Step 603: Display identifiers of the m candidate virtual objects.

After the candidate virtual objects meeting the selection condition aredetermined, the identifiers of the candidate virtual objects aredisplayed in the virtual battle interface. The identifier of thecandidate virtual object is used for uniquely identifying the virtualobject.

For example, the identifier of the candidate virtual object may be anavatar of the candidate virtual object. In some other examples, theidentifier of the candidate virtual object may be other information.This is not limited in this embodiment of this application.

For example, FIG. 7 is an exemplary schematic diagram of another virtualbattle interface. An avatar 71 of a candidate virtual object may bedisplayed in the virtual battle interface 50.

Step 604: Receive a selection signal for an identifier of a secondvirtual object in the m candidate virtual objects.

After the identifiers of the m candidate virtual objects are determinedand displayed, a user may perform selection from the m candidate virtualobjects. For example, the user may click an avatar of a candidatevirtual object (the second virtual object) in the m candidate virtualobjects, to trigger the selection signal.

Step 605: Determine the second virtual object as an attack target.

Correspondingly, after obtaining the selection signal corresponding tothe second virtual object, the client directly determines the secondvirtual object as an attack target.

Based on the above, according to the technical solution provided in thisembodiment of this application, after identifiers of candidate virtualobjects are displayed, and a selection signal corresponding to anidentifier of a virtual object in the candidate virtual objects isobtained, the virtual object is directly determined as an attack target.Compared with the related art in which a target virtual object isdetermined in real time according to a virtual scene at the current timepoint, and target virtual objects determined in different virtual scenesmay be different, according to the technical solution provided in thisembodiment of this application, the user directly selects the attacktarget in a virtual battle interface by selecting the identifier of thevirtual object, thereby ensuring accuracy of attack selection.

In an embodiment provided based on the embodiment in FIG. 3, theforegoing virtual object control method may further include thefollowing step:

after determining the first virtual object as an attack target, theclient may further detect in real time whether the first virtual objectmeets a loss condition. The loss condition is a condition used fordetecting whether an attack target is in a lost state.

The loss condition includes at least one of the following: the firstvirtual object being in a death state, the first virtual object beingnot in the virtual battle interface, and a distance between the firstvirtual object and the target virtual object being greater than a presetdistance, the target virtual object being a virtual object correspondingto the target user account.

In other words, when it is detected that the first virtual object isdead, or there is no field of view of the first virtual object in thevirtual battle interface, or the distance between the first virtualobject and the target virtual object is greater than the presetdistance, it is considered that the first virtual object meets the losscondition.

(1) It is determined that the first virtual object is in the lost statewhen the first virtual object meets the loss condition.

After it is detected that the first virtual object meets the losscondition, it is determined that the first virtual object is in the loststate.

(2) The first virtual object is kept as the attack target when no othervirtual object is determined as the attack target within a targetduration in which the first virtual object is in the lost state.

Within the target duration in which the first virtual object is in thelost state, the client may detect in real time whether the userdetermines another virtual object as a new attack target. When no othervirtual object is determined as the attack target within the targetduration, the first virtual object is kept as the attack target.

Based on the above, according to the technical solution provided in thisembodiment, when a virtual object having been selected as an attacktarget is in a lost state, if the user does not redetermine an attacktarget within the target duration, the determined virtual object is keptas the attack target. Therefore, secondary operation costs required forthe user to redetermine a determined attack target as a target in ashort time after the determined attack target is lost can be reduced.

In another embodiment provided based on the embodiment in FIG. 3, afterthe determining a first virtual object in the n virtual objects as anattack target based on operation information of the first triggeroperation in step 303, the following steps may further be performed:casting a skill to the attack target when a trigger operationcorresponding to a skill casting control is received.

In other words, after the attack target is determined, the user maytouch the skill casting control, to trigger and generate a triggersignal of the skill casting control. Correspondingly, when obtaining thetrigger signal corresponding to the skill casting control, the clientmay cast a skill to the determined attack target.

In some embodiments, the casting a skill to the attack target when atrigger operation corresponding to a skill casting control is receivedmay include the following steps:

(1) Obtain skill attribute information corresponding to the skillcasting control when the trigger operation corresponding to the skillcasting control is received.

When receiving the trigger operation corresponding to the skill castingcontrol, the client may obtain the skill attribute informationcorresponding to the skill casting control, the skill attributeinformation being used for indicating a basic attribute of the skill.

The skill attribute information may include a skill casting rule. Theskill casting rule is a condition that needs to be met for successfulcasting of the skill. For example, the skill casting rule may include aspecified target type of the skill, an effective casting range of theskill, and the like. This is not limited in this embodiment of thisapplication.

(2) Cast a skill to the attack target when the attack target meets theskill casting rule.

Subsequently, the client may detect whether the determined attack targetmeets the skill casting rule. When it is determined that the attacktarget meets the skill casting rule, the skill may be directly cast tothe attack target.

In addition, a second virtual object in the n virtual objects that meetsboth a selection condition and the skill casting rule is determined asthe attack target when the attack target does not meet the skill castingrule.

For example, assuming that the specified target type of the skillcorresponding to the skill casting control is virtual objects, when thedetermined attack target is a virtual object, it is determined that theattack target meets the skill casting rule, and the skill may be cast tothe attack target. Conversely, when the determined attack target is abuilding, it is determined that the attack target does not meet theskill casting rule, and the skill cannot be cast to the attack target.In this case, the client may reselect an attack target that meets boththe selection condition and the skill casting rule.

Based on the above, according to the technical solution provided in thisembodiment, when the user uses the skill casting control, if there is adetermined attack target, the skill is preferentially cast to the attacktarget, thereby providing skill casting with directivity and stability.

In another embodiment provided based on the embodiment in FIG. 3, afterthe determining a first virtual object in the n virtual objects as anattack target based on operation information of the first triggeroperation in step 303, the method further includes: receiving adeselection signal corresponding to the first virtual object; andcanceling, based on the deselection signal, the determining of the firstvirtual object as the attack target.

In other words, after the first virtual object is determined as theattack target, the determining of the first virtual object as the attacktarget may further be canceled. After obtaining the deselection signalcorresponding to the first virtual object, the client cancels thedetermining of the first virtual object as the attack target.

The receiving a deselection signal corresponding to the first virtualobject includes the following three manners:

(1) Receive a trigger operation corresponding to an identifier of thefirst virtual object.

After the first virtual object is determined as the attack target, theuser may further touch the identifier of the first virtual object, forexample, an avatar of the first virtual object, displayed in the virtualbattle interface. Correspondingly, the client may receive a triggeroperation corresponding to the identifier of the first virtual object,to cancel the determining of the first virtual object as the attacktarget.

(2) Receive a trigger operation corresponding to a target cancellationcontrol.

The target cancellation control is configured to cancel determining of avirtual object as an attack target. The target cancellation control matbe an operation control having only a function of canceling determiningof an attack target, or may be an operation control having otherfunctions in addition to the function of canceling determining of anattack target.

For example, as shown in FIG. 8, the target cancellation control may bea soldier key 81 or a tower key 82.

(3) Receive a second trigger operation corresponding to the functiontriggering control.

The second trigger operation is an operation of sliding out of thefunction triggering control for a specified distance.

In other words, when a finger of the user slides out of the functiontriggering control for the specified distance, it is determined that thedetermining of the first virtual object as the attack target is to becanceled.

Based on the above, according to the technical solution provided in thisembodiment of this application, after a virtual object used as an attacktarget is determined, the determining of the virtual object as theattack target can also be canceled, thereby improving the flexibility ofattack target setting, and improving user experience.

In still another embodiment provided based on the embodiment in FIG. 3,after the determining a first virtual object in the n virtual objects asan attack target based on operation information of the first triggeroperation in step 303, the method may further include: labeling anddisplaying the first virtual object in the virtual battle interface.

The labeling and displaying the first virtual object in the virtualbattle interface may include the following two manners:

(1) Highlight an identifier of the first virtual object in the virtualbattle interface.

The identifier of the first virtual object may be an avatar of the firstvirtual object, a hit point icon of the first virtual object, a model ofthe first virtual object, or the like.

In some embodiments, the highlighting an identifier of the first virtualobject in the virtual battle interface includes, but not limited to, atleast one of the following: adding a color label to the hit point iconof the first virtual object; and adding an identifier of a special shape(for example, a bracket) to the model of the first virtual object, andadding a color halo to the feet of the model of the first virtualobject. In some other embodiments, the identifier of the first virtualobject may alternatively be highlighted in other forms. This is notlimited in this embodiment of this application.

For example, as shown in FIG. 9, in the virtual battle interface 50, abracket 91 is displayed around a model of an attack target 90, and acolor halo 92 is displayed at the feet of the model.

(2) Display, in the virtual battle interface, an association identifierused for indicating an association relationship between the identifierof the first virtual object and the first virtual object.

The association identifier is used for indicating the associationrelationship between the identifier of the first virtual object and thefirst virtual object, that is, a correspondence between the identifierof the first virtual object and the first virtual object.

For example, the association identifier may be a connection lineconnecting the identifier of the first virtual object and the firstvirtual object. In some other examples, the association identifier mayalternatively be other identifiers used for connecting the identifier ofthe first virtual object and the first virtual object. This is notlimited in this embodiment of this application.

For example, as shown in FIG. 10, a connection line 101 used forconnecting an avatar of the first virtual object and the first virtualobject may be displayed in the virtual battle interface 50.

Based on the above, according to the technical solution provided in thisembodiment, after a virtual object is determined as an attack target,the virtual object may be labeled and displayed in a virtual battleinterface, so that the user can be clearer about the virtual objectdetermined as the attack target.

FIG. 11 is an exemplary flowchart of a virtual object control methodaccording to an embodiment of this application. In this embodiment, anexample in which the method is applied to a client of a game applicationinstalled and running in a terminal and a server in the implementationenvironment shown in FIG. 1 is mainly used for description. The methodmay include the following steps.

Step 1101: A target client transmits a target setting request to aserver according to operation information of a first trigger operation.

The target setting request is used for requesting to determine a firstvirtual object in n virtual objects as an attack target.

In some embodiments, the target setting request further includesidentifier information of the first virtual object.

Correspondingly, the server receives the target setting request.

Step 1102: The server transmits the target setting request to anotherclient.

The another client is a client corresponding to a virtual objectparticipating in a game battle.

Step 1103: The target client determines the first virtual object as anattack target.

That is, the target client determines the first virtual object as anattack target for an ordinary attack.

Step 1104: The target client labels and displays the first virtualobject in a virtual battle interface.

In some embodiments, the identifier of the first virtual object ishighlighted, or an association identifier of the first virtual object ishighlighted.

Step 1105: The target client obtains a deselection signal correspondingto the first virtual object.

In some embodiments, when the terminal receives the deselection signalof the first virtual object, the client obtains the deselection signal.

Step 1106: The target client transmits a target cancellation request tothe server when the deselection signal corresponding to the firstvirtual object is obtained.

The target cancellation request is used for requesting to cancel thesetting the first virtual object to the attack target.

Step 1107: The server transmits the target cancellation request toanother client.

Step 1108: The target client cancels the determining of the firstvirtual object as the attack target.

FIG. 12 is an exemplary flowchart of a virtual object control methodaccording to another embodiment of this application. In this embodiment,an example in which the method is applied to a client of a gameapplication installed and running in a terminal and a server in theimplementation environment shown in FIG. 1 is mainly used fordescription. The method may include the following steps:

Step 1201: A target client obtains a trigger signal corresponding to askill casting control.

Step 1202: The target client obtains skill attribute informationcorresponding to the skill casting control.

The skill attribute information may include a skill casting rule.

Step 1203: The target client detects whether an attack target meets askill casting rule.

When the attack target meets the skill casting rule, step 1204 isperformed; and when the attack target does not meet the skill castingrule, step 1205 is performed.

Step 1204: The target client transmits identifier information of theattack target and a skill casting request to a server.

Step 1205: The target client determines a second virtual object in nvirtual objects that meets both a selection condition and a skillcasting rule as an attack target.

Step 1206: The server transmits the identifier information of the attacktarget and the skill casting request to another client.

Step 1207: Display skill casting on the attack target in a virtualbattle interface of the target client.

The following describes apparatus embodiments of this application, whichcan be used to perform the method embodiments of this application. Fordetails not disclosed in the apparatus embodiment of this application,reference may be made to the method embodiments of this application.

FIG. 13 is a block diagram of an attack target determining apparatusaccording to an embodiment of this application. The apparatus has afunction of implementing the foregoing virtual object control methodexamples, and the function may be implemented by hardware or by hardwareexecuting corresponding software. The apparatus may be the terminaldescribed above, or may be disposed on the terminal. The apparatus 1300may include: an interface display module 1301, an operation receivingmodule 1302, and a target determining module 1303.

The interface display module 1301 is configured to display a virtualbattle interface, the virtual battle interface including n virtualobjects and a function triggering control, the function triggeringcontrol being configured to trigger an attack function against one ofthe virtual objects, n being a positive integer.

The operation receiving module 1302 is configured to receive a firsttrigger operation on the function triggering control.

The target determining module 1303 is configured to determine a firstvirtual object in the n virtual objects as an attack target based onoperation information of the first trigger operation when the firsttrigger operation meets an activation condition, the operationinformation being information obtained based on an activated targetaiming function associated with the function triggering control, thetarget aiming function being used for selecting an attack target for theattack function.

Based on the above, according to the technical solution provided in thisembodiment of this application, a virtual object used as an attacktarget is determined from a plurality of virtual objects by activating atarget aiming function of a function triggering control and according toattribute information of an operation signal. Compared with the relatedart in which each time a target virtual object is determined in realtime according to a virtual scene at the current time point, and targetvirtual objects determined in different virtual scenes may be different,according to the technical solution provided in this embodiment of thisapplication, the attack target is directly determined by using thetarget aiming function of the function triggering control and theattribute information of the operation signal, so that the determinedattack target can be kept unchanged for different virtual scenes,thereby providing the attack target with directivity and stability.

In some embodiments, the target determining module 1303 is configuredto: display a target selection region in the virtual battle interfacebased on direction information of the first trigger operation, thedirection information being a direction of a real-time touch point ofthe first trigger operation relative to a center point of the functiontriggering control; and determine the first virtual object within thetarget selection region as the attack target when the first triggeroperation ends.

In some embodiments, the target selection region is an arc-shaped regionwith a position of a target virtual object as a vertex, and a centerline direction of the target selection region corresponds to thedirection information; or a relative direction between a center point ofthe target selection region and the position of the target virtualobject corresponds to the direction information, and a distance betweenthe center point of the target selection region and the position of thetarget virtual object corresponds to a distance between the real-timetouch point and the center point of the function triggering control.

In some embodiments, the function triggering control includes anactivation region and an aiming region; and the target determiningmodule 1303 is configured to determine the first virtual object as theattack target based on the operation information of the first triggeroperation when an operation position of the first trigger operation ismoved from the activation region to the aiming region.

In some embodiments, as shown in FIG. 14, the apparatus 1300 furtherincludes: a candidate determining module 1304 and an identifier displaymodule 1305.

The candidate determining module 1304 is configured to determine mcandidate virtual objects meeting a selection condition from the nvirtual objects, m being a positive integer, and m≤n.

The identifier display module 1305 is configured to display identifiersof the m candidate virtual objects.

The operation receiving module 1302 is further configured to receive aselection signal for an identifier of a second virtual object in the mcandidate virtual objects.

The target determining module 1303 is further configured to determinethe second virtual object as the attack target.

In some embodiments, as shown in FIG. 14, the apparatus 1300 furtherincludes: a condition detection module 1306 and a state determiningmodule 1307.

The condition detection module 1306 is configured to detect whether thefirst virtual object meets a loss condition, the loss conditionincluding at least one of the following: the first virtual object beingin a death state, the first virtual object being not in the virtualbattle interface, and a distance between the first virtual object andthe target virtual object being greater than a preset distance.

The state determining module 1307 is configured to determine that thefirst virtual object is in the lost state when the first virtual objectmeets the loss condition.

The target determining module 1303 is further configured to keep thefirst virtual object as the attack target when no other virtual objectis determined as the attack target within a target duration in which thefirst virtual object is in the lost state.

In some embodiments, as shown in FIG. 14, the apparatus 1300 furtherincludes: a skill casting module 1308.

The skill casting module 1308 is configured to cast a skill to theattack target when a trigger operation corresponding to a skill castingcontrol is received.

In some embodiments, the skill casting module 1308 is configured to:obtain skill attribute information corresponding to the skill castingcontrol when the trigger operation corresponding to the skill castingcontrol is received, the skill attribute information including a skillcasting rule; and cast a skill to the attack target when the attacktarget meets the skill casting rule.

In some embodiments, the target determining module 1303 is furtherconfigured to determine, when the attack target does not meet the skillcasting rule, a second virtual object in the n virtual objects thatmeets both a selection condition and the skill casting rule as theattack target.

In some embodiments, as shown in FIG. 14, the apparatus 1300 furtherincludes: a deselection module 1309 and a target cancellation module1310.

The deselection module 1309 is configured to receive a deselectionsignal corresponding to the first virtual object.

The target cancellation module 1310 is configured to cancel, based onthe deselection signal, the determining of the first virtual object asthe attack target.

In some embodiments, the deselection module 1309 is configured to:receive a trigger operation corresponding to an identifier of the firstvirtual object; or receive a trigger operation corresponding to a targetcancellation control; or receive a second trigger operationcorresponding to the function triggering control.

In some embodiments, as shown in FIG. 14, the apparatus 1300 furtherincludes: a label display module 1311.

The label display module 1311 is configured to highlight an identifierof the first virtual object in the virtual battle interface; or thelabel display module 1311 is configured to display, in the virtualbattle interface, an association identifier used for indicating anassociation relationship between the identifier of the first virtualobject and the first virtual object.

When the apparatus provided in the foregoing embodiments implementsfunctions of the apparatus, the division of the foregoing functionalmodules is merely an example for description. In the practicalapplication, the functions may be assigned to and completed by differentfunctional modules according to the requirements, that is, the internalstructure of the device is divided into different functional modules, toimplement all or some of the functions described above. In addition, theapparatus and method embodiments provided in the foregoing embodimentsbelong to the same concept. For the specific implementation process,reference may be made to the method embodiments, and details are notdescribed herein again. In this application, the term “unit” or “module”refers to a computer program or part of the computer program that has apredefined function and works together with other related parts toachieve a predefined goal and may be all or partially implemented byusing software, hardware (e.g., processing circuitry and/or memoryconfigured to perform the predefined functions), or a combinationthereof. Each unit or module can be implemented using one or moreprocessors (or processors and memory). Likewise, a processor (orprocessors and memory) can be used to implement one or more modules orunits. Moreover, each module or unit can be part of an overall modulethat includes the functionalities of the module or unit.

FIG. 15 is a structural block diagram of a terminal according to anembodiment of this application. Generally, a terminal 1500 includes aprocessor 1501 and a memory 1502.

The processor 1501 may include one or more processing cores, forexample, a 4-core processor or an 8-core processor. The processor 1501may be implemented by using at least one hardware form of a digitalsignal processor (DSP), a field programmable gate array (FPGA), and aprogrammable logic array (PLA). The processor 1501 may alternativelyinclude a main processor and a coprocessor. The main processor is aprocessor configured to process data in an awake state, also referred toas a central processing unit (CPU), and the coprocessor is a low-powerprocessor configured to process data in a standby state. In someembodiments, the processor 1501 may be integrated with a graphicsprocessing unit (GPU). The GPU is configured to be responsible forrendering and drawing content that a display needs to display. In someembodiments, the processor 1501 may further include an artificialintelligence (AI) processor. The AI processor is configured to process acomputing operation related to machine learning.

The memory 1502 may include one or more non-transitory computer-readablestorage media. The computer-readable storage media may be non-transient.The memory 1502 may further include a high-speed random access memory(RAM), and a non-volatile memory such as one or more magnetic diskstorage devices and a flash storage device. In some embodiments, thenon-transitory computer-readable storage medium in the memory 1502 isconfigured to store at least one instruction, at least one program, acode set, or an instruction set, the at least one instruction, the atleast one program, the code set, or the instruction set being configuredto be executed by the processor 1501 to implement the virtual objectcontrol method provided in the method embodiment of this application.

In some embodiments, the terminal 1500 may alternatively include: aperipheral interface 1503 and at least one peripheral. The processor1501, the memory 1502, and the peripheral interface 1503 may beconnected through a bus or a signal cable. Each peripheral may beconnected to the peripheral interface 1503 through a bus, a signalcable, or a circuit board. Specifically, the peripheral may include: atleast one of a communication interface 1504, a display screen 1505, anaudio circuit 1506, a camera component 1507, a positioning component1508, and a power supply 1509.

A person skilled in the art may understand that the structure shown inFIG. 15 constitutes no limitation on the terminal 1500, and the terminalmay include more or fewer components than those shown in the figure, orsome components may be combined, or a different component deployment maybe used.

FIG. 16 is a schematic structural diagram of a server according to anembodiment of this application. Specifically:

The server 1600 includes a CPU 1601, a system memory 1604 including aRAM 1602 and a read-only memory (ROM) 1603, and a system bus 1605connecting the system memory 1604 and the CPU 1601. The server 1600further includes a basic input/output system (I/O system) 1606 assistingin transmitting information between devices in a computer, and a massstorage device 1607 configured to store an operating system 1613, anapplication 1614 and another program module 1615.

The basic I/O system 1606 includes a display 1608 configured to displayinformation and an input device 1609 such as a mouse or a keyboard thatis configured for information inputting by a user. The display 1608 andthe input device 1609 are both connected to the CPU 1601 by aninput/output controller 1610 connected to the system bus 1605. The basicI/O system 1606 may further include the input/output controller 1610, toreceive and process inputs from a plurality of other devices, such as akeyboard, a mouse, or an electronic stylus. Similarly, the input/outputcontroller 1610 further provides an output to a display screen, aprinter, or another type of output device.

The mass storage device 1607 is connected to the CPU 1601 through a massstorage controller (not shown) connected to the system bus 1605. Themass storage device 1607 and an associated computer-readable mediumprovide non-volatile storage for the server 1600. That is, the massstorage device 1607 may include a non-transitory computer-readablemedium (not shown) such as a hard disk or a compact disc ROM (CD-ROM)drive.

In general, the non-transitory computer-readable medium may include acomputer storage medium and a communication medium. The computer-storagemedium includes volatile and non-volatile media, and removable andnon-removable media implemented by using any method or technology usedfor storing information such as computer-readable instructions, datastructures, program modules, or other data. The computer storage mediumincludes a RAM, a ROM, an erasable programmable ROM (EPROM), a flashmemory or another solid-state storage technology, a CD-ROM, a DVD oranother optical storage, a magnetic cassette, a magnetic tape, or amagnetic disk storage or another magnetic storage device. Certainly, aperson skilled in the art may learn that the computer storage medium isnot limited to the foregoing several types. The system memory 1604 andthe mass storage device 1607 may be collectively referred to as amemory.

According to various embodiments of this application, the server 1600may further be connected, by using a network such as the Internet, to aremote computer on the network and run. That is, the server 1600 may beconnected to a network 1612 by using a network interface unit 1611connected to the system bus 1605, or may be connected to another type ofnetwork or a remote computer system (not shown) by using a networkinterface unit 1611.

The memory further includes at least one instruction, at least oneprogram, a code set, or an instruction set. The at least oneinstruction, the at least one program, the code set, or the instructionset is stored in the memory and is configured to be executed by one ormore processors to implement the foregoing virtual object controlmethod.

In an exemplary embodiment, a computer device is further provided. Thecomputer device may be a terminal or a server. The computer deviceincludes a processor and a memory, the memory storing at least oneinstruction, at least one program, a code set, or an instruction set,the at least one instruction, the at least one program, the code set, orthe instruction set being loaded and executed by the processor toimplement the foregoing virtual object control method.

In an exemplary embodiment, a non-transitory computer-readable storagemedium is further provided, storing at least one instruction, at leastone program, a code set, or an instruction set, the at least oneinstruction, the at least one program, the code set, or the instructionset, when executed by a processor, implementing the foregoing virtualobject control method.

In an exemplary embodiment, a computer program product is furtherprovided, the computer program product, when executed by a processor,being used for implementing the foregoing virtual object control method.

It is to be understood that “plurality of” mentioned in thisspecification means two or more. “And/or” describes an associationrelationship for associated objects and represents that threerelationships may exist. For example, A and/or B may represent thefollowing three cases: only A exists, both A and B exist, and only Bexists. The character “/” generally indicates an “or” relationshipbetween the associated objects.

The foregoing descriptions are merely exemplary embodiments of thisapplication, but are not intended to limit this application. Anymodification, equivalent replacement, or improvement made within thespirit and principle of this application shall fall within theprotection scope of this application.

What is claimed is:
 1. A virtual object control method, performed by acomputer device, the method comprising: displaying a virtual battleinterface, the virtual battle interface comprising n virtual objects anda function triggering control, the function triggering control beingconfigured to trigger an attack function against one of the virtualobjects, n being a positive integer; receiving a first trigger operationon the function triggering control; and determining a first virtualobject in the n virtual objects as an attack target based on operationinformation of the first trigger operation when the first triggeroperation meets an activation condition, the operation information beinginformation obtained based on an activated target aiming functionassociated with the function triggering control, the target aimingfunction being used for selecting an attack virtual target for theattack function.
 2. The method according to claim 1, wherein thedetermining a first virtual object in the n virtual objects as an attacktarget based on operation information of the first trigger operationcomprises: displaying a target selection region in the virtual battleinterface based on direction information of the first trigger operationon the function triggering control, the direction information being adirection of a real-time touch point of the first trigger operationrelative to a center point of the function triggering control and thetarget selection region including the first virtual object; anddetermining the first virtual object within the target selection regionas the attack target when the first trigger operation ends.
 3. Themethod according to claim 2, wherein a relative direction between acenter point of the target selection region and the position of thetarget virtual object corresponds to the direction information, and adistance between the center point of the target selection region and theposition of the target virtual object corresponds to a distance betweenthe real-time touch point and the center point of the functiontriggering control.
 4. The method according to claim 1, wherein thefunction triggering control comprises an activation region and an aimingregion; and the determining a first virtual object in the n virtualobjects as an attack target based on operation information of the firsttrigger operation when the first trigger operation meets an activationcondition comprises: determining the first virtual object as the attacktarget based on the operation information of the first trigger operationwhen an operation position of the first trigger operation is moved fromthe activation region to the aiming region.
 5. The method according toclaim 1, further comprising: after displaying the virtual battleinterface: determining m candidate virtual objects meeting a selectioncondition from the n virtual objects, m being a positive integer, andm≤n; displaying identifiers of the m candidate virtual objects;receiving a selection signal for an identifier of a second virtualobject in the m candidate virtual objects; and determining the secondvirtual object as the attack target.
 6. The method according to claim 1,further comprising: determining that the first virtual object is in alost state when the first virtual object meets a loss condition, theloss condition comprising at least one of the following: the firstvirtual object being in a death state, the first virtual object beingnot in the virtual battle interface, and a distance between the firstvirtual object and the target virtual object being greater than a presetdistance; and keeping the first virtual object as the attack target whenno other virtual object is determined as the attack target within apreset target duration in which the first virtual object is in the loststate.
 7. The method according to claim 1, further comprising: afterdetermining the first virtual object in the n virtual objects as theattack target, casting a skill to the attack target when a triggeroperation corresponding to a skill casting control is received.
 8. Themethod according to claim 7, wherein the casting a skill to the attacktarget when a trigger operation corresponding to a skill casting controlis received comprises: obtaining skill attribute informationcorresponding to the skill casting control when the trigger operationcorresponding to the skill casting control is received, the skillattribute information comprising a skill casting rule; and casting askill to the attack target when the attack target meets the skillcasting rule.
 9. The method according to claim 8, further comprising:determining, when the attack target does not meet the skill castingrule, a second virtual object in the n virtual objects that meets both aselection condition and the skill casting rule as the attack target. 10.The method according to claim 1, further comprising: after determiningthe first virtual object in the n virtual objects as the attack target,displaying, in the virtual battle interface, an association identifierused for indicating an association relationship between the identifierof the first virtual object and the first virtual object.
 11. A computerdevice, comprising a processor and a memory, the memory storing at leastone program, the at least one program, being loaded and executed by theprocessor to perform a plurality of operations including: displaying avirtual battle interface, the virtual battle interface comprising nvirtual objects and a function triggering control, the functiontriggering control being configured to trigger an attack functionagainst one of the virtual objects, n being a positive integer;receiving a first trigger operation on the function triggering control;and determining a first virtual object in the n virtual objects as anattack target based on operation information of the first triggeroperation when the first trigger operation meets an activationcondition, the operation information being information obtained based onan activated target aiming function associated with the functiontriggering control, the target aiming function being used for selectingan attack virtual target for the attack function.
 12. The computerdevice according to claim 11, wherein the determining a first virtualobject in then virtual objects as an attack target based on operationinformation of the first trigger operation comprises: displaying atarget selection region in the virtual battle interface based ondirection information of the first trigger operation on the functiontriggering control, the direction information being a direction of areal-time touch point of the first trigger operation relative to acenter point of the function triggering control and the target selectionregion including the first virtual object; and determining the firstvirtual object within the target selection region as the attack targetwhen the first trigger operation ends.
 13. The computer device accordingto claim 11, wherein the function triggering control comprises anactivation region and an aiming region; and the determining a firstvirtual object in the n virtual objects as an attack target based onoperation information of the first trigger operation when the firsttrigger operation meets an activation condition comprises: determiningthe first virtual object as the attack target based on the operationinformation of the first trigger operation when an operation position ofthe first trigger operation is moved from the activation region to theaiming region.
 14. The computer device according to claim 11, whereinthe plurality of operations further comprise: after displaying thevirtual battle interface: determining m candidate virtual objectsmeeting a selection condition from the n virtual objects, m being apositive integer, and m≤n; displaying identifiers of the m candidatevirtual objects; receiving a selection signal for an identifier of asecond virtual object in the m candidate virtual objects; anddetermining the second virtual object as the attack target.
 15. Thecomputer device according to claim 11, wherein the plurality ofoperations further comprise: determining that the first virtual objectis in a lost state when the first virtual object meets a loss condition,the loss condition comprising at least one of the following: the firstvirtual object being in a death state, the first virtual object beingnot in the virtual battle interface, and a distance between the firstvirtual object and the target virtual object being greater than a presetdistance; and keeping the first virtual object as the attack target whenno other virtual object is determined as the attack target within apreset target duration in which the first virtual object is in the loststate.
 16. The computer device according to claim 11, wherein theplurality of operations further comprise: after determining the firstvirtual object in the n virtual objects as the attack target,displaying, in the virtual battle interface, an association identifierused for indicating an association relationship between the identifierof the first virtual object and the first virtual object.
 17. Anon-transitory computer-readable storage medium, storing at least oneprogram, the at least one program being loaded and executed by aprocessor of a computer device to perform a plurality of operationsincluding: displaying a virtual battle interface, the virtual battleinterface comprising n virtual objects and a function triggeringcontrol, the function triggering control being configured to trigger anattack function against one of the virtual objects, n being a positiveinteger; receiving a first trigger operation on the function triggeringcontrol; and determining a first virtual object in the n virtual objectsas an attack target based on operation information of the first triggeroperation when the first trigger operation meets an activationcondition, the operation information being information obtained based onan activated target aiming function associated with the functiontriggering control, the target aiming function being used for selectingan attack virtual target for the attack function.
 18. The non-transitorycomputer-readable storage medium according to claim 17, wherein thedetermining a first virtual object in the n virtual objects as an attacktarget based on operation information of the first trigger operationcomprises: displaying a target selection region in the virtual battleinterface based on direction information of the first trigger operationon the function triggering control, the direction information being adirection of a real-time touch point of the first trigger operationrelative to a center point of the function triggering control and thetarget selection region including the first virtual object; anddetermining the first virtual object within the target selection regionas the attack target when the first trigger operation ends.
 19. Thenon-transitory computer-readable storage medium according to claim 17,wherein the function triggering control comprises an activation regionand an aiming region; and the determining a first virtual object in then virtual objects as an attack target based on operation information ofthe first trigger operation when the first trigger operation meets anactivation condition comprises: determining the first virtual object asthe attack target based on the operation information of the firsttrigger operation when an operation position of the first triggeroperation is moved from the activation region to the aiming region. 20.The non-transitory computer-readable storage medium according to claim17, wherein the plurality of operations further comprise: afterdetermining the first virtual object in the n virtual objects as theattack target, displaying, in the virtual battle interface, anassociation identifier used for indicating an association relationshipbetween the identifier of the first virtual object and the first virtualobject.