US 12,017,141 B2
Virtual object control method and apparatus, device, and storage medium
Yu Chen, Shenzhen (CN); Le Wang, Shenzhen (CN); Jianmiao Weng, Shenzhen (CN); Xun Hu, Shenzhen (CN); Yulin Wan, Shenzhen (CN); Shandong Su, Shenzhen (CN); and Yong Zhang, Shenzhen (CN)
Assigned to TENCENT TECHNOLOGY (SHENZHEN) COMPANY LIMITED, Shenzhen (CN)
Filed by Tencent Technology (Shenzhen) Company Limited, Shenzhen (CN)
Filed on Oct. 27, 2021, as Appl. No. 17/512,492.
Application 17/512,492 is a continuation of application No. PCT/CN2021/078458, filed on Mar. 1, 2021.
Claims priority of application No. 202010297051.0 (CN), filed on Apr. 15, 2020.
Prior Publication US 2022/0047941 A1, Feb. 17, 2022
Int. Cl. A63F 13/426 (2014.01); A63F 13/2145 (2014.01); A63F 13/56 (2014.01); A63F 13/57 (2014.01)
CPC A63F 13/426 (2014.09) [A63F 13/2145 (2014.09); A63F 13/56 (2014.09); A63F 13/57 (2014.09)] 20 Claims
OG exemplary drawing
 
1. A virtual object control method, performed by a computer device, the method comprising:
displaying a virtual battle interface including a first virtual scene, the virtual battle interface comprising n virtual objects and a function triggering control in the first virtual scene, the function triggering control being configured to trigger an attack function against one of the virtual objects, n being a positive integer;
receiving a first trigger operation on the function triggering control in the first virtual scene;
determining a first virtual object in the n virtual objects as an attack target in the first virtual scene based on operation information of the first trigger operation when the first trigger operation meets an activation condition, the operation information being information obtained based on an activated target aiming function associated with the function triggering control, the target aiming function being used for selecting an attack virtual target for the attack function; and
changing the first virtual scene to a second virtual scene, the second virtual scene including the functioning triggering control, the first virtual object, and at least another virtual object, wherein the first virtual object remains as the attack target before a second trigger operation is performed on the functioning triggering control.