CN109597949B - Third party buried point identification generation method and equipment based on data standardization - Google Patents

Third party buried point identification generation method and equipment based on data standardization Download PDF

Info

Publication number
CN109597949B
CN109597949B CN201811231468.6A CN201811231468A CN109597949B CN 109597949 B CN109597949 B CN 109597949B CN 201811231468 A CN201811231468 A CN 201811231468A CN 109597949 B CN109597949 B CN 109597949B
Authority
CN
China
Prior art keywords
buried point
information
channel
party
parameters
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811231468.6A
Other languages
Chinese (zh)
Other versions
CN109597949A (en
Inventor
胡雨佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811231468.6A priority Critical patent/CN109597949B/en
Publication of CN109597949A publication Critical patent/CN109597949A/en
Application granted granted Critical
Publication of CN109597949B publication Critical patent/CN109597949B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a third party buried point identification generation method and device based on data standardization, a computer readable storage medium and a computer device, wherein the method comprises the following steps: receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client; extracting tag parameters and channel information of the clicked buried point from the buried point information; acquiring preset channel parameters matched with the channel information; and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point. The method can simply and rapidly generate the third party buried point identification used in the application with the minimum change on the basis of the buried point label reported by the third party, is convenient for the application to uniformly manage the clicked buried point in the accessed third party page, and provides powerful support for the application to rapidly and accurately identify the source of the buried point of the page and statistically analyze macroscopic data.

Description

Third party buried point identification generation method and equipment based on data standardization
Technical Field
The invention relates to the technical field of computers, in particular to a third party buried point identification generation method and device based on data standardization, a computer readable storage medium and computer equipment.
Background
In the application data analysis scene, buried point analysis plays an important role. The embedded point of the page in the application can be used for flow analysis, such as analyzing page flow data such as page browsing number PV, independent access data amount UV, page access times and the like, so as to provide an improvement direction with reference value for the application in terms of improving the conversion rate, user viscosity and the like. The application is usually accessed with a third party page developed by a third party, but the embedded point rules of all the third party pages in the existing application are usually different, and when the third party page data in the application is analyzed, the embedded point sources of the pages cannot be quickly and accurately identified, so that the statistical analysis of the application macroscopic data is affected.
Disclosure of Invention
In order to solve at least one of the technical defects, the invention provides a third party buried point identification generation method based on data standardization, a corresponding device, a computer readable storage medium and computer equipment.
According to one aspect, the embodiment of the invention provides a third party buried point identification generation method based on data standardization, which comprises the following steps:
receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
extracting tag parameters and channel information of the clicked buried point from the buried point information;
acquiring preset channel parameters matched with the channel information;
and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point.
Preferably, the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
Further, the preset mapping relationship is preset by the following manner:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
Preferably, the splicing the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
Preferably, the receiving the embedded point information of the click embedded point corresponding to the third party page reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
Preferably, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
In addition, according to another aspect, an embodiment of the present invention provides a third party buried point identifier generating device based on data standardization, including:
the embedded point information receiving module is used for receiving embedded point information of the corresponding click embedded point of the third-party page reported by the user client;
the information extraction module is used for extracting the tag parameters and channel information of the click buried point from the buried point information;
the channel parameter acquisition module is used for acquiring preset channel parameters matched with the channel information;
and the buried point identifier generation module is used for performing splicing processing on the channel parameters and the tag parameters to generate the buried point identifier of the click buried point.
Preferably, the channel parameter obtaining module is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
According to still another aspect, an embodiment of the present invention provides a computer readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the method for generating a three-way buried point identifier.
According to yet another aspect, embodiments of the present invention provide a computer device, the computer comprising one or more processors; a memory; one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: and executing the third party buried point identification generation method.
Compared with the prior art, the invention has the following beneficial effects:
according to the data standardization-based third party buried point identification generation method, the data standardization-based third party buried point identification generation device, the computer-readable storage medium and the computer equipment, the buried point labels reported by the third party and the channel parameters set by the application are spliced, so that the third party buried point identification used in the application can be simply and quickly generated on the basis of the buried point labels reported by the third party with minimum variation, the application can conveniently and uniformly manage the clicked buried points in the accessed third party pages, and powerful support is provided for the application to quickly and accurately identify the sources of the buried points of the pages and statistically analyze macroscopic data.
In addition, the third party buried point identification generation method, the device, the computer readable storage medium and the computer equipment based on data standardization further determine the channel parameters matched with the channel information by determining the information module corresponding to the third party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a method for generating a third party buried point identifier based on data standardization according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a third party buried point identifier generating device based on data standardization according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
During the development of an application, some applications, such as security caretaker applications, have access to pages developed by third parties. Because the third-party page is automatically developed by a third party, the embedded point identification rules of all the parties are different, the current application cannot monitor the operation behaviors of the user on the third-party page, and further cannot count the breakpoint situation of the third-party page and analyze and obtain a targeted platform operation strategy and a product strategy according to the breakpoint situation of the third-party page.
In this regard, the embodiment of the invention provides a third party buried point identifier generating method based on data standardization, as shown in fig. 1, the method includes:
step S101: and receiving the embedded point information of the corresponding click embedded point of the third-party page reported by the user client.
For the embodiment, the third party page is a page to be accessed to the current application and developed by a third party. The click buried point is preset in a third party page by a third party when the page is developed, and is used for running a pre-built code to report data when a user client accessing the third party page responds to the click control operation of the user when the user executes the click control operation in the third party page. Specifically, when the third-party page is initialized, initializing an SDK (Software Development Kit ) for clicking the buried point in the third-party page, and when a trigger click control event occurs in the third-party page, calling a corresponding buried point data sending interface in the SDK to send buried point information.
For this embodiment, in order to reduce the traffic consumed by the user client in reporting data, the user client may implement reporting of the buried point information in a data mapping manner, that is, the user client performs simplified processing on the buried point information before reporting, and does not report specific parameter values, and accordingly, the application server obtains the buried point information by mapping simplified data according to a preset MAP-KEY mapping relationship after receiving the simplified processed buried point information reported by the user client. In addition, the user client can report the embedded point information in a non-instant sending mode, after compressing and packaging a plurality of pieces of data, waiting for the network condition to be good or reporting the embedded point information in a timing mode, and correspondingly, the application server performs decompression processing after receiving the data packet reported by the user client to obtain a plurality of pieces of embedded point information.
For this embodiment, the embedded point information reported by the user client includes, but is not limited to: the label parameters set by the third party for identifying the click buried point, such as 1001, 1002 and the like; channel information for identifying a source of data; a user ID for identifying a unique identity of the end user; a mobile equipment number (IMEI) for identifying the user client mobile device; time information for indicating event trigger time.
Step S102: and extracting the tag parameters and channel information of the click buried point from the buried point information.
For this embodiment, the tag parameter and the channel information are extracted from the received buried point information corresponding to the click buried point. The tag parameter is a parameter set by a third party and used for identifying a click buried point, and specifically, the tag parameter is used for identifying the click buried point so as to distinguish the click buried point from other click buried points in the same third party page or different third party pages developed by the third party. The channel information is used to identify the source of the data, in particular, to identify a third party or third party page of the point-of-click source.
Step S103: and obtaining preset channel parameters matched with the channel information.
For this embodiment, the channel parameter is a preset value given to the application by the third party, and the channel parameter is a unique identification parameter set by the application for identifying the source of the data, and there is only one channel parameter. For example, the security caretaker application distributes channel parameters for the third party as follows: and 5 is a financial module, the channel parameters allocated for carefully chosen funds under the module are 501, the channel parameters allocated for guaranty are 502, and so on. The channel information and the channel parameters are pre-stored with a mapping relation, and after the channel information is extracted from the reported buried point information by the application server, the channel parameters matched with the channel information can be obtained based on the pre-stored mapping relation. By means of the channel parameters, the source of each buried point can be clearly distinguished into which channel is specific.
Step S104: and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point.
For this embodiment, after the channel parameters are obtained, the channel parameters and the tag parameters are automatically spliced together based on a preset splicing processing rule, so as to generate the buried point identifier including the channel parameters and the tag parameters of the click buried point. The embedded point identification is a unique identification which is set by the application and used for identifying the clicking embedded point, and because the embedded point identification is generated according to the channel parameters and the tag parameters, the application can quickly identify the embedded point source according to the embedded point identification, namely a third party or a third party page of the clicking embedded point source.
According to the third party buried point identification generation method based on data standardization, the buried point labels reported by the third party and the channel parameters set by the application are spliced, so that the third party buried point identifications used in the application can be simply and quickly generated on the basis of the buried point labels reported by the third party with minimum variation, the application can conveniently and uniformly manage the clicked buried points in the accessed third party pages, and powerful support is provided for the application to quickly and accurately identify the sources of the buried points of the pages and statistically analyze macroscopic data.
In one embodiment, the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
For this embodiment, a preset mapping relationship exists between the channel information and the channel parameters, and according to the preset mapping relationship, channel parameters matched with the channel information can be mapped by the channel information.
The preset mapping relation may be embodied in the form of a preset mapping table.
Taking the application as a safe caretaker application as an example, as shown in the following table 1, a preset mapping table recording a preset mapping relationship between the channel information and the channel parameters is shown in a specific embodiment. In table 1, the first list is the channel information, i.e. information for identifying the third party or the third party page from which the click-through point originated, such as carefully chosen funds, guaranteed honour, etc., and the second list is the channel parameters, such as 501, 502, … …, which are correspondingly allocated to the channel information.
TABLE 1 channel information and corresponding channel parameters
Channel information Channel parameters
Choice fund 501
Baozun Baobao 502
Financial account 503
Land fund 504
Nianshenbao 505
It should be clearly noted that, the preset mapping relationship between the channel information and the channel parameters may also be embodied in other forms, which is not limited in this embodiment.
In one embodiment, the preset mapping relationship is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
In an actual application scenario, the application may include a plurality of information modules, so as to display or provide multiple information or services to the user, and the accessed third-party page is preset with the corresponding information module.
For the embodiment, in order to further improve the identification degree of the third party buried point identifier, it is convenient for the application to uniformly manage the clicked buried points in the accessed third party page, the channel parameters are distributed according to the information modules corresponding to the third party page, specifically, a certain data bit of the channel parameters is preset as a data bit for identifying the information modules, and the information modules corresponding to the third party page can be determined according to the data bit. After extracting the channel information, the application server determines an information module affiliated to the third-party page in the application according to the channel information, and then determines channel parameters matched with the channel information according to the information module.
Taking the safe housekeeper application as an example, the safe housekeeper application is a diversified application integrating insurance, banking, investment and life, and can comprehensively meet various requirements of users, and an information module in the safe housekeeper application comprises: health module, life module, activity module, policy module and financial module. The application may preset the first data bit of the channel parameter to be a data bit for identifying an information module, if it is determined that the information module corresponding to the third party page is a financial module according to the channel information, and the first data bit of the channel parameter corresponding to the financial module is 5, it is determined that the channel parameter matching the channel information should start with 5, for example 501, 502, and so on, according to the information module.
In this embodiment, by determining the information module corresponding to the third-party page according to the channel information, and further determining the channel parameter matched with the channel information, the method can further facilitate the unified management of the click buried point in the accessed third-party page, and provide powerful support for the application to quickly and accurately identify the information module and the buried point source of the page, and the statistical analysis of macroscopic data.
In one embodiment, the splicing the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
For this embodiment, after the channel parameters are obtained, the channel parameters and the tag parameters are automatically spliced together based on a preset splicing processing rule, specifically, preset splicing characters, such as "_and" & "are adopted to splice the tag parameters to the data end of the channel parameters, so as to generate the buried point identifier of the click buried point.
For example, if the buried point tag parameter label reported by a certain third party is 1001 and the channel parameter allocated to the application is 503, the buried point identifier generated corresponding to the clicked buried point is 503_1001.
For another example, if the channel parameter assigned by the security manager to the choice fund under the financial module is 501, all the point marks at the beginning of 501 will be subordinate to the choice fund, and the point marks of the choice fund may be 501_1001, 501_1002, and 501_2001 … ….
In this embodiment, the tag parameter is spliced to the data end of the channel parameter to generate the buried point identifier of the clicked buried point, so that the click buried point in the accessed third-party page can be managed uniformly, and powerful support is provided for the application to quickly and accurately identify the source of the buried point of the page and statistically analyze the macroscopic data according to the data bit in front of the buried point identifier.
In one embodiment, the receiving the embedded point information of the click embedded point corresponding to the third party page reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
In an actual application scenario, particularly in the application fields of insurance, finance and the like, the embedded point information uploaded by the user client side usually further comprises personal information of the user selected by clicking the control.
For this embodiment, in order to improve the security of the personal information of the user in the data transmission process, the buried point information is transmitted in an encrypted data form in the reporting process. The encryption click buried point is preset in a third party page when a third party develops the page, and is used for running a pre-built code to report encryption data in response to click control operation of a user by a user client accessing the third party page when the user executes the click control operation in the third party page. Specifically, when the third-party page is initialized, initializing an SDK (Software Development Kit ) for clicking the embedded point in the third-party page, and when a trigger click control event occurs in the third-party page, adopting a preset encryption algorithm, such as a symmetric encryption algorithm or an asymmetric encryption algorithm, to encrypt the embedded point information, and calling a corresponding embedded point data transmission interface in the SDK to transmit the encrypted embedded point information. Correspondingly, after receiving the encrypted embedded point information of the click embedded point corresponding to the third-party page reported by the user client, the application server decrypts the encrypted embedded point information by adopting a decryption algorithm matched with the preset encryption algorithm to obtain decrypted embedded point information.
In the embodiment, the buried point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or tampered maliciously.
In one embodiment, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
For this embodiment, after the buried point identifier of the clicked buried point is generated, the buried point identifier of the clicked buried point is stored in a preset database, and the buried point information corresponding to the clicked buried point is stored in the preset database at a position corresponding to the buried point identifier.
In this embodiment, the embedded point identifier and the embedded point information corresponding to the clicked embedded point are stored in a preset database, so that the application is further facilitated to perform unified management on the clicked embedded point in the accessed third party page, powerful support is provided for the application to quickly and accurately identify the source of the embedded point of the page and statistically analyze macroscopic data, the corresponding embedded point information is stored according to the embedded point identifier, matching of user information by a third party is not required, the application can associate the clicked embedded point with the user information, and the granularity of the embedded point can be refined to a single user.
In addition, an embodiment of the present invention provides a third party buried point identifier generating device based on data standardization, as shown in fig. 2, where the device includes: a buried point information receiving module 21, an information extracting module 22, a channel parameter acquiring module 23 and a buried point identification generating module 24; wherein,
the embedded point information receiving module 21 is configured to receive embedded point information of a click embedded point corresponding to a third party page reported by a user client;
the information extraction module 22 is configured to extract the tag parameter and the channel information of the click buried point from the buried point information;
the channel parameter obtaining module 23 is configured to obtain preset channel parameters matched with the channel information;
the buried point identifier generating module 24 is configured to splice the channel parameter and the tag parameter to generate a buried point identifier of the click buried point.
In one embodiment, the channel parameter obtaining module 23 is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
In one embodiment, the preset mapping relationship is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
In one embodiment, the buried point identifier generating module 24 is specifically configured to:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
In one embodiment, the buried point information receiving module 21 is specifically configured to:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
In one embodiment, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
The third party buried point identification generating device based on data standardization provided by the invention can realize the following steps: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The third party buried point identifier generating device based on data standardization provided by the embodiment of the present invention can implement the method embodiment provided above, and specific function implementation is referred to the description in the method embodiment and is not repeated here.
In addition, the embodiment of the invention provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and the computer program realizes the third party buried point identification generation method based on data standardization in the above embodiment when being executed by a processor. The computer readable storage medium includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random AcceSS Memory, random access memories), EPROMs (EraSable Programmable Read-Only memories), EEPROMs (Electrically EraSable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a storage device includes any medium that stores or transmits information in a form readable by a device (e.g., computer, cell phone), and may be read-only memory, magnetic or optical disk, etc.
The computer readable storage medium provided by the invention can realize: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The computer readable storage medium provided by the embodiments of the present invention may implement the method embodiments provided above, and specific functional implementation is referred to the description in the method embodiments and will not be repeated here.
In addition, the embodiment of the invention also provides computer equipment, as shown in fig. 3. The computer device described in this embodiment may be a server, a personal computer, a network device, or the like. The computer device includes a processor 302, a memory 303, an input unit 304, a display unit 305, and the like. It will be appreciated by those skilled in the art that the device architecture shown in fig. 3 does not constitute a limitation of all devices, and may include more or fewer components than shown, or may combine certain components. The memory 303 may be used to store a computer program 301 and functional modules, and the processor 302 runs the computer program 301 stored in the memory 303 to perform various functional applications of the device and data processing. The memory may be internal memory or external memory, or include both internal memory and external memory. The internal memory may include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, floppy disk, ZIP disk, U-disk, tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The memory disclosed herein is by way of example only and not by way of limitation.
The input unit 304 is used for receiving input of a signal and receiving keywords input by a user. The input unit 304 may include a touch panel and other input devices. The touch panel may collect touch operations on or near the user (e.g., the user's operation on or near the touch panel using any suitable object or accessory such as a finger, stylus, etc.), and drive the corresponding connection device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, mouse, joystick, etc. The display unit 305 may be used to display information entered by a user or provided to a user as well as various menus of the computer device. The display unit 305 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 302 is the control center of the computer device, connects the various parts of the overall computer using various interfaces and lines, performs various functions and processes data by running or executing software programs and/or modules stored in the memory 302, and invoking data stored in the memory.
As one embodiment, the computer device includes: the system comprises one or more processors 302, a memory 303, one or more computer programs 301, wherein the one or more computer programs 301 are stored in the memory 303 and configured to be executed by the one or more processors 302, the one or more computer programs 301 configured to perform the data standardization based third party buried point identification generation method described in any of the embodiments above.
The computer equipment provided by the invention can realize: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The computer device provided by the embodiment of the present invention may implement the method embodiment provided above, and specific functional implementation is referred to the description in the method embodiment and will not be repeated here.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The foregoing is only a partial embodiment of the present invention, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present invention, and such modifications and adaptations are intended to be comprehended within the scope of the present invention.

Claims (10)

1. The third party buried point identification generation method based on data standardization is characterized by comprising the following steps:
receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
extracting tag parameters and channel information of the clicked buried point from the buried point information;
acquiring preset channel parameters matched with the channel information;
splicing the channel parameters and the tag parameters to generate a buried point identifier of the clicked buried point;
the receiving of the embedded point information of the corresponding click embedded point of the third party page reported by the user client side comprises the following steps:
receiving simplified buried point information reported by a user client, and obtaining the buried point information according to a preset MAP-KEY mapping relation and the simplified buried point information;
the obtaining preset channel parameters matched with the channel information comprises the following steps:
determining an information module to which the third-party page belongs according to the channel information, and determining channel parameters matched with the channel information according to the information module;
the channel parameters are distributed according to the information modules corresponding to the third-party pages, and preset data bits of the channel parameters are preset as data bits for identifying the information modules;
the tag parameters are parameters for identifying the click buried point, the channel information is used for identifying the data source of the click buried point, and the channel parameters are unique identification parameters for identifying the data source.
2. The method for generating the third party buried point identifier according to claim 1, wherein the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
3. The method for generating a third party buried point identifier according to claim 2, wherein the preset mapping relation is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
4. The method for generating the third party buried point identifier according to claim 1, wherein the step of performing a splicing process on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
5. The method for generating the third party buried point identifier according to claim 1, wherein the receiving the buried point information of the third party page corresponding to the clicked buried point reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
6. The method for generating a third party buried point identifier according to claim 1, wherein the splicing processing is performed on the channel parameter and the tag parameter, and after generating the buried point identifier of the click buried point, the method further comprises:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
7. A third party buried point identification generating device based on data standardization, which is characterized by comprising:
the embedded point information receiving module is used for receiving embedded point information of the corresponding click embedded point of the third-party page reported by the user client;
the information extraction module is used for extracting the tag parameters and channel information of the click buried point from the buried point information;
the channel parameter acquisition module is used for acquiring preset channel parameters matched with the channel information;
the buried point identifier generation module is used for performing splicing processing on the channel parameters and the tag parameters to generate a buried point identifier of the click buried point;
the receiving of the embedded point information of the corresponding click embedded point of the third party page reported by the user client side comprises the following steps:
receiving simplified buried point information reported by a user client, and obtaining the buried point information according to a preset MAP-KEY mapping relation and the simplified buried point information;
the obtaining preset channel parameters matched with the channel information comprises the following steps:
determining an information module to which the third-party page belongs according to the channel information, and determining channel parameters matched with the channel information according to the information module;
the channel parameters are distributed according to the information modules corresponding to the third-party pages, and preset data bits of the channel parameters are preset as data bits for identifying the information modules;
the tag parameters are parameters for identifying the click buried point, the channel information is used for identifying the data source of the click buried point, and the channel parameters are unique identification parameters for identifying the data source.
8. The third party buried point identifier generating device according to claim 7, wherein the channel parameter obtaining module is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the third party buried point identification generation method according to any one of claims 1 to 6.
10. A computer device, comprising:
one or more processors;
a memory;
one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: a third party buried point identification generating method according to any one of claims 1 to 6 is performed.
CN201811231468.6A 2018-10-22 2018-10-22 Third party buried point identification generation method and equipment based on data standardization Active CN109597949B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811231468.6A CN109597949B (en) 2018-10-22 2018-10-22 Third party buried point identification generation method and equipment based on data standardization

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811231468.6A CN109597949B (en) 2018-10-22 2018-10-22 Third party buried point identification generation method and equipment based on data standardization

Publications (2)

Publication Number Publication Date
CN109597949A CN109597949A (en) 2019-04-09
CN109597949B true CN109597949B (en) 2024-04-02

Family

ID=65957954

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811231468.6A Active CN109597949B (en) 2018-10-22 2018-10-22 Third party buried point identification generation method and equipment based on data standardization

Country Status (1)

Country Link
CN (1) CN109597949B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111352969B (en) * 2020-02-28 2023-12-05 广州市千钧网络科技有限公司 Buried point data analysis method and device and electronic equipment
CN111610928A (en) * 2020-04-27 2020-09-01 上海容易网电子商务股份有限公司 Rapid and universal buried point data acquisition method
CN111966339B (en) * 2020-07-23 2024-04-09 招联消费金融股份有限公司 Buried point parameter input method and device, computer equipment and storage medium
CN113742161A (en) * 2020-09-07 2021-12-03 北京沃东天骏信息技术有限公司 Buried point reporting method and device
CN112596978B (en) * 2020-12-23 2023-07-14 华人运通(上海)云计算科技有限公司 Buried point information processing method, buried point information processing device and medium
CN112817816B (en) * 2021-01-25 2023-03-31 微民保险代理有限公司 Embedded point processing method and device, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106844217A (en) * 2017-01-26 2017-06-13 网易(杭州)网络有限公司 Control to applying bury method and device, readable storage medium storing program for executing a little
CN107196788A (en) * 2017-05-02 2017-09-22 阿里巴巴集团控股有限公司 A kind of processing method for burying point data, device, server and client
CN107818162A (en) * 2017-11-01 2018-03-20 平安科技(深圳)有限公司 Bury a processing method, device, computer equipment and storage medium
CN107908656A (en) * 2017-10-13 2018-04-13 平安科技(深圳)有限公司 Increase channel method, application server and computer-readable recording medium
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN108256025A (en) * 2018-01-10 2018-07-06 链家网(北京)科技有限公司 The construction method and device of the page based on HTML5
CN108572908A (en) * 2017-03-14 2018-09-25 腾讯科技(深圳)有限公司 information feedback method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN106844217A (en) * 2017-01-26 2017-06-13 网易(杭州)网络有限公司 Control to applying bury method and device, readable storage medium storing program for executing a little
CN108572908A (en) * 2017-03-14 2018-09-25 腾讯科技(深圳)有限公司 information feedback method and device
CN107196788A (en) * 2017-05-02 2017-09-22 阿里巴巴集团控股有限公司 A kind of processing method for burying point data, device, server and client
CN107908656A (en) * 2017-10-13 2018-04-13 平安科技(深圳)有限公司 Increase channel method, application server and computer-readable recording medium
CN107818162A (en) * 2017-11-01 2018-03-20 平安科技(深圳)有限公司 Bury a processing method, device, computer equipment and storage medium
CN108256025A (en) * 2018-01-10 2018-07-06 链家网(北京)科技有限公司 The construction method and device of the page based on HTML5

Also Published As

Publication number Publication date
CN109597949A (en) 2019-04-09

Similar Documents

Publication Publication Date Title
CN109597949B (en) Third party buried point identification generation method and equipment based on data standardization
US11531766B2 (en) Systems and methods for attributing security vulnerabilities to a configuration of a client device
US9411958B2 (en) Polymorphic treatment of data entered at clients
US10073916B2 (en) Method and system for facilitating terminal identifiers
US11321734B2 (en) Information processing method, server, and computer storage medium
US8671449B1 (en) Systems and methods for identifying potential malware
US9948637B2 (en) System and method for data security on big data sets
CN108512854B (en) System information safety monitoring method and device, computer equipment and storage medium
US8955143B1 (en) Use of decoy data in a data store
US20210092160A1 (en) Data set creation with crowd-based reinforcement
CN104836781A (en) Method distinguishing identities of access users, and device
CN108287823B (en) Message data processing method and device, computer equipment and storage medium
CN113076104A (en) Page generation method, device, equipment and storage medium
US20210382986A1 (en) Dynamic, Runtime Application Programming Interface Parameter Labeling, Flow Parameter Tracking and Security Policy Enforcement
CN109542894B (en) User data centralized storage method, device, medium and computer equipment
CN108052550B (en) Annuity data receiving method and device, computer equipment and storage medium
CN110807209B (en) Data processing method, device and storage medium
CN114186760A (en) Analysis method and system for stable operation of enterprise and readable storage medium
CN104639387B (en) A kind of user network behavior tracking method and apparatus
CN109818906A (en) A kind of device-fingerprint information processing method, device and server
CN110443044A (en) Block chain client bug excavation method, device, equipment and storage medium
CN110070383B (en) Abnormal user identification method and device based on big data analysis
CN111448551B (en) Method and system for tracking application activity data from a remote device and generating a corrective action data structure for the remote device
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
CN112817816B (en) Embedded point processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant