CN109597949B - Third party buried point identification generation method and equipment based on data standardization - Google Patents
Third party buried point identification generation method and equipment based on data standardization Download PDFInfo
- Publication number
- CN109597949B CN109597949B CN201811231468.6A CN201811231468A CN109597949B CN 109597949 B CN109597949 B CN 109597949B CN 201811231468 A CN201811231468 A CN 201811231468A CN 109597949 B CN109597949 B CN 109597949B
- Authority
- CN
- China
- Prior art keywords
- buried point
- information
- channel
- party
- parameters
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000012545 processing Methods 0.000 claims abstract description 19
- 230000015654 memory Effects 0.000 claims description 29
- 238000013507 mapping Methods 0.000 claims description 27
- 238000004590 computer program Methods 0.000 claims description 16
- 230000008569 process Effects 0.000 claims description 8
- 238000000605 extraction Methods 0.000 claims description 3
- 230000005540 biological transmission Effects 0.000 description 7
- 238000007726 management method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 230000006978 adaptation Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 230000005291 magnetic effect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000007619 statistical method Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 230000006399 behavior Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 238000013506 data mapping Methods 0.000 description 1
- 230000006837 decompression Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000005206 flow analysis Methods 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013486 operation strategy Methods 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides a third party buried point identification generation method and device based on data standardization, a computer readable storage medium and a computer device, wherein the method comprises the following steps: receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client; extracting tag parameters and channel information of the clicked buried point from the buried point information; acquiring preset channel parameters matched with the channel information; and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point. The method can simply and rapidly generate the third party buried point identification used in the application with the minimum change on the basis of the buried point label reported by the third party, is convenient for the application to uniformly manage the clicked buried point in the accessed third party page, and provides powerful support for the application to rapidly and accurately identify the source of the buried point of the page and statistically analyze macroscopic data.
Description
Technical Field
The invention relates to the technical field of computers, in particular to a third party buried point identification generation method and device based on data standardization, a computer readable storage medium and computer equipment.
Background
In the application data analysis scene, buried point analysis plays an important role. The embedded point of the page in the application can be used for flow analysis, such as analyzing page flow data such as page browsing number PV, independent access data amount UV, page access times and the like, so as to provide an improvement direction with reference value for the application in terms of improving the conversion rate, user viscosity and the like. The application is usually accessed with a third party page developed by a third party, but the embedded point rules of all the third party pages in the existing application are usually different, and when the third party page data in the application is analyzed, the embedded point sources of the pages cannot be quickly and accurately identified, so that the statistical analysis of the application macroscopic data is affected.
Disclosure of Invention
In order to solve at least one of the technical defects, the invention provides a third party buried point identification generation method based on data standardization, a corresponding device, a computer readable storage medium and computer equipment.
According to one aspect, the embodiment of the invention provides a third party buried point identification generation method based on data standardization, which comprises the following steps:
receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
extracting tag parameters and channel information of the clicked buried point from the buried point information;
acquiring preset channel parameters matched with the channel information;
and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point.
Preferably, the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
Further, the preset mapping relationship is preset by the following manner:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
Preferably, the splicing the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
Preferably, the receiving the embedded point information of the click embedded point corresponding to the third party page reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
Preferably, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
In addition, according to another aspect, an embodiment of the present invention provides a third party buried point identifier generating device based on data standardization, including:
the embedded point information receiving module is used for receiving embedded point information of the corresponding click embedded point of the third-party page reported by the user client;
the information extraction module is used for extracting the tag parameters and channel information of the click buried point from the buried point information;
the channel parameter acquisition module is used for acquiring preset channel parameters matched with the channel information;
and the buried point identifier generation module is used for performing splicing processing on the channel parameters and the tag parameters to generate the buried point identifier of the click buried point.
Preferably, the channel parameter obtaining module is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
According to still another aspect, an embodiment of the present invention provides a computer readable storage medium, where a computer program is stored, where the computer program is executed by a processor to implement the method for generating a three-way buried point identifier.
According to yet another aspect, embodiments of the present invention provide a computer device, the computer comprising one or more processors; a memory; one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: and executing the third party buried point identification generation method.
Compared with the prior art, the invention has the following beneficial effects:
according to the data standardization-based third party buried point identification generation method, the data standardization-based third party buried point identification generation device, the computer-readable storage medium and the computer equipment, the buried point labels reported by the third party and the channel parameters set by the application are spliced, so that the third party buried point identification used in the application can be simply and quickly generated on the basis of the buried point labels reported by the third party with minimum variation, the application can conveniently and uniformly manage the clicked buried points in the accessed third party pages, and powerful support is provided for the application to quickly and accurately identify the sources of the buried points of the pages and statistically analyze macroscopic data.
In addition, the third party buried point identification generation method, the device, the computer readable storage medium and the computer equipment based on data standardization further determine the channel parameters matched with the channel information by determining the information module corresponding to the third party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
Additional aspects and advantages of the invention will be set forth in part in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention.
Drawings
The foregoing and/or additional aspects and advantages of the invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings, in which:
FIG. 1 is a flow chart of a method for generating a third party buried point identifier based on data standardization according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a third party buried point identifier generating device based on data standardization according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
Embodiments of the present invention are described in detail below, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to like or similar elements or elements having like or similar functions throughout. The embodiments described below by referring to the drawings are illustrative only and are not to be construed as limiting the invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless expressly stated otherwise, as understood by those skilled in the art. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The term "and/or" as used herein includes all or any element and all combination of one or more of the associated listed items.
It will be understood by those skilled in the art that all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs unless defined otherwise. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the prior art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
During the development of an application, some applications, such as security caretaker applications, have access to pages developed by third parties. Because the third-party page is automatically developed by a third party, the embedded point identification rules of all the parties are different, the current application cannot monitor the operation behaviors of the user on the third-party page, and further cannot count the breakpoint situation of the third-party page and analyze and obtain a targeted platform operation strategy and a product strategy according to the breakpoint situation of the third-party page.
In this regard, the embodiment of the invention provides a third party buried point identifier generating method based on data standardization, as shown in fig. 1, the method includes:
step S101: and receiving the embedded point information of the corresponding click embedded point of the third-party page reported by the user client.
For the embodiment, the third party page is a page to be accessed to the current application and developed by a third party. The click buried point is preset in a third party page by a third party when the page is developed, and is used for running a pre-built code to report data when a user client accessing the third party page responds to the click control operation of the user when the user executes the click control operation in the third party page. Specifically, when the third-party page is initialized, initializing an SDK (Software Development Kit ) for clicking the buried point in the third-party page, and when a trigger click control event occurs in the third-party page, calling a corresponding buried point data sending interface in the SDK to send buried point information.
For this embodiment, in order to reduce the traffic consumed by the user client in reporting data, the user client may implement reporting of the buried point information in a data mapping manner, that is, the user client performs simplified processing on the buried point information before reporting, and does not report specific parameter values, and accordingly, the application server obtains the buried point information by mapping simplified data according to a preset MAP-KEY mapping relationship after receiving the simplified processed buried point information reported by the user client. In addition, the user client can report the embedded point information in a non-instant sending mode, after compressing and packaging a plurality of pieces of data, waiting for the network condition to be good or reporting the embedded point information in a timing mode, and correspondingly, the application server performs decompression processing after receiving the data packet reported by the user client to obtain a plurality of pieces of embedded point information.
For this embodiment, the embedded point information reported by the user client includes, but is not limited to: the label parameters set by the third party for identifying the click buried point, such as 1001, 1002 and the like; channel information for identifying a source of data; a user ID for identifying a unique identity of the end user; a mobile equipment number (IMEI) for identifying the user client mobile device; time information for indicating event trigger time.
Step S102: and extracting the tag parameters and channel information of the click buried point from the buried point information.
For this embodiment, the tag parameter and the channel information are extracted from the received buried point information corresponding to the click buried point. The tag parameter is a parameter set by a third party and used for identifying a click buried point, and specifically, the tag parameter is used for identifying the click buried point so as to distinguish the click buried point from other click buried points in the same third party page or different third party pages developed by the third party. The channel information is used to identify the source of the data, in particular, to identify a third party or third party page of the point-of-click source.
Step S103: and obtaining preset channel parameters matched with the channel information.
For this embodiment, the channel parameter is a preset value given to the application by the third party, and the channel parameter is a unique identification parameter set by the application for identifying the source of the data, and there is only one channel parameter. For example, the security caretaker application distributes channel parameters for the third party as follows: and 5 is a financial module, the channel parameters allocated for carefully chosen funds under the module are 501, the channel parameters allocated for guaranty are 502, and so on. The channel information and the channel parameters are pre-stored with a mapping relation, and after the channel information is extracted from the reported buried point information by the application server, the channel parameters matched with the channel information can be obtained based on the pre-stored mapping relation. By means of the channel parameters, the source of each buried point can be clearly distinguished into which channel is specific.
Step S104: and performing splicing processing on the channel parameters and the label parameters to generate the buried point identification of the clicked buried point.
For this embodiment, after the channel parameters are obtained, the channel parameters and the tag parameters are automatically spliced together based on a preset splicing processing rule, so as to generate the buried point identifier including the channel parameters and the tag parameters of the click buried point. The embedded point identification is a unique identification which is set by the application and used for identifying the clicking embedded point, and because the embedded point identification is generated according to the channel parameters and the tag parameters, the application can quickly identify the embedded point source according to the embedded point identification, namely a third party or a third party page of the clicking embedded point source.
According to the third party buried point identification generation method based on data standardization, the buried point labels reported by the third party and the channel parameters set by the application are spliced, so that the third party buried point identifications used in the application can be simply and quickly generated on the basis of the buried point labels reported by the third party with minimum variation, the application can conveniently and uniformly manage the clicked buried points in the accessed third party pages, and powerful support is provided for the application to quickly and accurately identify the sources of the buried points of the pages and statistically analyze macroscopic data.
In one embodiment, the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
For this embodiment, a preset mapping relationship exists between the channel information and the channel parameters, and according to the preset mapping relationship, channel parameters matched with the channel information can be mapped by the channel information.
The preset mapping relation may be embodied in the form of a preset mapping table.
Taking the application as a safe caretaker application as an example, as shown in the following table 1, a preset mapping table recording a preset mapping relationship between the channel information and the channel parameters is shown in a specific embodiment. In table 1, the first list is the channel information, i.e. information for identifying the third party or the third party page from which the click-through point originated, such as carefully chosen funds, guaranteed honour, etc., and the second list is the channel parameters, such as 501, 502, … …, which are correspondingly allocated to the channel information.
TABLE 1 channel information and corresponding channel parameters
Channel information | Channel parameters |
Choice fund | 501 |
Baozun Baobao | 502 |
Financial account | 503 |
Land fund | 504 |
Nianshenbao | 505 |
It should be clearly noted that, the preset mapping relationship between the channel information and the channel parameters may also be embodied in other forms, which is not limited in this embodiment.
In one embodiment, the preset mapping relationship is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
In an actual application scenario, the application may include a plurality of information modules, so as to display or provide multiple information or services to the user, and the accessed third-party page is preset with the corresponding information module.
For the embodiment, in order to further improve the identification degree of the third party buried point identifier, it is convenient for the application to uniformly manage the clicked buried points in the accessed third party page, the channel parameters are distributed according to the information modules corresponding to the third party page, specifically, a certain data bit of the channel parameters is preset as a data bit for identifying the information modules, and the information modules corresponding to the third party page can be determined according to the data bit. After extracting the channel information, the application server determines an information module affiliated to the third-party page in the application according to the channel information, and then determines channel parameters matched with the channel information according to the information module.
Taking the safe housekeeper application as an example, the safe housekeeper application is a diversified application integrating insurance, banking, investment and life, and can comprehensively meet various requirements of users, and an information module in the safe housekeeper application comprises: health module, life module, activity module, policy module and financial module. The application may preset the first data bit of the channel parameter to be a data bit for identifying an information module, if it is determined that the information module corresponding to the third party page is a financial module according to the channel information, and the first data bit of the channel parameter corresponding to the financial module is 5, it is determined that the channel parameter matching the channel information should start with 5, for example 501, 502, and so on, according to the information module.
In this embodiment, by determining the information module corresponding to the third-party page according to the channel information, and further determining the channel parameter matched with the channel information, the method can further facilitate the unified management of the click buried point in the accessed third-party page, and provide powerful support for the application to quickly and accurately identify the information module and the buried point source of the page, and the statistical analysis of macroscopic data.
In one embodiment, the splicing the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
For this embodiment, after the channel parameters are obtained, the channel parameters and the tag parameters are automatically spliced together based on a preset splicing processing rule, specifically, preset splicing characters, such as "_and" & "are adopted to splice the tag parameters to the data end of the channel parameters, so as to generate the buried point identifier of the click buried point.
For example, if the buried point tag parameter label reported by a certain third party is 1001 and the channel parameter allocated to the application is 503, the buried point identifier generated corresponding to the clicked buried point is 503_1001.
For another example, if the channel parameter assigned by the security manager to the choice fund under the financial module is 501, all the point marks at the beginning of 501 will be subordinate to the choice fund, and the point marks of the choice fund may be 501_1001, 501_1002, and 501_2001 … ….
In this embodiment, the tag parameter is spliced to the data end of the channel parameter to generate the buried point identifier of the clicked buried point, so that the click buried point in the accessed third-party page can be managed uniformly, and powerful support is provided for the application to quickly and accurately identify the source of the buried point of the page and statistically analyze the macroscopic data according to the data bit in front of the buried point identifier.
In one embodiment, the receiving the embedded point information of the click embedded point corresponding to the third party page reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
In an actual application scenario, particularly in the application fields of insurance, finance and the like, the embedded point information uploaded by the user client side usually further comprises personal information of the user selected by clicking the control.
For this embodiment, in order to improve the security of the personal information of the user in the data transmission process, the buried point information is transmitted in an encrypted data form in the reporting process. The encryption click buried point is preset in a third party page when a third party develops the page, and is used for running a pre-built code to report encryption data in response to click control operation of a user by a user client accessing the third party page when the user executes the click control operation in the third party page. Specifically, when the third-party page is initialized, initializing an SDK (Software Development Kit ) for clicking the embedded point in the third-party page, and when a trigger click control event occurs in the third-party page, adopting a preset encryption algorithm, such as a symmetric encryption algorithm or an asymmetric encryption algorithm, to encrypt the embedded point information, and calling a corresponding embedded point data transmission interface in the SDK to transmit the encrypted embedded point information. Correspondingly, after receiving the encrypted embedded point information of the click embedded point corresponding to the third-party page reported by the user client, the application server decrypts the encrypted embedded point information by adopting a decryption algorithm matched with the preset encryption algorithm to obtain decrypted embedded point information.
In the embodiment, the buried point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or tampered maliciously.
In one embodiment, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
For this embodiment, after the buried point identifier of the clicked buried point is generated, the buried point identifier of the clicked buried point is stored in a preset database, and the buried point information corresponding to the clicked buried point is stored in the preset database at a position corresponding to the buried point identifier.
In this embodiment, the embedded point identifier and the embedded point information corresponding to the clicked embedded point are stored in a preset database, so that the application is further facilitated to perform unified management on the clicked embedded point in the accessed third party page, powerful support is provided for the application to quickly and accurately identify the source of the embedded point of the page and statistically analyze macroscopic data, the corresponding embedded point information is stored according to the embedded point identifier, matching of user information by a third party is not required, the application can associate the clicked embedded point with the user information, and the granularity of the embedded point can be refined to a single user.
In addition, an embodiment of the present invention provides a third party buried point identifier generating device based on data standardization, as shown in fig. 2, where the device includes: a buried point information receiving module 21, an information extracting module 22, a channel parameter acquiring module 23 and a buried point identification generating module 24; wherein,
the embedded point information receiving module 21 is configured to receive embedded point information of a click embedded point corresponding to a third party page reported by a user client;
the information extraction module 22 is configured to extract the tag parameter and the channel information of the click buried point from the buried point information;
the channel parameter obtaining module 23 is configured to obtain preset channel parameters matched with the channel information;
the buried point identifier generating module 24 is configured to splice the channel parameter and the tag parameter to generate a buried point identifier of the click buried point.
In one embodiment, the channel parameter obtaining module 23 is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
In one embodiment, the preset mapping relationship is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
In one embodiment, the buried point identifier generating module 24 is specifically configured to:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
In one embodiment, the buried point information receiving module 21 is specifically configured to:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
In one embodiment, after the splicing processing is performed on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point, the method further includes:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
The third party buried point identification generating device based on data standardization provided by the invention can realize the following steps: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The third party buried point identifier generating device based on data standardization provided by the embodiment of the present invention can implement the method embodiment provided above, and specific function implementation is referred to the description in the method embodiment and is not repeated here.
In addition, the embodiment of the invention provides a computer readable storage medium, and a computer program is stored on the computer readable storage medium, and the computer program realizes the third party buried point identification generation method based on data standardization in the above embodiment when being executed by a processor. The computer readable storage medium includes, but is not limited to, any type of disk including floppy disks, hard disks, optical disks, CD-ROMs, and magneto-optical disks, ROMs (Read-Only memories), RAMs (Random AcceSS Memory, random access memories), EPROMs (EraSable Programmable Read-Only memories), EEPROMs (Electrically EraSable Programmable Read-Only memories), flash memories, magnetic cards, or optical cards. That is, a storage device includes any medium that stores or transmits information in a form readable by a device (e.g., computer, cell phone), and may be read-only memory, magnetic or optical disk, etc.
The computer readable storage medium provided by the invention can realize: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The computer readable storage medium provided by the embodiments of the present invention may implement the method embodiments provided above, and specific functional implementation is referred to the description in the method embodiments and will not be repeated here.
In addition, the embodiment of the invention also provides computer equipment, as shown in fig. 3. The computer device described in this embodiment may be a server, a personal computer, a network device, or the like. The computer device includes a processor 302, a memory 303, an input unit 304, a display unit 305, and the like. It will be appreciated by those skilled in the art that the device architecture shown in fig. 3 does not constitute a limitation of all devices, and may include more or fewer components than shown, or may combine certain components. The memory 303 may be used to store a computer program 301 and functional modules, and the processor 302 runs the computer program 301 stored in the memory 303 to perform various functional applications of the device and data processing. The memory may be internal memory or external memory, or include both internal memory and external memory. The internal memory may include read-only memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), flash memory, or random access memory. The external memory may include a hard disk, floppy disk, ZIP disk, U-disk, tape, etc. The disclosed memory includes, but is not limited to, these types of memory. The memory disclosed herein is by way of example only and not by way of limitation.
The input unit 304 is used for receiving input of a signal and receiving keywords input by a user. The input unit 304 may include a touch panel and other input devices. The touch panel may collect touch operations on or near the user (e.g., the user's operation on or near the touch panel using any suitable object or accessory such as a finger, stylus, etc.), and drive the corresponding connection device according to a preset program; other input devices may include, but are not limited to, one or more of a physical keyboard, function keys (e.g., play control keys, switch keys, etc.), a trackball, mouse, joystick, etc. The display unit 305 may be used to display information entered by a user or provided to a user as well as various menus of the computer device. The display unit 305 may take the form of a liquid crystal display, an organic light emitting diode, or the like. The processor 302 is the control center of the computer device, connects the various parts of the overall computer using various interfaces and lines, performs various functions and processes data by running or executing software programs and/or modules stored in the memory 302, and invoking data stored in the memory.
As one embodiment, the computer device includes: the system comprises one or more processors 302, a memory 303, one or more computer programs 301, wherein the one or more computer programs 301 are stored in the memory 303 and configured to be executed by the one or more processors 302, the one or more computer programs 301 configured to perform the data standardization based third party buried point identification generation method described in any of the embodiments above.
The computer equipment provided by the invention can realize: by splicing the embedded point label reported by the third party with the channel parameters set by the application, the embedded point identification of the third party used in the application can be simply and quickly generated on the basis of the embedded point label reported by the third party with minimum variation, so that the application can conveniently and uniformly manage the clicked embedded point in the accessed third party page, and powerful support is provided for the application to quickly and accurately identify the embedded point source of the page and statistically analyze macroscopic data; it is also possible to realize: determining channel parameters matched with the channel information by determining an information module corresponding to the third-party page according to the channel information; the label parameters are spliced at the data end of the channel parameters to generate the buried point identification of the clicked buried point, so that unified management of the clicked buried point in the accessed third-party page is further facilitated, and powerful support is provided for the application to quickly and accurately identify the information module and buried point source of the page dependence and to statistically analyze macroscopic data; and the embedded point information is transmitted in an encrypted data form in the reporting process, so that the safety of the personal information of the user in the data transmission process can be effectively improved, and the personal information of the user is prevented from being revealed or maliciously tampered.
The computer device provided by the embodiment of the present invention may implement the method embodiment provided above, and specific functional implementation is referred to the description in the method embodiment and will not be repeated here.
In addition, each functional unit in the embodiments of the present invention may be integrated in one processing module, or each unit may exist alone physically, or two or more units may be integrated in one module. The integrated modules may be implemented in hardware or in software functional modules. The integrated modules may also be stored in a computer readable storage medium if implemented in the form of software functional modules and sold or used as a stand-alone product.
The foregoing is only a partial embodiment of the present invention, and it should be noted that it will be apparent to those skilled in the art that modifications and adaptations can be made without departing from the principles of the present invention, and such modifications and adaptations are intended to be comprehended within the scope of the present invention.
Claims (10)
1. The third party buried point identification generation method based on data standardization is characterized by comprising the following steps:
receiving embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
extracting tag parameters and channel information of the clicked buried point from the buried point information;
acquiring preset channel parameters matched with the channel information;
splicing the channel parameters and the tag parameters to generate a buried point identifier of the clicked buried point;
the receiving of the embedded point information of the corresponding click embedded point of the third party page reported by the user client side comprises the following steps:
receiving simplified buried point information reported by a user client, and obtaining the buried point information according to a preset MAP-KEY mapping relation and the simplified buried point information;
the obtaining preset channel parameters matched with the channel information comprises the following steps:
determining an information module to which the third-party page belongs according to the channel information, and determining channel parameters matched with the channel information according to the information module;
the channel parameters are distributed according to the information modules corresponding to the third-party pages, and preset data bits of the channel parameters are preset as data bits for identifying the information modules;
the tag parameters are parameters for identifying the click buried point, the channel information is used for identifying the data source of the click buried point, and the channel parameters are unique identification parameters for identifying the data source.
2. The method for generating the third party buried point identifier according to claim 1, wherein the obtaining preset channel parameters matched with the channel information includes:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
3. The method for generating a third party buried point identifier according to claim 2, wherein the preset mapping relation is preset by:
determining an information module corresponding to the third-party page according to the channel information;
determining channel parameters matched with the channel information according to the information module;
and setting a preset mapping relation between the channel information and the channel parameters according to the channel information and the channel parameters.
4. The method for generating the third party buried point identifier according to claim 1, wherein the step of performing a splicing process on the channel parameter and the tag parameter to generate the buried point identifier of the click buried point includes:
and splicing the label parameters to the data end of the channel parameters by adopting preset splicing characters, and generating the buried point identification of the clicked buried point.
5. The method for generating the third party buried point identifier according to claim 1, wherein the receiving the buried point information of the third party page corresponding to the clicked buried point reported by the user client includes:
receiving encrypted embedded point information of a corresponding click embedded point of a third-party page reported by a user client;
and carrying out decryption processing on the encrypted buried point information to obtain decrypted buried point information.
6. The method for generating a third party buried point identifier according to claim 1, wherein the splicing processing is performed on the channel parameter and the tag parameter, and after generating the buried point identifier of the click buried point, the method further comprises:
and storing the buried point identification and the buried point information corresponding to the clicked buried point into a preset database.
7. A third party buried point identification generating device based on data standardization, which is characterized by comprising:
the embedded point information receiving module is used for receiving embedded point information of the corresponding click embedded point of the third-party page reported by the user client;
the information extraction module is used for extracting the tag parameters and channel information of the click buried point from the buried point information;
the channel parameter acquisition module is used for acquiring preset channel parameters matched with the channel information;
the buried point identifier generation module is used for performing splicing processing on the channel parameters and the tag parameters to generate a buried point identifier of the click buried point;
the receiving of the embedded point information of the corresponding click embedded point of the third party page reported by the user client side comprises the following steps:
receiving simplified buried point information reported by a user client, and obtaining the buried point information according to a preset MAP-KEY mapping relation and the simplified buried point information;
the obtaining preset channel parameters matched with the channel information comprises the following steps:
determining an information module to which the third-party page belongs according to the channel information, and determining channel parameters matched with the channel information according to the information module;
the channel parameters are distributed according to the information modules corresponding to the third-party pages, and preset data bits of the channel parameters are preset as data bits for identifying the information modules;
the tag parameters are parameters for identifying the click buried point, the channel information is used for identifying the data source of the click buried point, and the channel parameters are unique identification parameters for identifying the data source.
8. The third party buried point identifier generating device according to claim 7, wherein the channel parameter obtaining module is specifically configured to:
and acquiring preset channel parameters matched with the channel information according to a preset mapping relation between the channel information and the channel parameters.
9. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, implements the third party buried point identification generation method according to any one of claims 1 to 6.
10. A computer device, comprising:
one or more processors;
a memory;
one or more computer programs, wherein the one or more computer programs are stored in the memory and configured to be executed by the one or more processors, the one or more computer programs configured to: a third party buried point identification generating method according to any one of claims 1 to 6 is performed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811231468.6A CN109597949B (en) | 2018-10-22 | 2018-10-22 | Third party buried point identification generation method and equipment based on data standardization |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811231468.6A CN109597949B (en) | 2018-10-22 | 2018-10-22 | Third party buried point identification generation method and equipment based on data standardization |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109597949A CN109597949A (en) | 2019-04-09 |
CN109597949B true CN109597949B (en) | 2024-04-02 |
Family
ID=65957954
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811231468.6A Active CN109597949B (en) | 2018-10-22 | 2018-10-22 | Third party buried point identification generation method and equipment based on data standardization |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109597949B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111352969B (en) * | 2020-02-28 | 2023-12-05 | 广州市千钧网络科技有限公司 | Buried point data analysis method and device and electronic equipment |
CN111610928A (en) * | 2020-04-27 | 2020-09-01 | 上海容易网电子商务股份有限公司 | Rapid and universal buried point data acquisition method |
CN111966339B (en) * | 2020-07-23 | 2024-04-09 | 招联消费金融股份有限公司 | Buried point parameter input method and device, computer equipment and storage medium |
CN113742161A (en) * | 2020-09-07 | 2021-12-03 | 北京沃东天骏信息技术有限公司 | Buried point reporting method and device |
CN112596978B (en) * | 2020-12-23 | 2023-07-14 | 华人运通(上海)云计算科技有限公司 | Buried point information processing method, buried point information processing device and medium |
CN112817816B (en) * | 2021-01-25 | 2023-03-31 | 微民保险代理有限公司 | Embedded point processing method and device, computer equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106844217A (en) * | 2017-01-26 | 2017-06-13 | 网易(杭州)网络有限公司 | Control to applying bury method and device, readable storage medium storing program for executing a little |
CN107196788A (en) * | 2017-05-02 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of processing method for burying point data, device, server and client |
CN107818162A (en) * | 2017-11-01 | 2018-03-20 | 平安科技(深圳)有限公司 | Bury a processing method, device, computer equipment and storage medium |
CN107908656A (en) * | 2017-10-13 | 2018-04-13 | 平安科技(深圳)有限公司 | Increase channel method, application server and computer-readable recording medium |
WO2018113385A1 (en) * | 2016-12-24 | 2018-06-28 | 上海壹账通金融科技有限公司 | Method and system for dynamically tracking application of client, client, and server |
CN108256025A (en) * | 2018-01-10 | 2018-07-06 | 链家网(北京)科技有限公司 | The construction method and device of the page based on HTML5 |
CN108572908A (en) * | 2017-03-14 | 2018-09-25 | 腾讯科技(深圳)有限公司 | information feedback method and device |
-
2018
- 2018-10-22 CN CN201811231468.6A patent/CN109597949B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113385A1 (en) * | 2016-12-24 | 2018-06-28 | 上海壹账通金融科技有限公司 | Method and system for dynamically tracking application of client, client, and server |
CN106844217A (en) * | 2017-01-26 | 2017-06-13 | 网易(杭州)网络有限公司 | Control to applying bury method and device, readable storage medium storing program for executing a little |
CN108572908A (en) * | 2017-03-14 | 2018-09-25 | 腾讯科技(深圳)有限公司 | information feedback method and device |
CN107196788A (en) * | 2017-05-02 | 2017-09-22 | 阿里巴巴集团控股有限公司 | A kind of processing method for burying point data, device, server and client |
CN107908656A (en) * | 2017-10-13 | 2018-04-13 | 平安科技(深圳)有限公司 | Increase channel method, application server and computer-readable recording medium |
CN107818162A (en) * | 2017-11-01 | 2018-03-20 | 平安科技(深圳)有限公司 | Bury a processing method, device, computer equipment and storage medium |
CN108256025A (en) * | 2018-01-10 | 2018-07-06 | 链家网(北京)科技有限公司 | The construction method and device of the page based on HTML5 |
Also Published As
Publication number | Publication date |
---|---|
CN109597949A (en) | 2019-04-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109597949B (en) | Third party buried point identification generation method and equipment based on data standardization | |
US11531766B2 (en) | Systems and methods for attributing security vulnerabilities to a configuration of a client device | |
US9411958B2 (en) | Polymorphic treatment of data entered at clients | |
US10073916B2 (en) | Method and system for facilitating terminal identifiers | |
US11321734B2 (en) | Information processing method, server, and computer storage medium | |
US8671449B1 (en) | Systems and methods for identifying potential malware | |
US9948637B2 (en) | System and method for data security on big data sets | |
CN108512854B (en) | System information safety monitoring method and device, computer equipment and storage medium | |
US8955143B1 (en) | Use of decoy data in a data store | |
US20210092160A1 (en) | Data set creation with crowd-based reinforcement | |
CN104836781A (en) | Method distinguishing identities of access users, and device | |
CN108287823B (en) | Message data processing method and device, computer equipment and storage medium | |
CN113076104A (en) | Page generation method, device, equipment and storage medium | |
US20210382986A1 (en) | Dynamic, Runtime Application Programming Interface Parameter Labeling, Flow Parameter Tracking and Security Policy Enforcement | |
CN109542894B (en) | User data centralized storage method, device, medium and computer equipment | |
CN108052550B (en) | Annuity data receiving method and device, computer equipment and storage medium | |
CN110807209B (en) | Data processing method, device and storage medium | |
CN114186760A (en) | Analysis method and system for stable operation of enterprise and readable storage medium | |
CN104639387B (en) | A kind of user network behavior tracking method and apparatus | |
CN109818906A (en) | A kind of device-fingerprint information processing method, device and server | |
CN110443044A (en) | Block chain client bug excavation method, device, equipment and storage medium | |
CN110070383B (en) | Abnormal user identification method and device based on big data analysis | |
CN111448551B (en) | Method and system for tracking application activity data from a remote device and generating a corrective action data structure for the remote device | |
CN114036364B (en) | Method, apparatus, device, medium, and system for identifying crawlers | |
CN112817816B (en) | Embedded point processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |