CN110674440A - Buried point data processing method, system, computer device and readable storage medium - Google Patents

Buried point data processing method, system, computer device and readable storage medium Download PDF

Info

Publication number
CN110674440A
CN110674440A CN201910814008.4A CN201910814008A CN110674440A CN 110674440 A CN110674440 A CN 110674440A CN 201910814008 A CN201910814008 A CN 201910814008A CN 110674440 A CN110674440 A CN 110674440A
Authority
CN
China
Prior art keywords
buried point
target
program
point data
buried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910814008.4A
Other languages
Chinese (zh)
Inventor
芦永胜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910814008.4A priority Critical patent/CN110674440A/en
Publication of CN110674440A publication Critical patent/CN110674440A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention provides a buried point data processing method based on computer equipment, which comprises the following steps: configuring a buried point program for the computer equipment in advance, wherein the buried point program is used for processing buried point data; monitoring at least one service process running in the computer equipment, wherein the service process is used for executing a plurality of associated services of a target application program, and the associated services comprise target services with preset data embedding point requirements; when the target service is monitored to be executed, starting a corresponding target embedded point process through the embedded point program; acquiring buried point data through the target buried point process; and reporting the buried point data to a server through the target buried point process. The embodiment of the invention also provides a system, computer equipment and a readable storage medium. The embodiment of the invention can improve the readability of codes, avoid the problem that the buried point data cannot be reported, and avoid the problem that the corresponding process is blocked in the buried point logic when the communication with the server is abnormal.

Description

Buried point data processing method, system, computer device and readable storage medium
Technical Field
The embodiment of the invention relates to the field of computer data processing, in particular to a buried point data processing method and system based on computer equipment, the computer equipment and a computer readable storage medium.
Background
With the rapid development of mobile terminal technology, people can install various applications, such as browsers, communication tools, news tools, etc., in mobile terminals according to their own needs. These applications typically need to interact with a remote server to provide functionality and data usage to users, and thus statistical requirements for user behavior, active operational effects, data access frequency, conversion rate, etc. are increasing. One of the current ways to obtain application data is to set data embedding points in the application, such as data embedding points related to services, data and interactions, and report the data embedding points to a server, so that a service request is statistically analyzed based on the data embedding points, and the operation activity effect, the access amount, and the like are evaluated.
In the prior art, a general application program is composed of a plurality of processes, and each process corresponds to one or more pieces of embedded logic. It can be seen that the defects of data embedding points in the prior art are obvious: 1, each process has corresponding embedded point logic, so that the readability of the code is poor; 2, some processes do not need to communicate with a server, and the data of the embedded point logic may not be reported; and 3, when the communication with the server is abnormal, the corresponding process can be blocked in the embedded point logic.
Disclosure of Invention
In view of the above, embodiments of the present invention provide a method, a system, a computer device and a computer readable storage medium for processing embedded point data based on a computer device, which can improve code readability, avoid the problem that the embedded point data cannot be reported, and avoid the problem that a corresponding process is blocked in embedded point logic when communication with a server is abnormal.
In order to achieve the above object, an embodiment of the present invention provides a buried point data processing method based on a computer device, including the following steps:
configuring a buried point program for the computer equipment in advance, wherein the buried point program is used for processing buried point data;
monitoring at least one service process running in the computer equipment, wherein the service process is used for executing a plurality of associated services of a target application program, and the associated services comprise target services with preset data embedding point requirements;
when the target service is monitored to be executed, starting a corresponding target embedded point process through the embedded point program;
acquiring buried point data through the target buried point process; and
and reporting the buried point data to a server through the target buried point process.
Preferably, the step of configuring the computer device with a buried point program in advance includes:
adding a plurality of pre-configured buried point logics to the buried point program, each buried point logic being associated with a respective buried point logic code.
Preferably, the step of configuring the computer device with a buried point program in advance includes:
the computer device is configured with a buried point program with a plurality of buried point processes in advance, and each buried point process in the plurality of processes is used for associating one or more corresponding application programs.
Preferably, when monitoring that the target service is executed, the step of starting the buried point program and starting a corresponding buried point process includes:
and starting the embedded point program and starting a target embedded point process related to the target application program.
Preferably, the step of obtaining the data of the buried point through the buried point process includes:
providing a protocol to a target embedded point process through command line transmission parameters, wherein the protocol comprises corresponding command parameters and content parameters, the command is used for indicating target embedded point logic to be executed by the target process, and the content parameters are used for indicating embedded point data to be reported to the server;
and generating the buried point data by the target buried point process according to the target buried point logic and the content parameter.
Preferably, the step of reporting the buried point data to a server through the target buried point process includes:
reporting the buried point data in a circulating mode at a preset frequency;
judging whether the buried point data is reported to the server or whether the reporting frequency reaches a preset threshold value;
if the buried point data is reported to the server, clearing the buried point data and closing the target buried point process;
and if the reporting times reach a preset threshold value and the buried point data is not reported to the server, storing the buried point data into a local database, and closing the target buried point process.
Preferably, if the buried point data is not reported to the server, the method further comprises:
and configuring a daemon process, and starting the target embedded point process at a preset frequency through the daemon process so that the target embedded point process reports the embedded point data to the server.
In order to achieve the above object, an embodiment of the present invention further provides a buried point data processing system based on a computer device, including:
the computer equipment comprises a buried point program configuration module, a buried point program processing module and a data processing module, wherein the buried point program configuration module is used for configuring a buried point program for the computer equipment in advance, and the buried point program is used for processing buried point data;
a service process monitoring module, configured to monitor at least one service process running in the computer device, where the service process is used to execute multiple associated services of a target application program, and the multiple associated services include a target service in which a data embedding point is preset;
a buried point process starting module, configured to start a corresponding target buried point process through the buried point program when monitoring that the target service is executed;
the buried point data acquisition module is used for acquiring buried point data through the target buried point process; and
and the buried point data reporting module is used for reporting the buried point data to a server through the target buried point process.
In order to achieve the above object, the embodiments of the present invention further provide a computer device, a memory of the computer device, a processor, and a computer program stored in the memory and executable on the processor, wherein the computer program, when executed by the processor, implements the steps of the method for processing the embedded data based on the computer device as described above.
To achieve the above object, an embodiment of the present invention further provides a computer-readable storage medium, in which a computer program is stored, where the computer program is executable by at least one processor to cause the at least one processor to execute the steps of the method for processing buried point data based on a computer device as described above.
According to the embedded point data processing method and system based on the computer equipment, the computer equipment and the computer readable storage medium, the embedded point logics are placed in the embedded point processes instead of being inserted into each service code executing each service process, so that the readability of the codes is effectively improved; because the buried point data is in the buried point process, but not distributed in each service process, the problem that the buried point data cannot be reported is avoided; similarly, the embedded point data is in the embedded point process and reported to the server through the embedded point, so that the problem that the corresponding process is blocked in the embedded point logic when the communication with the server is abnormal is avoided.
Drawings
Fig. 1 is a schematic view of an operating environment of a buried point data processing method based on a computer device according to an embodiment of the present invention.
Fig. 2 is a flowchart of a first embodiment of a buried point data processing method based on a computer device according to the present invention.
FIG. 3 is a schematic diagram of program modules of a second embodiment of a buried point data processing system based on a computer device according to the present invention.
Fig. 4 is a schematic diagram of a hardware structure of a third embodiment of the computer device according to the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clearly understood, the present application is further described in detail below with reference to the accompanying drawings and the embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the description relating to "first", "second", etc. in the present invention is for descriptive purposes only and is not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present invention.
Fig. 1 is a schematic diagram illustrating an operating environment of a buried point data processing method based on a computer device according to an embodiment of the present invention. The computer device 2 is illustratively connected to a server 4.
The computer device 2 may run an operating system such as Microsoft Windows, Linux, Mac OS, Android, IOS, and the like, and the operating system is loaded with a browser application (e.g., an IE browser, a Chrome browser, and the like), a communication application (e.g., wechat, facebook), and the like. It should be noted that the computer device 2 may be a personal computer, a tablet computer, a mobile phone, or the like.
The following embodiment will exemplarily be described with the computer apparatus 2 as an execution subject.
Example one
Referring to fig. 2, a flowchart illustrating steps of a method for processing buried point data based on a computer device according to a first embodiment of the present invention is shown. It is to be understood that the flow charts in the embodiments of the present method are not intended to limit the order in which the steps are performed. The details are as follows.
And step S100, configuring a buried point program for the computer equipment in advance, wherein the buried point program is used for processing buried point data.
The data embedding point refers to a related technology for capturing, processing and sending specific user behaviors or events and an implementation process thereof, and the data embedding point is result data obtained after the data embedding point is passed.
Specifically, the data embedding point may be used to monitor an event of the application program during the operation process, perform judgment and capture when the event needing attention occurs, then obtain necessary service data, and finally arrange the service data and send the service data to the server 4. The monitored event can be provided by platforms such as an operating system, a browser, an APP framework and the like, and the trigger condition can be customized on the basis of the event (for example, a certain specific button is clicked).
In an exemplary embodiment, the step S100 may further include: adding a plurality of pre-configured buried point logics to the buried point program, each buried point logic being associated with a respective buried point logic code.
The buried point logic code may be programmed by monitoring the SDK provided by the analysis tool. The pair-multi-buried-point logic code of a plurality of buried-point logic pairs is encapsulated into a single buried-point program. And carrying out data embedding operation in the embedding point program set.
In an exemplary embodiment, the step S100 may further include: the computer device is configured with a buried point program with a plurality of buried point processes in advance, and each buried point process in the plurality of processes is used for associating one or more corresponding application programs.
Illustratively, a mapping relationship is established in advance between each embedded point and the process number of the corresponding application program, and the mapping relationship is stored in a mapping table.
That is, multiple applications in the computer device 2 that have data burial requirements share the burial program, but different applications may not share the burial process. For example, if the application program A has a data embedding point service requirement, a embedding point process is started; application B needs to bury the point and also starts a process of burying the point, and there are 2 processes of burying the point at the same time.
Step S102, at least one service process running in the computer equipment is monitored, the service process is used for executing a plurality of associated services of a target application program, and the associated services comprise target services with preset data burying point requirements.
The computer device 2 may be installed with a plurality of application programs, and each application program in the running state may correspond to one or more business processes, and each business process is used for processing one or more associated businesses.
Taking a target application program in the plurality of application programs as an example:
when the target application program is in a running state, one or more business processes may be corresponding to each business process, and each business process is used for processing one or more associated services specified by the target application program. Among other things, the business data of some of these associated businesses may need to be used for data analysis, thus requiring data landfills.
And step S104, when the target service is monitored to be executed, starting a corresponding target embedded point process through the embedded point program.
In an exemplary embodiment, when the buried point program is configured with multiple processes, each process is associated with a corresponding one or more applications. Step S104 further includes: and when the target service is monitored to be executed, starting the point burying program and starting a target point burying process associated with the target application program.
And step S106, acquiring buried point data through the target buried point process.
In an exemplary embodiment, step S106 further includes:
step S106A, providing the protocol to the target site process via the command line participation. The protocol includes corresponding command parameters and content parameters, the command is used to indicate a target embedded point logic to be executed by the target process, and the content parameters are used to indicate embedded point data to be reported to the server 4.
Step S106B, generating the buried point data by the target buried point process according to the target buried point logic and the content parameter.
And step S108, reporting the buried point data to a server 4 through the target buried point process.
The server 4 receives the buried point data, and can perform user analysis, such as user behavior analysis, according to the buried point data.
In an exemplary embodiment, step S108 further includes:
step S108A, reporting the buried point data cyclically at a preset frequency.
Step S108B, determining whether the buried point data is reported to the server 4. If yes, go to step S108D; otherwise, the process proceeds to step S108C.
And step S108C, judging that the reporting times reach a preset threshold value. If yes, go to step S108D; otherwise, the process proceeds to step S108E.
And step S108D, clearing the buried point data and closing the target buried point process.
Step S108E, storing the buried point data in a local database, and closing the target buried point process.
Optionally, step S108F is further included, where the target buried point process is started by the daemon process at a predetermined frequency. And after the target embedded point process is started, executing the steps S108A-S108D again until the embedded point data is reported to the server 4.
Example two
Referring to fig. 3, a program module diagram of a second embodiment of the embedded data processing system based on computer equipment according to the present invention is shown. In the present embodiment, the computer device-based buried point data processing system 20 may include or be divided into one or more program modules, which are stored in a storage medium and executed by one or more processors, to implement the present invention, and may implement the above-described computer device-based buried point data processing method. The program modules referred to in the embodiments of the present invention refer to a series of computer program instruction segments capable of performing specific functions, and are more suitable than the program itself for describing the execution process of the embedded data processing system 20 based on computer devices in the storage medium. The following description will specifically describe the functions of the program modules of the present embodiment:
a buried point program configuration module 200, configured to configure a buried point program for the computer device in advance, where the buried point program is used to process buried point data.
Data burial point refers to the related technology and implementation process of capturing, processing and sending aiming at specific user behaviors or events, and the data burial point is the result data after the last time.
The data burying point is that events in the running process of the application program are monitored, judgment and capture are carried out when the events needing attention occur, then necessary service data are obtained, and finally the service data are arranged and sent to the server 4. The monitored event can be provided by platforms such as an operating system, a browser, an APP framework and the like, and the trigger condition can be customized on the basis of the event (for example, a certain specific button is clicked).
In an exemplary embodiment, the buried point program configuration module 200 is further configured to: adding a plurality of pre-configured buried point logics to the buried point program, each buried point logic being associated with a respective buried point logic code.
The buried point logic code may be programmed by monitoring the SDK provided by the analysis tool. The pair-multi-buried-point logic code of a plurality of buried-point logic pairs is encapsulated into a single buried-point program. And carrying out data embedding operation in the embedding point program set.
In an exemplary embodiment, the buried point program configuration module 200 is further configured to: the computer device is configured with a buried point program with a plurality of buried point processes in advance, and each buried point process in the plurality of processes is used for associating one or more corresponding application programs.
That is, multiple applications in the computer device 2 that have data burial requirements share the burial program, but different applications may not share the burial process. For example, if the application program A has a data embedding point service requirement, a embedding point process is started; application B needs to bury the point and also starts a process of burying the point, and there are 2 processes of burying the point at the same time.
A service process monitoring module 202, configured to monitor at least one service process running in the computer device, where the service process is used to execute multiple associated services of a target application, and the multiple associated services include a target service for which a data embedding requirement is preset.
The computer device 2 may be installed with a plurality of application programs, and each application program in the running state may correspond to one or more business processes, and each business process is used for processing one or more associated businesses.
Taking a target application program in the plurality of application programs as an example:
when the target application program is in a running state, one or more business processes may be corresponding to each business process, and each business process is used for processing one or more associated services specified by the target application program. Among the related services, there may be some services data of a part of target services in the related services that need to be used for data analysis, and therefore data embedding is needed.
A buried point process starting module 204, configured to start a corresponding target buried point process through the buried point program when the target service is monitored to be executed.
In an exemplary embodiment, when the buried point program is configured with multiple processes, each process is associated with a corresponding one or more applications. The buried point process starting module 204 is further configured to: and when the target service is monitored to be executed, starting the embedded point program and starting a target embedded point process associated with the target application program.
And a buried point data obtaining module 206, configured to obtain buried point data through the target buried point process.
In an exemplary embodiment, the buried point data acquisition module 206 is further configured to: providing a protocol to a target buried point process through command line parameters; and generating the buried point data by the target buried point process according to the target buried point logic and the content parameter.
The protocol includes a corresponding command parameter and a content parameter, the command is used to indicate a target embedded point logic to be executed by the target process, and the content parameter is used to indicate embedded point data to be reported to the server 4.
And a buried point data reporting module 208, configured to report the buried point data to the server 4 through the target buried point process.
The server 4 receives the buried point data, and can perform user analysis, such as user behavior analysis, according to the buried point data.
In an exemplary embodiment, the buried point data reporting module 208 is further configured to:
reporting the buried point data in a circulating mode at a preset frequency;
judging whether the buried point data is reported to the server 4 or whether the reporting frequency reaches a preset threshold value;
if the buried point data is reported to the server 4, clearing the buried point data and closing the target buried point process;
and if the reporting times reach a preset threshold value and the buried point data is not reported to the server 4, storing the buried point data into a local database, and closing the target buried point process.
Optionally, if the buried point data is not reported to the server 4, the buried point data reporting module 208 is further configured to: and configuring a daemon process, and starting the target embedded point process at a preset frequency through the daemon process so that the target embedded point process reports the embedded point data to the server 4.
EXAMPLE III
Fig. 4 is a schematic diagram of a hardware architecture of a computer device according to a third embodiment of the present invention. In the present embodiment, the computer device 2 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a preset or stored instruction. The computer device 2 may be a personal computer, a tablet computer, a mobile phone, or the like, or may be a cloud device for providing a virtual client, such as a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of a plurality of servers). As shown, the computer device 2 includes, but is not limited to, at least a memory 21, a processor 22, a network interface 23, and a computer device-based buried point data processing system 20 communicatively connected to each other via a system bus. Wherein:
in this embodiment, the memory 21 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the storage 21 may be an internal storage unit of the computer device 2, such as a hard disk or a memory of the computer device 2. In other embodiments, the memory 21 may also be an external storage device of the computer device 2, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), etc. provided on the computer device 20. Of course, the memory 21 may also comprise both internal and external memory units of the computer device 2. In this embodiment, the memory 21 is generally used for storing an operating system and various application software installed in the computer device 2, such as the program code of the embedded data processing system 20 based on the computer device in the fifth embodiment. Further, the memory 21 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 22 is typically used to control the overall operation of the computer device 2. In this embodiment, the processor 22 is configured to execute the program code stored in the memory 21 or process data, for example, execute the computer device-based buried point data processing system 10, so as to implement the computer device-based buried point data processing method according to the first embodiment.
The network interface 23 may comprise a wireless network interface or a wired network interface, and the network interface 23 is generally used for establishing communication connection between the computer device 2 and other electronic apparatuses. For example, the network interface 23 is used to connect the computer device 2 to an external terminal through a network, establish a data transmission channel and a communication connection between the computer device 2 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), Wi-Fi, and the like.
It is noted that fig. 4 only shows the computer device 2 with components 20-23, but it is to be understood that not all shown components are required to be implemented, and that more or less components may be implemented instead.
In this embodiment, the computer device based buried point data processing system 20 stored in the memory 21 may also be divided into one or more program modules, which are stored in the memory 21 and executed by one or more processors (in this embodiment, the processor 22) to accomplish the present invention.
For example, fig. 3 shows a schematic diagram of program modules of a fourth embodiment of implementing the computer device-based buried point data processing system 20, in this embodiment, the computer device-based buried point data processing system 20 may be divided into a buried point program configuration module 200, a business process monitoring module 202, a buried point process starting module 204, a buried point data obtaining module 206, and a buried point data reporting module 208. The program module referred to in the present invention refers to a series of computer program instruction segments capable of performing specific functions, and is more suitable than a program for describing the execution process of the computer device based embedded data processing system 20 in the computer device 2. The specific functions of the program modules 200 and 208 have been described in detail in the second embodiment, and are not described herein again.
Example four
The present embodiment also provides a computer-readable storage medium, such as a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application mall, etc., on which a computer program is stored, which when executed by a processor implements corresponding functions. The computer-readable storage medium of the embodiment is used for storing the buried point data processing system 20 based on the computer device, and when being executed by the processor, the computer-device-based buried point data processing method of the first embodiment is implemented.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A buried point data processing method based on computer equipment is characterized by comprising the following steps:
configuring a buried point program for the computer equipment in advance, wherein the buried point program is used for processing buried point data;
monitoring at least one service process running in the computer equipment, wherein the service process is used for executing a plurality of associated services of a target application program, and the associated services comprise target services with preset data embedding point requirements;
when the target service is monitored to be executed, starting a corresponding target embedded point process through the embedded point program;
acquiring buried point data through the target buried point process; and
and reporting the buried point data to a server through the target buried point process.
2. The buried point data processing method according to claim 1, wherein the step of configuring the buried point program for the computer device in advance includes:
adding a plurality of pre-configured buried point logics to the buried point program, each buried point logic being associated with a respective buried point logic code.
3. The buried point data processing method according to claim 1 or 2, wherein the step of configuring the buried point program for the computer device in advance includes:
the computer device is configured with a buried point program with a plurality of buried point processes in advance, and each buried point process in the plurality of processes is used for associating one or more corresponding application programs.
4. The buried point data processing method of claim 3, wherein the step of starting a corresponding target buried point process by the buried point program when monitoring that the target service is executed comprises:
and starting the embedded point program and starting a target embedded point process related to the target application program.
5. The buried point data processing method according to claim 4, wherein the step of obtaining the buried point data by the buried point process includes:
providing a protocol to a target embedded point process through command line transmission parameters, wherein the protocol comprises corresponding command parameters and content parameters, the command is used for indicating target embedded point logic to be executed by the target process, and the content parameters are used for indicating embedded point data to be reported to the server;
and generating the buried point data by the target buried point process according to the target buried point logic and the content parameter.
6. The buried point data processing method of claim 5, wherein the step of reporting the buried point data to a server through the target buried point process comprises:
reporting the buried point data in a circulating mode at a preset frequency;
judging whether the buried point data is reported to the server or whether the reporting frequency reaches a preset threshold value;
if the buried point data is reported to the server, clearing the buried point data and closing the target buried point process;
and if the reporting times reach a preset threshold value and the buried point data is not reported to the server, storing the buried point data into a local database, and closing the target buried point process.
7. The buried point data processing method of claim 6, wherein if the buried point data is not reported to the server, the method further comprises:
and configuring a daemon process, and starting the target embedded point process at a preset frequency through the daemon process so that the target embedded point process reports the embedded point data to the server.
8. A buried point data processing system based on a computer device, comprising:
the computer equipment comprises a buried point program configuration module, a buried point program processing module and a data processing module, wherein the buried point program configuration module is used for configuring a buried point program for the computer equipment in advance, and the buried point program is used for processing buried point data;
a service process monitoring module, configured to monitor at least one service process running in the computer device, where the service process is used to execute multiple associated services of a target application program, and the multiple associated services include a target service in which a data embedding point is preset;
a buried point process starting module, configured to start a corresponding target buried point process through the buried point program when monitoring that the target service is executed;
the buried point data acquisition module is used for acquiring buried point data through the target buried point process; and
and the buried point data reporting module is used for reporting the buried point data to a server through the target buried point process.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the computer program when executed by the processor implements the steps of the computer device based buried point data processing method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having stored therein a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the computer device based buried point data processing method according to any one of claims 1 to 7.
CN201910814008.4A 2019-08-30 2019-08-30 Buried point data processing method, system, computer device and readable storage medium Pending CN110674440A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910814008.4A CN110674440A (en) 2019-08-30 2019-08-30 Buried point data processing method, system, computer device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910814008.4A CN110674440A (en) 2019-08-30 2019-08-30 Buried point data processing method, system, computer device and readable storage medium

Publications (1)

Publication Number Publication Date
CN110674440A true CN110674440A (en) 2020-01-10

Family

ID=69075851

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910814008.4A Pending CN110674440A (en) 2019-08-30 2019-08-30 Buried point data processing method, system, computer device and readable storage medium

Country Status (1)

Country Link
CN (1) CN110674440A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262875A (en) * 2020-01-21 2020-06-09 腾讯科技(深圳)有限公司 Server safety monitoring method, device, system and storage medium
CN111506475A (en) * 2020-04-15 2020-08-07 北京字节跳动网络技术有限公司 Data processing method, device and system, readable medium and electronic equipment
CN112491611A (en) * 2020-11-25 2021-03-12 网银在线(北京)科技有限公司 Fault location system, method, apparatus, electronic device and computer readable medium
CN112749062A (en) * 2021-01-18 2021-05-04 广州虎牙科技有限公司 Server program monitoring method and device, computer equipment and storage medium
CN112764837A (en) * 2021-01-29 2021-05-07 腾讯科技(深圳)有限公司 Data reporting method, device, storage medium and terminal
CN113010322A (en) * 2021-04-07 2021-06-22 智道网联科技(北京)有限公司 Method for optimizing in-vehicle memory, in-vehicle system, electronic device and storage medium
CN113239251A (en) * 2021-05-27 2021-08-10 深圳市金蝶天燕云计算股份有限公司 Processing method of buried point data, related device and storage medium
CN113590447A (en) * 2021-08-02 2021-11-02 北京百度网讯科技有限公司 Buried point processing method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140178593A1 (en) * 2011-05-11 2014-06-26 Air Force Engineering University of the Chinese People's Liberation Army Method and apparatus for nanocrystallizing a metal surface by shock wave-accelerated nanoparticles
CN107092488A (en) * 2017-03-31 2017-08-25 武汉斗鱼网络科技有限公司 It is a kind of that application is carried out to bury realization method and system a little without intrusionization
CN107894889A (en) * 2017-10-16 2018-04-10 努比亚技术有限公司 Bury point methods, equipment and computer-readable recording medium
US20190108074A1 (en) * 2017-10-06 2019-04-11 Experian Health, Inc. In-memory storage of aggregated data for real-time event tracking
CN109933317A (en) * 2018-12-24 2019-06-25 阿里巴巴集团控股有限公司 Bury point methods, device, server and readable storage medium storing program for executing

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140178593A1 (en) * 2011-05-11 2014-06-26 Air Force Engineering University of the Chinese People's Liberation Army Method and apparatus for nanocrystallizing a metal surface by shock wave-accelerated nanoparticles
CN107092488A (en) * 2017-03-31 2017-08-25 武汉斗鱼网络科技有限公司 It is a kind of that application is carried out to bury realization method and system a little without intrusionization
US20190108074A1 (en) * 2017-10-06 2019-04-11 Experian Health, Inc. In-memory storage of aggregated data for real-time event tracking
CN107894889A (en) * 2017-10-16 2018-04-10 努比亚技术有限公司 Bury point methods, equipment and computer-readable recording medium
CN109933317A (en) * 2018-12-24 2019-06-25 阿里巴巴集团控股有限公司 Bury point methods, device, server and readable storage medium storing program for executing

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111262875A (en) * 2020-01-21 2020-06-09 腾讯科技(深圳)有限公司 Server safety monitoring method, device, system and storage medium
CN111262875B (en) * 2020-01-21 2021-06-18 腾讯科技(深圳)有限公司 Server safety monitoring method, device, system and storage medium
CN111506475A (en) * 2020-04-15 2020-08-07 北京字节跳动网络技术有限公司 Data processing method, device and system, readable medium and electronic equipment
CN112491611A (en) * 2020-11-25 2021-03-12 网银在线(北京)科技有限公司 Fault location system, method, apparatus, electronic device and computer readable medium
CN112491611B (en) * 2020-11-25 2023-09-05 网银在线(北京)科技有限公司 Fault location system, method, apparatus, electronic device, and computer readable medium
CN112749062A (en) * 2021-01-18 2021-05-04 广州虎牙科技有限公司 Server program monitoring method and device, computer equipment and storage medium
CN112764837A (en) * 2021-01-29 2021-05-07 腾讯科技(深圳)有限公司 Data reporting method, device, storage medium and terminal
CN113010322A (en) * 2021-04-07 2021-06-22 智道网联科技(北京)有限公司 Method for optimizing in-vehicle memory, in-vehicle system, electronic device and storage medium
CN113239251A (en) * 2021-05-27 2021-08-10 深圳市金蝶天燕云计算股份有限公司 Processing method of buried point data, related device and storage medium
CN113590447A (en) * 2021-08-02 2021-11-02 北京百度网讯科技有限公司 Buried point processing method and device
CN113590447B (en) * 2021-08-02 2024-04-19 北京百度网讯科技有限公司 Buried point processing method and device

Similar Documents

Publication Publication Date Title
CN110674440A (en) Buried point data processing method, system, computer device and readable storage medium
CN110647438B (en) Event monitoring method and device, computer equipment and storage medium
CN109951514B (en) File processing method and system based on cloud storage and computer equipment
CN111988337B (en) Authority management method and system
CN113176978B (en) Monitoring method, system, equipment and readable storage medium based on log file
CN112039900B (en) Network security risk detection method, system, computer device and storage medium
CN111666145A (en) Message processing method and system of message queue and computer equipment
CN109218407B (en) Code management and control method based on log monitoring technology and terminal equipment
CN110635898A (en) Encryption method and encryption system
CN111045893B (en) Method, device and system for executing monitoring task, storage medium and electronic device
CN111177776A (en) Multi-tenant data isolation method and system
CN110502482B (en) User operation interface configuration method, system and data operation method
US20160029214A1 (en) Home control gateway and home control network connection method thereof
CN112153152A (en) Management method and system of algorithm service interface
CN115543827A (en) Buried point data display method and device
CN112422450A (en) Computer equipment, and flow control method and device for service request
CN113259429B (en) Session maintenance management and control method, device, computer equipment and medium
CN113965904A (en) Device registration method, device and storage medium
CN111062503B (en) Power grid monitoring alarm processing method, system, terminal and storage medium
CN111240904A (en) Database backup method and device, electronic equipment and storage medium
CN114302351B (en) Short message service processing method and device, computer equipment and storage medium
CN111324654A (en) Interface calling method, system, computer device and computer readable storage medium
CN113934552A (en) Method and device for determining function code, storage medium and electronic device
CN110602187A (en) Terminal sharing method, device and equipment
CN107766212B (en) Method and device for determining installation state of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination