CN112306826A - Method and apparatus for processing information for terminal - Google Patents

Method and apparatus for processing information for terminal Download PDF

Info

Publication number
CN112306826A
CN112306826A CN202010111444.8A CN202010111444A CN112306826A CN 112306826 A CN112306826 A CN 112306826A CN 202010111444 A CN202010111444 A CN 202010111444A CN 112306826 A CN112306826 A CN 112306826A
Authority
CN
China
Prior art keywords
target client
buried point
performance
analysis result
log
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010111444.8A
Other languages
Chinese (zh)
Inventor
不公告发明人
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010111444.8A priority Critical patent/CN112306826A/en
Publication of CN112306826A publication Critical patent/CN112306826A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the disclosure discloses a method and a device for processing information for a terminal. One embodiment of the method comprises: triggering a preset buried point for a target client; acquiring a buried point log generated after a buried point is triggered from a target client; and analyzing the obtained buried point log to obtain an analysis result for representing the performance of the target client. According to the embodiment, the embedded point log can be analyzed by the terminal after the embedded point log is generated by the client, so that the analysis result can be obtained more quickly, and the timeliness of information processing is improved.

Description

Method and apparatus for processing information for terminal
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to a method and a device for processing information for a terminal.
Background
A buried point is a logging scheme for recording specific characteristics of a specific event. Currently, a client application is usually subjected to a burdening process to determine the performance of the client application through the burdening process. For example, a buried point for recording page loading duration may be set for the client application, where page loading is an event recorded by the buried point, and duration is a characteristic of time.
At present, after a client application obtains a buried point log through a buried point, the buried point log is reported to a background server of the client application, so that the background server analyzes an analysis result for representing the performance of the client application according to the buried point log, for example, the time consumed for loading a page is consumed.
Disclosure of Invention
The embodiment of the disclosure provides a method and a device for processing information for a terminal.
In a first aspect, an embodiment of the present disclosure provides a method for processing information for a terminal, where the method includes: triggering a preset buried point for a target client; acquiring a buried point log generated after a buried point is triggered from a target client; and analyzing the obtained buried point log to obtain an analysis result for representing the performance of the target client.
In some embodiments, before analyzing the obtained buried point log to obtain an analysis result for characterizing the performance of the target client, the method further comprises: screening the obtained embedded point logs; and analyzing the obtained buried point log, and obtaining an analysis result for representing the performance of the target client comprises the following steps: and analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
In some embodiments, triggering a preset burial point for the target client comprises: and triggering a preset buried point aiming at the target client by utilizing a pre-installed test script for testing the performance of the target client.
In some embodiments, analyzing the obtained buried point log, and obtaining an analysis result for characterizing the performance of the target client includes: and analyzing the acquired embedded point log by using a preset analysis script to obtain an analysis result for representing the performance of the target client.
In some embodiments, obtaining the buried point log generated after the buried point is triggered from the target client comprises: and acquiring a buried point log generated after the buried point is triggered from the target client through a hook installed in advance.
In a second aspect, an embodiment of the present disclosure provides an apparatus for processing information for a terminal, the apparatus including: a triggering unit configured to trigger a buried point preset for a target client; the acquisition unit is configured to acquire a buried point log generated after a buried point is triggered from a target client; and the analysis unit is configured to analyze the obtained buried point log and obtain an analysis result for representing the performance of the target client.
In some embodiments, the apparatus further comprises: a screening unit configured to screen the acquired buried point log; and the analysis unit is further configured to: and analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
In some embodiments, the trigger unit is further configured to: and triggering a preset buried point aiming at the target client by utilizing a pre-installed test script for testing the performance of the target client.
In some embodiments, the analysis unit is further configured to: and analyzing the acquired embedded point log by using a preset analysis script to obtain an analysis result for representing the performance of the target client.
In some embodiments, the obtaining unit is further configured to: and acquiring a buried point log generated after the buried point is triggered from the target client through a hook installed in advance.
In a third aspect, an embodiment of the present disclosure provides a terminal, including: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method of any of the embodiments of the method for processing information for a terminal described above.
In a fourth aspect, embodiments of the present disclosure provide a computer-readable medium on which a computer program is stored, which when executed by a processor, implements the method of any of the above-described methods for processing information for a terminal.
According to the method and the device for processing the information of the terminal, the embedded point preset for the target client is triggered, the embedded point log generated after the embedded point is triggered is obtained from the target client, and finally the obtained embedded point log is analyzed to obtain the analysis result for representing the performance of the target client, so that the embedded point log can be analyzed by the terminal after the embedded point log is generated by the client. Compared with the scheme that the remote server analyzes the embedded point log in the prior art, the embodiment of the disclosure can obtain the analysis result more quickly, and is beneficial to improving the timeliness of information processing.
Drawings
Other features, objects and advantages of the disclosure will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
FIG. 1 is an exemplary system architecture diagram in which one embodiment of the present disclosure may be applied;
FIG. 2 is a flow diagram for one embodiment of a method of processing information for a terminal according to the present disclosure;
fig. 3 is a schematic diagram of one application scenario of a method of processing information for a terminal according to an embodiment of the present disclosure;
FIG. 4 is a flow diagram of yet another embodiment of a method of processing information for a terminal according to the present disclosure;
FIG. 5 is a schematic block diagram illustrating one embodiment of an apparatus for processing information for a terminal according to the present disclosure;
FIG. 6 is a block diagram of a computer system suitable for use with a terminal device implementing an embodiment of the disclosure.
Detailed Description
The present disclosure is described in further detail below with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings.
It should be noted that, in the present disclosure, the embodiments and features of the embodiments may be combined with each other without conflict. The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 illustrates an exemplary system architecture 100 to which embodiments of the disclosed method for processing information for a terminal or apparatus for processing information for a terminal may be applied.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various client applications installed thereon, such as a web browser application, a shopping-like application, a search-like application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal apparatuses 101, 102, and 103 may be hardware or software. When the terminal devices 101, 102, 103 are hardware, they may be various electronic devices, including but not limited to smart phones, tablet computers, electronic book readers, MP3 players (Moving Picture Experts Group Audio Layer III, mpeg Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, mpeg Audio Layer 4), laptop portable computers, desktop computers, and the like. When the terminal apparatuses 101, 102, 103 are software, they can be installed in the electronic apparatuses listed above. It may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules to provide distributed services) or as a single piece of software or software module. And is not particularly limited herein.
The server 105 may be a server providing various services, such as a background server for clients installed on the terminal devices 101, 102, 103. The background server can analyze and process the request and the like initiated by the terminal equipment by using the client and feed back the processing result to the terminal equipment.
It should be noted that the method for processing information for a terminal provided by the embodiment of the present disclosure is generally executed by the terminal devices 101, 102, 103, and accordingly, the apparatus for processing information for a terminal is generally disposed in the terminal devices 101, 102, 103.
The server may be hardware or software. When the server is hardware, it may be implemented as a distributed server cluster formed by multiple servers, or may be implemented as a single server. When the server is software, it may be implemented as multiple pieces of software or software modules (e.g., multiple pieces of software or software modules used to provide distributed services), or as a single piece of software or software module. And is not particularly limited herein.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. In the case where data used in generating the analysis result for characterizing the performance of the target client does not need to be acquired from a remote place, the above system architecture may not include a network and a server, but only a terminal device.
With continued reference to fig. 2, a flow 200 of one embodiment of a method for processing information for a terminal according to the present disclosure is shown. The method for processing information comprises the following steps:
step 201, triggering a preset buried point for a target client.
In the present embodiment, an execution subject of the method for processing information for a terminal (e.g., a terminal device shown in fig. 1) may trigger a buried point set in advance for a target client in various ways. Wherein the target client may be a client whose performance is to be determined. The target client may be preinstalled on the execution body. Specifically, the target client may be various types of client applications, for example, a communication-type client application, a shopping-type client application, and the like.
In practice, a technician will typically set a buried point for a client application after the development of the client application is completed. Data which are generated in the process that the user uses the client application and are related to the performance of the client application can be recorded through the buried point, and the performance of the client application can be optimized based on the data. For example, a technician may set a buried point for recording the time that a page is loaded, a buried point for recording the number of failures of controls on a page, and so forth.
Specifically, the technician may package the buried points as a set of procedures. Furthermore, the client only needs to import specific service parameters (e.g., pageType, actionType) and extension parameters into the set of programs to implement the point burying.
It will be appreciated that a buried point will be triggered when an event recorded by the buried point occurs. Therefore, in this embodiment, the execution body may trigger the corresponding buried point of the target client by executing an operation for generating an event recorded by the buried point.
Specifically, as an example, the execution body may execute an operation for triggering the buried point at the instruction of the user. For example, the user may click an icon of the target client, and the execution main body may execute an operation of loading a homepage of the target client after detecting that the user clicks the icon of the target client, and further trigger a buried point for recording a loading duration of the homepage of the target client.
In some optional implementation manners of this embodiment, the execution main body may further trigger a preset flush point for the target client by using a pre-installed test script for testing the performance of the target client. The test script can be used for simulating the operation of the user, for example, simulating the operation of the user clicking the icon of the target client. Furthermore, the execution main body may execute an operation for triggering the buried point under an instruction of the test script after the test script is run.
It can be understood that the user can generate a user instruction after performing the operation, the test script can generate a script instruction after running, and the test script can simulate the user operation because the script instruction corresponding to the test script can be the same as the user instruction corresponding to the user operation. Further, the execution body may execute an operation for triggering the embedding point by the user in response to an instruction from the user, or may execute an operation for triggering the embedding point in response to an instruction from the script.
Step 202, acquiring a buried point log generated after the buried point is triggered from the target client.
In this embodiment, after step 201 is executed, the execution subject may obtain, from the target client, a buried point log generated after the buried point is triggered. The buried point log may include target feature information for characterizing a target feature of an event recorded by a triggered buried point, where the target feature may be a feature to be analyzed, and the target feature may be related to performance of the target client, for example, the event recorded by the triggered buried point may be a loaded page, and the target feature may be a duration of the loaded page.
In addition, the buried point log may also include information characterizing other characteristics of the event recorded by the triggered buried point, such as time information characterizing the time of occurrence of the event.
In practice, after the embedded point log is generated, the client usually reports the embedded point log to the server corresponding to the client, so that the server analyzes the embedded point log to obtain an analysis result. However, the reporting process consumes a lot of time due to links such as network transmission, and further, the scheme of analyzing the embedded point log by the server is difficult to obtain the analysis result quickly, and the timeliness of information processing is poor.
According to the embodiment, after the embedded point log is generated, the execution main body of the installation target client side can acquire the embedded point log and analyze the embedded point log, links such as network transmission are not needed, an analysis result can be obtained more quickly, and the timeliness of information processing is improved.
Specifically, the execution body may obtain, from the target client, a buried point log generated after the buried point is triggered by using various methods.
In some optional implementation manners of this embodiment, the execution main body may obtain, through a hook installed in advance, a buried point log generated after a buried point is triggered from a target client.
In practice, a hook (hook) technology is a technology that intercepts a message of a certain process (for example, a process that reports a pit log to a server), and performs custom processing on the message. The developer can develop hook software for a certain interception process. The hook software may record rules for intercepting information and processing information. And when the information to be intercepted is detected, the hook software can intercept the information and process the information.
In this implementation, a developer may develop a hook for intercepting a buried point log and install the hook on the execution main body, and the execution main body may detect the buried point log by using the installed hook, and when the buried point log is detected, obtain the buried point log and store the buried point log locally, so that the execution main body obtains the buried point log through the hook.
And 203, analyzing the obtained buried point log to obtain an analysis result for representing the performance of the target client.
In this embodiment, based on the buried point log obtained in step 202, the executing entity may analyze the obtained buried point log to obtain an analysis result for characterizing the performance of the target client. Wherein the analysis results may include, but are not limited to, at least one of: text, numbers, symbols, images, audio, video.
In practice, after obtaining the analysis result, the execution subject may present the analysis result to a technician, so that the technician optimizes the target client based on the analysis result.
Specifically, the executing body may analyze the obtained embedded point log by using various methods to obtain an analysis result. For example, the execution subject may first extract at least two page loading durations from at least two buried point logs, and then perform mean calculation on the at least two page loading durations to obtain a calculation result as an analysis result; or, the execution main body may extract the page load duration with the longest duration from the at least two page load durations corresponding to the at least two buried point logs as an analysis result.
In some optional implementation manners of this embodiment, the execution main body may analyze the obtained embedded point log by using a preset analysis script, and obtain an analysis result for characterizing performance of the target client. The analysis script may be a script preset by a technician and used for analyzing the embedded point log. Rules for analyzing the buried point log may be recorded in the analysis script. The execution main body may obtain an analysis result for characterizing performance of the target client by running an analysis script that takes the obtained buried point log as an input.
It should be noted that, since the process of testing the performance of the client generally includes a step of analyzing the tested data, the test script for testing the performance of the client and the analysis script for analyzing the tested data are generally used in combination. Therefore, the analysis script in this implementation and the test script for testing the performance of the target client may belong to one total script. Furthermore, when the performance of the client is tested, only one master script needs to be installed, so that the analysis scripts and the test scripts can be installed, the testing steps of the performance of the client are simplified, and the testing efficiency of the performance of the client is improved.
With continued reference to fig. 3, fig. 3 is a schematic diagram of an application scenario of the method for processing information for a terminal according to the present embodiment. In the application scenario of fig. 3, the handset 301 may trigger a preset buried point 303 (e.g., a buried point for recording a main page loading duration) for the target client 302, so that the target client 302 generates a buried point log 304. The handset 301 can then obtain, from the target client 304, the buried point log 304 generated after the buried point 303 is triggered. Finally, the handset 301 can analyze the obtained buried point log 304 to obtain an analysis result 305 (e.g., average duration of main page loading) for characterizing the performance of the target client 302.
The method provided by the above embodiment of the present disclosure may be implemented by the terminal after the client generates the buried point log. Compared with the scheme that the remote server analyzes the embedded point log in the prior art, the embodiment of the disclosure can obtain the analysis result more quickly, and is beneficial to improving the timeliness of information processing.
With further reference to fig. 4, a flow 400 of yet another embodiment of a method of processing information for a terminal is shown. The flow 400 of the method for processing information for a terminal includes the following steps:
step 401, triggering a preset buried point for a target client.
In the present embodiment, an execution subject of the method for processing information for a terminal (e.g., a terminal device shown in fig. 1) may trigger a buried point set in advance for a target client in various ways. Wherein the target client may be a client whose performance is to be determined. The target client may be preinstalled on the execution body. In particular, the target client may be various types of client applications.
Step 402, acquiring a buried point log generated after the buried point is triggered from the target client.
In this embodiment, after step 401 is executed, the execution subject may obtain, from the target client, a buried point log generated after the buried point is triggered. The buried point log may include target feature information for characterizing target features of events recorded by the triggered buried point, where the target features may be features to be analyzed, and the target features may be related to performance of the target client.
In addition, the buried point log may also include information characterizing other characteristics of events recorded by the triggered buried point.
Step 401 and step 402 may be performed in a manner similar to that of step 201 and step 202 in the foregoing embodiment, respectively, and the above description for step 201 and step 202 also applies to step 401 and step 402, which is not described herein again.
And step 403, screening the obtained embedded point logs.
In this embodiment, based on the buried point log obtained in step 402, the execution subject may filter the buried point log based on a preset condition. The preset condition may be a condition predetermined by a technician for screening a buried point log having an analysis value from a plurality of buried point logs.
Specifically, as an example, the preset condition may be that the occurrence time of the event corresponding to the buried point log is within the target time period. The target time period may be a preset time period, for example, 3 months in 2019, or a time period determined based on the current time, for example, 3 days in the past. As yet another example, the preset condition may also be that a feature value of a target feature for characterizing an event recorded in the buried point log is greater than or equal to a preset threshold value. For example, if the event is page loading and the target feature is page loading duration, the preset condition may be that the page loading duration recorded in the embedded point log is greater than or equal to a preset duration.
And step 404, analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
In this embodiment, based on the filtered buried point log obtained in step 403, the execution main body may analyze the filtered buried point log to obtain an analysis result for characterizing the performance of the target client.
Specifically, the executing body may analyze the filtered embedded point log according to the analysis manner of the embedded point log in step 203 to obtain an analysis result, which is not described herein again.
As can be seen from fig. 4, compared with the embodiment corresponding to fig. 2, the flow 400 of the method for processing information of a terminal in this embodiment highlights a step of screening the obtained buried point logs, and further analyzing the screened buried point logs to obtain an analysis result for characterizing the performance of the target client. Therefore, according to the scheme described in this embodiment, the embedded point logs meeting the preset condition can be screened from the acquired embedded point logs, and the embedded point logs meeting the preset condition are analyzed, so that the number of the analyzed embedded point logs can be reduced on the basis of obtaining the analysis result for representing the performance of the target client, the embedded point log analysis steps are simplified, the generation efficiency of the analysis result is improved, and the resource consumed for analyzing the embedded point logs can be reduced.
With further reference to fig. 5, as an implementation of the methods shown in the above-mentioned figures, the present disclosure provides an embodiment of an apparatus for processing information for a terminal, which corresponds to the method embodiment shown in fig. 2, and which is particularly applicable to various electronic devices.
As shown in fig. 5, the apparatus 500 for processing information of a terminal of the present embodiment includes: trigger unit 501, acquisition unit 502 and analysis unit 503. Wherein the triggering unit 501 is configured to trigger a preset buried point for a target client; the obtaining unit 502 is configured to obtain, from the target client, a buried point log generated after a buried point is triggered; the analysis unit 503 is configured to analyze the obtained buried point log to obtain an analysis result for characterizing the performance of the target client.
In the present embodiment, the triggering unit 501 of the apparatus 500 for processing information of a terminal may trigger a buried point preset for a target client in various ways. Wherein the target client may be a client whose performance is to be determined. The target client may be pre-installed on the electronic device to which the apparatus 500 is applied. In particular, the target client may be various types of client applications.
In practice, a technician will typically set a buried point for a client application after the development of the client application is completed. Data which are generated in the process that the user uses the client application and are related to the performance of the client application can be recorded through the buried point, and the performance of the client application can be optimized based on the data.
In this embodiment, the obtaining unit 502 may obtain, from the target client, a buried point log generated after the buried point is triggered. The buried point log may include target feature information for characterizing target features of events recorded by the triggered buried point, where the target features may be features to be analyzed, and the target features may be related to performance of the target client.
In addition, the buried point log may also include information characterizing other characteristics of events recorded by the triggered buried point.
In this embodiment, based on the buried point log obtained by the obtaining unit 502, the analyzing unit 503 may analyze the obtained buried point log to obtain an analysis result for characterizing the performance of the target client. Wherein the analysis results may include, but are not limited to, at least one of: text, numbers, symbols, images, audio, video.
In some optional implementations of this embodiment, the apparatus 500 further includes: a screening unit (not shown in the figure) configured to screen the obtained buried point log; and the analyzing unit 503 may be further configured to: and analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
In some optional implementations of this embodiment, the triggering unit 501 may be further configured to: and triggering a preset buried point aiming at the target client by utilizing a pre-installed test script for testing the performance of the target client.
In some optional implementations of this embodiment, the analyzing unit 503 may be further configured to: and analyzing the acquired embedded point log by using a preset analysis script to obtain an analysis result for representing the performance of the target client.
In some optional implementations of this embodiment, the obtaining unit 502 may be further configured to: and acquiring a buried point log generated after the buried point is triggered from the target client through a hook installed in advance.
It will be understood that the elements described in the apparatus 500 correspond to various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 500 and the units included therein, and are not described herein again.
The apparatus 500 provided by the above embodiment of the present disclosure may analyze the buried point log by the terminal after the client generates the buried point log. Compared with the scheme that the remote server analyzes the embedded point log in the prior art, the embodiment of the disclosure can obtain the analysis result more quickly, and is beneficial to improving the timeliness of information processing.
Referring now to fig. 6, a schematic diagram of an electronic device (e.g., the terminal device of fig. 1) 600 suitable for implementing embodiments of the present disclosure is shown. The terminal device in the embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, electronic device 600 may include a processing means (e.g., central processing unit, graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 600 to communicate with other devices wirelessly or by wire to exchange data. While fig. 6 illustrates an electronic device 600 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: triggering a preset buried point for a target client; acquiring a buried point log generated after a buried point is triggered from a target client; and analyzing the obtained buried point log to obtain an analysis result for representing the performance of the target client.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a cell does not in some cases constitute a limitation on the cell itself, for example, a trigger cell may also be described as a "cell triggering a buried point".
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the disclosure herein is not limited to the particular combination of features described above, but also encompasses other embodiments in which any combination of the features described above or their equivalents does not depart from the spirit of the disclosure. For example, the above features and (but not limited to) the features disclosed in this disclosure having similar functions are replaced with each other to form the technical solution.

Claims (12)

1. A method of processing information for a terminal, comprising:
triggering a preset buried point for a target client;
acquiring a buried point log generated after the buried point is triggered from the target client;
and analyzing the obtained buried point log to obtain an analysis result for representing the performance of the target client.
2. The method of claim 1, wherein prior to said analyzing the obtained buried point log to obtain an analysis result characterizing performance of the target client, the method further comprises:
screening the obtained embedded point logs; and
the analyzing the obtained embedded point log to obtain an analysis result for representing the performance of the target client includes:
and analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
3. The method of claim 1, wherein the triggering a pre-set burial point for a target client comprises:
and triggering a preset buried point aiming at the target client by utilizing a pre-installed test script for testing the performance of the target client.
4. The method of claim 3, wherein the analyzing the obtained buried point log to obtain an analysis result for characterizing performance of the target client comprises:
and analyzing the obtained embedded point log by using a preset analysis script to obtain an analysis result for representing the performance of the target client.
5. The method of any of claims 1-4, wherein the obtaining, from the target client, the buried point log generated after the buried point is triggered comprises:
and acquiring a buried point log generated after the buried point is triggered from the target client through a hook installed in advance.
6. An apparatus for processing information for a terminal, comprising:
a triggering unit configured to trigger a buried point preset for a target client;
an obtaining unit configured to obtain, from the target client, a buried point log generated after the buried point is triggered;
and the analysis unit is configured to analyze the obtained buried point log and obtain an analysis result for representing the performance of the target client.
7. The apparatus of claim 6, wherein the apparatus further comprises:
a screening unit configured to screen the acquired buried point log; and
the analysis unit is further configured to:
and analyzing the screened embedded point logs to obtain an analysis result for representing the performance of the target client.
8. The apparatus of claim 6, wherein the trigger unit is further configured to:
and triggering a preset buried point aiming at the target client by utilizing a pre-installed test script for testing the performance of the target client.
9. The apparatus of claim 8, wherein the analysis unit is further configured to:
and analyzing the obtained embedded point log by using a preset analysis script to obtain an analysis result for representing the performance of the target client.
10. The apparatus according to one of claims 6-9, wherein the obtaining unit is further configured to:
and acquiring a buried point log generated after the buried point is triggered from the target client through a hook installed in advance.
11. A terminal, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-5.
12. A computer-readable medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN202010111444.8A 2020-02-24 2020-02-24 Method and apparatus for processing information for terminal Pending CN112306826A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010111444.8A CN112306826A (en) 2020-02-24 2020-02-24 Method and apparatus for processing information for terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010111444.8A CN112306826A (en) 2020-02-24 2020-02-24 Method and apparatus for processing information for terminal

Publications (1)

Publication Number Publication Date
CN112306826A true CN112306826A (en) 2021-02-02

Family

ID=74336680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010111444.8A Pending CN112306826A (en) 2020-02-24 2020-02-24 Method and apparatus for processing information for terminal

Country Status (1)

Country Link
CN (1) CN112306826A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113608979A (en) * 2021-07-20 2021-11-05 Tcl通讯(宁波)有限公司 Log data analysis and statistics method and device, mobile terminal and storage medium
CN113626111A (en) * 2021-07-16 2021-11-09 北京澎思科技有限公司 Information acquisition method and device, electronic equipment and storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107402835A (en) * 2017-07-25 2017-11-28 广东欧珀移动通信有限公司 Abnormality eliminating method, device and the storage medium and mobile terminal of application program
CN107423204A (en) * 2017-06-30 2017-12-01 北京五八信息技术有限公司 Processing method, device and the terminal of the Operation Log of application program
CN107800591A (en) * 2017-11-07 2018-03-13 南威软件股份有限公司 A kind of analysis method of unified daily record data
CN108021485A (en) * 2016-11-04 2018-05-11 北大方正集团有限公司 The monitoring method and device of application program running state
CN108280022A (en) * 2018-02-08 2018-07-13 无线生活(杭州)信息科技有限公司 Performance monitoring method and device
CN108365989A (en) * 2018-01-26 2018-08-03 北京奇虎科技有限公司 Event-handling method and device
CN109144836A (en) * 2018-08-06 2019-01-04 阿里巴巴集团控股有限公司 A kind of processing method of operation log, device and electronic equipment
CN110008101A (en) * 2019-04-04 2019-07-12 网易(杭州)网络有限公司 Client performance evaluation method, device, storage medium and electronic equipment
CN110347906A (en) * 2019-05-20 2019-10-18 拉扎斯网络科技(上海)有限公司 A kind of user behavior methods of exhibiting and device, electronic equipment and storage medium
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium
CN110377441A (en) * 2019-06-04 2019-10-25 天津五八到家科技有限公司 Positioning problems method, apparatus, equipment and storage medium on application software of calling a taxi line

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108021485A (en) * 2016-11-04 2018-05-11 北大方正集团有限公司 The monitoring method and device of application program running state
CN107423204A (en) * 2017-06-30 2017-12-01 北京五八信息技术有限公司 Processing method, device and the terminal of the Operation Log of application program
CN107402835A (en) * 2017-07-25 2017-11-28 广东欧珀移动通信有限公司 Abnormality eliminating method, device and the storage medium and mobile terminal of application program
CN107800591A (en) * 2017-11-07 2018-03-13 南威软件股份有限公司 A kind of analysis method of unified daily record data
CN108365989A (en) * 2018-01-26 2018-08-03 北京奇虎科技有限公司 Event-handling method and device
CN108280022A (en) * 2018-02-08 2018-07-13 无线生活(杭州)信息科技有限公司 Performance monitoring method and device
CN109144836A (en) * 2018-08-06 2019-01-04 阿里巴巴集团控股有限公司 A kind of processing method of operation log, device and electronic equipment
CN110008101A (en) * 2019-04-04 2019-07-12 网易(杭州)网络有限公司 Client performance evaluation method, device, storage medium and electronic equipment
CN110347906A (en) * 2019-05-20 2019-10-18 拉扎斯网络科技(上海)有限公司 A kind of user behavior methods of exhibiting and device, electronic equipment and storage medium
CN110377441A (en) * 2019-06-04 2019-10-25 天津五八到家科技有限公司 Positioning problems method, apparatus, equipment and storage medium on application software of calling a taxi line
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113626111A (en) * 2021-07-16 2021-11-09 北京澎思科技有限公司 Information acquisition method and device, electronic equipment and storage medium
CN113608979A (en) * 2021-07-20 2021-11-05 Tcl通讯(宁波)有限公司 Log data analysis and statistics method and device, mobile terminal and storage medium
CN113608979B (en) * 2021-07-20 2023-11-10 Tcl通讯(宁波)有限公司 Log data analysis and statistics method and device, mobile terminal and storage medium

Similar Documents

Publication Publication Date Title
US9069968B2 (en) Method and apparatus providing privacy benchmarking for mobile application development
CN111597065B (en) Method and device for collecting equipment information
CN107644075B (en) Method and device for collecting page information
CN113505302A (en) Method, device and system for supporting dynamic acquisition of buried point data and electronic equipment
CN111796997A (en) Log information processing method and device and electronic equipment
CN112306826A (en) Method and apparatus for processing information for terminal
CN110059064B (en) Log file processing method and device and computer readable storage medium
CN114840379A (en) Log generation method, device, server and storage medium
CN112363885B (en) Method, device, electronic equipment and computer readable medium for detecting application abnormality
CN111813685B (en) Automatic test method and device
CN112965916A (en) Page testing method, page testing device, electronic equipment and readable storage medium
CN116662193A (en) Page testing method and device
CN111382039A (en) Method, device, electronic equipment and storage medium for reporting user behavior event
CN112379967B (en) Simulator detection method, device, equipment and medium
CN110086880B (en) Method and apparatus for creating instances of network requests
CN112817874A (en) User interface test method, device, equipment and medium
CN113568695A (en) Corner mark processing method and device for boarder application
CN113542238A (en) Risk judgment method and system based on zero trust
CN112241372A (en) Terminal testing method and device and electronic equipment
CN112084114A (en) Method and apparatus for testing an interface
CN113342633B (en) Performance test method and device
CN111831530A (en) Test method and device
CN111831531B (en) Test method and device
CN111767447A (en) Method and device for determining user traffic path
CN111784380B (en) Advertisement putting attribution method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination