CN113554315A - Service data tracking method and device, computer equipment and storage medium - Google Patents

Service data tracking method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN113554315A
CN113554315A CN202110845623.9A CN202110845623A CN113554315A CN 113554315 A CN113554315 A CN 113554315A CN 202110845623 A CN202110845623 A CN 202110845623A CN 113554315 A CN113554315 A CN 113554315A
Authority
CN
China
Prior art keywords
user
target
information
data
character string
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110845623.9A
Other languages
Chinese (zh)
Inventor
牛慧升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Consumer Finance Co Ltd
Original Assignee
Ping An Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Consumer Finance Co Ltd filed Critical Ping An Consumer Finance Co Ltd
Priority to CN202110845623.9A priority Critical patent/CN113554315A/en
Publication of CN113554315A publication Critical patent/CN113554315A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06398Performance of employee with respect to a job function

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Theoretical Computer Science (AREA)
  • Educational Administration (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • General Engineering & Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The embodiment of the application belongs to the technical field of computers, is applied to the field of intelligent government affairs, and relates to a business data tracking method, a business data tracking device, a computer device and a storage medium. By comparing the difference of the progress states between the target mark retaining information and the historical mark retaining information, the business data of the target user is generated, the business data of the user is automatically tracked and output, the performance of the user is tracked, and the recognition efficiency of the performance of the user is improved. The encryption string may be stored in a blockchain.

Description

Service data tracking method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for tracking service data, a computer device, and a storage medium.
Background
With the continuous innovation and development of computer technology, the method is gradually applied to various industries and changes the life style of people. At present, many companies apply computer technology to data tracking and statistics, and the efficiency and accuracy of data tracking and statistics are greatly improved.
However, in the field of data popularization, due to numerous personnel and various popularization modes, for a user of a company, business data which cannot be timely tracked and updated to the latest statistical client state often occurs, so that delay, repetition or error occurs when the overall data is finally counted, and great loss is caused.
Disclosure of Invention
The embodiment of the application aims to provide a business data tracking method, a business data tracking device, a computer device and a storage medium, so that business data of a user can be automatically tracked.
In order to solve the above technical problem, an embodiment of the present application provides a service data tracking method, which adopts the following technical solutions:
a business data tracking method comprises the following steps:
when a recommended data generation request sent by a user in a login state is received, acquiring the employee number of the user, generating an encrypted character string according to the employee number, generating recommended data based on the encrypted character string, and associating the recommended data with the current user;
when identifying that the client clicks any recommended data, taking the recommended data clicked by the client as target recommended data, analyzing the target recommended data to obtain a target encrypted character string, decrypting the target encrypted character string to obtain target user data, and determining a target user based on the target user data;
acquiring progress states of information retention operations of clients through the target recommendation data in real time through buried points, generating target trace information based on the progress states, and associating the target trace information with the target user;
and obtaining historical trace information associated with the target user, comparing whether the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, and replacing the historical trace information by the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information to obtain and output the service data of the target user.
Further, before the step of obtaining the employee number of the user when the request for generating recommended data sent by the user in the login state is received, the method includes:
acquiring a channel selected by a user, and acquiring a login list associated with the channel according to the channel to be used as a target login list;
and acquiring the employee number or the mobile phone number input by the user, respectively searching whether the employee number or the mobile phone number exists in an employee number column or a mobile phone number column in the target login list, and allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column.
Further, the step of generating an encrypted character string according to the employee number includes:
acquiring signature information of a user based on the employee number and the channel;
and generating the encrypted character string based on the signature information, the employee number and the channel.
Further, the step of generating the encrypted string based on the signature information, the employee number, and the channel includes:
identifying the type of the signature information, wherein the type of the signature information comprises an electronic signature class and a handwritten signature class;
when the type of the signature information is a handwritten signature type, intercepting the signature information as a signature picture;
converting the signature picture into a signature character string in a Base64 information conversion mode;
and generating the encrypted character string based on the signature character string, the employee number and the channel.
Further, the step of generating recommendation data based on the encrypted string includes:
acquiring and identifying a recommended data type carried by the recommended data generation request;
when the recommended data type is a two-dimensional code, calling a two-dimensional code generation tool, and generating a recommended two-dimensional code based on the encrypted character string to serve as the recommended data;
when the recommended data type is a long chain, generating first long chain information based on the encrypted character string to serve as the recommended data;
and when the recommended data type is a short chain, generating second long chain information based on the encrypted character string, and configuring short chain information mapped with the second long chain information as the recommended data.
Further, after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the method further includes:
when a user is identified to be in a login state, a telephone number of the client is obtained, and a dialing button is clicked, telephone mark remaining information is generated and is associated with the current user, wherein the telephone mark remaining information comprises the telephone number of the client;
when a client registration notice is received, acquiring a registration telephone number carried by the client registration notice, searching whether the registration telephone number exists in the telephone trace information, and determining that one person is added to the promotion number of a user corresponding to the telephone trace information when the registration telephone number exists in the telephone trace information.
Further, after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the method further includes:
when an information modification instruction is received, the modification type and the modification information carried by the information modification instruction are obtained, the modification position is determined according to the modification type, and the character corresponding to the modification position is replaced by the modification information, so that the user information modification is completed.
In order to solve the above technical problem, an embodiment of the present application further provides a service data tracking apparatus, which adopts the following technical solutions:
a traffic data tracking apparatus, comprising:
the generation module is used for acquiring the employee number of the user when receiving a recommendation data generation request sent by the user in a login state, generating an encrypted character string according to the employee number, generating recommendation data based on the encrypted character string, and associating the recommendation data with the current user;
the decryption module is used for taking the recommended data clicked by the client as target recommended data when the fact that the client clicks any recommended data is identified, analyzing the target recommended data to obtain a target encrypted character string, decrypting the target encrypted character string to obtain target user data, and determining a target user based on the target user data;
the acquisition module is used for acquiring the progress state of information retention operation of a client through the target recommendation data in real time through a buried point, generating target trace information based on the progress state, and associating the target trace information with the target user;
and the comparison module is used for acquiring historical trace information associated with the target user, comparing whether the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, and replacing the historical trace information by the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information to acquire and output the service data of the target user.
In order to solve the above technical problem, an embodiment of the present application further provides a computer device, which adopts the following technical solutions:
a computer device comprising a memory and a processor, the memory having stored therein computer readable instructions, the processor implementing the steps of the traffic data tracking method described above when executing the computer readable instructions.
In order to solve the above technical problem, an embodiment of the present application further provides a computer-readable storage medium, which adopts the following technical solutions:
a computer readable storage medium having computer readable instructions stored thereon, which when executed by a processor, implement the steps of the traffic data tracking method described above.
Compared with the prior art, the embodiment of the application mainly has the following beneficial effects:
according to the method and the device, the interference of the user can be reduced, the encrypted character string is generated based on the information of the user, namely the employee number, the recommendation data is generated based on the encrypted character string, then when the fact that the user clicks the recommendation data is identified, the target encrypted character string can be reversely pushed out according to the recommendation data, then the target user data is obtained through decryption, therefore the target user is determined based on the target user data, namely the target user can be determined according to the recommendation data, and the user related to the recommendation data clicked by the user can be automatically determined. By comparing the difference of the progress states between the target mark retaining information and the historical mark retaining information, the business data of the target user is generated, the achievement condition of the user can be automatically tracked and output, and the identification efficiency of the achievement condition of the user is improved.
Drawings
In order to more clearly illustrate the solution of the present application, the drawings needed for describing the embodiments of the present application will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and that other drawings can be obtained by those skilled in the art without inventive effort.
FIG. 1 is an exemplary system architecture diagram in which the present application may be applied;
FIG. 2 is a flow diagram of one embodiment of a business data tracking method according to the present application;
FIG. 3 is a schematic block diagram of one embodiment of a business data tracking apparatus according to the present application;
FIG. 4 is a schematic block diagram of one embodiment of a computer device according to the present application.
Reference numerals: 200. a computer device; 201. a memory; 202. a processor; 203. a network interface; 300. a service data tracking device; 301. a generation module; 302. a decryption module; 303. an acquisition module; 304. and a comparison module.
Detailed Description
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs; the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application; the terms "including" and "having," and any variations thereof, in the description and claims of this application and the description of the above figures are intended to cover non-exclusive inclusions. The terms "first," "second," and the like in the description and claims of this application or in the above-described drawings are used for distinguishing between different objects and not for describing a particular order.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings.
As shown in fig. 1, the system architecture 100 may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have various communication client applications installed thereon, such as a web browser application, a shopping application, a search application, an instant messaging tool, a mailbox client, social platform software, and the like.
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, e-book readers, MP3 players (Moving Picture Experts Group Audio Layer III, mpeg compression standard Audio Layer 3), MP4 players (Moving Picture Experts Group Audio Layer IV, mpeg compression standard Audio Layer 4), laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background server providing support for pages displayed on the terminal devices 101, 102, 103.
It should be noted that, the service data tracking method provided in the embodiment of the present application is generally executed by a server/terminal device, and accordingly, the service data tracking apparatus is generally disposed in the server/terminal device.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
With continuing reference to FIG. 2, a flow diagram of one embodiment of a business data tracking method in accordance with the present application is shown. The business data tracking method comprises the following steps:
s1: when a recommended data generation request sent by a user in a login state is received, acquiring the employee number of the user, generating an encrypted character string according to the employee number, generating recommended data based on the encrypted character string, and associating the recommended data with the current user.
In this embodiment, the encrypted string is generated by a symmetric encryption algorithm. The recommended data includes short chain, long chain, two-dimensional code, etc. When generating the recommendation data, the user can select the application on the front-end page, the application includes downloading application, promotion activities and the like, and the promotion mode is selected, namely the recommendation quantity type, and the promotion mode includes short chain, WeChat long chain, forum long chain, WeChat two-dimensional code, WeChat small program and the like. According to different selections of the user, the access parameters which need to be filled in are different, and the access parameters comprise channel parties, popularization personnel, popularization IDs, popularization timeliness, sub-channels, popularization extension parameters and the like. In addition, parameters can be added according to a customized mode, such as: the popularization purpose and the like, and a more open popularization mode is provided for each channel and the salesman. When the business data of the target user is finally output, the business data and the input parameters form a business report of the business member and are fed back to the company of the business member, so that the company can further distribute bonus and the like. The generated recommendation data is shared and promoted through scenes such as short messages, open screen advertisements, short message promotion, WeChat public number promotion, WeChat friend sharing and the like, so that users can click the recommendation data.
In some optional implementation manners of this embodiment, before step S1, that is, before the step of obtaining the employee number of the user when the recommendation data generation request sent by the user in the login state is received, the electronic device may further perform the following steps:
when a login number sent by a user is received, a pre-stored login list and the login number are obtained, whether the login number exists in the login list or not is searched, and the user is allowed to log in when the login number exists in the login list.
In this embodiment, the user is a salesperson (a promotion agent). When the user clicks the login button in the front-end page, the computer receives a login signal sent by the user. The user can log in through various modes such as employee numbers or mobile phone numbers. The login list running in the background comprises the information of employee numbers and mobile phone numbers.
In this embodiment, the electronic device (for example, the server/terminal device shown in fig. 1) on which the service data tracking method operates may receive the login signal sent by the user through a wired connection manner or a wireless connection manner. It should be noted that the wireless connection means may include, but is not limited to, a 3G/4G connection, a WiFi connection, a bluetooth connection, a WiMAX connection, a Zigbee connection, a uwb (ultra wideband) connection, and other wireless connection means now known or developed in the future.
Specifically, the login number includes an employee number and a mobile phone number, and the step of obtaining a pre-stored login list and a login number input by a user, searching whether the login number exists in the login list, and allowing the user to log in when the login number exists in the login list includes:
acquiring a channel selected by a user, and acquiring a login list associated with the channel according to the channel to be used as a target login list;
and acquiring the employee number or the mobile phone number input by the user, respectively searching whether the employee number or the mobile phone number exists in an employee number column or a mobile phone number column in the target login list, and allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column.
In this embodiment, there are various sources of the salesman, for example, a promoter from a jittering company, a promoter from a express company, and the like. For the popularizing personnel from different companies, the employee numbers of the popularizing personnel may be the same, so that after the user selects the channel, the corresponding target login list needs to be called according to the channel, whether the employee numbers in the target login list are consistent with the employee numbers input by the user or not is compared, and if the employee numbers are consistent, the correct input is determined, and the user can log in. Namely, the employee authentication of the corresponding channel is realized for the user. And after the login is successful, all the subsequent operations of the employee are bound with the channel.
Specifically, in step S1, the step of generating an encrypted character string according to the employee number includes:
acquiring signature information of a user based on the employee number and the channel;
and generating the encrypted character string based on the signature information, the employee number and the channel.
In this embodiment, the channel is a source of the user, for example, a promoter from a jittering company, a promoter from a express company, and the like. And the corresponding user can be accurately determined through the employee number and the channel, so that the user-defined signature information is obtained.
Wherein the step of generating the encrypted string based on the signature information, the employee number, and the channel comprises:
identifying the type of the signature information, wherein the type of the signature information comprises an electronic signature class and a handwritten signature class;
when the type of the signature information is a handwritten signature type, intercepting the signature information as a signature picture;
converting the signature picture into a signature character string in a Base64 information conversion mode;
and generating the encrypted character string based on the signature character string, the employee number and the channel.
In this embodiment, when the encrypted string is generated, the corresponding channel and the employee code of the user are displayed, and the signature information designed by the user is added, so that the information generates an encrypted string, the encrypted string does not need to be decrypted by the front end, and the back end takes the encrypted string to decrypt and mark all the information. In addition, when the type of the signature information is a handwritten signature type, the output signature content can be obtained by inputting the signature picture into a pre-trained convolutional neural network, and the signature content is converted into a target signature character string according to a pre-configured character mapping relation.
Further, in step S1, the step of generating recommendation data based on the encrypted character string includes:
acquiring and identifying a recommended data type carried by the recommended data generation request;
when the recommended data type is a two-dimensional code, calling a two-dimensional code generation tool, and generating a recommended two-dimensional code based on the encrypted character string to serve as the recommended data;
when the recommended data type is a long chain, generating first long chain information based on the encrypted character string to serve as the recommended data;
and when the recommended data type is a short chain, generating second long chain information based on the encrypted character string, and configuring short chain information mapped with the second long chain information as the recommended data.
In this embodiment, the recommended data includes short chains, long chains, two-dimensional codes, and the like. After the two-dimensional code, the first long-chain information and the second long-chain information are generated, the unique codes corresponding to the two-dimensional code, the first long-chain information and the second long-chain information are used as the identifiers of the two-dimensional code, and computer identification is facilitated. And in the subsequent step of taking the recommended data clicked by the client as target recommended data and analyzing the target recommended data when the client is identified to click any one of the recommended data, the computer acquires the unique code of the recommended data when the client is identified to click any one of the recommended data, identifies the unique code as the target unique code, and analyzes the recommended data corresponding to the target unique code to obtain the target encrypted character string. The unique code can also be called a third-party order number, the generation mode of the unique code is any preset unique code generation mode selected by a user, and the computer generates the unique code according to the selection of the user, for example, if the user selects to generate the unique code based on an MD5 algorithm, the computer acquires the current time and the employee code, and processes the current time and the employee code based on an MD5 encryption algorithm to acquire the unique code. If a short chain needs to be generated, a short chain service needs to be called, and a long chain is converted into a short chain according to a mapping relation. If a WeChat two-dimensional code needs to be generated, the WeChat two-dimensional code generation service needs to be called, and the encrypted character string is transmitted to the WeChat. In the process of generating the first long chain information by encrypting the character string, the encrypted character string is positioned behind the key character in the first long chain information, for example, the first long chain information is http:// www.xxxx.com//3451456, wherein com// belongs to the key character. And the subsequent process of analyzing the first long-chain information to obtain the encrypted character string comprises the steps of identifying key characters in the first long-chain information and taking the characters behind the key characters as the encrypted character string. The second long chain information is the same, and is not described in detail in the present application.
And a mapping relation is configured between the second long-chain information and the short-chain information, namely the second long-chain information is mapped with the short-chain information, and the short-chain information mapped with the second long-chain information is user-defined or generated through the second long-chain information. The step of generating short-chain information through the second long-chain information comprises the following steps: and carrying out compression operation on the second long-chain information through a preset compression algorithm to obtain short-chain information (generally 5 letters). The reason why the second long-chain information needs to be converted into the short-chain information is that when the short message carrying the recommended data is sent to the user, if the content is the second long-chain information, the content of the short message is too long, and then the short message can be intercepted into a plurality of short messages to be sent by an operator, and a plurality of fees can be collected, and meanwhile, the user experience is poor. By changing the short message content into short-chain information, the short message content can be more concise, and the user experience is improved.
S2: when the fact that the client clicks any recommended data is identified, the recommended data clicked by the client is used as target recommended data, the target recommended data is analyzed to obtain a target encryption character string, the target encryption character string is decrypted to obtain target user data, and the target user is determined based on the target user data.
In this embodiment, because symmetric encryption is adopted, the target encrypted character string can be directly decrypted by the local key to obtain the target user data, that is, the information such as the employee number, and the target user can be determined according to the information.
S3: and acquiring the progress state of information retention operation of a client through the target recommendation data in real time through a buried point, generating target trace information based on the progress state, and associating the target trace information with the target user.
In this embodiment, each time the user clicks, the data is buried by using the policy, and the data of the user is transmitted back to the server in real time. For example, the target recommendation data is a short-chain or long-chain link, after the user clicks the link, an H5 page is opened, a place for inputting a mobile phone number is on the page, after the user inputs the mobile phone number, the current progress state is the completion of the mobile phone number input, target trace information is generated based on the progress state and the mobile phone number for completing the mobile phone number input, the target trace information is bound with an encrypted character string in the link, and then the target trace information is associated with the target user, and finally the information is retained.
S4: and obtaining historical trace information associated with the target user, comparing whether the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, and replacing the historical trace information by the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information to obtain and output the service data of the target user.
In this embodiment, once a user enters the life cycle of a product, the current status of the user is recorded in the server, for example, the user is registered but not named, but not consumed. The current situation of the user who clicks the link can be known by comparing the mobile phone number with the previous trace information. The progress state comprises registration, real names and the like, and the real names belong to subsequent registered states according to a preset progress state sequence directory.
In some optional implementation manners of this embodiment, after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the electronic device may further perform the following step:
when a user is identified to be in a login state, a telephone number of the client is obtained, and a dialing button is clicked, telephone mark remaining information is generated and is associated with the current user, wherein the telephone mark remaining information comprises the telephone number of the client;
when a client registration notice is received, acquiring a registration telephone number carried by the client registration notice, searching whether the registration telephone number exists in the telephone trace information, and determining that one person is added to the promotion number of a user corresponding to the telephone trace information when the registration telephone number exists in the telephone trace information.
In this embodiment, if the user uses the outbound function carried by the user in the system, the generation of the telephone trace information according to the outbound result can be realized, and the telephone trace information is automatically associated with the user, and if the user uses the outbound function of the third-party service, the outbound information needs to be manually input and then is associated with the user.
In some optional implementation manners of this embodiment, after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the electronic device may further perform the following step:
when an information modification instruction is received, the modification type and the modification information carried by the information modification instruction are obtained, the modification position is determined according to the modification type, and the character corresponding to the modification position is replaced by the modification information, so that the user information modification is completed.
In this embodiment, a user can modify his own personal information after logging in, and the user can change his own channel, employee code, and preference information, where the preference information includes a common target recommendation data generation manner, his own signature information (as a tamper-resistant signature), and a unique code generation manner. The modification type refers to fields such as employee codes and channels, and the modification information refers to specific contents corresponding to the fields such as the employee codes or the channels.
In addition, after the business data of the target user are finally output, all the trace information related to the target user is counted, the number of times of clicking each recommended data, the number of clients successfully guided by each recommended data, the performance created by each recommended data, namely the click rate and the payment number, are determined according to the trace information. And then the company is assisted to count the current commission of the salesman, determine which promotion mode is better, and determine which places can be improved for the salesman, and the like.
The method and the system can reduce human participation, all the rules are on the platform, the salesman only needs to abide by the rules to popularize, the achievement can be attributed to the salesman naturally, and if the rules are not abide, the popularization can fail. So that failure is eliminated. The propaganda of the salesman is reduced, and the popularization efficiency is improved. The activity promotion efficiency is improved, for example, an activity promotion page is newly added, and after the information is seen on the platform, the business staff can naturally select to use the activity promotion page. The salesman can see the specific situation of each user promoted by the salesman, and can follow the user specifically. The business member can see the commission, so that the work power of the business member is improved, and the performance of the business member per month is increased by utilizing the trend line.
It is emphasized that the encryption string may also be stored in a node of a blockchain in order to further ensure the privacy and security of the encryption string.
The block chain referred by the application is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
This application can be applied to in the wisdom government affairs field, specifically is applied to the popularization of sweeping the code and downloading government affair APP in the wisdom government affairs field to and the popularization of other information etc to promote the construction in wisdom city.
According to the method and the device, the interference of the user can be reduced, the encrypted character string is generated based on the information of the user, namely the employee number, the recommendation data is generated based on the encrypted character string, then when the fact that the user clicks the recommendation data is identified, the target encrypted character string can be reversely pushed out according to the recommendation data, then the target user data is obtained through decryption, therefore the target user is determined based on the target user data, namely the target user can be determined according to the recommendation data, and the user related to the recommendation data clicked by the user can be automatically determined. By comparing the difference of the progress states between the target mark retaining information and the historical mark retaining information, the business data of the target user is generated, the achievement condition of the user can be automatically tracked and output, and the identification efficiency of the achievement condition of the user is improved.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware associated with computer readable instructions, which can be stored in a computer readable storage medium, and when executed, can include processes of the embodiments of the methods described above. The storage medium may be a non-volatile storage medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a Random Access Memory (RAM).
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
With further reference to fig. 3, as an implementation of the method shown in fig. 2, the present application provides an embodiment of a service data tracking apparatus, where the embodiment of the apparatus corresponds to the embodiment of the method shown in fig. 2, and the apparatus may be specifically applied to various electronic devices.
As shown in fig. 3, the service data tracking apparatus 300 according to this embodiment includes: a generation module 301, a decryption module 302, an acquisition module 303 and a comparison module 304. Wherein: the generation module 301 is configured to, when receiving a recommendation data generation request sent by a user in a login state, obtain an employee number of the user, generate an encrypted character string according to the employee number, generate recommendation data based on the encrypted character string, and associate the recommendation data with a current user; the decryption module 302 is configured to, when it is identified that a client clicks any one of the recommended data, take the recommended data clicked by the client as target recommended data, analyze the target recommended data, obtain a target encrypted character string, decrypt the target encrypted character string, obtain target user data, and determine a target user based on the target user data; an obtaining module 303, configured to obtain, in real time, a progress state of an information retention operation performed by a client through the target recommendation data by using a buried point, generate target trace information based on the progress state, and associate the target trace information with the target user; a comparison module 304, configured to obtain historical trace information associated with the target user, compare whether a progress state in the target trace information belongs to a subsequent state of the progress state in the historical trace information, and replace the historical trace information with the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, to obtain and output service data of the target user.
In this embodiment, the interference of the user can be reduced, the encrypted character string is generated based on the information of the user, namely the employee number, the recommendation data is generated based on the encrypted character string, and then when the fact that the user clicks the recommendation data is identified, the target encrypted character string can be reversely pushed out according to the recommendation data, and then the target user data is obtained through decryption, so that the target user is determined based on the target user data, namely the target user can be determined according to the recommendation data, and the user related to the recommendation data clicked by the user can be automatically determined. By comparing the difference of the progress states between the target mark retaining information and the historical mark retaining information, the business data of the target user is generated, the achievement condition of the user can be automatically tracked and output, and the identification efficiency of the achievement condition of the user is improved.
The generation module 301 includes a signature information acquisition sub-module and a generation sub-module. The signature information acquisition submodule is used for acquiring signature information of a user based on the employee number and the channel; and the generation submodule is used for generating the encrypted character string based on the signature information, the employee number and the channel.
The generation submodule comprises an identification unit, an interception unit, a conversion unit and a generation unit. The identification unit is used for identifying the type of the signature information, wherein the type of the signature information comprises an electronic signature class and a handwritten signature class; the intercepting unit is used for intercepting the signature information as a signature picture when the type of the signature information is a handwritten signature type; the conversion unit is used for converting the signature picture into a signature character string in a Base64 information conversion mode; the generation unit is used for generating the encryption character string based on the signature character string, the employee number and the channel.
The generation module 301 further includes a recommended data type obtaining sub-module, a calling sub-module, a first long-chain information generation sub-module, and a second long-chain information generation sub-module. The recommended data type obtaining submodule is used for obtaining and identifying recommended data types carried by the recommended data generation request; the calling submodule is used for calling a two-dimensional code generating tool when the recommended data type is a two-dimensional code, and generating a recommended two-dimensional code based on the encrypted character string to serve as the recommended data; the first long-chain information generation submodule is used for generating first long-chain information as the recommended data based on the encrypted character string when the recommended data type is a long chain; and the second long-chain information generation sub-module is used for generating second long-chain information based on the encrypted character string when the recommended data type is a short chain, and configuring short-chain information mapped with the second long-chain information as the recommended data.
In some optional implementations of this embodiment, the apparatus 300 further includes: the searching module is used for acquiring a pre-stored login list and the login number when receiving the login number sent by the user, searching whether the login number exists in the login list, and allowing the user to log in when the login number exists in the login list.
The searching module comprises an obtaining submodule and a searching submodule, wherein the obtaining submodule is used for obtaining a channel selected by a user, and a login list associated with the channel is obtained according to the channel and is used as a target login list; the search submodule is used for acquiring employee numbers or mobile phone numbers input by a user, respectively searching whether the employee numbers or the mobile phone numbers exist in an employee number column or a mobile phone number column in the target login list, and allowing the user to log in when the employee numbers exist in the employee number column or the mobile phone numbers exist in the mobile phone number column.
In some optional implementations of this embodiment, the apparatus 300 further includes: the trace-remaining module is used for acquiring the telephone number of a client when the user is identified to be in a login state, generating telephone trace-remaining information when a dialing button is clicked, and associating the telephone trace-remaining information with the current user, wherein the telephone trace-remaining information comprises the telephone number of the client; when a client registration notice is received, acquiring a registration telephone number carried by the client registration notice, searching whether the registration telephone number exists in the telephone trace information, and determining that one person is added to the promotion number of a user corresponding to the telephone trace information when the registration telephone number exists in the telephone trace information.
In some optional implementations of this embodiment, the apparatus 300 further includes: and the modification module is used for acquiring the modification type and the modification information carried by the information modification instruction when the information modification instruction is received, determining the modification position according to the modification type, and replacing the character corresponding to the modification position by the modification information to finish the modification of the user information.
According to the method and the device, the interference of the user can be reduced, the encrypted character string is generated based on the information of the user, namely the employee number, the recommendation data is generated based on the encrypted character string, then when the fact that the user clicks the recommendation data is identified, the target encrypted character string can be reversely pushed out according to the recommendation data, then the target user data is obtained through decryption, therefore the target user is determined based on the target user data, namely the target user can be determined according to the recommendation data, and the user related to the recommendation data clicked by the user can be automatically determined. By comparing the difference of the progress states between the target mark retaining information and the historical mark retaining information, the business data of the target user is generated, the achievement condition of the user can be automatically tracked and output, and the identification efficiency of the achievement condition of the user is improved.
In order to solve the technical problem, an embodiment of the present application further provides a computer device. Referring to fig. 4, fig. 4 is a block diagram of a basic structure of a computer device according to the present embodiment.
The computer device 200 comprises a memory 201, a processor 202, a network interface 203 communicatively connected to each other via a system bus. It is noted that only computer device 200 having components 201 and 203 is shown, but it is understood that not all of the illustrated components are required and that more or fewer components may alternatively be implemented. As will be understood by those skilled in the art, the computer device is a device capable of automatically performing numerical calculation and/or information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded device, and the like.
The computer device can be a desktop computer, a notebook, a palm computer, a cloud server and other computing devices. The computer equipment can carry out man-machine interaction with a user through a keyboard, a mouse, a remote controller, a touch panel or voice control equipment and the like.
The memory 201 includes at least one type of readable storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 201 may be an internal storage unit of the computer device 200, such as a hard disk or a memory of the computer device 200. In other embodiments, the memory 201 may also be an external storage device of the computer device 200, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, provided on the computer device 200. Of course, the memory 201 may also include both internal and external storage devices of the computer device 200. In this embodiment, the memory 201 is generally used for storing an operating system installed in the computer device 200 and various application software, such as computer readable instructions of a business data tracking method. Further, the memory 201 may also be used to temporarily store various types of data that have been output or are to be output.
The processor 202 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 202 is generally operative to control overall operation of the computer device 200. In this embodiment, the processor 202 is configured to execute computer readable instructions stored in the memory 201 or process data, for example, execute computer readable instructions of the business data tracking method.
The network interface 203 may comprise a wireless network interface or a wired network interface, and the network interface 203 is generally used for establishing communication connection between the computer device 200 and other electronic devices.
In the embodiment, the business data of the target user is generated by comparing the difference of the progress states between the target trace information and the historical trace information, so that the performance condition of the user can be automatically tracked and output, and the recognition efficiency of the performance condition of the user is improved.
The present application further provides another embodiment, which is to provide a computer-readable storage medium storing computer-readable instructions executable by at least one processor to cause the at least one processor to perform the steps of the traffic data tracking method as described above.
In the embodiment, the business data of the target user is generated by comparing the difference of the progress states between the target trace information and the historical trace information, so that the performance condition of the user can be automatically tracked and output, and the recognition efficiency of the performance condition of the user is improved.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be embodied in the form of a software product, which is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk) and includes instructions for enabling a terminal device (such as a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present application.
It is to be understood that the above-described embodiments are merely illustrative of some, but not restrictive, of the broad invention, and that the appended drawings illustrate preferred embodiments of the invention and do not limit the scope of the invention. This application is capable of embodiments in many different forms and is provided for the purpose of enabling a thorough understanding of the disclosure of the application. Although the present application has been described in detail with reference to the foregoing embodiments, it will be apparent to one skilled in the art that the present application may be practiced without modification or with equivalents of some of the features described in the foregoing embodiments. All equivalent structures made by using the contents of the specification and the drawings of the present application are directly or indirectly applied to other related technical fields and are within the protection scope of the present application.

Claims (10)

1. A method for tracking business data, comprising the steps of:
when a recommended data generation request sent by a user in a login state is received, acquiring the employee number of the user, generating an encrypted character string according to the employee number, generating recommended data based on the encrypted character string, and associating the recommended data with the current user;
when identifying that the client clicks any recommended data, taking the recommended data clicked by the client as target recommended data, analyzing the target recommended data to obtain a target encrypted character string, decrypting the target encrypted character string to obtain target user data, and determining a target user based on the target user data;
acquiring progress states of information retention operations of clients through the target recommendation data in real time through buried points, generating target trace information based on the progress states, and associating the target trace information with the target user;
and obtaining historical trace information associated with the target user, comparing whether the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, and replacing the historical trace information by the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information to obtain and output the service data of the target user.
2. The business data tracking method according to claim 1, wherein before the step of obtaining the employee number of the user when receiving the recommendation data generation request sent by the user in the login state, the method comprises:
acquiring a channel selected by a user, and acquiring a login list associated with the channel according to the channel to be used as a target login list;
and acquiring the employee number or the mobile phone number input by the user, respectively searching whether the employee number or the mobile phone number exists in an employee number column or a mobile phone number column in the target login list, and allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column.
3. The business data tracking method of claim 2, wherein the step of generating an encrypted string according to the employee number comprises:
acquiring signature information of a user based on the employee number and the channel;
and generating the encrypted character string based on the signature information, the employee number and the channel.
4. The business data tracking method of claim 3, wherein the step of generating the encrypted string based on the signature information, the employee number, and the channel comprises:
identifying the type of the signature information, wherein the type of the signature information comprises an electronic signature class and a handwritten signature class;
when the type of the signature information is a handwritten signature type, intercepting the signature information as a signature picture;
converting the signature picture into a signature character string in a Base64 information conversion mode;
and generating the encrypted character string based on the signature character string, the employee number and the channel.
5. The business data tracking method of claim 1, wherein the step of generating recommendation data based on the encrypted string comprises:
acquiring and identifying a recommended data type carried by the recommended data generation request;
when the recommended data type is a two-dimensional code, calling a two-dimensional code generation tool, and generating a recommended two-dimensional code based on the encrypted character string to serve as the recommended data;
when the recommended data type is a long chain, generating first long chain information based on the encrypted character string to serve as the recommended data;
and when the recommended data type is a short chain, generating second long chain information based on the encrypted character string, and configuring short chain information mapped with the second long chain information as the recommended data.
6. The method for tracking business data according to claim 2, wherein after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the method further comprises:
when a user is identified to be in a login state, a telephone number of the client is obtained, and a dialing button is clicked, telephone mark remaining information is generated and is associated with the current user, wherein the telephone mark remaining information comprises the telephone number of the client;
when a client registration notice is received, acquiring a registration telephone number carried by the client registration notice, searching whether the registration telephone number exists in the telephone trace information, and determining that one person is added to the promotion number of a user corresponding to the telephone trace information when the registration telephone number exists in the telephone trace information.
7. The method for tracking business data according to claim 2, wherein after the step of allowing the user to log in when the employee number exists in the employee number column or the mobile phone number exists in the mobile phone number column, the method further comprises:
when an information modification instruction is received, the modification type and the modification information carried by the information modification instruction are obtained, the modification position is determined according to the modification type, and the character corresponding to the modification position is replaced by the modification information, so that the user information modification is completed.
8. A traffic data tracking apparatus, comprising:
the generation module is used for acquiring the employee number of the user when receiving a recommendation data generation request sent by the user in a login state, generating an encrypted character string according to the employee number, generating recommendation data based on the encrypted character string, and associating the recommendation data with the current user;
the decryption module is used for taking the recommended data clicked by the client as target recommended data when the fact that the client clicks any recommended data is identified, analyzing the target recommended data to obtain a target encrypted character string, decrypting the target encrypted character string to obtain target user data, and determining a target user based on the target user data;
the acquisition module is used for acquiring the progress state of information retention operation of a client through the target recommendation data in real time through a buried point, generating target trace information based on the progress state, and associating the target trace information with the target user;
and the comparison module is used for acquiring historical trace information associated with the target user, comparing whether the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information, and replacing the historical trace information by the target trace information when the progress state in the target trace information belongs to the subsequent state of the progress state in the historical trace information to acquire and output the service data of the target user.
9. A computer device comprising a memory having computer readable instructions stored therein and a processor which when executed implements the steps of a business data tracking method according to any one of claims 1 to 7.
10. A computer-readable storage medium, having computer-readable instructions stored thereon, which, when executed by a processor, implement the steps of the traffic data tracking method according to any one of claims 1 to 7.
CN202110845623.9A 2021-07-26 2021-07-26 Service data tracking method and device, computer equipment and storage medium Pending CN113554315A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110845623.9A CN113554315A (en) 2021-07-26 2021-07-26 Service data tracking method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110845623.9A CN113554315A (en) 2021-07-26 2021-07-26 Service data tracking method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113554315A true CN113554315A (en) 2021-10-26

Family

ID=78132828

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110845623.9A Pending CN113554315A (en) 2021-07-26 2021-07-26 Service data tracking method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113554315A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113986062A (en) * 2021-11-05 2022-01-28 武汉夜莺科技有限公司 Information processing method, device and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274221A (en) * 2017-06-12 2017-10-20 王亚杰 A kind of page network promotion method and system
CN107909381A (en) * 2017-08-24 2018-04-13 平安普惠企业管理有限公司 Business recommended method, apparatus, equipment and computer-readable recording medium
CN108153858A (en) * 2017-12-22 2018-06-12 平安养老保险股份有限公司 Information-pushing method, device, storage medium and computer equipment
CN111680245A (en) * 2020-04-22 2020-09-18 上海淇玥信息技术有限公司 Page display method and device based on business event and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107274221A (en) * 2017-06-12 2017-10-20 王亚杰 A kind of page network promotion method and system
CN107909381A (en) * 2017-08-24 2018-04-13 平安普惠企业管理有限公司 Business recommended method, apparatus, equipment and computer-readable recording medium
CN108153858A (en) * 2017-12-22 2018-06-12 平安养老保险股份有限公司 Information-pushing method, device, storage medium and computer equipment
CN111680245A (en) * 2020-04-22 2020-09-18 上海淇玥信息技术有限公司 Page display method and device based on business event and electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113986062A (en) * 2021-11-05 2022-01-28 武汉夜莺科技有限公司 Information processing method, device and storage medium

Similar Documents

Publication Publication Date Title
US10572882B2 (en) Systems and methods for tracking and responding to mobile events in a relationship management system
US10862843B2 (en) Computerized system and method for modifying a message to apply security features to the message's content
CN103023875B (en) A kind of account management system and method
US10313353B2 (en) Method, device, terminal, and server for verifying security of service operation
CN103065080B (en) A kind of application program login method and device
JP6837066B2 (en) Information processing method and server, computer storage medium
CN112270597A (en) Business processing and credit evaluation model training method, device, equipment and medium
CN111814179A (en) User authority management and data control method and related equipment thereof
US10831754B2 (en) Using metadata to take action on an SMS message on a proprietary system
US20180131656A1 (en) Taking actions on notifications using an incomplete data set from a message
CN112039826A (en) Login method and device applied to applet terminal
CN111680477A (en) Method and device for exporting spreadsheet file, computer equipment and storage medium
CN111651749A (en) Method and device for finding account based on password, computer equipment and storage medium
CN111708927A (en) Information recommendation method and device and electronic equipment
CN113554315A (en) Service data tracking method and device, computer equipment and storage medium
CN111797297B (en) Page data processing method and device, computer equipment and storage medium
CN105577624B (en) Client exchange method and client and server
CN112507141A (en) Investigation task generation method and device, computer equipment and storage medium
CN116956326A (en) Authority data processing method and device, computer equipment and storage medium
CN108512803A (en) Remind the method and device of change account bound phone number
CN113190562A (en) Report generation method and device and electronic equipment
CN110213294A (en) By means of the community data cochain method and its equipment of block chain
US20190394036A1 (en) Communication system, server device, user device, method, and computer program
CN114980072B (en) Electronic business card exchange method and device based on Subscriber Identity Module (SIM) card
CN114978620B (en) Encryption method and decryption method for identity identification number

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination