CN113742161A - Buried point reporting method and device - Google Patents

Buried point reporting method and device Download PDF

Info

Publication number
CN113742161A
CN113742161A CN202010931334.6A CN202010931334A CN113742161A CN 113742161 A CN113742161 A CN 113742161A CN 202010931334 A CN202010931334 A CN 202010931334A CN 113742161 A CN113742161 A CN 113742161A
Authority
CN
China
Prior art keywords
reporting
name
parameter
proxy
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010931334.6A
Other languages
Chinese (zh)
Inventor
王凯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Wodong Tianjun Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Wodong Tianjun Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN202010931334.6A priority Critical patent/CN113742161A/en
Publication of CN113742161A publication Critical patent/CN113742161A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Abstract

The invention discloses a buried point reporting method and device, and relates to the technical field of computers. The method comprises the following steps of capturing a target object and acquiring a target object proxy name; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters; and calling an execution reporting method, and transmitting an actual reporting name and reporting parameters to a reporting server. Therefore, the method and the device can solve the problems of low reporting efficiency and poor flexibility of the existing buried point.

Description

Buried point reporting method and device
Technical Field
The invention relates to the technical field of computers, in particular to a buried point reporting method and device.
Background
In the currently realized website, common point-click buried points and exposure buried points are used for reporting data of page element click or exposure. The reporting usually needs to carry parameters, wherein the clicking embedded point needs to add a uniform identifier on a tag for reporting the clicking data, then monitors the element clicking with the identifier, and executes the relevant logic of clicking reporting; or adding relevant logic of click reporting in click response events needing to report click data. The exposure buried point needs to expose the element of the reported data to add the identifier, the exposure time of the identified element is observed through a page rolling event, and once the exposure is carried out, the relevant logic of exposure reporting is executed.
The buried point is a condition where a specific process collects some information in the application to track the usage of the application. The click reporting refers to collecting click events, reporting the click events to a reporting server, and performing website click hotspot analysis by the reporting server according to the reported data to provide data support for product optimization. The exposure reporting means that exposure elements are collected and reported to a reporting server, and the reporting server performs exposure analysis on the website elements according to the reported data to provide data support for the website plate typesetting.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art:
the relevant logics of the embedded points and the execution report are dispersed in each place of the system, which is not beneficial to maintenance, and when the report is not correctly executed by a certain embedded point, the check is difficult. Moreover, the embedded point and the execution report are strongly coupled with the service logic, so that a large amount of business logic is invaded, the quality of the embedded point is different from that of the execution report, and the execution of the service logic is possibly influenced, thereby causing the occurrence of on-line accidents. In addition, when the click buried point is reported, too much data cannot be carried, and certain service scenes cannot be met. And the website volume can be increased, and the website loading speed is influenced.
Disclosure of Invention
In view of this, embodiments of the present invention provide a method and an apparatus for reporting a buried point, which can solve the problems of low efficiency and poor flexibility of the existing buried point reporting.
In order to achieve the above object, according to an aspect of the embodiments of the present invention, a method for reporting a buried point is provided, including capturing a target object, and obtaining a target object proxy name; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters; and calling an execution reporting method, and transmitting an actual reporting name and reporting parameters to a reporting server.
Optionally, comprising:
capturing a target method through a click event agent method to obtain a click event agent name; the click event agent name comprises an agent component name and an agent target method name;
extracting an actual click reporting name and a reporting parameter name set corresponding to the click event proxy name according to the reporting key mapping configuration;
based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and calling an execution click reporting method, and transmitting an actual click reporting name and a reporting parameter to a reporting server.
Optionally, before capturing the target method by the click event proxy method, the method includes:
and adopting a javascript decorator mode to proxy the target method by using a click event proxy method.
Optionally, comprising:
capturing a target exposure element through an exposure element observer, and acquiring an exposure element proxy name; wherein, the exposure element proxy name comprises a proxied component name and a proxied target exposure element name;
extracting an actual exposure reporting name and a reporting parameter name set corresponding to the exposure element proxy name according to the reporting key mapping configuration;
based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and calling an exposure reporting execution method, and transmitting an actual exposure reporting name and reporting parameters to a reporting server.
Optionally, before capturing the target exposure element by the exposure element viewer, comprising:
acquiring a target exposure element, and adding an agent attribute; wherein the proxy attribute is defined as a combination of an identity and an element name.
Optionally, before capturing the target object, the method includes:
acquiring the configuration of the reported mapping data from a configuration server; the reporting mapping data configuration comprises reporting key mapping configuration and reporting parameter mapping configuration.
In addition, the invention also provides a buried point reporting device which comprises a data reporting component, a data processing component and a data processing component, wherein the data reporting component is used for capturing the target object and acquiring the proxy name of the target object; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and the execution reporting component is used for calling the execution reporting method, transmitting the actual reporting name and the reporting parameters into the execution reporting method and sending the actual reporting name and the reporting parameters to the reporting server.
Optionally, the method further comprises:
the data reporting component is a exact high-order component.
One embodiment of the above invention has the following advantages or benefits: the invention aims to: the invention utilizes the proxy characteristic of the exact high-order component, utilizes the javascript decorator to make a small amount of service intrusion, and decouples the service logic and the data reporting logic, so that the service component does not need to care about the data reporting logic and reporting parameters and is more concentrated on the service. Moreover, the IntersectionalObserver is used as an exposure element observer, so that the performance overhead caused by monitoring the rolling event of the browser is avoided, and the website can better perform in the modern browser. In addition, the invention adopts centralized configuration management to report the key and the parameters, thereby realizing the technical effects of centralized maintenance, one-time maintenance and long-term availability.
Further effects of the above-mentioned non-conventional alternatives will be described below in connection with the embodiments.
Drawings
The drawings are included to provide a better understanding of the invention and are not to be construed as unduly limiting the invention. Wherein:
fig. 1 is a schematic diagram of a main flow of a buried point reporting method according to an embodiment of the present invention;
fig. 2 is a schematic diagram of main modules of a buried point reporting apparatus according to an embodiment of the present invention;
fig. 3 is a schematic diagram of reporting key mapping configuration according to an embodiment of the present invention;
fig. 4 is a schematic diagram of reporting parameter mapping configuration according to an embodiment of the present invention;
FIG. 5 is an exemplary system architecture diagram in which embodiments of the present invention may be employed;
fig. 6 is a schematic block diagram of a computer system suitable for use in implementing a terminal device or server of an embodiment of the invention.
Detailed Description
Exemplary embodiments of the present invention are described below with reference to the accompanying drawings, in which various details of embodiments of the invention are included to assist understanding, and which are to be considered as merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the invention. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a schematic diagram of a main flow of a buried point reporting method according to an embodiment of the present invention, and as shown in fig. 1, the buried point reporting method includes:
step S101, capturing the target object and obtaining the proxy name of the target object.
In some embodiments, if the reporting of the buried click event is targeted, the target method may be captured by the click event proxy method to obtain the click event proxy name. Wherein the click event agent name comprises an proxied component name and a proxied target method name.
Preferably, the target method is proxied using the click event proxy method using the javascript decorator schema. The javascript decorator is a part of the javascript used for modifying the class or method, can act on the class or method, and is used for adding additional functions to the class or method on the premise of not damaging the original functions.
If the exposure element reporting is aimed at, the target exposure element can be captured by the exposure element observer, and the proxy name of the exposure element is obtained. Wherein the exposure element proxy name includes a proxied component name and a proxied target exposure element name.
Preferably, the target exposure element may be acquired and the proxy attribute added before the target exposure element is captured by the exposure element viewer. Wherein the proxy attribute is defined as a combination of an identity and an element name.
And step S102, extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration.
In some embodiments, if the reporting of the click event is for a buried point, the actual click reporting name and the reporting parameter name set corresponding to the click event proxy name are extracted according to the reporting key mapping configuration.
It should be noted that if the actual click reporting name and the reporting parameter name set corresponding to the click event proxy name are not extracted according to the reporting key mapping configuration, it indicates that the reporting key mapping configuration is incorrect, a warning log is printed, the service target method is directly executed, and the subsequent process is not executed.
And if the reporting of the buried point exposure element is aimed at, extracting an actual exposure reporting name and a reporting parameter name set corresponding to the proxy name of the exposure element according to the reporting key mapping configuration.
It should be noted that if the actual exposure reporting name and the reporting parameter name set corresponding to the exposure element proxy name are not extracted according to the reporting key mapping configuration, it is indicated that the reporting key mapping configuration is incorrect, the warning log is printed, and the subsequent process is not executed.
Step S103, based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; and then acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters.
In some embodiments, the configuration of the reported mapping data may be obtained from a configuration server; the reporting mapping data configuration comprises reporting key mapping configuration and reporting parameter mapping configuration.
Step S104, the execution reporting method is called, and the actual reporting name and the reporting parameters are transmitted to the reporting server.
In some embodiments, if the reporting is for the buried click event, the click reporting execution method is called, and the actual click reporting name and the reporting parameter are transmitted to the reporting server.
If the reporting is directed to the buried point exposure element reporting, an exposure reporting execution method is called, and an actual exposure reporting name and reporting parameters are transmitted to a reporting server side.
Fig. 2 is a schematic diagram of main modules of a buried point reporting device according to an embodiment of the present invention, and as shown in fig. 2, the buried point reporting device includes a data reporting component and an execution reporting component. The data reporting component captures a target object and acquires a target object proxy name; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; and then acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters. And the execution reporting component calls an execution reporting method, transmits the actual reporting name and the reporting parameters and sends the actual reporting name and the reporting parameters to the reporting server.
In some embodiments, the device for reporting a buried point further includes a service component, and the corresponding service component may be set according to different types of the buried point reporting service, for example: the service component corresponding to the report of the execution click and the service component corresponding to the report of the execution exposure.
Preferably, the business components include business data and public data. The service data is specific data set for different service types reported by different buried points. The public data is the data which is required by all the reporting services of the buried points. Further, a proxy attribute needs to be added to the exposure reported element in the service component, and the proxy attribute is defined as a combination of an identifier and an element name, for example, as an expReport _ + element name.
Preferably, the present invention may be configured with a plurality of data reporting components, and the data reporting components are exact high-order components. The act high-order component reports the component itself and the click event proxy method to the external exposure data. The private function of the exact higher-level component is an exposure element observer, which holds the element with the proxy name in the proxy service component, and is implemented by H5 api interaction observer ver, wherein the observation proxy name is the element beginning with a preset identifier (e.g., expReport _).
In addition, each data reporting component is provided with a reporting data pool, and the reporting data pool comprises data items of service data and public data. Meanwhile, the data reporting component can process click event reports (i.e., by a click event proxy method) and can also process exposure reports (i.e., by an exposure element viewer).
Where act refers to a function that accepts a component as a parameter and returns a new component, and higher order components are a function and not a component.
As another embodiment, if a click-to-bury reporting service is executed, that is, a target element of a service component is clicked, a specific implementation process includes:
before executing the business target method, the data reporting component captures the target method through a click event proxy method, and a click event proxy name is obtained in the click event proxy method. Wherein the click event agent name comprises an proxied component name and a proxied target method name. And then, extracting an actual click reporting name and a reporting parameter name set corresponding to the click event proxy name according to the reporting key mapping configuration. And based on the reporting parameter name set, obtaining the corresponding data item name according to the reporting parameter mapping configuration. And then, acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters. And calling an execution click reporting method in the execution reporting component, and transmitting an actual click reporting name and a reporting parameter to a reporting server. Finally, a business objective method is executed.
As another embodiment, if the exposure and buried point reporting service is executed, that is, a target element of a service component appears in the viewport, the specific implementation process includes:
the data reporting component captures the target exposure element through the exposure element viewer and obtains the exposure element proxy name in the exposure element viewer. Wherein the exposure element proxy name includes a proxied component name and a proxied target exposure element name. And extracting the actual exposure reporting name and the reporting parameter name set corresponding to the exposure element proxy name according to the reporting key mapping configuration. Based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; and then acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters. Finally, the exposure execution reporting method in the exposure execution reporting component is called, and the actual exposure reporting name and the reporting parameters are transmitted to the reporting server.
As still another embodiment, before performing the buried point report, the buried point report apparatus needs to be initialized, and the specific implementation process includes:
each service component of the client acquires required service data and public data from the service server, and the service component holds the corresponding service data and the public data during initialization.
The reporting mapping data configuration of the client can be obtained from a configuration server, and comprises reporting key mapping configuration and reporting parameter mapping configuration. The reporting key mapping configuration maintains the two data, as shown in fig. 3, the mapping relationship between the click event agent name and the actual click reporting name and reporting parameter name set, and the mapping relationship between the exposure element agent name and the actual exposure reporting name and reporting parameter name set. The reporting parameter mapping configuration maintains the mapping relationship between the reporting parameter name and the data item name of the data obtained from the service end, as shown in fig. 4. The data item name comprises a business data item name and a public data item name.
It should be noted that, the embedded point reporting method and the embedded point reporting apparatus of the present invention have a corresponding relationship in the specific implementation content, and therefore the repeated content is not described again.
In summary, the present invention creatively proposes to adopt a exact high-level component and utilize a click event agent to realize click reporting, and simultaneously realize exposure reporting in the agent component. Therefore, the invention can manage the data of the buried points in a centralized way, only one entry is reported, and the examination can be conveniently carried out when the report is invalid. And point burying, reporting execution and service logic decoupling are realized, and only a small amount of service logic is needed to be invaded. The embedding and reporting do not affect the execution of the business logic. Meanwhile, the embedded point mode of the labels is abandoned, and the embedded point does not influence the website volume and the loading speed any more.
Fig. 5 shows an exemplary system architecture 600 of a buried point reporting method or a buried point reporting apparatus, a buried point reporting judgment device or a buried point reporting judgment device, to which the embodiments of the present invention may be applied.
As shown in fig. 5, the system architecture 600 may include terminal devices 601, 602, 603, a network 604, and a server 605. The network 604 serves to provide a medium for communication links between the terminal devices 601, 602, 603 and the server 605. Network 604 may include various types of connections, such as wire, wireless communication links, or fiber optic cables, to name a few.
A user may use the terminal devices 601, 602, 603 to interact with the server 605 via the network 604 to receive or send messages or the like. The terminal devices 601, 602, 603 may have installed thereon various communication client applications, such as shopping applications, web browser applications, search applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 601, 602, 603 may be various electronic devices that have a buried point reporting screen or a buried point reporting determination screen and support web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 605 may be a server providing various services, such as a background management server (for example only) providing support for shopping websites browsed by users using the terminal devices 601, 602, 603. The backend management server may analyze and perform other processing on the received data such as the product information query request, and feed back a processing result (for example, target push information, product information — just an example) to the terminal device.
It should be noted that the method for reporting a hidden node or the method for determining whether the hidden node is reported in the embodiment of the present invention is generally executed by the server 605, and accordingly, the computing device is generally disposed in the server 605.
It should be understood that the number of terminal devices, networks, and servers in fig. 5 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Referring now to FIG. 6, a block diagram of a computer system 600 suitable for use with a terminal device implementing an embodiment of the invention is shown. The terminal device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 6, the computer system 600 includes a Central Processing Unit (CPU)601 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. In the RAM603, various programs and data necessary for the operation of the computer system 600 are also stored. The CPU601, ROM602, and RAM603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
The following components are connected to the I/O interface 605: an input portion 806 including a keyboard, a mouse, and the like; an output section 607 including a Cathode Ray Tube (CRT), a liquid crystal buried point reporter (LCD), and the like, and a speaker and the like; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. A drive 810 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
In particular, according to the embodiments of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program performs the above-described functions defined in the system of the present invention when executed by the Central Processing Unit (CPU) 601.
It should be noted that the computer readable medium shown in the present invention can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present invention, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present invention, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The modules described in the embodiments of the present invention may be implemented by software or hardware. The described modules may also be provided in a processor, which may be described as: a processor includes a data reporting component and an execution reporting component. Wherein the names of the modules do not in some cases constitute a limitation of the module itself.
As another aspect, the present invention also provides a computer-readable medium that may be contained in the apparatus described in the above embodiments; or may be separate and not incorporated into the device. The computer readable medium carries one or more programs which, when executed by a device, cause the device to include capturing a target object, obtaining a target object proxy name; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters; and calling an execution reporting method, and transmitting an actual reporting name and reporting parameters to a reporting server.
According to the technical scheme of the embodiment of the invention, the problems of low reporting efficiency and poor flexibility of the existing buried point can be solved.
The above-described embodiments should not be construed as limiting the scope of the invention. Those skilled in the art will appreciate that various modifications, combinations, sub-combinations, and substitutions can occur, depending on design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for reporting a buried point is characterized by comprising the following steps:
capturing a target object and acquiring a target object proxy name;
extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration;
based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and calling an execution reporting method, and transmitting an actual reporting name and reporting parameters to a reporting server.
2. The method of claim 1, comprising:
capturing a target method through a click event agent method to obtain a click event agent name; the click event agent name comprises an agent component name and an agent target method name;
extracting an actual click reporting name and a reporting parameter name set corresponding to the click event proxy name according to the reporting key mapping configuration;
based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and calling an execution click reporting method, and transmitting an actual click reporting name and a reporting parameter to a reporting server.
3. The method of claim 2, wherein prior to capturing the target method by the click event proxy method, comprising:
and adopting a javascript decorator mode to proxy the target method by using a click event proxy method.
4. The method of claim 1, comprising:
capturing a target exposure element through an exposure element observer, and acquiring an exposure element proxy name; wherein, the exposure element proxy name comprises a proxied component name and a proxied target exposure element name;
extracting an actual exposure reporting name and a reporting parameter name set corresponding to the exposure element proxy name according to the reporting key mapping configuration;
based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and calling an exposure reporting execution method, and transmitting an actual exposure reporting name and reporting parameters to a reporting server.
5. The method of claim 4, wherein prior to capturing the target exposure element by the exposure element viewer, comprising:
acquiring a target exposure element, and adding an agent attribute; wherein the proxy attribute is defined as a combination of an identity and an element name.
6. The method of any one of claims 1-6, wherein prior to capturing the target object, comprising:
acquiring the configuration of the reported mapping data from a configuration server; the reporting mapping data configuration comprises reporting key mapping configuration and reporting parameter mapping configuration.
7. A device for reporting a buried point is characterized by comprising:
the data reporting component is used for capturing the target object and acquiring the proxy name of the target object; extracting an actual reporting name and a reporting parameter name set corresponding to the target object proxy name according to the reporting key mapping configuration; based on the reporting parameter name set, obtaining a corresponding data item name according to reporting parameter mapping configuration; further acquiring corresponding values of the data item names from the reporting data pool, and assembling the values and the corresponding reporting parameter names into reporting parameters;
and the execution reporting component is used for calling the execution reporting method, transmitting the actual reporting name and the reporting parameters into the execution reporting method and sending the actual reporting name and the reporting parameters to the reporting server.
8. The apparatus of claim 7, further comprising:
the data reporting component is a exact high-order component.
9. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-6.
10. A computer-readable medium, on which a computer program is stored, which, when being executed by a processor, carries out the method according to any one of claims 1-6.
CN202010931334.6A 2020-09-07 2020-09-07 Buried point reporting method and device Pending CN113742161A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010931334.6A CN113742161A (en) 2020-09-07 2020-09-07 Buried point reporting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010931334.6A CN113742161A (en) 2020-09-07 2020-09-07 Buried point reporting method and device

Publications (1)

Publication Number Publication Date
CN113742161A true CN113742161A (en) 2021-12-03

Family

ID=78728015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010931334.6A Pending CN113742161A (en) 2020-09-07 2020-09-07 Buried point reporting method and device

Country Status (1)

Country Link
CN (1) CN113742161A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018121501A1 (en) * 2016-12-29 2018-07-05 北京国双科技有限公司 Method and apparatus for monitoring network visitor behavior
CN109597949A (en) * 2018-10-22 2019-04-09 平安科技(深圳)有限公司 Third party based on data normalization buries point identification generation method and equipment
US20190199812A1 (en) * 2017-12-27 2019-06-27 Microsoft Technology Licensing, Llc Server-to-server integration of tracking events
CN110209386A (en) * 2019-05-17 2019-09-06 北京奇艺世纪科技有限公司 The acquisition methods and device that data bury setting method a little, bury point data
CN110489180A (en) * 2019-08-07 2019-11-22 北京字节跳动网络技术有限公司 One kind burying a report method, device, medium and electronic equipment
CN110874307A (en) * 2018-08-29 2020-03-10 北京京东尚科信息技术有限公司 Event buried point collecting and reporting method and device
CN110909269A (en) * 2018-09-17 2020-03-24 北京京东尚科信息技术有限公司 Log reporting method and device
CN111046317A (en) * 2019-12-27 2020-04-21 北京奇艺世纪科技有限公司 Page data acquisition method, device, equipment and computer readable storage medium
CN111427741A (en) * 2020-02-26 2020-07-17 中国平安人寿保险股份有限公司 Buried point reporting method and related product

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018121501A1 (en) * 2016-12-29 2018-07-05 北京国双科技有限公司 Method and apparatus for monitoring network visitor behavior
US20190199812A1 (en) * 2017-12-27 2019-06-27 Microsoft Technology Licensing, Llc Server-to-server integration of tracking events
CN110874307A (en) * 2018-08-29 2020-03-10 北京京东尚科信息技术有限公司 Event buried point collecting and reporting method and device
CN110909269A (en) * 2018-09-17 2020-03-24 北京京东尚科信息技术有限公司 Log reporting method and device
CN109597949A (en) * 2018-10-22 2019-04-09 平安科技(深圳)有限公司 Third party based on data normalization buries point identification generation method and equipment
CN110209386A (en) * 2019-05-17 2019-09-06 北京奇艺世纪科技有限公司 The acquisition methods and device that data bury setting method a little, bury point data
CN110489180A (en) * 2019-08-07 2019-11-22 北京字节跳动网络技术有限公司 One kind burying a report method, device, medium and electronic equipment
CN111046317A (en) * 2019-12-27 2020-04-21 北京奇艺世纪科技有限公司 Page data acquisition method, device, equipment and computer readable storage medium
CN111427741A (en) * 2020-02-26 2020-07-17 中国平安人寿保险股份有限公司 Buried point reporting method and related product

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
PAL, GAUTAM; LI, GANGMIN; ATKINSON, KATIE: "Big Data Real-Time Clickstream Data Ingestion Paradigm for E-Commerce Analytics", 4TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 28 October 2018 (2018-10-28) *
廖爱红;罗铭涛;: "埋点管理系统分析与设计", 办公自动化, vol. 25, no. 16, 15 August 2020 (2020-08-15) *
杨唯: "基于Android的移动游戏数据采集工具设计与实现", 中国优秀硕士学位论文全文数据库 (信息科技辑), no. 05, 15 May 2019 (2019-05-15) *

Similar Documents

Publication Publication Date Title
CN107491488B (en) Page data acquisition method and device
CN111124819B (en) Method and device for full link monitoring
CN107480277B (en) Method and device for collecting website logs
CN109981322B (en) Method and device for cloud resource management based on label
CN111460129B (en) Method, device, electronic equipment and storage medium for generating identification
CN111309550A (en) Data acquisition method, system, equipment and storage medium of application program
CN111427701A (en) Workflow engine system and business processing method
CN110928934A (en) Data processing method and device for business analysis
CN109218041B (en) Request processing method and device for server system
CN115357761A (en) Link tracking method and device, electronic equipment and storage medium
CN110727563A (en) Cloud service alarm method and device for preset customer
CN114153703A (en) Micro-service exception positioning method and device, electronic equipment and program product
CN110866001A (en) Method and device for determining order to be processed
CN112948138A (en) Method and device for processing message
CN111698109A (en) Method and device for monitoring log
CN113742161A (en) Buried point reporting method and device
CN109087097B (en) Method and device for updating same identifier of chain code
CN113761433A (en) Service processing method and device
US20150222505A1 (en) Business transaction resource usage tracking
CN112699116A (en) Data processing method and system
CN112306791B (en) Performance monitoring method and device
CN112214500A (en) Data comparison method and device, electronic equipment and storage medium
CN112152915A (en) Message forwarding network system and message forwarding method
CN116450622B (en) Method, apparatus, device and computer readable medium for data warehouse entry
CN114844957B (en) Link message conversion method, device, equipment, storage medium and program product

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination