Disclosure of Invention
In order to overcome the defects of the prior art, the invention aims to provide a sharing intelligent tracking method, device and system, which can solve the problem that the sharing function of the existing social platform is not perfect.
One of the purposes of the invention is realized by adopting the following technical scheme:
a sharing intelligent tracking method comprises the following steps:
s1, receiving browsing operation of a user; the browsing operation comprises first user identification information and link information;
s2, acquiring a corresponding user data packet from the database according to the first user identification information, and generating webpage information according to the link information and browsing data in the user data packet;
s3, acquiring browsing data of the webpage information browsed by the user at the time, and sending the browsing data to a user data packet corresponding to the second user identification information, wherein the link information comprises the second user identification information;
s4, according to the sharing operation of the user, generating new link information by the link information and the first user identification information; and shares the new link information to the corresponding other users, and returns to S1.
Preferably, the method further comprises the following steps after the step of S1:
s11, judging whether the user logs in, if yes, executing S1, otherwise, sending login request information to the user side, and executing S12;
s12, judging whether the user login information sent by the user side is received, if so, executing S1; the user login information includes first user identification information.
Preferably, S2 further includes the following steps:
s21, judging whether a user data packet corresponding to the first user identification information exists in the database, if so, executing S2, otherwise, opening the webpage information corresponding to the link information, and executing S3.
Preferably, the step of S21, before the step of S3, further comprises: and establishing a user data packet corresponding to the first user identification information in a database.
Preferably, S2 further includes the following steps:
s22, judging whether the link information of the browsing operation of the user contains second user identification information, if yes, executing S2; otherwise, new link information is generated from the link information and the first user identification information, and S2 is performed.
The second purpose of the invention is realized by adopting the following technical scheme:
a shared smart tracking device, comprising:
the first receiving module is used for receiving browsing operation of a user; the browsing operation comprises first user identification information and link information;
the first generation module is used for acquiring a corresponding user data packet from a database according to the first user identification information and generating webpage information according to the link information and browsing data in the user data packet;
the first acquisition module is used for acquiring browsing data of the webpage information browsed by the user at this time and sending the browsing data to a user data packet corresponding to the second user identification information, and the link information comprises the second user identification information;
the second generation module is used for generating new link information from the link information and the first user identification information according to the sharing operation of the user; and sharing the new link information to other corresponding users, and returning to the first receiving module.
Preferably, the method further comprises the following steps:
the first judging module is used for judging whether the user logs in, if so, executing the first receiving module, otherwise, sending login request information to the user side, and executing the second judging module;
the second judging module is used for judging whether user login information sent by the user side is received or not, and if so, the first receiving module is executed; the user login information includes first user identification information.
Preferably, the method further comprises the following steps:
and the third judging module is used for judging whether a user data packet corresponding to the first user identification information exists in the database, if so, executing the first generating module, otherwise, opening the webpage information corresponding to the link information, and executing the first acquiring module.
Preferably, the third determining module further comprises, before the executing of the first acquiring module: and establishing a user data packet corresponding to the first user identification information in a database.
Preferably, the method further comprises the following steps:
the fourth judging module is used for judging whether the link information of the browsing operation of the user contains the second user identification information or not, and if so, the first generating module is executed; otherwise, new link information is generated by the link information and the first user identification information, and the first generation module is executed.
The third purpose of the invention is realized by adopting the following technical scheme:
a shared intelligent tracking system is used for executing an intelligent tracking method.
Compared with the prior art, the invention has the beneficial effects that: the user identification of the user is inserted into the link of the webpage, the browsing data of the user is tracked, so that the user can obtain the browsing data of the sharing object, the user sharing experience is better, and the user sharing enthusiasm is improved.
Detailed Description
The invention will be further described with reference to the accompanying drawings and the detailed description below:
a shared intelligent tracking method, as shown in fig. 1, includes the following steps:
step 101, receiving browsing operation of a user, judging whether the user logs in, if so, executing step 103, otherwise, sending login request information to the user side, and executing step 102;
the browsing operation of the user comprises that the user actively clicks a link message; or the user receives the link information shared by other users and clicks the shared link information.
After the user performs browsing operation, the system judges whether the user logs in, taking a WeChat platform as an example, namely judges whether the WeChat of the user authorizes browsing operation of a corresponding website, if so, corresponding webpage information is directly opened, user login information of the user can be directly obtained, and otherwise, login authorization of the user is required.
Step 102, judging whether user login information sent by a user side is received, if so, executing step 103;
the user sends user login information to perform login authorization, and after authorization, corresponding webpage information is opened according to link information in the browsing operation of the user; the user login information comprises first user identification information, user head portrait information, user nickname information and the like.
Taking the WeChat platform as an example, the user login state is automatically checked by using the sesion or the cookie: if the login state does not exist, initiating the authorization of the wechat oauth2, acquiring user login information such as first user identification information, user head portrait information, user nickname information and the like, acquiring the unique user identification openid, updating the user login state and storing user data in a warehouse.
103, acquiring a corresponding user data packet from a database according to the user login information, generating webpage information according to the link information and browsing data in the user data packet, opening the webpage information, and executing step 104;
the database is a graph database which is a non-relational database, can record the relation between entities and is widely applied to the record of social relations. The database stores user data packets of a plurality of users, and each user data packet corresponds to the first user identification information one by one.
Further, step 103 further comprises the following steps:
and judging whether a user data packet corresponding to the first user identification information exists in the database, if so, executing step 103, otherwise, opening webpage information corresponding to the link information, and executing step 104.
Further, before step 104 is executed, the method further includes "establishing a user data packet corresponding to the first user identification information in the database".
Step 104, acquiring browsing data of the webpage information browsed by the user at the time, and storing the browsing data into a corresponding user data packet in a database; judging whether second user identification information exists in the link information in the browsing operation, if so, sending the browsing data to a user data packet corresponding to the second user identification information, and then executing the step 105, otherwise, directly executing the step 105;
the browsing data comprises data such as browsing time and browsing progress of the user about the opened webpage information; if the link information of the user performing the browsing operation is not shared by other users but is link information opened by the user actively performing the browsing operation, the link information does not include second user identification information of other users, and at this time, the browsing data of the user is only stored in a user data packet corresponding to the user.
However, when the link information of the browsing operation performed by the user is shared by other users to the user, the link information may include second user identification information of other users, so that if the link information includes the second user identification information of other users, the browsing data is not only stored in the user datagram corresponding to the user, but also sent to user datagrams of other users. It should be noted that, in this case, the second user identification information may also include user identification information of multiple other users, and it is necessary to send browsing data of the user to user data packets of the multiple other users.
105, generating new link information by the link information and the first user identification information according to the sharing operation of the user; and sharing the new link information to the corresponding other users, and returning to the step 101.
For example, if a user a needs to share first link information with a user B, new first link information is generated by the first link information and first user identification information of the user a, and the new first link information includes second user identification information corresponding to the user a; and sharing the new first link information to the user B.
The user B receives the new first link information, and it needs to be noted that after the user B is shared, the new first link information is only the first link information for the user B; therefore, when the user B needs to share the first link information with the user C, the first link information and the first user identification information of the user B are regenerated into new first link information, and the new first link information includes second user identification information corresponding to the user B; and then sharing the new first link information to the user C.
Optionally, the first link information received by the user C may include, in addition to the second user identification information of the user B, the second user identification information corresponding to the user a, and also include the user identification information of the user C; so in this case, the browsing information of user C needs to be stored to user a's user data packet, user B's user data packet, and user C's user data packet.
It should be noted that the first user identification information and the second user identification information of the same user are actually the same user identification information; the first user identification information and the second user identification information of the same user correspond to a user data packet in the database. For example, "according to the sharing operation of the user, the link information and the first user identification information are generated into new link information in step 105; "the new link information includes the second user identification information, but the second user identification information and the first user identification information are actually the same user identification information.
Further, step 103 further comprises the following steps:
judging whether the link information of the browsing operation of the user contains second user identification information, if so, directly executing the step 103; otherwise, new link information is generated from the link information and the first user identification information, and step 103 is executed. The new link information includes second user identification information, and the second user identification information and the first user identification information are actually the same user identification information.
Taking a WeChat platform as an example, in order to overcome the defects of the traditional WeChat transmission monitoring mode, the method utilizes an open interface of a WeChat public platform to carry out secondary development, completes the monitoring of the content transmission condition in the WeChat, provides the conditions that the content shared by the sharers is read and shared by WeChat friends in the WeChat (chat and friend circles), and improves the enthusiasm of the user for sharing the content.
A shared smart tracking device, comprising:
the first receiving module is used for receiving browsing operation of a user; the browsing operation comprises first user identification information and link information;
the first generation module is used for acquiring a corresponding user data packet from a database according to the first user identification information, generating webpage information according to the link information and browsing data in the user data packet, and opening the webpage information;
the first acquisition module is used for acquiring browsing data of the webpage information browsed by the user at this time and sending the browsing data to a user data packet corresponding to the second user identification information;
the second generation module is used for generating new link information from the link information and the first user identification information according to the sharing operation of the user; and sharing the new link information to other corresponding users, and returning to the first receiving module.
Preferably, the first receiving module further comprises:
the first judging module is used for judging whether the user logs in, if so, executing the first receiving module, otherwise, sending login request information to the user side, and executing the second judging module;
the second judging module is used for judging whether user login information sent by the user side is received or not, and if so, the first receiving module is executed; the user login information includes first user identification information.
Preferably, the first generating module further comprises:
and the third judging module is used for judging whether a user data packet corresponding to the first user identification information exists in the database, if so, executing the first generating module, otherwise, opening the webpage information corresponding to the link information, and executing the first acquiring module.
Preferably, the third determining module further comprises, before the executing of the first acquiring module: and establishing a user data packet corresponding to the first user identification information in a database.
Preferably, the first generating module further comprises:
the fourth judging module is used for judging whether the link information of the browsing operation of the user contains the second user identification information or not, and if so, the first generating module is executed; otherwise, new link information is generated by the link information and the first user identification information, and the first generation module is executed.
Various other modifications and changes may be made by those skilled in the art based on the above-described technical solutions and concepts, and all such modifications and changes should fall within the scope of the claims of the present invention.