CN108063691A - One kind buries point data consistency detecting method, apparatus and system - Google Patents

One kind buries point data consistency detecting method, apparatus and system Download PDF

Info

Publication number
CN108063691A
CN108063691A CN201610979846.3A CN201610979846A CN108063691A CN 108063691 A CN108063691 A CN 108063691A CN 201610979846 A CN201610979846 A CN 201610979846A CN 108063691 A CN108063691 A CN 108063691A
Authority
CN
China
Prior art keywords
point data
buries
bury
terminal
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610979846.3A
Other languages
Chinese (zh)
Inventor
李�权
徐海峰
苗伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Banma Zhixing Network Hongkong Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201610979846.3A priority Critical patent/CN108063691A/en
Publication of CN108063691A publication Critical patent/CN108063691A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Theoretical Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

One kind is provided in the embodiment of the present application and buries point data consistency detecting method, apparatus and system, this method includes:Obtain that first terminal generates first, which buries point data and second terminal and generate and be stored in, to be buried the second of point server and buries point data;Wherein, first point data is buried as data caused by least one operation of first terminal response;Second buries point data as data caused by the same at least one operation of second terminal response;It compares this and first buries point data and this second buries point data;According to comparing result, determine that this first buries point data whether second to bury point data consistent with this.Using the scheme in the application, the uniformity for burying point data can be detected.

Description

One kind buries point data consistency detecting method, apparatus and system
Technical field
This application involves computer technologies, and in particular, to one kind buries point data consistency detecting method, device and is System.
Background technology
In order to carry out statistics and analysis to behavior of the user in application or the page, the method for generally use is to answer at present With or the code corresponding position of the page on be implanted into statistics codes, that is, bury a little.
By burying a little, behavior of the user in respective application or the page can be tracked, including clicking on, sliding, downloading, browsing Deng;Multiple point datas of burying are counted, the Continuous behavior of user can be tracked, the data being collected into can also be inputted and established Model, draw the operation behavior of user.By burying a little, additionally it is possible to statistics obtain page browsing amount, independent access person quantity, The statistical numbers such as IP, page residence time, page operation time, page access number, button number of clicks, file download number According to, and can be in this, as application or page development and the foundation of optimization.
In the prior art, the process flow for burying point data at present is as follows:Applying when receiving operation in terminal, will What each operation generated, which bury point data, is uploaded to and buries point server;It buries point server and stores these data in the form of a table;It is needing When, related data can be read from point server is buried, and carry out statistical analysis.
During the application is realized, inventor has found, in some scenarios, in fact it could happen that bury burying in point server The situation of point data inaccuracy, for example, stored in point server is buried bury point data and terminal it is actual generate bury point data It is inconsistent, burying burying of being stored in point server, that point data is buried expected from point data and developer is inconsistent etc.;Therefore, it is necessary to carry The scheme of point data uniformity is buried for a kind of detection.
The content of the invention
One kind is provided in the embodiment of the present application and buries point data consistency detecting method, apparatus and system, can detect and bury The uniformity of point data.
According to the first aspect of the embodiment of the present application, provide one kind and bury point data consistency detecting method, including:It obtains Take that first terminal generates first, which buries point data and second terminal and generate and be stored in, to be buried the second of point server and buries point data; Wherein, first point data is buried as data caused by least one operation of first terminal response;Second buries point data as the second end End responds data caused by least one operation;It compares this and first buries point data and this second buries point data;It is tied according to comparison Fruit determines that this first buries point data whether second to bury point data consistent with this.
According to the second aspect of the embodiment of the present application, provide one kind and bury point data consistency detection device, including:Number According to acquisition module, first for obtaining first terminal generation buries point data and second terminal is generated and is stored in and buries a service The second of device buries point data;Wherein, first point data is buried as data caused by least one operation of first terminal response;Second It buries point data and responds data caused by least one operation for second terminal;Contrast module first buries points for comparing this Second point data is buried according to this;Determining module, for according to comparing result, determining that this first buries point data and this second buries points According to whether consistent.
According to the 3rd of the embodiment of the present application the aspect, provide one kind and bury point data consistency detection system, including:One A or multiple terminals bury point data for generating first;Point server is buried, point data is buried for storing second;Test server, First for obtaining first terminal generation, which buries point data and second terminal, generates and is stored in and bury the second of point server and bury a little Data;Wherein, first point data is buried as data caused by least one operation of first terminal response;Second buries point data as the Two terminals respond data caused by least one operation;And it compares this and first buries point data and this second buries point data;And root According to comparing result, determine that this first buries point data whether second to bury point data consistent with this.
Point data consistency detecting method, device or system are buried using what is provided in the embodiment of the present application, acquisition performs spy Fixed operation generate first bury point data and perform it is that same operation generates, from terminal transmission to burying the of point server storage Two bury point data;And compare first and bury point data and second and bury point data, according to comparing result, judge this first bury point data and Whether second to bury point data consistent;So as to fulfill the consistency detection for burying point data.
Description of the drawings
Attached drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Schematic description and description please does not form the improper restriction to the application for explaining the application.In the accompanying drawings:
Fig. 1 is to bury point data consistency detection system schematic according to the embodiment of the present application one;
The flow chart for burying point data consistency detecting method according to the embodiment of the present application one is shown in Fig. 2;
Fig. 3 is to bury point data consistency detection system schematic according to the embodiment of the present application two;
The flow chart for burying point data consistency detecting method according to the embodiment of the present application two is shown in Fig. 4;
The flow chart for burying point data consistency detecting method according to the embodiment of the present application three is shown in Fig. 5;
Fig. 6 is the structure diagram that point data consistency detection device is buried shown in the embodiment of the present application four.
Specific embodiment
During the application is realized, inventor has found, in some scenarios, in fact it could happen that bury burying in point server The situation of point data inaccuracy for example, for the application of open source code, carries out again the application in third party manufacturer During exploitation, in fact it could happen that third party manufacturer developer changes or delete the situation about burying a little in source code, causes the original of application Developer or data analyst bury point data expected from can not obtaining;It is buried a little alternatively, will bury point data in terminal and transport to During server, due to network, cause a part bury point data loss, at this point, bury stored in point server bury point data With terminal it is actual generate to bury point data inconsistent etc.;Accordingly, it is desirable to provide a kind of scheme for judging to bury point data uniformity.
It buries point data consistency detecting method, device in view of the above-mentioned problems, providing one kind in the embodiment of the present application and is System, obtain perform that specific operation generates first bury point data and perform it is that same operation generates, from terminal transmission to burying clothes The second of business device storage buries point data;And compare first and bury point data and second and bury point data, according to comparing result, judge this Whether one with second to bury point data consistent if burying point data;Same operation is performed due to being directed to same application, should theoretically be generated Identical buries point data, so if first buries point data and second to bury point data inconsistent, then developer can be reminded to bury Point or be possible breakdown etc. in transmission path.
Scheme in the embodiment of the present application may be employed various computer languages and realize, for example, the program of object-oriented is set Count language Java and literal translation formula script JavaScript etc..
In order to which technical solution in the embodiment of the present application and advantage is more clearly understood, below in conjunction with attached drawing to the application Exemplary embodiment be described in more detail, it is clear that described embodiment be only the application a part implementation The exhaustion of example rather than all embodiments.It should be noted that in the case where there is no conflict, embodiment and reality in the application Applying the feature in example can be mutually combined.
Embodiment one
The point data consistency detecting method that buries in the embodiment of the present application can be applied in system as shown in Figure 1.Such as Shown in Fig. 1, which includes terminal 101, buries point server 102, test server 103 and test lead 104.
In the specific implementation, which can include a variety of electronic equipments that can be run application or open the page, example Such as mobile phone, computer, day cat magic box, wrist-watch.
In the specific implementation, this, which buries point server 102, can include receiving module and memory module.Receiving module can be used Point data is buried in being received from terminal;Memory module can be used for storage and bury point data from what terminal received;In the specific implementation, The memory module can be by database realizing, for example, Mysql databases;In the database, it can be stored with different forms Point data is buried from different terminals;The different periods from same terminal can also be stored with multiple forms buries point data.
Point data is buried since each terminal constantly uploads, to avoid the frequent operation to database, in receiving module and storage Outside module, a cache module and log acquisition module can also be included by burying point server;Cache module can be used for caching and connect What is received buries point data;Log acquisition module can be used for reading each terminal-pair from the caching function module every scheduled duration That answers buries point data;And it is respectively written into database.
In the specific implementation, which can include data acquisition module and contrast module;The data acquisition Module, which is used to obtaining the first of first terminal generation, buries point data and second terminal and generates and be stored in and bury the second of point server Bury point data;Wherein, first point data is buried as data caused by least one operation of first terminal response;Second buries point data Data caused by same at least one operation are responded for second terminal;Contrast module for compare this first bury point data and Described second buries point data, and obtains comparing result;It can also determine that first buries point data and second and bury a little according to comparing result Whether data are consistent.
In the specific implementation, which can include following at least one:It clicks on, slide, downloading or is clear It lookes at.
In the specific implementation, test lead 104 can include a variety of electronic equipments that can run application, such as mobile phone, meter Calculation machine, PAD etc..Specifically, which can include an operation interface, and testing staff can be touched by the operation interface Root of hair buries point data consistency detecting method according to the embodiment of the present application, for example, " starting on testing staff's clicking operation interface Detection " button triggering buries point data consistency detecting method according to the embodiment of the present application.
In the specific implementation, which can also include display module, for being shown to user in visual form Show the comparing result of the contrast module from test server.Specifically, the comparing result of display can be that each buries point data Comparing result;It can also only show wherein inconsistent comparing result;It can also show all comparing results, and highlight Inconsistent comparing result etc.;The application is not restricted this.
In the specific implementation, which can also include setup module, make a reservation for bury point data form for setting, This, which buries point data form, can filter out that predetermined operation is corresponding to bury point data, be corresponded to targetedly to detect predetermined operation Whether bury point data consistent.
In the specific implementation, which can also include reminding module, for developer to be prompted to bury a little;Or Prompt failure in transmission path.So that developer performs corresponding action according to prompting.
In the specific implementation, the test server 103 and test lead can be arranged on same electronic equipment, can also be divided It is located on different electronic equipments, the application is not restricted this.
The flow chart for burying point data consistency detecting method according to the embodiment of the present application one is shown in Fig. 2.
As shown in Fig. 2, comprised the following steps according to the point data consistency detecting method that buries of the embodiment of the present application one:
S201, terminal generate first and bury point data.
In the specific implementation, manually first can be generated with automatic mode triggering terminal bury point data.Specifically, User can bury point data by operating the page or the Webpage of a certain application come manual triggering terminal generation first, can also Run Script file in the terminal, and by script file come the operation of analog subscriber, generate first with this triggering terminal and bury a little Data.
In the specific implementation, this first buries point data and can include one and multiple bury point data;For example, it may be terminal exists The a certain moment buries point data, and what also can in the terminal be generated in 5 minutes including user buries point data;Can also be The all of the terminal bury point data;Specifically, which can be pre-set by testing staff, It can be set by system default, the application is not restricted this.
For example, user is 10:00-10:Between 05, perform operate twice altogether, be for the first time 10:01 a certain application master Clicking operation is performed on the position (200,100) of the page, generation accordingly buries point data:2000Amainpage(200,100);Its In, 2000 represent clicking operation, and Amainpage is the unique mark of the page, can be made of application+Page Name;(200, 100) it is coordinate, for representing the specific location in the page.Second is 10:The 03 slip behaviour performed on advertisement page Make, generation accordingly buries point data:3000Apage1 (502,506);Wherein, wherein, 3000 represent slide, and Apage1 is should The unique mark of advertisement page;(502,506) it is coordinate, for representing the initial position of slide.Then first bury point data Including:2000Amainpage (200,100) and 3000Apage1 (502,506).
S202, terminal bury point data by first and are respectively sent to bury point server and test server.
In the specific implementation, terminal can bury point data by first for example, by the data format of http agreements and send respectively To burying point server and test server.
In the specific implementation, terminal can send and bury point data in real time, i.e. and it often generates one and buries point data transmission one, It can also first cache the point data of burying of generation, and send the point data of burying of caching with predetermined time interval, the application is not to a bit It is restricted.
In the specific implementation, that buries that point server would generally receive that multiple terminals send buries point data;For ease of distinguishing, eventually When point data is buried in end transmission, the mark of itself can also be sent to and bury point server and test server.
S203 buries point server and receives and stores this and bury point data, obtains second and bury point data.
In the specific implementation, that buries that point server would generally receive that multiple terminals send buries point data;For ease of distinguishing, bury Point server receive bury point data when, may further determine that is received buries the corresponding terminal of point data;And it is storing When, establish the correspondence for burying point data and the terminal.
In the specific implementation, point data can be buried often to receive by burying point server, just write database.But due to each terminal It constantly uploads and buries point data, to avoid the frequent operation to database, coming from of receiving can also first be cached by burying point server Each terminal buries point data;And pass through log acquisition module and read that each terminal is corresponding to bury points from caching every scheduled duration According to;And it is respectively written into database.
Specifically, multiple temporary tables can be cached by burying point server, and each temporary table corresponds to different terminals respectively; When burying point data of each terminal transmission is received, in the temporary table that this can first be buried to point data write-in corresponding terminal.Pre- When timing length reaches, log acquisition module reads data from the temporary table of each terminal, and writes in database, each terminal-pair In the form answered;Then the data in temporary table are deleted.
For example, store tetra- terminals of A, B, C, D in burying the database of point server buries point data.Wherein, due to net Network reason, A terminals are in step 201 10:03-10:What is generated between 05 buries point data loss, causes A terminals are corresponding to bury a little Tables of data is as follows:
Terminal iidentification Moment Bury point data
A 8:00 2000homepage(200,100)
A 10:01 2000Amainpage(200,100)
In upper table, these bury point data and show:A terminals are 8:When 00, receive user homepage (200, 100) clicking operation at place;10:When 01, clicking operation of the user at (200,100) of Amainpage is received.
S204, test server reception come the first of self terminal and bury point data.
In the specific implementation, test server can be that first received buries point data and establish a temporary table, When receiving first and burying point data, the point data of burying received is write into the temporary table successively.Specifically, for establish this first The correspondence of point data and the terminal is buried, terminal iidentification can be included in the form, it can also be in the life of the temporary table Order includes terminal iidentification;The application is not restricted this.
For example, test server establish first bury point data temporary table can be as follows:
Terminal iidentification Moment Bury point data
A 10:01 2000Amainpage(200,100)
A 10:03 3000Apage1 (502,506)
In upper table, these bury point data and show:A terminals are 10:00-10:It performs between 05 and operates twice altogether:10: When 01, clicking operation of the user at (200,100) of Amainpage is received;10:When 03, receive user and exist Slide at (502,506) of Apage1.
In the specific implementation, there is no stringent sequential relationship between S203 and S204, i.e. S203 can be first carried out, after hold Row S204;S204 can also be first carried out, performs S203 afterwards;S203 and S204 can also be synchronously performed, the application does not make this Limitation.
S205, test server bury point data from point server acquisition second is buried.
In the specific implementation, test server can be asked to the data acquisition for burying point server transmission carried terminal mark It asks, triggering buries point server and inquires about that the terminal is corresponding to bury point data in the database, and is buried query result as second a little Data sending is to test server.
Specifically, if the inspection policies set before are to detect all uniformity for burying point data of the terminal, bury The corresponding all point datas of burying of the terminal stored in database are sent to test server by point server;If it sets before The inspection policies put are to detect the terminal in scheduled duration, for example, 10:00-10:The consistent of point data is buried between 05 Property;It then screens the terminal and buries point data in the scheduled duration, and bury point data as second and be sent to testing service Device.
For example, bury point server inquires 10 in point data table in burying for A:00-10:Point data of burying between 05 has one :The data then can be buried point data as second and be sent to test server by 2000Amainpage (200,100).
In the specific implementation, test server can be that second received buries point data and establish another temporary table, When receiving second and burying point data, the point data of burying received is write into the temporary table successively.Specifically, for establish this Two bury the correspondence of point data and the terminal, can include terminal iidentification in the form, can also be in the temporary table Order includes terminal iidentification;The application is not restricted this.
It should be appreciated that it buries point data for ease of subsequently burying point data and second to first and is compared, in S204 and S205 Point data and second is buried for first to bury the temporary table that point data establishes respectively same format may be employed.
For example, test server establish second bury point data temporary table can be as follows:
Terminal iidentification Moment Bury point data
A 10:01 2000Amainpage(200,100)
In upper table, these bury point data and show:A terminals are 10:00-10:It performs between 05 and operates twice altogether:10: When 01, clicking operation of the user at (200,100) of Amainpage is received.
In the specific implementation, there is no stringent sequential relationship between S204 and S205, i.e. S204 can be first carried out, after hold Row S205;S205 can also be first carried out, performs S204 afterwards;S204 and S205 can also be synchronously performed, the application does not make this Limitation.
S206, test server compare this and first bury point data and second and bury point data, obtain comparing result.
In the specific implementation, each that can one by one compare in the temporary table established in S204 and S205 buries point data, And obtain each comparing result for burying point data.Specifically, test server can be buried a little with comparing result form to record first Data and the second comparing result for burying point data.
In comparing result form, multiple information can be recorded, including terminal iidentification, moment, bury point data and comparison knot Fruit.Terminal iidentification, moment and comparing result etc. can also only be recorded;The application is not restricted this.
For example, comparing result form can be as follows:
Terminal iidentification Moment Bury point data Comparing result
A 10:01 2000Amainpage(200,100) Unanimously
A 10:03 3000Apage1 (502,506) It is inconsistent
As can be seen from the above table, what terminal A was generated buries point data, actual with terminal after process buries point server There are inconsistent for the point data of burying generated.
S207, test lead display comparison result.
In the specific implementation, the comparing result form obtained in S206 can be sent to test lead progress by test server It has been shown that, only can also be sent to test lead by inconsistent data item and show;It can also show all comparing results, and dash forward Go out and show inconsistent comparing result etc.;The application is not restricted this.
Point data consistency detecting method is buried using in the embodiment of the present application, increases test server and test lead newly, and Obtain that same terminal performs that specific operation generates by test server first buries point data and from terminal transmission to burying clothes The second of business device storage buries point data;And compare first and bury point data and second and bury point data, according to comparing result, judge this Whether one with second to bury point data consistent if burying point data, and comparing result is sent to test lead and is shown;It is same due to being directed to The same operation of one terminal, should theoretically generate it is identical bury point data, so if first buries point data and second and buries a little Data are inconsistent, then can prompt possible breakdown in developer's transmission path.
In a upper embodiment, describe and the point data of burying that same terminal is sent through different paths is subjected to consistency detection Method embodiment.Next, the embodiment buried point data and carry out the method for consistency detection that different terminals will be generated It is described.
Embodiment two
The point data consistency detecting method that buries in the embodiment of the present application can be applied in system as shown in Figure 3.Such as Shown in Fig. 3, which includes terminal 301a and 301b, buries point server 302, test server 303 and test lead 304.
In the specific implementation, the implementation of terminal 301a and 301b is referred to terminal 101 in the embodiment of the present application one Implement, overlaps will not be repeated.Specifically, which can further include an export module, and points are buried for exporting According to.
In the specific implementation, it can install what former application was developed again with third party manufacturer in terminal 301a and 301b respectively Using;Specifically, former application by terminal 301a can be installed, the application that third party manufacturer develops again can be installed by 301b.
In the specific implementation, which is referred to bury point server in the embodiment of the present application one 102 implementation, overlaps will not be repeated.
In the specific implementation, the implementation of the test server 303 is referred to test server in the embodiment of the present application one 103 implementation, overlaps will not be repeated.
In the specific implementation, the implementation of the test lead 304 is referred to the reality of test lead 104 in the embodiment of the present application one It applies, overlaps will not be repeated.
In addition, the test lead 304 can include further comprising an import modul, point data is buried for importing.
The flow chart for burying point data consistency detecting method according to the embodiment of the present application two is shown in Fig. 4.
As shown in figure 4, comprised the following steps according to the point data consistency detecting method that buries of the embodiment of the present application two:
S401, terminal 301a generate first and bury point data.
In the specific implementation, the implementation of step 401 may refer to the implementation of S201 in the embodiment of the present application one, repeat part It repeats no more.
S402 exports this and first buries point data.
In the specific implementation, testing staff can bury point data from terminal 301a by first manually and export, and save as survey The analysable file of server is tried, for example, filename, using .txt as the text formatting of suffix, filename is using .log as the day of suffix The file of the plain text formats such as will file.This can also be derived automatically from by terminal and first buries point data, and preserve in the terminal or Person is sent to test server.The application is not restricted this.
In the specific implementation, if being exported manually by testing staff, then export this first bury point data before, may be used also Further to verify the permission of testing staff, specifically, can be verified by way of username and password, it can also be by existing Have for verifying the verification of the other modes of user right in technology, the application is not restricted this.
S403, terminal 301b generate the 8th and bury point data;
In the specific implementation, the implementation of step 403, which may refer in the embodiment of the present application one to generate first in S201, buries a little The implementation of data, overlaps will not be repeated.
It should be appreciated that be compared, the action performed in terminal 301a and terminal 301b is same action.
S404, terminal 301b terminals, which by the 8th are buried point data and are sent to, buries point server.
In the specific implementation, the implementation of step 404 may refer in the embodiment of the present application one that terminal is buried first in S202 Point data is sent to the implementation for burying point server, and overlaps will not be repeated.
S405 buries point server and receives and stores in step 404 and bury point data, obtains second and bury point data.
In the specific implementation, the implementation of step 405 may refer to the implementation of S203 in the embodiment of the present application one, repeat part It repeats no more.
S406, test server import first and bury point data.
In the specific implementation, testing staff can manually import first and bury point data;For example, click on leading for test lead offer Enter button, and in the dialog box of pop-up the first store path for burying point data and first is chosen to bury point data file or hand Dynamic input this first bury the store path of point data and first and bury the title of point data file;The application is not restricted this.
In the specific implementation, when importing, it can also further input this and first bury the corresponding terminal of point data, i.e. eventually The mark of 301a is held, for example, terminal name;And can further be preserved in test server this first bury point data correspond to The correspondence of terminal 301a.
In the specific implementation, import this first bury point data before, can also further verify the permission of testing staff, Specifically, can be verified by way of username and password, it can also be by verifying user right in the prior art Other modes verify that the application is not restricted this.
S407, test server bury point data from point server acquisition second is buried.
In the specific implementation, before point data is buried in acquisition second, it can also further determine that second buries point data correspondence Terminal mark.It specifically, can be by the mark of testing staff input terminal 301b when point data is buried in importing first;Also may be used To inquire about the correspondence between the terminal 301a pre-established and terminal 301b, the mark of terminal 301b is obtained.
Obtain terminal 301b mark after, from bury point server obtain second bury point data specific implementation can join See the implementation of S205 in the embodiment of the present application one, overlaps will not be repeated.
S408, test server compare this and first bury point data and second and bury point data, obtain comparing result.
In the specific implementation, the implementation of step 408 may refer to the implementation of S206 in the embodiment of the present application one, repeat part It repeats no more.
S409, test lead display comparison result.
In the specific implementation, the implementation of step 409 may refer to the implementation of S207 in the embodiment of the present application one, repeat part It repeats no more.
Point data consistency detecting method is buried using in the embodiment of the present application, increases test server and test lead newly, and Obtain that different terminals perform that same operation generates by test server first buries point data and from another terminal transmission to burying The second of point server storage buries point data;And comparison first buries point data and second and buries point data, according to comparing result, judges This first buries point data whether with second bury point data consistent;Due to being directed to the application execution of former application and the exploitation of third party manufacturer Same operation if first buries point data and second to bury point data inconsistent, can prompt former application and third party manufacturer In the application of exploitation to bury point code inconsistent.
Next, by the method that the specific consistency detection for burying point data for burying point data form is set to testing staff Embodiment is described.
Embodiment three
System as shown in Figure 3 can be applied to according to the point data consistency detecting method that buries of the embodiment of the present application three In.
The flow chart for burying point data consistency detecting method according to the embodiment of the present application three is shown in Fig. 5.
As shown in figure 5, comprised the following steps according to the point data consistency detecting method that buries of the embodiment of the present application three:
S501, testing staff bury point data form in the setting of test lead 304.
In the specific implementation, testing staff can click on the corresponding button of test lead offer manually, for example, " self-defined " presses Button, and it is self-defined in the dialog box of pop-up bury point data form, alternatively, can be selected in the menu of pop-up concern behaviour Make, test lead can according to it is pre-stored operation and bury the correspondence between point data form, determine testing staff set Bury point data form;The application is not restricted this.
For example, testing staff want to compare two station terminals perform generated during identical clicking operation bury point data, then examine Survey personnel, which can be set, buries point data form as " 2000*** ";Or " 2000** (*, *) ";I.e., it is possible to by asterisk wildcard * come Fuzzy query as long as burying point data includes " 2000 ", just meets the requirements.
S502, terminal 301b generate the 9th and bury point data;
In the specific implementation, the implementation of step 502 may refer to the implementation of S201 in the embodiment of the present application one, repeat part It repeats no more.
S503, terminal 301b, which by the 9th bury point data and be sent to, buries point server.
In the specific implementation, the implementation of step 503 may refer in the embodiment of the present application one that terminal is buried first in S202 Point data is sent to the implementation for burying point server, and overlaps will not be repeated.
S504 buries point server and receives and stores in step 503 and buries point data.
In the specific implementation, the implementation of step 504 may refer to the implementation of S203 in the embodiment of the present application one, repeat part It repeats no more.
S505, test server import first and bury point data.
In the specific implementation, the implementation of step 505 may refer to the implementation of S406 in the embodiment of the present application two, repeat part It repeats no more.
From burying in point data of being generated during the action identical with the action in S502 is received by terminal 301a, according to step The data buried point data form and screened set in 501.
S506, point server acquisition terminal 301b is corresponding, meets and buries the second of point data form from burying for test server Bury point data.
In the specific implementation, the corresponding specific implementations for burying point data of terminal 301b are obtained and may refer to the embodiment of the present application The implementation of S407 in two, overlaps will not be repeated.
After obtaining that terminal 301b is corresponding and burying point data, burying point server can be further according to burying point data form Screening obtains second and buries point data.
S507, test server compare this and first bury point data and second and bury point data, obtain comparing result.
In the specific implementation, the implementation of step 507 may refer to the implementation of S206 in the embodiment of the present application two, repeat part It repeats no more.
S508, test lead display comparison result.
In the specific implementation, the implementation of step 508 may refer to the implementation of S207 in the embodiment of the present application one, repeat part It repeats no more.
Point data consistency detecting method is buried using in the embodiment of the present application, the lattice that can be set according to testing staff Formula buries point data and second to the first of specified format and buries point data and compare, operated convenient for testing staff.
Based on same inventive concept, one kind is additionally provided in the embodiment of the present application and buries point data consistency detection device, by It is similar to the method that the embodiment of the present application one, two or three is provided in the principle that the device solves the problems, such as, therefore the reality of the device The implementation for the method for may refer to is applied, overlaps will not be repeated.
Example IV
Fig. 6 is the structure diagram that point data consistency detection device is buried shown in the embodiment of the present application four.As shown in fig. 6, Point data consistency detection device 600 is buried shown in the embodiment of the present application four, including:Data acquisition module 601, for obtaining first What terminal generated first buries point data and second terminal and generates and be stored in and bury the second of point server and bury point data;Wherein, institute It states first and buries point data as data caused by least one operation of first terminal response;Described second buries point data as institute It states second terminal and responds data caused by least one operation;Contrast module 602 first buries point data for comparing this Second point data is buried with this;Determining module 603, for according to comparing result, determining that this first buries point data and this second is buried a little Whether data are consistent.
In the specific implementation, data acquisition module specifically can be used for receiving that first terminal sends first buries point data; Or it imports this and first buries point data.
In the specific implementation, point data consistency detection device is buried shown in the embodiment of the present application four, can also be included:First Trigger module first buries point data for exporting this from the first terminal.
In the specific implementation, data acquisition module specifically can be used for triggering this and bury point server and inquire about the second terminal Corresponding 3rd buries point data;It obtains the 3rd and buries point data, and bury point data using the 3rd and bury point data as second.
In the specific implementation, point data consistency detection device is buried shown in the embodiment of the present application four to be included:It receives Module buries point data form for what reception was set, wherein, this buries point data form, and for screening, predetermined operation is corresponding to bury a little Data.
In the specific implementation, data acquisition module specifically can be used for triggering this and bury point server and inquire about the second terminal Corresponding 4th buries point data;Point data form is buried according to this, screening is buried in point data from the 4th and meets this and bury point data lattice The 5th of formula buries point data;It receives the 5th and buries point data, and bury point data using the 5th and bury point data as second.
In the specific implementation, point data consistency detection device is buried shown in the embodiment of the present application four to be included:Display Module, for showing the comparing result.
In the specific implementation, point data consistency detection device is buried shown in the embodiment of the present application four to be included:Prompting Module, for developer to be prompted to bury a little;Or failure in prompting transmission path.
In the specific implementation, which includes following at least one:It clicks on, slide, download or browses.
It should be understood by those skilled in the art that, embodiments herein can be provided as method, system or computer program Product.Therefore, the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application Apply the form of example.Moreover, the computer for wherein including computer usable program code in one or more can be used in the application The computer program production that usable storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The application is with reference to the flow according to the method for the embodiment of the present application, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that it can be realized by computer program instructions every first-class in flowchart and/or the block diagram The combination of flow and/or box in journey and/or box and flowchart and/or the block diagram.These computer programs can be provided The processor of all-purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that the instruction performed by computer or the processor of other programmable data processing devices is generated for real The device for the function of being specified in present one flow of flow chart or one box of multiple flows and/or block diagram or multiple boxes.
These computer program instructions, which may also be stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction generation being stored in the computer-readable memory includes referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one box of block diagram or The function of being specified in multiple boxes.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to generate computer implemented processing, so as in computer or The instruction offer performed on other programmable devices is used to implement in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in a box or multiple boxes.
Although the preferred embodiment of the application has been described, those skilled in the art once know basic creation Property concept, then can make these embodiments other change and modification.So appended claims be intended to be construed to include it is excellent It selects embodiment and falls into all change and modification of the application scope.
Obviously, those skilled in the art can carry out the application essence of the various modification and variations without departing from the application God and scope.In this way, if these modifications and variations of the application belong to the scope of the application claim and its equivalent technologies Within, then the application is also intended to comprising including these modification and variations.

Claims (20)

1. one kind buries point data consistency detecting method, which is characterized in that including:
Obtain that first terminal generates first, which buries point data and second terminal and generate and be stored in, to be buried the second of point server and buries a little Data;Wherein, described first point data is buried as data caused by least one operation of first terminal response;Described second It buries point data and responds data caused by least one operation for the second terminal;
It compares described first and buries point data and described second and bury point data;
According to comparing result, determine that described first buries point data whether with described second bury point data consistent.
2. according to the method described in claim 1, described first burying point data it is characterized in that, obtaining, specifically include:
Receive first terminal transmission first buries point data;Or
It imports described first and buries point data.
3. according to the method described in claim 2, it is characterized in that, before point data is buried in importing described first, further include:
Described first is exported from the first terminal and buries point data.
4. according to the method described in claim 2, described second burying point data it is characterized in that, obtaining, specifically include:
The point server inquiry second terminal the corresponding 3rd is buried described in triggering and buries point data;
It obtains the described 3rd and buries point data, bury point data using the described 3rd and bury point data as second.
5. it according to the method described in claim 1, is buried a little it is characterized in that, burying point data and described second in comparison described first Before data, further include:
Receive set bury point data form, wherein, it is described to bury point data form predetermined operation is corresponding to bury points for screening According to.
6. according to the method described in claim 5, burying point data from bury point server second it is characterized in that, obtaining, have Body includes:
The point server inquiry second terminal the corresponding 4th is buried described in triggering and buries point data;
Point data form is buried according to described, screening is buried in point data from the described 4th and meets and described bury the 5th of point data form and bury Point data;
It receives the described 5th and buries point data, bury point data using the described 5th and bury point data as second.
7. according to the method described in claim 1, it is characterized in that, according to comparing result, determine that described first buries point data With described second bury point data it is whether consistent after, further include:
Show the comparing result.
8. according to the method described in claim 1, it is characterized in that, according to comparing result, determine that described first buries point data With described second bury point data it is inconsistent after, further include:
Prompting developer buries a little;Or
Prompt failure in transmission path.
9. according to the method described in claim 1, it is characterized in that, at least one operation includes following at least one:Point It hits, slide, download or browses.
10. one kind buries point data consistency detection device, which is characterized in that including:
Data acquisition module, first for obtaining first terminal generation, which buries point data and second terminal, generates and is stored in and bury The second of point server buries point data;Wherein, described first point data is buried as at least one operation institute of first terminal response The data of generation;Described second buries point data responds data caused by least one operation for the second terminal;
Contrast module buries point data and described second for comparing described first and buries point data;
Determining module, for according to comparing result, determining that described first buries point data whether with described second bury point data consistent.
11. device according to claim 10, which is characterized in that data acquisition module, specifically for receiving first terminal First sent buries point data;Or it imports described first and buries point data.
12. according to the devices described in claim 11, which is characterized in that further include:
First trigger module buries point data for exporting described first from the first terminal.
13. according to the devices described in claim 11, which is characterized in that data acquisition module, specifically for being buried a little described in triggering Server inquires about the second terminal the corresponding 3rd and buries point data;It obtains the described 3rd and buries point data, and the described 3rd is buried Point data buries point data as second.
14. device according to claim 10, which is characterized in that further include:
Receiving module buries point data form for what reception was set, wherein, it is described to bury point data form for screening predetermined operation It is corresponding to bury point data.
15. device according to claim 14, which is characterized in that data acquisition module, specifically for being buried a little described in triggering Server inquires about the second terminal the corresponding 4th and buries point data;Point data form is buried according to described, is buried a little from the described 4th Screening, which meets, in data described bury the 5th of point data form and buries point data;It receives the described 5th and buries point data, and by described Five bury point data buries point data as second.
16. device according to claim 10, which is characterized in that further include:
Display module, for showing the comparing result.
17. device according to claim 10, which is characterized in that further include:
Reminding module, for developer to be prompted to bury a little;Or failure in prompting transmission path.
18. device according to claim 10, which is characterized in that at least one operation includes following at least one: It clicks on, slide, download or browses.
19. one kind buries point data consistency detection system, which is characterized in that including:
One or more terminals bury point data for generating first;
Point server is buried, point data is buried for storing second;
Test server, first for obtaining first terminal generation, which buries point data and second terminal, generates and is stored in and bury a little The second of server buries point data;Wherein, described first bury point data by the first terminal response it is at least one operation produce Raw data;Described second buries point data responds data caused by least one operation for the second terminal;It is and right Point data is buried than described first and described by second buries point data;And according to comparing result, determine that described first buries point data and institute Whether stating second, to bury point data consistent.
20. system according to claim 19, which is characterized in that further include:
Test lead, for receiving and showing the comparing result of the test server.
CN201610979846.3A 2016-11-08 2016-11-08 One kind buries point data consistency detecting method, apparatus and system Pending CN108063691A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610979846.3A CN108063691A (en) 2016-11-08 2016-11-08 One kind buries point data consistency detecting method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610979846.3A CN108063691A (en) 2016-11-08 2016-11-08 One kind buries point data consistency detecting method, apparatus and system

Publications (1)

Publication Number Publication Date
CN108063691A true CN108063691A (en) 2018-05-22

Family

ID=62137729

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610979846.3A Pending CN108063691A (en) 2016-11-08 2016-11-08 One kind buries point data consistency detecting method, apparatus and system

Country Status (1)

Country Link
CN (1) CN108063691A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763415A (en) * 2018-05-23 2018-11-06 杭州优行科技有限公司 Information processing method, device, electronic equipment and readable storage medium storing program for executing
CN109146096A (en) * 2018-09-07 2019-01-04 上海携程商务有限公司 Report processing method, device, storage medium and the electronic equipment of event for repairment
CN109491921A (en) * 2018-11-29 2019-03-19 携程旅游网络技术(上海)有限公司 Bury the management method and system of information
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium
CN111611141A (en) * 2020-04-30 2020-09-01 广州华多网络科技有限公司 Reporting verification method and device of buried point data, electronic equipment and storage medium
CN111984520A (en) * 2019-05-23 2020-11-24 上海哔哩哔哩科技有限公司 Buried point testing method, computer device and computer-readable storage medium
CN112579408A (en) * 2020-10-29 2021-03-30 上海钱拓网络技术有限公司 Classification method of embedded point information
CN113778868A (en) * 2021-09-03 2021-12-10 珠海格力电器股份有限公司 Method and device for data detection based on data buried points

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691745A (en) * 1997-09-29 2005-11-02 松下电器产业株式会社 Data match detecting apparatus, data match judging apparatus and data selecting apparatus
US20070176826A1 (en) * 2004-06-07 2007-08-02 Commissariat A L'energie Atomique Ulb location system for rescuing avalanche victims
CN104050054A (en) * 2014-06-27 2014-09-17 广州金山网络科技有限公司 Processing method for installation package installation failure and cause determining method and device
CN104461888A (en) * 2014-12-11 2015-03-25 中国科学院声学研究所 Application testing method and system
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1691745A (en) * 1997-09-29 2005-11-02 松下电器产业株式会社 Data match detecting apparatus, data match judging apparatus and data selecting apparatus
US20070176826A1 (en) * 2004-06-07 2007-08-02 Commissariat A L'energie Atomique Ulb location system for rescuing avalanche victims
CN104050054A (en) * 2014-06-27 2014-09-17 广州金山网络科技有限公司 Processing method for installation package installation failure and cause determining method and device
CN104461888A (en) * 2014-12-11 2015-03-25 中国科学院声学研究所 Application testing method and system
CN104915296A (en) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 Buried point testing method, data query method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763415A (en) * 2018-05-23 2018-11-06 杭州优行科技有限公司 Information processing method, device, electronic equipment and readable storage medium storing program for executing
CN109146096A (en) * 2018-09-07 2019-01-04 上海携程商务有限公司 Report processing method, device, storage medium and the electronic equipment of event for repairment
CN109146096B (en) * 2018-09-07 2020-11-17 上海携程商务有限公司 Processing method and device for repair event, storage medium and electronic equipment
CN109491921A (en) * 2018-11-29 2019-03-19 携程旅游网络技术(上海)有限公司 Bury the management method and system of information
CN109491921B (en) * 2018-11-29 2021-10-12 携程旅游网络技术(上海)有限公司 Management method and system of buried point information
CN111984520A (en) * 2019-05-23 2020-11-24 上海哔哩哔哩科技有限公司 Buried point testing method, computer device and computer-readable storage medium
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium
CN111611141A (en) * 2020-04-30 2020-09-01 广州华多网络科技有限公司 Reporting verification method and device of buried point data, electronic equipment and storage medium
CN112579408A (en) * 2020-10-29 2021-03-30 上海钱拓网络技术有限公司 Classification method of embedded point information
CN113778868A (en) * 2021-09-03 2021-12-10 珠海格力电器股份有限公司 Method and device for data detection based on data buried points

Similar Documents

Publication Publication Date Title
CN108063691A (en) One kind buries point data consistency detecting method, apparatus and system
CN106528432B (en) The construction method and device of test scene data bury a test method
CN109446069A (en) Compatibility test method, device, computer equipment and medium
CN108132814A (en) Page loading method, device, computer equipment and the storage medium of application program
CN105224343B (en) A kind of the update reminding method and device of application program
CN108052334A (en) Method for page jump, device, computer equipment and storage medium
CN107896244B (en) Version file distribution method, client and server
CN108255993A (en) Extract method, apparatus, electronic equipment and the storage medium of service fields
CN106557424A (en) Internal storage testing method, measured terminal, test client and system
CN103559222B (en) Method and device for displaying page loading time in browsers
CN108459964A (en) Test cases selection method, apparatus, equipment and computer readable storage medium
CN105302706B (en) Applied program testing method and device
CN108696481A (en) leak detection method and device
CN104579830B (en) service monitoring method and device
CN110275826A (en) Automated testing method, device and computer readable storage medium
CN109327355A (en) Cloud storage system performance evaluation methodology, device and computer readable storage medium
CN106899445A (en) The method and system of page interface automatic test
CN105095207A (en) Methods for retrieving and obtaining contents of application software, and devices for retrieving and obtaining contents of application software
CN110297776A (en) Examining report generation, method of reseptance, device, equipment and storage medium
CN109815105A (en) Applied program testing method and device based on Btrace
CN103246606A (en) Method and system for testing performances of ESB (enterprises service bus) platform
CN106844096A (en) The treating method and apparatus of program code
CN105095753B (en) Broadcast safe detection method, device
CN109739704A (en) A kind of interface test method, server-side and computer readable storage medium
CN108334516A (en) Information-pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201211

Address after: Room 603, 6 / F, Roche Plaza, 788 Cheung Sha Wan Road, Kowloon, China

Applicant after: Zebra smart travel network (Hong Kong) Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20180522