CN109144836A - A kind of processing method of operation log, device and electronic equipment - Google Patents

A kind of processing method of operation log, device and electronic equipment Download PDF

Info

Publication number
CN109144836A
CN109144836A CN201810883885.2A CN201810883885A CN109144836A CN 109144836 A CN109144836 A CN 109144836A CN 201810883885 A CN201810883885 A CN 201810883885A CN 109144836 A CN109144836 A CN 109144836A
Authority
CN
China
Prior art keywords
log
function point
application
extracted
point
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810883885.2A
Other languages
Chinese (zh)
Other versions
CN109144836B (en
Inventor
陈晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Nova Technology Singapore Holdings Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201810883885.2A priority Critical patent/CN109144836B/en
Publication of CN109144836A publication Critical patent/CN109144836A/en
Application granted granted Critical
Publication of CN109144836B publication Critical patent/CN109144836B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Abstract

This specification embodiment is related to processing method, device and the electronic equipment of a kind of operation log.Wherein, the processing method of operation log includes: to determine that strategy is extracted in the log of the application based on the user behavior data for the application a little obtained is buried to application;Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;Show the operation log.

Description

A kind of processing method of operation log, device and electronic equipment
Technical field
This specification embodiment be related to technical field of the computer network more particularly to a kind of processing method of operation log, Device and electronic equipment.
Background technique
Current operation log is to show user with the full dose data without any processing.Operation log is the every behaviour of user Make once just to record once, therefore, the data volume of displaying is very big.For a user, it is desirable to check certain operation note, need It to be filtered manually, when data volume is excessive, difficulty in filtration is greatly improved, and user's search efficiency is caused to decline.
In view of this, currently needing a kind of technical side that operation log can be showed to user in more friendly mode Case.
Summary of the invention
The one of purpose of this specification embodiment is to provide a kind of processing method of the operation log of operation log, device And electronic equipment, it can be improved the efficiency of user's search operation log.
To achieve the goals above, this specification embodiment adopts the following technical solutions:
In a first aspect, this specification embodiment provides a kind of processing method of operation log, comprising:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Second aspect provides a kind of processing unit of operation log, comprising:
Determining module determines the application based on the user behavior data for the application a little obtained is buried to application Log extract strategy;
Extraction module extracts strategy according to the log and screens extraction operation log from the operation note of the application;
Display module, for showing the operation log.
The third aspect provides a kind of electronic equipment, comprising: memory, processor and is stored on the memory simultaneously The computer program that can be run on the processor, the computer program are executed by the processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Fourth aspect provides a kind of computer readable storage medium, is stored on the computer readable storage medium Computer program, the computer program realize following steps when being executed by processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
In this specification, determine that strategy is extracted in log based on user behavior data, and extract strategy according to log and be directed to Property extract the operation log closely related with user behavior and be shown, the operation log shown can be made more to meet the phase of user It hopes, achievees the effect that user's finding is i.e. used, for a user, greatly improve the search efficiency and benefit for operation log Use benefit.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment are not paying creative labor for those of ordinary skill in the art Under the premise of dynamic property, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the step structural schematic diagram of the processing method for the operation log that this specification embodiment provides;
Fig. 2 is the logical construction schematic diagram of the processing method for the operation log that this specification embodiment provides;
Fig. 3 is to determine that the logic knot of strategy is extracted in log in the processing method for the operation log that this specification embodiment provides Structure schematic diagram;
Fig. 4 is the logical construction schematic diagram of the processing unit for the operation log that this specification embodiment provides;
Fig. 5 is the hardware structural diagram for the electronics that this specification embodiment provides;
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification embodiment clearer, have below in conjunction with this specification The technical solution of this specification embodiment is clearly and completely described in body embodiment and corresponding attached drawing.Obviously, described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this Field those of ordinary skill every other embodiment obtained without making creative work, belongs to this explanation The range of book embodiment protection.
In the prior art, the record rule of operation log and extracting shows rule dead, the software design that is that software program is write When, first determine which function point needs to record the operation log of user, which function point does not need to record the behaviour of user Make log.For the function point for needing to record operation log, the every operation of user is once just recorded once, finally with untreated Full dose data show user, and personalized displaying can not be carried out for different user.Want certain checked in operation log in family When operation note, need to be filtered manually, to increase lookup difficulty.In addition, the extraction of operation log shows rule Once modification then needs to redesign software program, realize that difficulty is larger, extracts and show that rule does not have flexibility.
In view of this, this specification provides one kind can define log extraction strategy according to user behavior, and according to log The technical solution that tactful extraction operation log is shown is extracted, finds desired operation log convenient for user.
On the one hand, this specification embodiment provides a kind of processing method of operation log, as shown in Figure 1, comprising:
Step 102, based on the user behavior data for the application a little obtained is buried to application, the log of application is determined Extract strategy;
For step 102:
Bury the relevant technologies and its implementation for a little referring to capturing, handle and send for specific user's behavior or event Process.And user behavior is a complete event, main includes five behavior elements compositions: event, place, personage, interaction, Interactive content.Under normal circumstances, user it is expected the operation log it is seen that closely related with itself.By being carried out to application The user behavior data obtained is buried, the function point that user applies frequent operation for this can be accurately positioned out, these are frequently The function point of operation is the object of user's concern, thus determine that the function point that strategy more extracts emphatically user's concern is extracted in log Operation log.
Step 104, strategy being extracted according to log, extraction operation log is screened from the operation note of application;
For step 104:
When user accesses the operation log of application, strategy is extracted based on the corresponding log of the user, can only screening be mentioned The full dose operation log for taking part operation log, rather than applying.For example, the operation day of the function point of user's concern is extracted in screening Will.
Step 106, operation log is shown.
For step 106:
The operation log of step 104 screening extraction can be only shown to user;Alternatively, can also show application to user All operationss log, but forward displaying or label show that step 104 screens the operation log extracted.
In the processing method of the present embodiment, determine that strategy is extracted in log based on user behavior data, and extract according to log Strategy targetedly extracts the operation log closely related with user behavior and is shown, and the operation log shown can be made more to accord with The expectation for sharing family achievees the effect that user's finding is i.e. used, for a user, greatly improves the lookup for operation log Efficiency and utilization benefit.
It describes in detail below to the processing method of the present embodiment.
The processing method of the present embodiment can be applied to the operation log in any system.User uses systematic difference meeting Operation note is produced, it is subsequent extraction operation log to be shown to user from operation note.
Referring to figs. 2 and 3, the processing method of the present embodiment specifically includes:
Step 202, the function point set of the application in acquisition system, comprising: determine application comprising at least one type Business function, the business function of at least one type split with the function point of tree structure, most granule is eventually arrived at The function point of degree obtains function point set.
Wherein, the type of business function may include conversational traffic type and log access type;Accordingly, function point set Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access The business function of type carries out function point and splits the log access function point obtained.
As exemplary introduction, it is assumed that certain information site provides download service, then the conversational traffic function point of download service For the function of providing a user downloading, corresponding log access function point are as follows: provide the function of the corresponding operation log of download function Energy.
Step 204, obtain function point buries point data, comprising: bury a little to the function point in function point set, obtain Function point buries point data.
Specifically, this step bury a little to conversational traffic function point, obtains that conversational traffic function point is corresponding to bury points According to;And log access function point bury a little, obtain that log access function point is corresponding to bury point data.
By taking download service as an example, the point data of burying of the conversational traffic function point of download service includes that user uses download function User information, temporal information, location information, downloading content information etc..The log access function point of download service buries points According to the user information, temporal information, location information, access content information for including the corresponding operation log of user's access download function Deng.
Step 206, point data is buried based on function point, determines the corresponding user behavior data of function point, comprising: to function The point data of burying of point is analyzed, from the user behavior data for burying determining function point in point data.
Specifically, data cleansing, such as de-redundancy, meaningless number can be carried out to point data is buried before being analyzed According to;And specification, such as the data format that transformational analysis is applicable are carried out to point data is buried;Data preparation is carried out to point data is buried, Such as data sorting, data rich (relevant other information is added).
Later, point data is buried based on conversational traffic function point is corresponding, determine the corresponding user's row of conversational traffic function point For data, which includes: the information that user uses conversational traffic function point, should Information can reflect that user uses the frequency of conversational traffic function point;
And point data is buried based on log access function point is corresponding, determine the corresponding user of normal log access function point Behavioral data, the corresponding user behavior data of log access function point include: that user's access conversational traffic function point is corresponding The information of operation log, the information can reflect that user accesses the frequency of the corresponding operation log of conversational traffic function point.
Step 208, after obtaining user behavior data, the level of interest of function point is determined, comprising: initial configuration function point Level of interest, be based on the corresponding user behavior data of function point, the level of interest of function point initial configuration carried out again true It is fixed.
Specifically, this step is based on the corresponding user behavior data of conversational traffic function point, determines conversational traffic function point Level of interest;And it is based on the corresponding user behavior data of log access function point, determine the concern of log access function point Grade.
As exemplary introduction, by taking the information management service that web station system provides as an example, conversational traffic function point be can wrap Include information addition, information modification and information deletion etc..Log access function point is then user for conversational traffic function point Operation log accesses behavior, may include: that the behavior of operation log, the user access information of user access information addition is modified The behavior for the operation log that the behavior of operation log and user access information are deleted.
In the present embodiment, initial level of interest is arranged to conversational traffic function point and log access function point.
For example, the level of interest division of conversational traffic function point has five grades of I-V, the smaller higher grade of numerical value.Wherein, The information value of the operation log of information addition is higher, therefore level of interest initially can be set to I, high-grade conversational traffic The operation log of function point extracts under strategy in log, it is easier to be extracted, show.As the information of the operation log of information deletion It is worth relatively small, therefore level of interest can be initially set to V, similarly the operation log of the conversational traffic function point of inferior grade In the case where strategy is extracted in log, it is less prone to be extracted, shows.
Later, the concern etc. to conversational traffic function point is determined according to the corresponding user behavior data of conversational traffic function point Grade.Assuming that information adds the function that corresponding user behavior data indicates the less use of user or the addition of not applicable information, It then indicates that information adds corresponding operation log for user without too many utility value, information can be added current Grade is redefined as III, is less susceptible to be extracted in the case where strategy is extracted in log so that information adds corresponding operation log.
Similarly, the user behavior data of log access function point can reflect out operation of the user to conversational traffic function point The access frequency of log.Obviously, access frequency is higher, then it represents that goes out use of the user to the operation log of conversational traffic function point Demand is bigger, therefore the level of interest for the log access function point being arranged also should be higher;Similarly, access frequency gets over bottom, then it represents that User is smaller to the use demand of the operation log of conversational traffic function point out, therefore the concern etc. of log access function point is arranged Grade is also lower.
It should be noted that this step determines that the level of interest of log access function point is that dynamic carries out, can constantly be based on The corresponding user behavior data of function point, is adjusted the level of interest of fixed function point, so that log be allowed to extract plan Summary can maintain always higher hit rate.
For example, the level of interest of a certain conversational traffic function point A is being determined as I before, when conversational traffic function point A according to Nearest time corresponding user behavior data indicates that user operates less work to conversational traffic function point A or do not operate, then The current level of interest of conversational traffic function point A can be reduced to III, to make conversational traffic function point A corresponding operation day Aim at being less susceptible to be extracted under log extraction strategy;
Step 210, determine that strategy is extracted in the log of application, comprising: according to the level of interest of function point, determine that log is extracted Strategy.
Specifically, level of interest of this step based on conversational traffic function point determines the corresponding behaviour of conversational traffic function point Make whether log is extracted;If it is determined that the operation log of conversational traffic function point is extracted, then log access function is based further on The level of interest that can be put determines that the operation log of conversational traffic function point is that whole is extracted or set part is extracted.
Wherein, the information value of the operation log of the level of interest reaction conversational traffic function point of conversational traffic function point, It therefore, can be by the operator of conversational traffic function point when the level of interest of conversational traffic function point is higher than predefined standard Log is extracted and is shown to user.
And the level of interest of log access function point, then react use of the user to the operation log of conversational traffic function point Demand.The level of interest of log access function point is higher, then user's use demands are bigger, should more show more comprehensively conventional industry The operation log of business function point is supported with providing sufficient data;Conversely, the level of interest of log access function point is smaller, then User's use demands are smaller, in the case where strategy is extracted in log, should simplify and show the corresponding operation log of conversational traffic function point.
As exemplary introduction, it is assumed that the level of interest of conversational traffic function point A is I, then it represents that the conversational traffic function The information value of the operation log of point A is higher, should extract and be shown.But the level of interest of corresponding log access function point is V, then it represents that user and the operation log for infrequently accessing conversational traffic function point A, therefore in the case where strategy is extracted in log, only extract The operation log of recent conversational traffic function point A is shown to user.
Similarly, it is assumed that the level of interest of conversational traffic function point B is I, then it represents that the operation day of conversational traffic function point B The information value of will is higher, should extract and be shown.The level of interest of corresponding log access function point is I simultaneously, then it represents that It is frequently visited by the user the operation log of conversational traffic function point A, therefore in the case where strategy is extracted in log, extracts conversational traffic function point The all operationss log of A is shown to user.
It should be noted that strategy is extracted in the log of the present embodiment is not limited to above-mentioned form, it can be according to actual use Demand flexible setting.For example, the purpose of access operation log is retrospect individual to conversational traffic function for corresponding individual subscriber The usage behavior of point, therefore it is to extract the corresponding operation log of conversational traffic function point to be opened up that strategy is extracted in the log of this step Show.And for administrator, the purpose for checking operation log may be to trace the behavior of personal user's access operation log, then The log of this step extracts the tactful corresponding operation log that can extract log access function point and is shown (log access function The behavior that corresponding operation log recording has personal user to access the corresponding operation log of conversational traffic function point can be put).
Step 212, operation log is shown, comprising: extract tactful screen from the operation note of application according to log and mention Extract operation log, and opened up to user.
Strategy is extracted in log based on step 210, this step can show the higher operation log of information value to user, And the quantity of the operation log shown meets user to the use demand of operation log, so that displaying benefit greatly improved.
The above content only carries out exemplary introduction to the processing method of the present embodiment, is not departing from principle of the present invention Under the premise of, it can also make several improvements and retouch, these modifications and embellishments should also be considered as the scope of protection of the present invention.
For example, the processing method of the present embodiment is that different user configures exclusive user identifier, and is marked based on target user Know corresponding user behavior data and determine that target user identifies corresponding log and extracts strategy, thus corresponding according to user identifier Strategy is extracted in log, and the operation log for meeting target user's behavior is shown to target user.Obviously, the present embodiment can be difference User targetedly shows personalized operation log, therefore has very high applicability.
For another example the processing method of the present embodiment can be determined based on corresponding user behavior data in designated time period Strategy is extracted in the corresponding log of designated time period.It, then can be with for example, when a certain user wants to check the operation log of last Jun User behavior data based on last Jun determines that strategy is extracted in the log of last Jun, later based on the log of last Jun Strategy is extracted, shows last Jun important operation log to user.Obviously, embodiment can for user accurately show with Toward sometime interior operation log, so that user be helped more easily to trace historical operation behavior.
Below with reference to practical application, the processing method of the present embodiment is introduced.
Assuming that the processing method of the present embodiment is applied to the operation log of an information management website, which is responsible for providing The typing of raw information and the maintenance of student information.
Classify first, in accordance with business function, the maintenance activities of student information is defined as to the business of conversational traffic type Function, it includes: increase, deletion, modification, inquiry and website log to student information, website that conversational traffic, which reaches function point, It publishes;User is defined as the operation log access behavior of the business function of conversational traffic type to the industry of log access type Be engaged in function, log access function point include the operation logs such as increase, deletion, modification, inquiry to student information checked, Editor etc..
In the business function of conversational traffic type, the increase of student information, deletion, modification, inquiry and website are stepped on The level of interest of conversational traffics function point configuration initialization such as record, publish.For example, increase is set as III level, modification is set as I Grade, log in wouldn't be arranged.In the business function of log access type, the log access function such as check, edit to operation log The level of interest of point configuration initialization.For example, checking that the operation log for increasing student information is set as IV grades, checks modification student The operation log of information is set as I grades, deletes and logs in the operation log of student information and be set as II grades etc..
Later, conversational traffic function point and log access function point are carried out burying a little respectively, comprising: carry out to point data is buried Statistics carries out user behavior analysis to point data is buried using user behavior analyzer, obtains user behavior number.For example, super pipe Reason person modifies 100 times, averagely daily 34 times of student information during May Day, and checks the behaviour to modify to student information table 5 times, etc. suchlike user behavior datas are total up to as log.
Later, using user behavior data, the level of interest of conversational traffic function point and log access function point is adjusted.Example Such as, to the movement that changes of student information table education relatively frequently, utilization rate it is high, therefore the level of interest of modification is maintained I grades;It checks The operating frequency of the operation log of student information table modification is less, therefore the level of interest of log access function point is reduced to III level.
After adjusting level of interest, strategy is extracted in the log of setting user kernel operation note.For example, user A is to student The level of interest of information modification is I grades, the level of interest of corresponding log access function point is IV grades, then user A is last daily Once the operation log of student information modification be used to extract, show;Again for example: the concern that user B modifies student information Grade is I grades, the level of interest of corresponding log access function point is I grades, then the user B operation to student information modification every time Log can be used to extract, show;For another example user C is IV grades, corresponding log to the level of interest that student information is modified The level of interest of access function point is IV grades, then user C will not be used to mention to all operation logs that student information is modified It takes, show.
The operation log finally extracted, is the operation log of core, and user can view flat without manual filtration The operation note of day concern.Such as: to user A show its daily last time to student information modification operation log, to Family B shows that it, every time to the operation log of student information modification, does not show its operation day to student information modification to user C Will.
Based on above-mentioned practical application it is recognised that the processing method combination user behavior analysis of the present embodiment, for each The different behaviors of user targetedly show the core operation log being concerned about, so that the utilization of operation log to different user Rate is improved;In addition, strategy is extracted in log can constantly carry out self-teaching, self-perfection according to user behavior, reduce artificial The cost of maintenance.
It is the introduction to the processing method of the present embodiment above, correspondingly, this specification embodiment also provides one kind The processing unit of operation log, as shown in Figure 4, comprising:
Determining module 41 determines the log of application based on the user behavior data for application a little obtained is buried to application Extract strategy;
Extraction module 42 extracts strategy according to the log and screens extraction operation log from the operation note of application;
Display module 43 shows aforesaid operations log.
Obviously, the processing unit of the present embodiment is the executing subject of the processing method of the above-mentioned offer of this specification, therefore should Technical effect achieved by processing method, the processing unit of the present embodiment equally also can be realized.
Specifically, the determining module 41 of the present embodiment specifically includes:
Acquiring unit obtains the function point set of application;
Dot element is buried, the function point in function point set bury a little, obtain function point buries point data;
Analytical unit buries point data based on function point, determines the corresponding user behavior data of function point;
Level cells are based on the corresponding user behavior data of function point, determine the level of interest of function point;
Rules unit determines that strategy is extracted in the log of application according to the level of interest of function point.
Wherein, acquiring unit specifically determine application comprising at least one type business function;To at least one type Business function carry out function point fractionation, obtain function point set.
Specifically, the type of the business function includes conversational traffic type and log access type;
The function point set includes: to carry out function point to the business function of conversational traffic type to split the conventional industry obtained Business function point and the log access function point that function point fractionation acquisition is carried out to the business function of log access type.
On above-mentioned basis, level cells are based on the corresponding user behavior data of conversational traffic function point, determine conventional The level of interest of business function point, the corresponding user behavior data of the conversational traffic function point include that user uses conversational traffic The information of function point;And it is based on the corresponding user behavior data of log access function point, determine the pass of log access function point Grade is infused, the corresponding user behavior data of the log access function point includes that user accesses the corresponding behaviour of conversational traffic function point Make the information of log.
On above-mentioned basis, level of interest of the rules unit based on conversational traffic function point determines conversational traffic function Whether the corresponding operation log of point is extracted;If it is determined that the operation log of conversational traffic function point is extracted, then visited based on log The level of interest for asking function point determines that the operation log of conversational traffic function point is that whole is extracted or set part is mentioned It takes.
In addition, the determining module 41 of the present embodiment may further comprise:
Conciliation unit is based on the corresponding user behavior data of function point, carries out to the level of interest of fixed function point Adjustment.
Optionally, the determining module 41 of this implementation can based on target user identify it is corresponding with bury point data determination described in Target user identifies corresponding log and extracts strategy.
Optionally, the determining module 41 of this implementation can based in designated time period with bury point data determine it is described specified Period, strategy was extracted in corresponding log.
In addition, as shown in figure 5, this illustrates that embodiment also provides a kind of electronic equipment 500, comprising:
At least one processor 501, memory 502, at least one network interface 504 and user interface 503.Terminal 500 In various components be coupled by bus system 505.It is understood that bus system 505 is for realizing between these components Connection communication.Bus system 505 further includes that power bus, control bus and status signal are total in addition to including data/address bus Line.But for the sake of clear explanation, various buses are all designated as bus system 505 in Fig. 5.
Wherein, user interface 503 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 502 in this specification embodiment can be volatile memory or non-volatile memories Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read-Only Memory), programmable read only memory (PROM, Programmable), erasable programmable is read-only deposits Reservoir (EPROM, Erasable PROM), electrically erasable programmable read-only memory (EEPROM, Electrically EPROM) Or flash memory.Volatile memory can be random access memory (RAM, Random Access Memory), be used as outside Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory (SRAM, Static RAM), dynamic random access memory (DRAM, Dynamic RAM), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous DRAM), double data speed synchronous dynamic RAM (DDRSDRAM, Double Data Rate SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced SDRAM), synchronized links Dynamic random access memory (SLDRAM, Synchlink DRAM) and direct rambus random access memory (DRRAM, Direct Rambus RAM).The memory 502 of the system and method for this specification embodiment description is intended to include but is not limited to The memory of these and any other suitable type.
In some embodiments, memory 502 stores following element, executable modules or data structures, or Their subset of person or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 5022 includes various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that this specification is implemented The program of example method may be embodied in application program 5022.
In this specification embodiment, electronic equipment 500 further include: storage on a memory 502 and can be in processor 501 The computer program of upper operation, computer program realize following step when being executed by processor 501:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Optionally, computer program by processor 501 execute based on to application bury the use for the application a little obtained Family behavioral data, when determining that strategy is extracted in the log of the application, comprising:
Obtain the function point set of application;
Function point in function point set bury a little, obtain function point buries point data;
Point data is buried based on function point, determines the corresponding user behavior data of function point;
Based on the corresponding user behavior data of function point, the level of interest of function point is determined;
According to the level of interest of function point, determine that strategy is extracted in the log of application.
Optionally, when computer program executes the function point set for obtaining application by processor 501, comprising:
Determine application comprising at least one type business function;
Function point fractionation is carried out to the business function of at least one type, obtains function point set.
Optionally, the type of the business function includes conversational traffic type and log access type;The function point set Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access The business function of type carries out function point and splits the log access function point obtained.
Optionally, computer program is executed by processor 501 and is based on user behavior data, determines the level of interest of function point When, comprising:
Based on the corresponding user behavior data of conversational traffic function point, the level of interest of conversational traffic function point, institute are determined Stating the corresponding user behavior data of conversational traffic function point includes the information that user uses conversational traffic function point;
Based on the corresponding user behavior data of log access function point, the level of interest of log access function point, institute are determined Stating the corresponding user behavior data of log access function point includes that user accesses the corresponding operation log of conversational traffic function point Information.
Optionally, computer program executes the level of interest based on function point by processor 501, determines that strategy is extracted in log When, comprising:
Based on the level of interest of conversational traffic function point, determine whether the corresponding operation log of conversational traffic function point is mentioned It takes;
If it is determined that the operation log of conversational traffic function point is extracted, then the level of interest based on log access function point, The operation log for determining conversational traffic function point is that whole is extracted or set part is extracted.
Optionally, when computer program is executed by processor 501, further includes:
Based on the corresponding user behavior data of function point, the level of interest of fixed function point is adjusted.
Optionally, when computer program determines that strategy is extracted in log based on user behavior data by the execution of processor 501, packet It includes:
Corresponding user behavior data, which is identified, based on any user determines that strategy is extracted in the corresponding log of the user identifier.
Optionally, when computer program determines that strategy is extracted in log based on user behavior data by the execution of processor 501, packet It includes:
Determine that strategy is extracted in the corresponding log of the time block based on the corresponding user behavior data of any time paragraph.
The electronic equipment of the present embodiment determines that strategy is extracted in log based on user behavior data, and extracts strategy according to log It targetedly extracts the operation log closely related with user behavior to be shown, the operation log shown can be made more to meet use The expectation at family achievees the effect that user's finding is i.e. used, for a user, greatly improves the search efficiency for operation log And utilization benefit.
In addition, this illustrates that embodiment also provides a kind of computer readable storage medium, the computer readable storage medium On be stored with computer program, the computer program realizes following steps when being executed by processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Obtain the function point set of application;
Function point in function point set bury a little, obtain function point buries point data;
Point data is buried based on function point, determines the corresponding user behavior data of function point;
Based on the corresponding user behavior data of function point, the level of interest of function point is determined;
According to the level of interest of function point, determine that strategy is extracted in the log of application.
Optionally, when computer program is executed by processor the function point set for obtaining application, comprising:
Determine application comprising at least one type business function;
Function point fractionation is carried out to the business function of at least one type, obtains function point set.
Optionally, the type of the business function includes conversational traffic type and log access type;The function point set Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access The business function of type carries out function point and splits the log access function point obtained.
Optionally, when computer program is executed by processor the level of interest for determining function point based on user behavior data, Include:
Based on the corresponding user behavior data of conversational traffic function point, the level of interest of conversational traffic function point, institute are determined Stating the corresponding user behavior data of conversational traffic function point includes the information that user uses conversational traffic function point;
Based on the corresponding user behavior data of log access function point, the level of interest of log access function point, institute are determined Stating the corresponding user behavior data of log access function point includes that user accesses the corresponding operation log of conversational traffic function point Information.
Optionally, computer program is executed by processor the level of interest based on function point, when determining that strategy is extracted in log, Include:
Based on the level of interest of conversational traffic function point, determine whether the corresponding operation log of conversational traffic function point is mentioned It takes;
If it is determined that the operation log of conversational traffic function point is extracted, then the level of interest based on log access function point, The operation log for determining conversational traffic function point is that whole is extracted or set part is extracted.
Optionally, when computer program is executed by processor, further includes:
Based on the corresponding user behavior data of function point, the level of interest of fixed function point is adjusted.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Corresponding user behavior data, which is identified, based on any user determines that strategy is extracted in the corresponding log of the user identifier.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Determine that strategy is extracted in the corresponding log of the time block based on the corresponding user behavior data of any time paragraph.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in this specification The form of example.Moreover, it wherein includes the computer of computer usable program code that this specification, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can With or may be advantageous.
The above is only the embodiments of this specification, are not limited to this specification.For those skilled in the art For, this specification can have various modifications and variations.All any modifications made within the spirit and principle of this specification, Equivalent replacement, improvement etc., should be included within the scope of the claims of this specification.

Claims (12)

1. a kind of processing method of operation log, comprising:
Based on the user behavior data for the application a little obtained is buried to application, determine that plan is extracted in the log of the application Slightly;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
2. the method as described in claim 1, based on the user behavior data for the application a little obtained is buried to application, really Strategy is extracted in the log of the fixed application, comprising:
Obtain the function point set of application;
Function point in function point set bury a little, obtain function point buries point data;
Point data is buried based on function point, determines the corresponding user behavior data of function point;
Based on the corresponding user behavior data of function point, the level of interest of function point is determined;
According to the level of interest of function point, determine that strategy is extracted in the log of application.
3. method according to claim 2,
Obtain the function point set of application, comprising:
Determine application comprising at least one type business function;
Function point fractionation is carried out to the business function of at least one type, obtains function point set.
4. method as claimed in claim 3,
The type of the business function includes conversational traffic type and log access type;
The function point set includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function obtained It can put and function point is carried out to the business function of log access type and split the log access function point obtained.
5. method as claimed in claim 4,
Based on user behavior data, the level of interest of function point is determined, comprising:
Based on the corresponding user behavior data of conversational traffic function point, the level of interest of conversational traffic function point is determined, it is described normal The corresponding user behavior data of rule business function point includes the information that user uses conversational traffic function point;
Based on the corresponding user behavior data of log access function point, the level of interest of log access function point, the day are determined The corresponding user behavior data of will access function point includes the information that user accesses the corresponding operation log of conversational traffic function point.
6. method as claimed in claim 5,
Level of interest based on function point determines that strategy is extracted in the log of application, comprising:
Based on the level of interest of conversational traffic function point, determine whether the corresponding operation log of conversational traffic function point is extracted;
If it is determined that the operation log of conversational traffic function point is extracted, then the level of interest based on log access function point determines The operation log of conversational traffic function point is that whole is extracted or set part is extracted.
7. method according to claim 2,
Based on the corresponding user behavior data of function point, the level of interest of fixed function point is adjusted.
8. such as the described in any item methods of claim 1, based on determining that strategy is extracted in log with burying point data, comprising:
Determine that the target user identifies corresponding log and extracts strategy with burying point data based on target user's mark is corresponding.
9. such as the described in any item methods of claim 1, based on determining that strategy is extracted in log with burying point data, comprising:
Based on determining that strategy is extracted in the corresponding log of the designated time period with burying point data in designated time period.
10. a kind of processing unit of operation log, comprising:
Determining module determines the day of the application based on the user behavior data for the application a little obtained is buried to application Will extracts strategy;
Extraction module extracts strategy according to the log and screens extraction operation log from the operation note of the application;
Display module, for showing the operation log.
11. a kind of electronic equipment includes: memory, processor and is stored on the memory and can transport on the processor Capable computer program, the computer program are executed by the processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that plan is extracted in the log of the application Slightly;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
12. a kind of computer readable storage medium, computer program, the meter are stored on the computer readable storage medium Calculation machine program realizes following steps when being executed by processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that plan is extracted in the log of the application Slightly;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
CN201810883885.2A 2018-08-06 2018-08-06 Method and device for processing operation log and electronic equipment Active CN109144836B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810883885.2A CN109144836B (en) 2018-08-06 2018-08-06 Method and device for processing operation log and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810883885.2A CN109144836B (en) 2018-08-06 2018-08-06 Method and device for processing operation log and electronic equipment

Publications (2)

Publication Number Publication Date
CN109144836A true CN109144836A (en) 2019-01-04
CN109144836B CN109144836B (en) 2021-09-28

Family

ID=64791690

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810883885.2A Active CN109144836B (en) 2018-08-06 2018-08-06 Method and device for processing operation log and electronic equipment

Country Status (1)

Country Link
CN (1) CN109144836B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110399067A (en) * 2019-07-31 2019-11-01 江苏满运软件科技有限公司 Point methods, device, electronic equipment, storage medium are buried in visualization
CN110764971A (en) * 2019-10-30 2020-02-07 杭州安恒信息技术股份有限公司 Auxiliary database operation and maintenance auditing method and device and electronic equipment
CN111352903A (en) * 2020-03-13 2020-06-30 京东方科技集团股份有限公司 Log management platform, log management method, medium, and electronic device
CN111640049A (en) * 2020-05-30 2020-09-08 计雄昆 Student data traceability-based information analysis system
CN111651324A (en) * 2020-06-02 2020-09-11 上海泛微网络科技股份有限公司 Log collection method and device
CN112306826A (en) * 2020-02-24 2021-02-02 北京字节跳动网络技术有限公司 Method and apparatus for processing information for terminal

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631699A (en) * 2012-08-28 2014-03-12 纽海信息技术(上海)有限公司 Log management system and method for log monitoring, acquiring and querying
US9405651B1 (en) * 2013-10-03 2016-08-02 Initial State Technologies, Inc. Apparatus and method for processing log file data
CN106557410A (en) * 2016-10-25 2017-04-05 北京百度网讯科技有限公司 User behavior analysis method and apparatus based on artificial intelligence
CN107678908A (en) * 2017-06-23 2018-02-09 平安科技(深圳)有限公司 Log recording method, device, computer equipment and storage medium
CN107800591A (en) * 2017-11-07 2018-03-13 南威软件股份有限公司 A kind of analysis method of unified daily record data
CN107797894A (en) * 2017-02-17 2018-03-13 平安科技(深圳)有限公司 APP user behavior analysis method and apparatus

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103631699A (en) * 2012-08-28 2014-03-12 纽海信息技术(上海)有限公司 Log management system and method for log monitoring, acquiring and querying
US9405651B1 (en) * 2013-10-03 2016-08-02 Initial State Technologies, Inc. Apparatus and method for processing log file data
CN106557410A (en) * 2016-10-25 2017-04-05 北京百度网讯科技有限公司 User behavior analysis method and apparatus based on artificial intelligence
CN107797894A (en) * 2017-02-17 2018-03-13 平安科技(深圳)有限公司 APP user behavior analysis method and apparatus
CN107678908A (en) * 2017-06-23 2018-02-09 平安科技(深圳)有限公司 Log recording method, device, computer equipment and storage medium
CN107800591A (en) * 2017-11-07 2018-03-13 南威软件股份有限公司 A kind of analysis method of unified daily record data

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110399067A (en) * 2019-07-31 2019-11-01 江苏满运软件科技有限公司 Point methods, device, electronic equipment, storage medium are buried in visualization
CN110764971A (en) * 2019-10-30 2020-02-07 杭州安恒信息技术股份有限公司 Auxiliary database operation and maintenance auditing method and device and electronic equipment
CN112306826A (en) * 2020-02-24 2021-02-02 北京字节跳动网络技术有限公司 Method and apparatus for processing information for terminal
CN111352903A (en) * 2020-03-13 2020-06-30 京东方科技集团股份有限公司 Log management platform, log management method, medium, and electronic device
CN111640049A (en) * 2020-05-30 2020-09-08 计雄昆 Student data traceability-based information analysis system
CN111651324A (en) * 2020-06-02 2020-09-11 上海泛微网络科技股份有限公司 Log collection method and device
CN111651324B (en) * 2020-06-02 2023-09-01 上海泛微网络科技股份有限公司 Log collection method and device

Also Published As

Publication number Publication date
CN109144836B (en) 2021-09-28

Similar Documents

Publication Publication Date Title
CN109144836A (en) A kind of processing method of operation log, device and electronic equipment
Mateo et al. Biodiversity models: what if unsaturation is the rule?
Palomo et al. Incorporating the social–ecological approach in protected areas in the Anthropocene
Serageldin et al. Social capital: A multifaceted perspective
AU2021202128A1 (en) Method and system for providing domain-specific incremental search results with a customer self-service system for a financial management system
Jones et al. Altered rainfall patterns increase forb abundance and richness in native tallgrass prairie
Kolus et al. Land carbon models underestimate the severity and duration of drought’s impact on plant productivity
US20090158161A1 (en) Collaborative search in virtual worlds
Asbeck et al. Biodiversity response to forest management intensity, carbon stocks and net primary production in temperate montane forests
CN110399420A (en) A kind of deriving method, electronic equipment and the medium of configurableization Excel format
DE112016004579T5 (en) Mobile user interface
DE112020005323T5 (en) ELASTIC EXECUTION OF MACHINE LEARNING WORKLOADS USING APPLICATION-BASED PROFILING
CN103400329A (en) Online courseware making platform system based on Web
Zimmerer Understanding agrobiodiversity and the rise of resilience: analytic category, conceptual boundary object or meta-level transition?
Hong et al. Entrepreneurship across time and space: Empirical evidence from Korea
CN101188521B (en) A method for digging user behavior data and website server
DE202014010890U1 (en) System for the selective display of content
Sjølie et al. An assessment of forest sector modeling approaches: conceptual differences and quantitative comparison
Weiskopf et al. A conceptual framework to integrate biodiversity, ecosystem function, and ecosystem service models
Fletcher et al. Introduction to spatial ecology and its relevance for conservation
Molina Morales et al. Absorptive capacity and radical innovation in industrial districts
Kondor et al. Explaining population booms and busts in Mid-Holocene Europe
DE112019002680T5 (en) Device for orchestrating distributed application delivery with end-to-end performance guarantee
Tobias Hidden impacts of logging
Bruun et al. What is unmanaged forest and how does it sustain biodiversity in landscapes with a long history of intensive forestry?

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240228

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Advanced Nova Technology (Singapore) Holdings Ltd.

Country or region after: Singapore

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands