A kind of processing method of operation log, device and electronic equipment
Technical field
This specification embodiment be related to technical field of the computer network more particularly to a kind of processing method of operation log,
Device and electronic equipment.
Background technique
Current operation log is to show user with the full dose data without any processing.Operation log is the every behaviour of user
Make once just to record once, therefore, the data volume of displaying is very big.For a user, it is desirable to check certain operation note, need
It to be filtered manually, when data volume is excessive, difficulty in filtration is greatly improved, and user's search efficiency is caused to decline.
In view of this, currently needing a kind of technical side that operation log can be showed to user in more friendly mode
Case.
Summary of the invention
The one of purpose of this specification embodiment is to provide a kind of processing method of the operation log of operation log, device
And electronic equipment, it can be improved the efficiency of user's search operation log.
To achieve the goals above, this specification embodiment adopts the following technical solutions:
In a first aspect, this specification embodiment provides a kind of processing method of operation log, comprising:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted
Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Second aspect provides a kind of processing unit of operation log, comprising:
Determining module determines the application based on the user behavior data for the application a little obtained is buried to application
Log extract strategy;
Extraction module extracts strategy according to the log and screens extraction operation log from the operation note of the application;
Display module, for showing the operation log.
The third aspect provides a kind of electronic equipment, comprising: memory, processor and is stored on the memory simultaneously
The computer program that can be run on the processor, the computer program are executed by the processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted
Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Fourth aspect provides a kind of computer readable storage medium, is stored on the computer readable storage medium
Computer program, the computer program realize following steps when being executed by processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted
Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
In this specification, determine that strategy is extracted in log based on user behavior data, and extract strategy according to log and be directed to
Property extract the operation log closely related with user behavior and be shown, the operation log shown can be made more to meet the phase of user
It hopes, achievees the effect that user's finding is i.e. used, for a user, greatly improve the search efficiency and benefit for operation log
Use benefit.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or
Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
The some embodiments recorded in this specification embodiment are not paying creative labor for those of ordinary skill in the art
Under the premise of dynamic property, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the step structural schematic diagram of the processing method for the operation log that this specification embodiment provides;
Fig. 2 is the logical construction schematic diagram of the processing method for the operation log that this specification embodiment provides;
Fig. 3 is to determine that the logic knot of strategy is extracted in log in the processing method for the operation log that this specification embodiment provides
Structure schematic diagram;
Fig. 4 is the logical construction schematic diagram of the processing unit for the operation log that this specification embodiment provides;
Fig. 5 is the hardware structural diagram for the electronics that this specification embodiment provides;
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification embodiment clearer, have below in conjunction with this specification
The technical solution of this specification embodiment is clearly and completely described in body embodiment and corresponding attached drawing.Obviously, described
Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this
Field those of ordinary skill every other embodiment obtained without making creative work, belongs to this explanation
The range of book embodiment protection.
In the prior art, the record rule of operation log and extracting shows rule dead, the software design that is that software program is write
When, first determine which function point needs to record the operation log of user, which function point does not need to record the behaviour of user
Make log.For the function point for needing to record operation log, the every operation of user is once just recorded once, finally with untreated
Full dose data show user, and personalized displaying can not be carried out for different user.Want certain checked in operation log in family
When operation note, need to be filtered manually, to increase lookup difficulty.In addition, the extraction of operation log shows rule
Once modification then needs to redesign software program, realize that difficulty is larger, extracts and show that rule does not have flexibility.
In view of this, this specification provides one kind can define log extraction strategy according to user behavior, and according to log
The technical solution that tactful extraction operation log is shown is extracted, finds desired operation log convenient for user.
On the one hand, this specification embodiment provides a kind of processing method of operation log, as shown in Figure 1, comprising:
Step 102, based on the user behavior data for the application a little obtained is buried to application, the log of application is determined
Extract strategy;
For step 102:
Bury the relevant technologies and its implementation for a little referring to capturing, handle and send for specific user's behavior or event
Process.And user behavior is a complete event, main includes five behavior elements compositions: event, place, personage, interaction,
Interactive content.Under normal circumstances, user it is expected the operation log it is seen that closely related with itself.By being carried out to application
The user behavior data obtained is buried, the function point that user applies frequent operation for this can be accurately positioned out, these are frequently
The function point of operation is the object of user's concern, thus determine that the function point that strategy more extracts emphatically user's concern is extracted in log
Operation log.
Step 104, strategy being extracted according to log, extraction operation log is screened from the operation note of application;
For step 104:
When user accesses the operation log of application, strategy is extracted based on the corresponding log of the user, can only screening be mentioned
The full dose operation log for taking part operation log, rather than applying.For example, the operation day of the function point of user's concern is extracted in screening
Will.
Step 106, operation log is shown.
For step 106:
The operation log of step 104 screening extraction can be only shown to user;Alternatively, can also show application to user
All operationss log, but forward displaying or label show that step 104 screens the operation log extracted.
In the processing method of the present embodiment, determine that strategy is extracted in log based on user behavior data, and extract according to log
Strategy targetedly extracts the operation log closely related with user behavior and is shown, and the operation log shown can be made more to accord with
The expectation for sharing family achievees the effect that user's finding is i.e. used, for a user, greatly improves the lookup for operation log
Efficiency and utilization benefit.
It describes in detail below to the processing method of the present embodiment.
The processing method of the present embodiment can be applied to the operation log in any system.User uses systematic difference meeting
Operation note is produced, it is subsequent extraction operation log to be shown to user from operation note.
Referring to figs. 2 and 3, the processing method of the present embodiment specifically includes:
Step 202, the function point set of the application in acquisition system, comprising: determine application comprising at least one type
Business function, the business function of at least one type split with the function point of tree structure, most granule is eventually arrived at
The function point of degree obtains function point set.
Wherein, the type of business function may include conversational traffic type and log access type;Accordingly, function point set
Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access
The business function of type carries out function point and splits the log access function point obtained.
As exemplary introduction, it is assumed that certain information site provides download service, then the conversational traffic function point of download service
For the function of providing a user downloading, corresponding log access function point are as follows: provide the function of the corresponding operation log of download function
Energy.
Step 204, obtain function point buries point data, comprising: bury a little to the function point in function point set, obtain
Function point buries point data.
Specifically, this step bury a little to conversational traffic function point, obtains that conversational traffic function point is corresponding to bury points
According to;And log access function point bury a little, obtain that log access function point is corresponding to bury point data.
By taking download service as an example, the point data of burying of the conversational traffic function point of download service includes that user uses download function
User information, temporal information, location information, downloading content information etc..The log access function point of download service buries points
According to the user information, temporal information, location information, access content information for including the corresponding operation log of user's access download function
Deng.
Step 206, point data is buried based on function point, determines the corresponding user behavior data of function point, comprising: to function
The point data of burying of point is analyzed, from the user behavior data for burying determining function point in point data.
Specifically, data cleansing, such as de-redundancy, meaningless number can be carried out to point data is buried before being analyzed
According to;And specification, such as the data format that transformational analysis is applicable are carried out to point data is buried;Data preparation is carried out to point data is buried,
Such as data sorting, data rich (relevant other information is added).
Later, point data is buried based on conversational traffic function point is corresponding, determine the corresponding user's row of conversational traffic function point
For data, which includes: the information that user uses conversational traffic function point, should
Information can reflect that user uses the frequency of conversational traffic function point;
And point data is buried based on log access function point is corresponding, determine the corresponding user of normal log access function point
Behavioral data, the corresponding user behavior data of log access function point include: that user's access conversational traffic function point is corresponding
The information of operation log, the information can reflect that user accesses the frequency of the corresponding operation log of conversational traffic function point.
Step 208, after obtaining user behavior data, the level of interest of function point is determined, comprising: initial configuration function point
Level of interest, be based on the corresponding user behavior data of function point, the level of interest of function point initial configuration carried out again true
It is fixed.
Specifically, this step is based on the corresponding user behavior data of conversational traffic function point, determines conversational traffic function point
Level of interest;And it is based on the corresponding user behavior data of log access function point, determine the concern of log access function point
Grade.
As exemplary introduction, by taking the information management service that web station system provides as an example, conversational traffic function point be can wrap
Include information addition, information modification and information deletion etc..Log access function point is then user for conversational traffic function point
Operation log accesses behavior, may include: that the behavior of operation log, the user access information of user access information addition is modified
The behavior for the operation log that the behavior of operation log and user access information are deleted.
In the present embodiment, initial level of interest is arranged to conversational traffic function point and log access function point.
For example, the level of interest division of conversational traffic function point has five grades of I-V, the smaller higher grade of numerical value.Wherein,
The information value of the operation log of information addition is higher, therefore level of interest initially can be set to I, high-grade conversational traffic
The operation log of function point extracts under strategy in log, it is easier to be extracted, show.As the information of the operation log of information deletion
It is worth relatively small, therefore level of interest can be initially set to V, similarly the operation log of the conversational traffic function point of inferior grade
In the case where strategy is extracted in log, it is less prone to be extracted, shows.
Later, the concern etc. to conversational traffic function point is determined according to the corresponding user behavior data of conversational traffic function point
Grade.Assuming that information adds the function that corresponding user behavior data indicates the less use of user or the addition of not applicable information,
It then indicates that information adds corresponding operation log for user without too many utility value, information can be added current
Grade is redefined as III, is less susceptible to be extracted in the case where strategy is extracted in log so that information adds corresponding operation log.
Similarly, the user behavior data of log access function point can reflect out operation of the user to conversational traffic function point
The access frequency of log.Obviously, access frequency is higher, then it represents that goes out use of the user to the operation log of conversational traffic function point
Demand is bigger, therefore the level of interest for the log access function point being arranged also should be higher;Similarly, access frequency gets over bottom, then it represents that
User is smaller to the use demand of the operation log of conversational traffic function point out, therefore the concern etc. of log access function point is arranged
Grade is also lower.
It should be noted that this step determines that the level of interest of log access function point is that dynamic carries out, can constantly be based on
The corresponding user behavior data of function point, is adjusted the level of interest of fixed function point, so that log be allowed to extract plan
Summary can maintain always higher hit rate.
For example, the level of interest of a certain conversational traffic function point A is being determined as I before, when conversational traffic function point A according to
Nearest time corresponding user behavior data indicates that user operates less work to conversational traffic function point A or do not operate, then
The current level of interest of conversational traffic function point A can be reduced to III, to make conversational traffic function point A corresponding operation day
Aim at being less susceptible to be extracted under log extraction strategy;
Step 210, determine that strategy is extracted in the log of application, comprising: according to the level of interest of function point, determine that log is extracted
Strategy.
Specifically, level of interest of this step based on conversational traffic function point determines the corresponding behaviour of conversational traffic function point
Make whether log is extracted;If it is determined that the operation log of conversational traffic function point is extracted, then log access function is based further on
The level of interest that can be put determines that the operation log of conversational traffic function point is that whole is extracted or set part is extracted.
Wherein, the information value of the operation log of the level of interest reaction conversational traffic function point of conversational traffic function point,
It therefore, can be by the operator of conversational traffic function point when the level of interest of conversational traffic function point is higher than predefined standard
Log is extracted and is shown to user.
And the level of interest of log access function point, then react use of the user to the operation log of conversational traffic function point
Demand.The level of interest of log access function point is higher, then user's use demands are bigger, should more show more comprehensively conventional industry
The operation log of business function point is supported with providing sufficient data;Conversely, the level of interest of log access function point is smaller, then
User's use demands are smaller, in the case where strategy is extracted in log, should simplify and show the corresponding operation log of conversational traffic function point.
As exemplary introduction, it is assumed that the level of interest of conversational traffic function point A is I, then it represents that the conversational traffic function
The information value of the operation log of point A is higher, should extract and be shown.But the level of interest of corresponding log access function point is
V, then it represents that user and the operation log for infrequently accessing conversational traffic function point A, therefore in the case where strategy is extracted in log, only extract
The operation log of recent conversational traffic function point A is shown to user.
Similarly, it is assumed that the level of interest of conversational traffic function point B is I, then it represents that the operation day of conversational traffic function point B
The information value of will is higher, should extract and be shown.The level of interest of corresponding log access function point is I simultaneously, then it represents that
It is frequently visited by the user the operation log of conversational traffic function point A, therefore in the case where strategy is extracted in log, extracts conversational traffic function point
The all operationss log of A is shown to user.
It should be noted that strategy is extracted in the log of the present embodiment is not limited to above-mentioned form, it can be according to actual use
Demand flexible setting.For example, the purpose of access operation log is retrospect individual to conversational traffic function for corresponding individual subscriber
The usage behavior of point, therefore it is to extract the corresponding operation log of conversational traffic function point to be opened up that strategy is extracted in the log of this step
Show.And for administrator, the purpose for checking operation log may be to trace the behavior of personal user's access operation log, then
The log of this step extracts the tactful corresponding operation log that can extract log access function point and is shown (log access function
The behavior that corresponding operation log recording has personal user to access the corresponding operation log of conversational traffic function point can be put).
Step 212, operation log is shown, comprising: extract tactful screen from the operation note of application according to log and mention
Extract operation log, and opened up to user.
Strategy is extracted in log based on step 210, this step can show the higher operation log of information value to user,
And the quantity of the operation log shown meets user to the use demand of operation log, so that displaying benefit greatly improved.
The above content only carries out exemplary introduction to the processing method of the present embodiment, is not departing from principle of the present invention
Under the premise of, it can also make several improvements and retouch, these modifications and embellishments should also be considered as the scope of protection of the present invention.
For example, the processing method of the present embodiment is that different user configures exclusive user identifier, and is marked based on target user
Know corresponding user behavior data and determine that target user identifies corresponding log and extracts strategy, thus corresponding according to user identifier
Strategy is extracted in log, and the operation log for meeting target user's behavior is shown to target user.Obviously, the present embodiment can be difference
User targetedly shows personalized operation log, therefore has very high applicability.
For another example the processing method of the present embodiment can be determined based on corresponding user behavior data in designated time period
Strategy is extracted in the corresponding log of designated time period.It, then can be with for example, when a certain user wants to check the operation log of last Jun
User behavior data based on last Jun determines that strategy is extracted in the log of last Jun, later based on the log of last Jun
Strategy is extracted, shows last Jun important operation log to user.Obviously, embodiment can for user accurately show with
Toward sometime interior operation log, so that user be helped more easily to trace historical operation behavior.
Below with reference to practical application, the processing method of the present embodiment is introduced.
Assuming that the processing method of the present embodiment is applied to the operation log of an information management website, which is responsible for providing
The typing of raw information and the maintenance of student information.
Classify first, in accordance with business function, the maintenance activities of student information is defined as to the business of conversational traffic type
Function, it includes: increase, deletion, modification, inquiry and website log to student information, website that conversational traffic, which reaches function point,
It publishes;User is defined as the operation log access behavior of the business function of conversational traffic type to the industry of log access type
Be engaged in function, log access function point include the operation logs such as increase, deletion, modification, inquiry to student information checked,
Editor etc..
In the business function of conversational traffic type, the increase of student information, deletion, modification, inquiry and website are stepped on
The level of interest of conversational traffics function point configuration initialization such as record, publish.For example, increase is set as III level, modification is set as I
Grade, log in wouldn't be arranged.In the business function of log access type, the log access function such as check, edit to operation log
The level of interest of point configuration initialization.For example, checking that the operation log for increasing student information is set as IV grades, checks modification student
The operation log of information is set as I grades, deletes and logs in the operation log of student information and be set as II grades etc..
Later, conversational traffic function point and log access function point are carried out burying a little respectively, comprising: carry out to point data is buried
Statistics carries out user behavior analysis to point data is buried using user behavior analyzer, obtains user behavior number.For example, super pipe
Reason person modifies 100 times, averagely daily 34 times of student information during May Day, and checks the behaviour to modify to student information table
5 times, etc. suchlike user behavior datas are total up to as log.
Later, using user behavior data, the level of interest of conversational traffic function point and log access function point is adjusted.Example
Such as, to the movement that changes of student information table education relatively frequently, utilization rate it is high, therefore the level of interest of modification is maintained I grades;It checks
The operating frequency of the operation log of student information table modification is less, therefore the level of interest of log access function point is reduced to
III level.
After adjusting level of interest, strategy is extracted in the log of setting user kernel operation note.For example, user A is to student
The level of interest of information modification is I grades, the level of interest of corresponding log access function point is IV grades, then user A is last daily
Once the operation log of student information modification be used to extract, show;Again for example: the concern that user B modifies student information
Grade is I grades, the level of interest of corresponding log access function point is I grades, then the user B operation to student information modification every time
Log can be used to extract, show;For another example user C is IV grades, corresponding log to the level of interest that student information is modified
The level of interest of access function point is IV grades, then user C will not be used to mention to all operation logs that student information is modified
It takes, show.
The operation log finally extracted, is the operation log of core, and user can view flat without manual filtration
The operation note of day concern.Such as: to user A show its daily last time to student information modification operation log, to
Family B shows that it, every time to the operation log of student information modification, does not show its operation day to student information modification to user C
Will.
Based on above-mentioned practical application it is recognised that the processing method combination user behavior analysis of the present embodiment, for each
The different behaviors of user targetedly show the core operation log being concerned about, so that the utilization of operation log to different user
Rate is improved;In addition, strategy is extracted in log can constantly carry out self-teaching, self-perfection according to user behavior, reduce artificial
The cost of maintenance.
It is the introduction to the processing method of the present embodiment above, correspondingly, this specification embodiment also provides one kind
The processing unit of operation log, as shown in Figure 4, comprising:
Determining module 41 determines the log of application based on the user behavior data for application a little obtained is buried to application
Extract strategy;
Extraction module 42 extracts strategy according to the log and screens extraction operation log from the operation note of application;
Display module 43 shows aforesaid operations log.
Obviously, the processing unit of the present embodiment is the executing subject of the processing method of the above-mentioned offer of this specification, therefore should
Technical effect achieved by processing method, the processing unit of the present embodiment equally also can be realized.
Specifically, the determining module 41 of the present embodiment specifically includes:
Acquiring unit obtains the function point set of application;
Dot element is buried, the function point in function point set bury a little, obtain function point buries point data;
Analytical unit buries point data based on function point, determines the corresponding user behavior data of function point;
Level cells are based on the corresponding user behavior data of function point, determine the level of interest of function point;
Rules unit determines that strategy is extracted in the log of application according to the level of interest of function point.
Wherein, acquiring unit specifically determine application comprising at least one type business function;To at least one type
Business function carry out function point fractionation, obtain function point set.
Specifically, the type of the business function includes conversational traffic type and log access type;
The function point set includes: to carry out function point to the business function of conversational traffic type to split the conventional industry obtained
Business function point and the log access function point that function point fractionation acquisition is carried out to the business function of log access type.
On above-mentioned basis, level cells are based on the corresponding user behavior data of conversational traffic function point, determine conventional
The level of interest of business function point, the corresponding user behavior data of the conversational traffic function point include that user uses conversational traffic
The information of function point;And it is based on the corresponding user behavior data of log access function point, determine the pass of log access function point
Grade is infused, the corresponding user behavior data of the log access function point includes that user accesses the corresponding behaviour of conversational traffic function point
Make the information of log.
On above-mentioned basis, level of interest of the rules unit based on conversational traffic function point determines conversational traffic function
Whether the corresponding operation log of point is extracted;If it is determined that the operation log of conversational traffic function point is extracted, then visited based on log
The level of interest for asking function point determines that the operation log of conversational traffic function point is that whole is extracted or set part is mentioned
It takes.
In addition, the determining module 41 of the present embodiment may further comprise:
Conciliation unit is based on the corresponding user behavior data of function point, carries out to the level of interest of fixed function point
Adjustment.
Optionally, the determining module 41 of this implementation can based on target user identify it is corresponding with bury point data determination described in
Target user identifies corresponding log and extracts strategy.
Optionally, the determining module 41 of this implementation can based in designated time period with bury point data determine it is described specified
Period, strategy was extracted in corresponding log.
In addition, as shown in figure 5, this illustrates that embodiment also provides a kind of electronic equipment 500, comprising:
At least one processor 501, memory 502, at least one network interface 504 and user interface 503.Terminal 500
In various components be coupled by bus system 505.It is understood that bus system 505 is for realizing between these components
Connection communication.Bus system 505 further includes that power bus, control bus and status signal are total in addition to including data/address bus
Line.But for the sake of clear explanation, various buses are all designated as bus system 505 in Fig. 5.
Wherein, user interface 503 may include display, keyboard or pointing device (for example, mouse, trace ball
(trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 502 in this specification embodiment can be volatile memory or non-volatile memories
Device, or may include both volatile and non-volatile memories.Wherein, nonvolatile memory can be read-only memory
(ROM, Read-Only Memory), programmable read only memory (PROM, Programmable), erasable programmable is read-only deposits
Reservoir (EPROM, Erasable PROM), electrically erasable programmable read-only memory (EEPROM, Electrically EPROM)
Or flash memory.Volatile memory can be random access memory (RAM, Random Access Memory), be used as outside
Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static random access memory
(SRAM, Static RAM), dynamic random access memory (DRAM, Dynamic RAM), Synchronous Dynamic Random Access Memory
(SDRAM, Synchronous DRAM), double data speed synchronous dynamic RAM (DDRSDRAM, Double
Data Rate SDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM, Enhanced SDRAM), synchronized links
Dynamic random access memory (SLDRAM, Synchlink DRAM) and direct rambus random access memory (DRRAM,
Direct Rambus RAM).The memory 502 of the system and method for this specification embodiment description is intended to include but is not limited to
The memory of these and any other suitable type.
In some embodiments, memory 502 stores following element, executable modules or data structures, or
Their subset of person or their superset: operating system 5021 and application program 5022.
Wherein, operating system 5021 include various system programs, such as ccf layer, core library layer, driving layer etc., are used for
Realize various basic businesses and the hardware based task of processing.Application program 5022 includes various application programs, such as media
Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize that this specification is implemented
The program of example method may be embodied in application program 5022.
In this specification embodiment, electronic equipment 500 further include: storage on a memory 502 and can be in processor 501
The computer program of upper operation, computer program realize following step when being executed by processor 501:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted
Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Optionally, computer program by processor 501 execute based on to application bury the use for the application a little obtained
Family behavioral data, when determining that strategy is extracted in the log of the application, comprising:
Obtain the function point set of application;
Function point in function point set bury a little, obtain function point buries point data;
Point data is buried based on function point, determines the corresponding user behavior data of function point;
Based on the corresponding user behavior data of function point, the level of interest of function point is determined;
According to the level of interest of function point, determine that strategy is extracted in the log of application.
Optionally, when computer program executes the function point set for obtaining application by processor 501, comprising:
Determine application comprising at least one type business function;
Function point fractionation is carried out to the business function of at least one type, obtains function point set.
Optionally, the type of the business function includes conversational traffic type and log access type;The function point set
Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access
The business function of type carries out function point and splits the log access function point obtained.
Optionally, computer program is executed by processor 501 and is based on user behavior data, determines the level of interest of function point
When, comprising:
Based on the corresponding user behavior data of conversational traffic function point, the level of interest of conversational traffic function point, institute are determined
Stating the corresponding user behavior data of conversational traffic function point includes the information that user uses conversational traffic function point;
Based on the corresponding user behavior data of log access function point, the level of interest of log access function point, institute are determined
Stating the corresponding user behavior data of log access function point includes that user accesses the corresponding operation log of conversational traffic function point
Information.
Optionally, computer program executes the level of interest based on function point by processor 501, determines that strategy is extracted in log
When, comprising:
Based on the level of interest of conversational traffic function point, determine whether the corresponding operation log of conversational traffic function point is mentioned
It takes;
If it is determined that the operation log of conversational traffic function point is extracted, then the level of interest based on log access function point,
The operation log for determining conversational traffic function point is that whole is extracted or set part is extracted.
Optionally, when computer program is executed by processor 501, further includes:
Based on the corresponding user behavior data of function point, the level of interest of fixed function point is adjusted.
Optionally, when computer program determines that strategy is extracted in log based on user behavior data by the execution of processor 501, packet
It includes:
Corresponding user behavior data, which is identified, based on any user determines that strategy is extracted in the corresponding log of the user identifier.
Optionally, when computer program determines that strategy is extracted in log based on user behavior data by the execution of processor 501, packet
It includes:
Determine that strategy is extracted in the corresponding log of the time block based on the corresponding user behavior data of any time paragraph.
The electronic equipment of the present embodiment determines that strategy is extracted in log based on user behavior data, and extracts strategy according to log
It targetedly extracts the operation log closely related with user behavior to be shown, the operation log shown can be made more to meet use
The expectation at family achievees the effect that user's finding is i.e. used, for a user, greatly improves the search efficiency for operation log
And utilization benefit.
In addition, this illustrates that embodiment also provides a kind of computer readable storage medium, the computer readable storage medium
On be stored with computer program, the computer program realizes following steps when being executed by processor:
Based on the user behavior data for the application a little obtained is buried to application, determine that the log of the application is extracted
Strategy;
Strategy is extracted according to the log, and extraction operation log is screened from the operation note of the application;
Show the operation log.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Obtain the function point set of application;
Function point in function point set bury a little, obtain function point buries point data;
Point data is buried based on function point, determines the corresponding user behavior data of function point;
Based on the corresponding user behavior data of function point, the level of interest of function point is determined;
According to the level of interest of function point, determine that strategy is extracted in the log of application.
Optionally, when computer program is executed by processor the function point set for obtaining application, comprising:
Determine application comprising at least one type business function;
Function point fractionation is carried out to the business function of at least one type, obtains function point set.
Optionally, the type of the business function includes conversational traffic type and log access type;The function point set
Conjunction includes: to carry out function point to the business function of conversational traffic type to split the conversational traffic function point obtained and to log access
The business function of type carries out function point and splits the log access function point obtained.
Optionally, when computer program is executed by processor the level of interest for determining function point based on user behavior data,
Include:
Based on the corresponding user behavior data of conversational traffic function point, the level of interest of conversational traffic function point, institute are determined
Stating the corresponding user behavior data of conversational traffic function point includes the information that user uses conversational traffic function point;
Based on the corresponding user behavior data of log access function point, the level of interest of log access function point, institute are determined
Stating the corresponding user behavior data of log access function point includes that user accesses the corresponding operation log of conversational traffic function point
Information.
Optionally, computer program is executed by processor the level of interest based on function point, when determining that strategy is extracted in log,
Include:
Based on the level of interest of conversational traffic function point, determine whether the corresponding operation log of conversational traffic function point is mentioned
It takes;
If it is determined that the operation log of conversational traffic function point is extracted, then the level of interest based on log access function point,
The operation log for determining conversational traffic function point is that whole is extracted or set part is extracted.
Optionally, when computer program is executed by processor, further includes:
Based on the corresponding user behavior data of function point, the level of interest of fixed function point is adjusted.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Corresponding user behavior data, which is identified, based on any user determines that strategy is extracted in the corresponding log of the user identifier.
Optionally, computer program be executed by processor based on user behavior data determine log extract strategy when, comprising:
Determine that strategy is extracted in the corresponding log of the time block based on the corresponding user behavior data of any time paragraph.
It will be understood by those skilled in the art that the embodiment of this specification can provide as the production of method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or implementation combining software and hardware aspects can be used in this specification
The form of example.Moreover, it wherein includes the computer of computer usable program code that this specification, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
It is above-mentioned that this specification specific embodiment is described.Other embodiments are in the scope of the appended claims
It is interior.In some cases, the movement recorded in detail in the claims or step can be come according to the sequence being different from embodiment
It executes and desired result still may be implemented.In addition, process depicted in the drawing not necessarily require show it is specific suitable
Sequence or consecutive order are just able to achieve desired result.In some embodiments, multitasking and parallel processing be also can
With or may be advantageous.
The above is only the embodiments of this specification, are not limited to this specification.For those skilled in the art
For, this specification can have various modifications and variations.All any modifications made within the spirit and principle of this specification,
Equivalent replacement, improvement etc., should be included within the scope of the claims of this specification.