CN109542743A - Log method of calibration, device, electronic equipment and computer readable storage medium - Google Patents
Log method of calibration, device, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN109542743A CN109542743A CN201811367928.8A CN201811367928A CN109542743A CN 109542743 A CN109542743 A CN 109542743A CN 201811367928 A CN201811367928 A CN 201811367928A CN 109542743 A CN109542743 A CN 109542743A
- Authority
- CN
- China
- Prior art keywords
- log
- verified
- user behaviors
- rules
- list
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3466—Performance evaluation by tracing or monitoring
- G06F11/3476—Data logging
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Debugging And Monitoring (AREA)
Abstract
The embodiment of the present disclosure provides a kind of log method of calibration, device, electronic equipment and computer readable storage medium, applied to log calibration technology field, wherein this method comprises: being monitored by multiple preset event monitoring modules to an event of burying corresponding in application program, it generates and buries the corresponding multiple user behaviors logs to be verified of an event with multiple, preset log list of rules is then based on to verify multiple user behaviors logs to be verified, determine log check results, the automatic Verification of user behaviors log to be verified is realized by preset log list of rules, verification personnel are not needed to verify log to be verified one by one using manual type, to improve the verification efficiency of user behaviors log to be verified, reduce verification cost.
Description
Technical field
This disclosure relates to log calibration technology field, specifically, this disclosure relates to a kind of log method of calibration, device,
Electronic equipment and computer readable storage medium.
Background technique
Transformation with from the information economy era to the digital economy epoch, data become " petroleum " of economic development, wherein
Data platform passes through the technologies such as a little of burying and obtains the behavioral data on website or applying user on App, can use the use got
The subsequent service for providing a user specific aim or personalization of family behavioral data.
Currently, obtaining the side that user behavior data is a kind of important acquisition user behavior data from User action log
Formula, for the User action log got, the prior art verifies the behavior day got one by one by way of desk checking
Will, to verify the accuracy and completeness of obtained User action log.However, existing desk checking mode excessively relies on school
The experience of personnel is tested, verification personnel need to be grasped the reference format of every user behaviors log, then one by one by user behaviors log to be verified
It is compared, counts with the user behaviors log of standard, just can determine that the accuracy and completeness of user behaviors log to be verified, in addition, to
The quantity of the user behaviors log of verification is usually huger, according to existing desk checking mode, needs to consume a longer time ability
Complete the verifying work of user behaviors log to be verified.Therefore, there is excessively dependence school in the mode of existing desk checking user behaviors log
The problem of testing the experience, verification low efficiency and high labor cost of personnel.
Summary of the invention
Present disclose provides a kind of log method of calibration, device, electronic equipment and computer readable storage mediums, for real
Now efficiently, automatically User action log is verified, the disclosure the technical solution adopted is as follows:
In a first aspect, provide a kind of user behaviors log method of calibration, this method includes,
An event of burying corresponding in application program is monitored by multiple preset event monitoring modules, generate with
It is multiple to bury the corresponding multiple user behaviors logs to be verified of an event;
Multiple user behaviors logs to be verified are verified based on preset log list of rules, determine log verification knot
Fruit.
Second aspect provides a kind of user behaviors log calibration equipment, which includes,
Monitoring modular, for by multiple preset event monitoring modules in application program it is corresponding bury an event into
Row monitoring generates and buries the corresponding multiple user behaviors logs to be verified of an event with multiple;
Correction verification module, multiple behavior days to be verified for being generated based on preset log list of rules to monitoring modular
Will is verified, and determines log check results.
The third aspect provides a kind of electronic equipment, which includes:
One or more processors;
Memory;
One or more application program, wherein one or more application programs be stored in memory and be configured as by
One or more processors execute, and one or more programs are configured to: executing user behaviors log verification side shown in first aspect
Method.
Fourth aspect, provides a kind of computer readable storage medium, and computer storage medium refers to for storing computer
It enables, when run on a computer, computer is allowed to execute user behaviors log method of calibration shown in first aspect.
The embodiment of the present disclosure provides a kind of log method of calibration, device, electronic equipment and computer readable storage medium,
The accuracy of user behaviors log to be verified is determined compared with completeness by desk checking mode with the prior art, the disclosure passes through more
A preset event monitoring module is monitored an event of burying corresponding in application program, generates and buries an event phase with multiple
The multiple user behaviors logs to be verified answered are then based on preset log list of rules and carry out to multiple user behaviors logs to be verified
Verification, determines log check results, i.e., realizes the automatic Verification of user behaviors log to be verified by preset log list of rules,
It does not need verification personnel to verify log to be verified one by one using manual type, to improve user behaviors log to be verified
Verification efficiency reduces verification cost.
The additional aspect of the disclosure and advantage will be set forth in part in the description, these will become from the following description
It obtains obviously, or recognized by the practice of the disclosure.
Detailed description of the invention
The disclosure is above-mentioned and/or additional aspect and advantage will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is a kind of flow diagram of user behaviors log method of calibration of the embodiment of the present disclosure;
Fig. 2 is a kind of structural schematic diagram of user behaviors log calibration equipment of the embodiment of the present disclosure;
Fig. 3 is the structural schematic diagram of another user behaviors log calibration equipment of the embodiment of the present disclosure;
Fig. 4 is the structural schematic diagram of a kind of electronic equipment of the embodiment of the present disclosure.
Specific embodiment
Embodiment of the disclosure is described below in detail, the example of each embodiment is shown in the accompanying drawings, wherein phase from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached drawing
The embodiment of description is exemplary, and is only used for explaining the disclosure, and cannot be construed to the limitation to the disclosure.
Those skilled in the art of the present technique are appreciated that unless expressly stated, singular " one " used herein, "one"
It may also comprise plural form with "the".It is to be further understood that wording " comprising " used in the specification of the disclosure is
Refer to existing characteristics, integer, step, operation, element and/or component, but it is not excluded that in the presence of or addition it is one or more other
Feature, integer, step, operation, element, component and/or their group.Wording "and/or" used herein is including one or more
Multiple associated wholes for listing item or any cell and all combination.
To keep the purposes, technical schemes and advantages of the disclosure clearer, below in conjunction with attached drawing to disclosure embodiment party
Formula is described in further detail.
How the technical solution of the disclosure and the technical solution of the disclosure are solved with specifically embodiment below above-mentioned
Technical problem is described in detail.These specific embodiments can be combined with each other below, for the same or similar concept
Or process may repeat no more in certain embodiments.Below in conjunction with attached drawing, embodiment of the disclosure is described.
The embodiment of the present disclosure provides a kind of user behaviors log method of calibration, as shown in Figure 1, this method may include following step
It is rapid:
Step S101 supervises an event of burying corresponding in application program by multiple preset event monitoring modules
It surveys, generates and bury the corresponding multiple user behaviors logs to be verified of an event with multiple;
For the embodiment of the present disclosure, multiple event monitoring modules are pre-seted, for supervising in application program with each event
The corresponding event of burying of module is surveyed to be monitored, when it is any bury an event and be triggered when, generate with this bury an event it is corresponding to
The user behaviors log of verification.
Wherein, burying a little is a kind of method that data acquisition is carried out to webpage Web, using App etc., by burying a little, Ke Yishou
The behavioral data that collection user generates in the application, and then for analyzing and optimizing the subsequent experience of product, or product
Operation provides data supporting;Wherein, burying an event can be the user of tracking or record in webpage Web or using the row on App
For or business procedure (such as register account number, search content, purchase commodity, viewing video, is thumbed up, comments on, pays close attention to, is collected login
Deng) event;Wherein, the event monitoring module pre-seted can be in one section of JS for accordingly burying the corresponding page addition of an event
(JS, that is, Javascript, Javascript are a kind of script languages developed by the LiveScript of Netscape to code
Speech), it is called " burying a little " in the process of the respective page addition code of the data of collection, when the behavior of user is met certain condition
When, the JS code of addition will be performed, and generate corresponding User action log, and report the user behaviors log of generation.
Step S102 verifies multiple user behaviors logs to be verified based on preset log list of rules, determines day
Will check results.
For the embodiment of the present disclosure, the list of rules verified to user behaviors log is preset, then to getting
Multiple user behaviors logs to be verified are verified, to obtain log check results.
The embodiment of the present disclosure provides a kind of user behaviors log method of calibration, is determined with the prior art by desk checking mode
For the accuracy of user behaviors log to be verified compared with completeness, the embodiment of the present disclosure is corresponding by multiple preset event monitoring modules
It is monitored with an event of burying corresponding in program, generates and bury an event corresponding multiple behavior days to be verified with multiple
Will is then based on preset log list of rules and verifies to multiple user behaviors logs to be verified, determines log check results,
The automatic Verification that user behaviors log to be verified is realized by preset log list of rules does not need verification personnel using artificial
Mode verifies log to be verified one by one, thus improve the verification efficiency of user behaviors log to be verified, reduce verification at
This.
The embodiment of the present disclosure provides a kind of possible implementation, wherein and step S102 includes,
Step S1021 (not shown), the preset school of log identifier lookup based on any user behaviors log to be verified
The multiple log standard rules for including in list of rules are tested, determination is corresponding with the log of any user behaviors log to be verified mark
Log standard parameter, any log standard rule include log label and corresponding log standard parameter;
It include multiple log standard rules, any day in preset verification list of rules for the embodiment of the present disclosure
Will standard rule includes log label and corresponding standard parameter, passes through the log mark of any user behaviors log to be verified and day
The matching relationship of log label in will standard rule, determines the corresponding log standard parameter of any user behaviors log to be verified.
Wherein, burying an event can include but is not limited to three elements: operation (such as click, pull), attribute (such as include
People, the event, place, equipment, the business information of operation for triggering this event, as purchase events need the attribute recorded to have trade name
Title, type, quantity, amount of money etc.), attribute value (as buy commodity quantity);The element for including is defined in log standard parameter
Quantity and each element value corresponding format etc., such as purchase quantity attribute value type be int, wherein may further specify that
The length value of int, if the int is the numerical value no more than 8.
Step S1022 (not shown) joins the log of any user behaviors log to be verified according to log standard parameter
Number is verified, if consistent with log standard parameter, it is determined that for the log check results of any user behaviors log to be verified
It is correct for log parameters, if inconsistent with log standard parameter, it is determined that for the log school of any user behaviors log to be verified
Testing result is log parameters mistake.
For the embodiment of the present disclosure, according to determining log standard parameter to the log parameters of any user behaviors log to be verified
It is verified, if the log parameters of user behaviors log to be verified are consistent with corresponding log standard parameter, it is determined that be verified
The log check results of user behaviors log are that log parameters are correct, if the log parameters of user behaviors log to be verified and corresponding log
Standard parameter is inconsistent, it is determined that the log check results of user behaviors log to be verified are log parameters mistake.
It wherein, include optional attribute item and essential attribute item in log standard parameter (when as watched the id of video, watching
Long, video type is essential attribute item, and playback equipment, viewing time are optional attribute item), the day of verification user behaviors log can be treated
Whether the quantity of the attribute item comprising that must include in log standard parameter is verified in will parameter, if comprising essential category
Property item quantity less than the essential attribute item quantity in log standard parameter, it is determined that the log of user behaviors log to be verified verifies knot
Fruit is log parameters mistake;Wherein, school can also be carried out to the attribute Value Types of the log parameters of any user behaviors log to be verified
It tests, the attribute Value Types as watched duration in log standard parameter are int, when watching in the log parameters of user behaviors log to be verified
Long attribute Value Types are string, it is determined that the log check results of user behaviors log to be verified are log parameters mistake.
For the embodiment of the present disclosure, by the corresponding log standard parameter of determination user behaviors log to be verified, then according to really
The log parameters that fixed log standard parameter treats verification user behaviors log are verified, and the log of user behaviors log to be verified is realized
The automatic Verification of parameter improves verification efficiency, reduces verification cost.
The embodiment of the present disclosure provides a kind of possible implementation, wherein and step 102 includes,
Step S1023 (not shown), to corresponding with multiple user behaviors logs to be verified in log list of rules
Log standard rule is labeled;
For the embodiment of the present disclosure, can be identified based on the log of multiple user behaviors logs to be verified, determine respectively it is each to
The user behaviors log of verification corresponding log standard rule in log list of rules, and to determining corresponding log standard rule
It is labeled, wherein mark can be the statistics of number, e.g., determines that corresponding log standard is advised according to user behaviors log to be verified
Then, then the corresponding number of log standard rule is carried out plus 1 operates.
Step S1024 (not shown), when completing to be directed to the verification of multiple user behaviors logs to be verified, according to mark
Log list of rules afterwards determines log check results.
Log for the embodiment of the present disclosure, after completing verification to multiple user behaviors logs to be verified, after being marked
List of rules (such as carries out the log rules column after counting statistics to each log standard rule in preset log list of rules
Table), log check results are determined according to the log list of rules after mark.
For the embodiment of the present disclosure, to log mark corresponding with multiple user behaviors logs to be verified in log list of rules
Quasi-regular is labeled, and is then determined log check results according to the log list of rules after mark, is realized user behaviors log
The automatic Verification of completeness improves the verification efficiency of user behaviors log to be verified, reduces verification cost.
The embodiment of the present disclosure provides a kind of possible implementation, wherein in step S1024 according to the day after mark
Will list of rules determines log check results, including,
Step S10241 (not shown), if including the log standard that is not marked in log list of rules after mark
Rule and/or labeled times be less than predetermined labeled times log standard rule, determine log check results be not marked and/
Or labeled times user behaviors log corresponding less than the log standard rule of predetermined labeled times is omitted;
Step S10242 (not shown), if mark after log list of rules in include log standard rule mark
Number is greater than predetermined labeled times, determines that log check results are that the corresponding user behaviors log of the log standard rule repeats.
For the embodiment of the present disclosure, the predetermined labeled times of each log standard rule are preset, it can set in advance
Fixed each event of burying should bury number a little, if including that the log standard not being marked is advised in the log list of rules after mark
Then and/or labeled times be less than predetermined labeled times log standard rule, determine log check results be not marked and/or
Labeled times user behaviors log corresponding less than the log standard rule of predetermined labeled times is omitted, i.e. the corresponding page of corresponding event
Omission is buried a little;If including the labeled times of log standard rule in the log list of rules after mark greater than predetermined mark
Number determines that log check results are that the corresponding user behaviors log of the log standard rule repeats, i.e. the corresponding page weight of corresponding event
It buries again a little.
For the embodiment of the present disclosure, by the labeled times of log standard rule in the log list of rules after marking with
Predetermined labeled times are compared, and realize the verification of the completeness of user behaviors log to be verified, improve user behaviors log to be verified
Verification efficiency, reduce verification cost.
The embodiment of the present disclosure provides a kind of possible implementation, wherein preset log list of rules is answered
With a functional module in program, in step S102 based on preset log list of rules to multiple user behaviors logs to be verified
It is verified, comprising:
Step S1025 (not shown) is based on preset log list of rules, to function corresponding with log list of rules
The corresponding user behaviors log to be verified of energy module is verified.
For the embodiment of the present disclosure, the corresponding corresponding preset log list of rules of the different function module of application program,
Such as log in registration module, video tour module respectively corresponds corresponding preset log list of rules, pass through preset log
List of rules carries out school to the corresponding user behaviors log to be verified in the corresponding functional module of the preset log list of rules
It tests.
For the embodiment of the present disclosure, corresponding preset log rule is set separately to different function of application modules
List realizes the verification of the user behaviors log to be verified in different function module.
The embodiment of the present disclosure provides alternatively possible implementation, and this method further includes,
Step S103 (not shown) is based on log check results, generates corresponding prompt information for prompting to survey
Examination personnel execute corresponding operation.
For the embodiment of the present disclosure, corresponding prompt information is generated based on log check results, for prompting tester
Member executes corresponding operation, such as check results are that the corresponding user behaviors log of corresponding log standard rule repeats, i.e., corresponding log
Corresponding event repeats to bury a little, and prompt tester, which bury, a little deletes operation.
For the embodiment of the present disclosure, corresponding prompt information is generated for prompting tester based on log check results
Execution corresponding operation realizes the problem of accuracy of discovery user behaviors log acquisition is with completeness aspect in time, to be promoted
The efficiency of research and development.
Fig. 2 is a kind of user behaviors log calibration equipment that the embodiment of the present disclosure provides, which includes: monitoring modular 201,
Correction verification module 202, wherein
Monitoring modular 201, for burying a thing to corresponding in application program by multiple preset event monitoring modules
Part is monitored, and is generated and is buried the corresponding multiple user behaviors logs to be verified of an event with multiple;
Correction verification module 202, it is multiple to be verified for being generated based on preset log list of rules to monitoring modular 201
User behaviors log is verified, and determines log check results.
The embodiment of the present disclosure provides a kind of user behaviors log calibration equipment, is determined with the prior art by desk checking mode
For the accuracy of user behaviors log to be verified compared with completeness, the embodiment of the present disclosure is corresponding by multiple preset event monitoring modules
It is monitored with an event of burying corresponding in program, generates and bury an event corresponding multiple behavior days to be verified with multiple
Will is then based on preset log list of rules and verifies to multiple user behaviors logs to be verified, determines log check results,
The automatic Verification that user behaviors log to be verified is realized by preset log list of rules does not need verification personnel using artificial
Mode verifies log to be verified one by one, thus improve the verification efficiency of user behaviors log to be verified, reduce verification at
This.
A kind of user behaviors log provided in disclosure above-described embodiment can be performed in the user behaviors log calibration equipment of the present embodiment
Method of calibration, realization principle is similar, and details are not described herein again.
The embodiment of the present disclosure provides another user behaviors log calibration equipment, as shown in figure 3, the device 30 of the present embodiment can
To include: monitoring modular 301, correction verification module 302, wherein
Monitoring modular 301, for burying a thing to corresponding in application program by multiple preset event monitoring modules
Part is monitored, and is generated and is buried the corresponding multiple user behaviors logs to be verified of an event with multiple;
Wherein, the monitoring modular 301 in Fig. 3 is same or similar with the function of monitoring modular 201 in Fig. 2, herein not
It repeats again.
Correction verification module 302, it is multiple to be verified for being generated based on preset log list of rules to monitoring modular 301
User behaviors log is verified, and determines log check results.
Wherein, the correction verification module 301 in Fig. 3 is same or similar with the function of correction verification module 201 in Fig. 2, herein not
It repeats again.
The embodiment of the present disclosure provides a kind of possible implementation, wherein correction verification module 302 includes searching unit 3021
And verification unit 3022;
Searching unit 3021, for the preset verification rule of log identifier lookup based on any user behaviors log to be verified
The multiple log standard rules for including in list determine log mark corresponding with the log of any user behaviors log to be verified mark
Quasi- parameter, any log standard rule include log label and corresponding log standard parameter;
Verification unit 3022, for searching determining log standard parameter to any to be verified according to searching unit 3021
The log parameters of user behaviors log are verified, if consistent with log standard parameter, it is determined that for any behavior day to be verified
The log check results of will are that log parameters are correct, if inconsistent with log standard parameter, it is determined that for any to be verified
The log check results of user behaviors log are log parameters mistake.
For the embodiment of the present disclosure, by the corresponding log standard parameter of determination user behaviors log to be verified, then according to really
The log parameters that fixed log standard parameter treats verification user behaviors log are verified, and the log of user behaviors log to be verified is realized
The automatic Verification of parameter improves verification efficiency, reduces verification cost.
The embodiment of the present disclosure provides a kind of possible implementation, wherein correction verification module 302 includes mark unit 3023
And determination unit 3024;
Mark unit 3023, in log list of rules to log mark corresponding with multiple user behaviors logs to be verified
Quasi-regular is labeled;
Determination unit 3024, when for being directed to the verification of multiple user behaviors logs to be verified in completion, according to mark unit
Log list of rules after 3023 marks determines log check results.
For the embodiment of the present disclosure, to log mark corresponding with multiple user behaviors logs to be verified in log list of rules
Quasi-regular is labeled, and is then determined log check results according to the log list of rules after mark, is realized user behaviors log
The automatic Verification of completeness improves the verification efficiency of user behaviors log to be verified, reduces verification cost.
The embodiment of the present disclosure provides alternatively possible implementation, wherein according to the log list of rules after mark
Determine log check results, including,
If including the log standard rule not being marked and/or labeled times in the log list of rules after mark less than pre-
The log standard rule for determining labeled times determines that log check results are not to be marked and/or labeled times are less than predetermined mark
The corresponding user behaviors log of the log standard rule of number is omitted;
If the labeled times in the log list of rules after mark including log standard rule are greater than predetermined labeled times, really
Settled date will check results are that the corresponding user behaviors log of the log standard rule repeats.
For the embodiment of the present disclosure, by the labeled times of log standard rule in the log list of rules after marking with
Predetermined labeled times are compared, and realize the verification of the completeness of user behaviors log to be verified, improve user behaviors log to be verified
Verification efficiency, reduce verification cost.
The embodiment of the present disclosure provides a kind of possible implementation, wherein preset log list of rules is answered
With a functional module in program, multiple user behaviors logs to be verified are verified based on preset log list of rules, are wrapped
It includes:
Based on preset log list of rules, row to be verified corresponding to functional module corresponding with log list of rules
It is verified for log.
For the embodiment of the present disclosure, corresponding preset log rules column is set separately in different function of application modules
Table realizes the verification of the user behaviors log to be verified in different function module.
The embodiment of the present disclosure provides alternatively possible implementation, wherein the device further includes cue module 303;
Cue module 303 generates corresponding prompt information for prompting tester for being based on log check results
Execute corresponding operation.
For the embodiment of the present disclosure, corresponding prompt information is generated for prompting tester based on log check results
The problem of executing corresponding operation, realizing in terms of finding user behaviors log acquisition accuracy and completeness in time, to improve
The efficiency of research and development.
The embodiment of the present disclosure provides a kind of user behaviors log calibration equipment, is determined with the prior art by desk checking mode
For the accuracy of user behaviors log to be verified compared with completeness, the embodiment of the present disclosure is corresponding by multiple preset event monitoring modules
It is monitored with an event of burying corresponding in program, generates and bury an event corresponding multiple behavior days to be verified with multiple
Will is then based on preset log list of rules and verifies to multiple user behaviors logs to be verified, determines log check results,
The automatic Verification that user behaviors log to be verified is realized by preset log list of rules does not need verification personnel using artificial
Mode verifies log to be verified one by one, thus improve the verification efficiency of user behaviors log to be verified, reduce verification at
This.
The embodiment of the present disclosure provides a kind of user behaviors log calibration equipment, is suitable for method shown in above-described embodiment,
This is repeated no more.
The embodiment of the present disclosure provides a kind of electronic equipment, as shown in figure 4, it illustrates be suitable for being used to realizing disclosure reality
Apply the structural schematic diagram of the electronic equipment (such as terminal device or server) 40 of example.Terminal device in the embodiment of the present disclosure can
It is (flat to include but is not limited to such as mobile phone, laptop, digit broadcasting receiver, PDA (personal digital assistant), PAD
Plate computer), PMP (portable media player), car-mounted terminal (such as vehicle mounted guidance terminal) etc. mobile terminal and
Such as fixed terminal of number TV, desktop computer etc..Electronic equipment shown in Fig. 4 is only an example, should not be to this
The function and use scope of open embodiment bring any restrictions.
As shown in figure 4, electronic equipment 40 may include processing unit (such as central processing unit, graphics processor etc.) 401,
It can be loaded into random access storage according to the program being stored in read-only memory (ROM) 402 or from storage device 408
Program in device (RAM) 403 and execute various movements appropriate and processing.In RAM 403, it is also stored with the behaviour of electronic equipment 40
Various programs and data needed for making.Processing unit 401, ROM 402 and RAM 403 are connected with each other by bus 404.It is defeated
Enter/export (I/O) interface 405 and is also connected to bus 404.
In general, following device can connect to I/O interface 405: including such as touch screen, touch tablet, keyboard, mouse, taking the photograph
As the input unit 406 of head, microphone, accelerometer, gyroscope etc.;Including such as liquid crystal display (LCD), loudspeaker, vibration
The output device 407 of dynamic device etc.;Storage device 408 including such as tape, hard disk etc.;And communication device 409.Communication device
409, which can permit electronic equipment 40, is wirelessly or non-wirelessly communicated with other equipment to exchange data.Although Fig. 4, which is shown, to be had
The electronic equipment 40 of various devices, it should be understood that being not required for implementing or having all devices shown.It can substitute
Implement or have more or fewer devices in ground.
The embodiment of the present disclosure provides a kind of electronic equipment, determines row to be verified by desk checking mode with the prior art
For log accuracy compared with completeness, the embodiment of the present disclosure is by multiple preset event monitoring modules in application program
A corresponding event of burying is monitored, and is generated and is buried the corresponding multiple user behaviors logs to be verified of an event with multiple, then base
Multiple user behaviors logs to be verified are verified in preset log list of rules, determine log check results, i.e., by pre-
If log list of rules realize the automatic Verification of user behaviors log to be verified, do not need verification personnel and treated using manual type
Verification log is verified one by one, to improve the verification efficiency of user behaviors log to be verified, reduce verification cost.
The embodiment of the present disclosure provides a kind of electronic equipment suitable for above method embodiment, and details are not described herein.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium
On computer program, which includes the program code for method shown in execution flow chart.In such reality
It applies in example, which can be downloaded and installed from network by communication device 409, or from storage device 408
It is mounted, or is mounted from ROM 402.When the computer program is executed by processing unit 401, the embodiment of the present disclosure is executed
Method in the above-mentioned function that limits.
It should be noted that the above-mentioned computer-readable medium of the disclosure can be computer-readable signal media or meter
Calculation machine readable storage medium storing program for executing either the two any combination.Computer readable storage medium for example can be --- but not
Be limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, or any above combination.Meter
The more specific example of calculation machine readable storage medium storing program for executing can include but is not limited to: have the electrical connection, just of one or more conducting wires
Taking formula computer disk, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type may be programmed read-only storage
Device (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), light storage device, magnetic memory device,
Or above-mentioned any appropriate combination.In the disclosure, computer readable storage medium can be it is any include or storage journey
The tangible medium of sequence, the program can be commanded execution system, device or device use or in connection.And at this
In open, computer-readable signal media may include in a base band or as the data-signal that carrier wave a part is propagated,
In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to
Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable and deposit
Any computer-readable medium other than storage media, the computer-readable signal media can send, propagate or transmit and be used for
By the use of instruction execution system, device or device or program in connection.Include on computer-readable medium
Program code can transmit with any suitable medium, including but not limited to: electric wire, optical cable, RF (radio frequency) etc. are above-mentioned
Any appropriate combination.
Above-mentioned computer-readable medium can be included in above-mentioned electronic equipment;It is also possible to individualism, and not
It is fitted into the electronic equipment.
Above-mentioned computer-readable medium carries one or more program, when said one or multiple programs are by the electricity
When sub- equipment executes, so that the electronic equipment: obtaining at least two internet protocol addresses;Send to Node evaluation equipment includes institute
State the Node evaluation request of at least two internet protocol addresses, wherein the Node evaluation equipment is internet from described at least two
In protocol address, chooses internet protocol address and return;Receive the internet protocol address that the Node evaluation equipment returns;Its
In, the fringe node in acquired internet protocol address instruction content distributing network.
Alternatively, above-mentioned computer-readable medium carries one or more program, when said one or multiple programs
When being executed by the electronic equipment, so that the electronic equipment: receiving the Node evaluation including at least two internet protocol addresses and request;
From at least two internet protocol address, internet protocol address is chosen;Return to the internet protocol address selected;Wherein,
The fringe node in internet protocol address instruction content distributing network received.
The calculating of the operation for executing the disclosure can be write with one or more programming languages or combinations thereof
Machine program code, above procedure design language include object oriented program language-such as Java, Smalltalk, C+
+, it further include conventional procedural programming language-such as " C " language or similar programming language.Program code can
Fully to execute, partly execute on the user computer on the user computer, be executed as an independent software package,
Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part.
In situations involving remote computers, remote computer can pass through the network of any kind --- including local area network (LAN)
Or wide area network (WAN)-is connected to subscriber computer, or, it may be connected to outer computer (such as utilize Internet service
Provider is connected by internet).
The embodiment of the present disclosure provides a kind of computer readable storage medium, true by desk checking mode with the prior art
For the accuracy of fixed user behaviors log to be verified compared with completeness, the embodiment of the present disclosure passes through multiple preset event monitoring modules pair
A corresponding event of burying is monitored in application program, is generated and is buried an event corresponding multiple behavior days to be verified with multiple
Will is then based on preset log list of rules and verifies to multiple user behaviors logs to be verified, determines log check results,
The automatic Verification that user behaviors log to be verified is realized by preset log list of rules does not need verification personnel using artificial
Mode verifies log to be verified one by one, thus improve the verification efficiency of user behaviors log to be verified, reduce verification at
This.
The embodiment of the present disclosure provides a kind of computer readable storage medium and is suitable for above method embodiment, herein no longer
It repeats.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use
The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually
It can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it to infuse
Meaning, the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart can be with holding
The dedicated hardware based system of functions or operations as defined in row is realized, or can use specialized hardware and computer instruction
Combination realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard
The mode of part is realized.Wherein, the title of unit does not constitute the restriction to the unit itself under certain conditions.
Above description is only the preferred embodiment of the disclosure and the explanation to institute's application technology principle.Those skilled in the art
Member is it should be appreciated that the open scope involved in the disclosure, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic
Scheme, while should also cover in the case where not departing from design disclosed above, it is carried out by above-mentioned technical characteristic or its equivalent feature
Any combination and the other technical solutions formed.Such as features described above has similar function with (but being not limited to) disclosed in the disclosure
Can technical characteristic replaced mutually and the technical solution that is formed.
Claims (10)
1. a kind of user behaviors log method of calibration, which is characterized in that including,
An event of burying corresponding in application program is monitored by multiple preset event monitoring modules, generate with it is multiple
Bury the corresponding multiple user behaviors logs to be verified of an event;
Multiple user behaviors logs to be verified are verified based on preset log list of rules, determine log check results.
2. the method according to claim 1, wherein described be based on preset log list of rules to the multiple
User behaviors log to be verified is verified, and determines log check results, including,
Include in preset verification list of rules described in log identifier lookup based on any user behaviors log to be verified is multiple
Log standard rule determines log standard parameter corresponding with the log mark of any user behaviors log to be verified, any
The log standard rule includes log label and corresponding log standard parameter;
It is verified according to log parameters of the log standard parameter to any user behaviors log to be verified, if with described
Log standard parameter is consistent, it is determined that for any user behaviors log to be verified log check results be log parameters just
Really, if inconsistent with the log standard parameter, it is determined that the log for any user behaviors log to be verified verifies knot
Fruit is log parameters mistake.
3. method according to claim 1 or 2, which is characterized in that described to be based on preset log list of rules to described
Multiple user behaviors logs to be verified are verified, and determine log check results, including,
Log standard rule corresponding with the multiple user behaviors log to be verified is marked in the log list of rules
Note;
When completing to be directed to the verification of the multiple user behaviors log to be verified, day is determined according to the log list of rules after mark
Will check results.
4. according to the method described in claim 3, it is characterized in that, the log list of rules according to after mark determines log
Check results, including,
If including the log standard rule not being marked and/or labeled times in the log list of rules after mark less than pre- calibration
The log standard rule for infusing number determines that log check results are not marked for described in and/or the labeled times are less than predetermined
The corresponding user behaviors log of the log standard rule of labeled times is omitted;
If the labeled times in the log list of rules after mark including log standard rule are greater than predetermined labeled times, day is determined
Will check results are that the corresponding user behaviors log of the log standard rule repeats.
5. the method according to claim 1, wherein the preset log list of rules corresponds to the application
A functional module in program, it is described that school is carried out to the multiple user behaviors log to be verified based on preset log list of rules
It tests, comprising:
Based on preset log list of rules, row to be verified corresponding to functional module corresponding with the log list of rules
It is verified for log.
6. the method according to claim 1, wherein this method further includes,
Based on the log check results, corresponding prompt information is generated for prompting tester to execute corresponding operation.
7. a kind of user behaviors log calibration equipment, which is characterized in that including,
Monitoring modular, for being supervised by multiple preset event monitoring modules to an event of burying corresponding in application program
It surveys, generates and bury the corresponding multiple user behaviors logs to be verified of an event with multiple;
Correction verification module, multiple behavior days to be verified for being generated based on preset log list of rules to the monitoring modular
Will is verified, and determines log check results.
8. device according to claim 7, which is characterized in that the correction verification module includes searching unit and verification unit;
The searching unit, for the rule of preset verification described in the log identifier lookup based on any user behaviors log to be verified
The multiple log standard rules for including in list determine day corresponding with the log mark of any user behaviors log to be verified
Will standard parameter, any log standard rule include log label and corresponding log standard parameter;
The verification unit, for searching the determining log standard parameter to described any to school according to the searching unit
The log parameters for the user behaviors log tested are verified, if consistent with the log standard parameter, it is determined that for it is described it is any to
The log check results of the user behaviors log of verification are that log parameters are correct, if inconsistent with the log standard parameter, it is determined that
Log check results for any user behaviors log to be verified are log parameters mistake.
9. a kind of electronic equipment characterized by comprising
One or more processors;
Memory;
One or more application program, wherein one or more of application programs are stored in the memory and are configured
To be executed by one or more of processors, one or more of programs are configured to: being executed according to claim 1 to 6
Described in any item user behaviors log methods of calibration.
10. a kind of computer readable storage medium, which is characterized in that the computer storage medium refers to for storing computer
It enables, when run on a computer, computer is allowed to execute behavior described in any one of the claims 1 to 6
Log method of calibration.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367928.8A CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811367928.8A CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109542743A true CN109542743A (en) | 2019-03-29 |
CN109542743B CN109542743B (en) | 2022-04-12 |
Family
ID=65847765
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811367928.8A Active CN109542743B (en) | 2018-11-16 | 2018-11-16 | Log checking method and device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109542743B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444099A (en) * | 2020-03-27 | 2020-07-24 | 携程计算机技术(上海)有限公司 | Data inconsistency analysis method, system, electronic device and storage medium |
CN116166501A (en) * | 2023-02-03 | 2023-05-26 | 上海擎创信息技术有限公司 | Log verification method and device, electronic equipment and storage medium |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150120677A1 (en) * | 2011-06-27 | 2015-04-30 | Amazon Technologies, Inc. | Validation of log formats |
CN104915296A (en) * | 2015-06-29 | 2015-09-16 | 北京金山安全软件有限公司 | Buried point testing method, data query method and device |
CN107844400A (en) * | 2017-10-16 | 2018-03-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of a kind of daily record data |
CN107995283A (en) * | 2017-11-29 | 2018-05-04 | 上海恺英网络科技有限公司 | A kind of data bury the method, equipment and system of point analysis |
CN108280022A (en) * | 2018-02-08 | 2018-07-13 | 无线生活(杭州)信息科技有限公司 | Performance monitoring method and device |
-
2018
- 2018-11-16 CN CN201811367928.8A patent/CN109542743B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150120677A1 (en) * | 2011-06-27 | 2015-04-30 | Amazon Technologies, Inc. | Validation of log formats |
CN104915296A (en) * | 2015-06-29 | 2015-09-16 | 北京金山安全软件有限公司 | Buried point testing method, data query method and device |
CN107844400A (en) * | 2017-10-16 | 2018-03-27 | 阿里巴巴集团控股有限公司 | The method of calibration and device of a kind of daily record data |
CN107995283A (en) * | 2017-11-29 | 2018-05-04 | 上海恺英网络科技有限公司 | A kind of data bury the method, equipment and system of point analysis |
CN108280022A (en) * | 2018-02-08 | 2018-07-13 | 无线生活(杭州)信息科技有限公司 | Performance monitoring method and device |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111444099A (en) * | 2020-03-27 | 2020-07-24 | 携程计算机技术(上海)有限公司 | Data inconsistency analysis method, system, electronic device and storage medium |
CN116166501A (en) * | 2023-02-03 | 2023-05-26 | 上海擎创信息技术有限公司 | Log verification method and device, electronic equipment and storage medium |
CN116166501B (en) * | 2023-02-03 | 2024-03-08 | 上海擎创信息技术有限公司 | Log verification method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109542743B (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102693495B (en) | Filtering and the method and computer readable storage medium for promoting application shop application | |
US9591088B2 (en) | Method and system for collecting and providing application usage analytics | |
CN109308266A (en) | Construction method, test method, device, equipment and the medium of test case | |
US9424611B2 (en) | User interface for managing questions and answers across multiple social media data sources | |
CN108459953A (en) | test method and device | |
JP2019502192A (en) | Method and device for application information risk management | |
CN109614766A (en) | It is a kind of that the method and device that block chain deposits card is carried out to webpage by file acquisition | |
CN110377522A (en) | The test method for scene of trading, calculates equipment and medium at device | |
CN109582885A (en) | It is a kind of that the method and device that block chain deposits card is carried out to webpage by webpage monitoring | |
CN108494860A (en) | WEB accesses system, WEB access methods and device for client | |
CN109241722A (en) | For obtaining method, electronic equipment and the computer-readable medium of information | |
CN109510874A (en) | Electronic certificate method for pushing, device and electronic equipment based on LBS | |
CN109815105A (en) | Applied program testing method and device based on Btrace | |
CN109918146A (en) | Page generation method and device | |
CN114003473B (en) | Page operation behavior backtracking method and device and electronic equipment | |
CN107977678A (en) | Method and apparatus for output information | |
CN110309469A (en) | A kind of user clicks behavior visual analysis method, system, medium and electronic equipment | |
CN110097397A (en) | Information-pushing method, device and electronic equipment based on feedback | |
CN109150700A (en) | A kind of method and device of data acquisition | |
CN110334542A (en) | Card method of calibration and device are deposited in a kind of network preservation of evidence, network evidence | |
CN109471976A (en) | Processing method, device, electronic equipment and the storage medium of web page operation data | |
CN108959642A (en) | Method and apparatus for information to be written | |
CN109542743A (en) | Log method of calibration, device, electronic equipment and computer readable storage medium | |
US20150113036A1 (en) | Server and method for sharing application services | |
CN110321705A (en) | Method, apparatus for generating the method, apparatus of model and for detecting file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right |
Effective date of registration: 20221228 Address after: Room 1445A, No. 55 Xili Road, China (Shanghai) Pilot Free Trade Zone, Pudong New Area, Shanghai, 200120 Patentee after: Honey Grapefruit Network Technology (Shanghai) Co.,Ltd. Address before: 408, 4th floor, 51 Zhichun Road, Haidian District, Beijing 100086 Patentee before: BEIJING MICROLIVE VISION TECHNOLOGY Co.,Ltd. |
|
TR01 | Transfer of patent right |