CN109614566A - Traffic source analysis method, system and device - Google Patents

Traffic source analysis method, system and device Download PDF

Info

Publication number
CN109614566A
CN109614566A CN201811343766.4A CN201811343766A CN109614566A CN 109614566 A CN109614566 A CN 109614566A CN 201811343766 A CN201811343766 A CN 201811343766A CN 109614566 A CN109614566 A CN 109614566A
Authority
CN
China
Prior art keywords
traffic source
dimension
business object
information
configuration information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811343766.4A
Other languages
Chinese (zh)
Inventor
穆毅鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811343766.4A priority Critical patent/CN109614566A/en
Publication of CN109614566A publication Critical patent/CN109614566A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of traffic source analysis methods, comprising: determines the traffic source configuration information of business object, includes and the one-to-one dimension description information of default dimension in the traffic source configuration information;Based on the traffic source configuration information, traffic source mark is generated, includes and the default one-to-one dimension identification information of dimension in the traffic source mark;It is identified based on the traffic source, the traffic source of the business object is analyzed.Using the embodiment of the present application, the traffic source of business platform accurately can be positioned and be analyzed, monitors the implementation result of every migration efficiency.

Description

Traffic source analysis method, system and device
Technical field
This application involves field of computer technology more particularly to a kind of analysis of traffic source to determine mthods, systems and devices.
Background technique
With the development of computer technology and popularizing for mobile Internet, business platform has also been obtained increasingly on various lines It is widely applied, facilitates people's lives.
At the same time, sharp increase situation is presented in the portfolio of business platform, and user demand also tends to diversification, in this regard, Business platform operator can implement different migration efficiencies on business platform and be reached more with meeting the demand of different user Good operational effect.
Therefore, the traffic source of business platform how is analyzed, to monitor the implementation result of every migration efficiency, becomes one Urgent problem to be solved.
Summary of the invention
The embodiment of the present application provides a kind of traffic source analysis method, system and device, to analyze the stream of business platform Source is measured, the implementation result of every migration efficiency is monitored.
The embodiment of the present application adopts the following technical solutions:
In a first aspect, the embodiment of the present application provides a kind of traffic source analysis method, comprising:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
Optionally, in the method that the embodiment of the present application first aspect provides, the default dimension includes following at least one :
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
Optionally, the embodiment of the present application first aspect provide method in, the default dimension further include it is following at least One:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing State business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
Optionally, in the method that the embodiment of the present application first aspect provides, the traffic source configuration of business object is determined Information, comprising:
The impression information of the business object is obtained, includes the corresponding dimension of each default dimension in the impression information Description information;
Based on the corresponding dimension description information of each default dimension, according to the preset data knot comprising the default dimension Structure generates the traffic source configuration information.
Optionally, in the method that the embodiment of the present application first aspect provides, it is based on the traffic source configuration information, it is raw It is identified at traffic source, comprising:
Based on the preset data structure, the corresponding dimension of each default dimension in the traffic source configuration information is determined Spend description information;
Using any default dimension as current dimension, using the corresponding dimension description information of the current dimension as leading dimension Description information is spent, following steps are executed, until traversing each default dimension:
Morphological analysis is carried out to the current dimension description information, is obtained corresponding with the current dimension description information Current word sequence;
Syntactic analysis is carried out to the current word sequence, is determined corresponding with the current dimension description information current Semantic character string;
Based on the current semantics character string, corresponding with the current dimension in the traffic source mark work as is determined Preceding dimension identification information.
Optionally, in the method that the embodiment of the present application first aspect provides, the dimension description information is Chinese character Form;
It is then based on the current semantics character string, is determined corresponding with the current dimension in the traffic source mark Leading dimension degree identification information, comprising:
The current semantics character string of Chinese character form is converted to the current semantics character string of English character form;
Current semantics character string based on English character form, determine in traffic source mark with the current dimension Corresponding leading dimension degree identification information.
Optionally, it in the method that the embodiment of the present application first aspect provides, is identified based on the traffic source, to described The traffic source of business object is analyzed, comprising:
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
It obtains and links corresponding access log with the service request, include the traffic source in the access log Mark;
Based on the access log, the traffic source of the business object is analyzed.
Optionally, it in the method that the embodiment of the present application first aspect provides, is identified based on the traffic source, to described The traffic source of business object is analyzed, further includes:
Acquisition buries and a little reports log, and described bury a little reports in log including traffic source mark;
Log is a little reported based on described bury, the traffic source of the business object is analyzed.
Second aspect, the embodiment of the present application provide a kind of traffic source analysis method, are applied to first server, comprising:
It receives from the first user terminal, business object traffic source configuration information, the traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business pair The traffic source of elephant is analyzed.
Optionally, in the method that the embodiment of the present application second aspect provides, the default dimension includes following at least one :
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
Optionally, the embodiment of the present application second aspect provide method in, the default dimension further include it is following at least One:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing State business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
Optionally, in the method that the embodiment of the present application second aspect provides, it is based on the traffic source configuration information, it is raw It is identified at traffic source, comprising:
Based on the preset data structure of the default dimension, each default dimension point in the traffic source configuration information is determined Not corresponding dimension description information;
Using any default dimension as current dimension, using the corresponding dimension description information of the current dimension as leading dimension Description information is spent, following steps are executed, until traversing each default dimension:
Morphological analysis is carried out to the current dimension description information, is obtained corresponding with the current dimension description information Current word sequence;
Syntactic analysis is carried out to the current word sequence, is determined corresponding with the current dimension description information current Semantic character string;
Based on the current semantics character string, corresponding with the current dimension in the traffic source mark work as is determined Preceding dimension identification information.
Optionally, in the method that the embodiment of the present application second aspect provides, the dimension description information is Chinese character Form;
It is then based on the current semantics character string, is determined corresponding with the current dimension in the traffic source mark Leading dimension degree identification information, comprising:
The current semantics character string of Chinese character form is converted to the current semantics character string of English character form;
Current semantics character string based on English character form, determine in traffic source mark with the current dimension Corresponding leading dimension degree identification information.
Optionally, in the method that the embodiment of the present application second aspect provides, the traffic source mark is provided, specifically Are as follows:
The traffic source mark is provided to third user terminal, is based on the traffic source for the third user terminal Mark, generation include the service request link of the traffic source mark, and the service request link is for accessing the industry Business object.
Optionally, in the method that the embodiment of the present application second aspect provides, after the traffic source mark is provided, The method also includes:
It is obtained from second server and links corresponding access log with the service request, include in the access log The traffic source mark, the second server are used to provide the service request link to fourth user terminal;
The access log is sent to the second user terminal, is based on the access day for the second user terminal Will analyzes the traffic source of the business object.
Optionally, in the method that the embodiment of the present application second aspect provides, after the traffic source mark is provided, The method also includes:
It is buried from fourth user terminal acquisition and a little reports log, described bury a little reports in log including the traffic source Mark;
It a little reports log to be sent to the second user terminal described bury, is based on described bury for the second user terminal Point reports log, analyzes the traffic source of the business object.
The third aspect, the embodiment of the present application provide a kind of traffic source analysis method, are applied to the first user terminal, packet It includes:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
The traffic source configuration information is sent to first server, for the first server based on the flow come Source configuration information generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
Optionally, in the method that the embodiment of the present application third aspect provides, the default dimension includes following at least one :
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
Optionally, the embodiment of the present application third aspect provide method in, the default dimension further include it is following at least One:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing State business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
Optionally, in the method that the embodiment of the present application third aspect provides, the traffic source configuration of business object is determined Information, comprising:
The impression information of the business object is obtained, includes the corresponding dimension of each default dimension in the impression information Description information;
Based on the corresponding dimension description information of each default dimension, according to the preset data knot comprising the default dimension Structure generates the traffic source configuration information.
Fourth aspect, the embodiment of the present application provide a kind of traffic source analysis method, are applied to second user terminal, packet It includes:
It obtains and links corresponding access log with service request, include the traffic source mark in the access log Know, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Based on the access log, the traffic source of the business object is analyzed.
Optionally, in the method that the embodiment of the present application fourth aspect provides, acquisition links corresponding with service request Access log includes at least one of the following:
It is obtained from second server and links corresponding access log with service request, the second server is for the Four user terminals provide the service request link;
It is obtained from first server and links corresponding access log with service request, the access log is by described first Server is obtained from the second server.
Optionally, in the method that the embodiment of the present application fourth aspect provides, the method also includes:
Acquisition buries and a little reports log, and described bury a little reports in log including traffic source mark;
Log is a little reported based on described bury, the traffic source of the business object is analyzed.
Optionally, in the method that the embodiment of the present application fourth aspect provides, acquisition, which is buried, a little reports log, specifically:
It is buried from first server acquisition and a little reports log, described bury a little reports log to be used by the first server from the 4th Family terminal obtains.
5th aspect, the embodiment of the present application provide a kind of traffic source analysis method, are applied to third user terminal, packet It includes:
Traffic source mark is obtained from first server, the traffic source mark is based on business by the first server The traffic source configuration information of object generates, and includes and the one-to-one dimension of default dimension in the traffic source configuration information Description information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
The service request link is provided to second server, provides institute to fourth user terminal for the second server State service request link.
6th aspect, the embodiment of the present application provide a kind of traffic source analysis system, comprising:
First user terminal, for determining the traffic source configuration information of business object, the traffic source configuration information In include and the one-to-one dimension description information of default dimension;
First server generates traffic source mark, the traffic source for being based on the traffic source configuration information Include and the default one-to-one dimension identification information of dimension in mark;
Second user terminal divides the traffic source of the business object for being identified based on the traffic source Analysis.
7th aspect, the embodiment of the present application provide a kind of traffic source analysis system, comprising:
First server, it is described for receiving from the first user terminal, business object traffic source configuration information Include and the one-to-one dimension description information of default dimension in traffic source configuration information;It is also used to based on the traffic source Configuration information generates traffic source mark, includes and the default one-to-one dimension of dimension in the traffic source mark Identification information;The traffic source mark is also provided for, is identified for second user terminal based on the traffic source, to described The traffic source of business object is analyzed;
First user terminal, for determining the traffic source configuration information of business object, the traffic source configuration information In include and the one-to-one dimension description information of default dimension;It is also used to the traffic source configuration information being sent to first Server is based on the traffic source configuration information for the first server, generates traffic source mark;Wherein, the stream Measure in source identification includes to identify with the default one-to-one dimension identification information of dimension, the traffic source for institute The traffic source for stating business object is analyzed;
Second user terminal links corresponding access log with service request for obtaining, wraps in the access log The traffic source mark is included, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;Also For being based on the access log, the traffic source of the business object is analyzed;
Third user terminal, for obtaining traffic source mark from first server, the traffic source mark is by described First server is generated based on the traffic source configuration information of business object, is included in the traffic source configuration information and is preset Dimension one-to-one dimension description information includes and the default one-to-one dimension of dimension in traffic source mark Identification information;It being also used to identify based on the traffic source, generation includes the service request link of the traffic source mark, The service request link is for accessing the business object;It is also used to provide the service request link to second server, The service request link is provided to fourth user terminal for the second server.
Eighth aspect, the embodiment of the present application provide a kind of traffic source analytical equipment, comprising:
Configuration information determining module determines the traffic source configuration information of business object, the traffic source configuration information In include and the one-to-one dimension description information of default dimension;
Source identification generation module is based on the traffic source configuration information, generates traffic source mark, and the flow comes Include and the default one-to-one dimension identification information of dimension in the mark of source;
Traffic source analysis module is identified based on the traffic source, is divided the traffic source of the business object Analysis.
9th aspect, the embodiment of the present application provide a kind of traffic source analytical equipment, are applied to first server, comprising:
Configuration information receiving module is received from the first user terminal, business object traffic source configuration information, institute It states in traffic source configuration information and includes and the one-to-one dimension description information of default dimension;
Source identification generation module is based on the traffic source configuration information, generates traffic source mark, and the flow comes Include and the default one-to-one dimension identification information of dimension in the mark of source;
Source identification provides module, provides the traffic source mark, is based on the traffic source for second user terminal Mark, analyzes the traffic source of the business object.
Tenth aspect, the embodiment of the present application provide a kind of traffic source analytical equipment, are applied to the first user terminal, packet It includes:
Configuration information determining module determines the traffic source configuration information of business object, the traffic source configuration information In include and the one-to-one dimension description information of default dimension;
The traffic source configuration information is sent to first server by configuration information sending module, for first clothes Device be engaged in based on the traffic source configuration information, generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
Tenth on the one hand, and the embodiment of the present application provides a kind of traffic source analytical equipment, is applied to second user terminal, packet It includes:
Access log obtains module, obtains and links corresponding access log with service request, wraps in the access log The traffic source mark is included, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Traffic source analysis module is based on the access log, analyzes the traffic source of the business object.
12nd aspect, the embodiment of the present application provide a kind of traffic source analytical equipment, are applied to third user terminal, packet It includes:
Source identification obtains module, obtains traffic source mark from first server, the traffic source mark is by described First server is generated based on the traffic source configuration information of business object, is included in the traffic source configuration information and is preset Dimension one-to-one dimension description information includes and the default one-to-one dimension of dimension in traffic source mark Identification information;
Generation module is linked, is identified based on the traffic source, generation includes that the business of the traffic source mark is asked Link is asked, the service request link is for accessing the business object;
Link provides module, provides service request link to second server, for the second server to the 4th User terminal provides the service request link.
13rd aspect, the embodiment of the present application provide a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
Fourteenth aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage one or more program, one or more of programs are executed when the electronic equipment for being included multiple application programs When, so that the electronic equipment executes following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
15th aspect, the embodiment of the present application provide a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
It receives from the first user terminal, business object traffic source configuration information, the traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business pair The traffic source of elephant is analyzed.
16th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage one or more program, one or more of programs are executed when the electronic equipment for being included multiple application programs When, so that the electronic equipment executes following operation:
It receives from the first user terminal, business object traffic source configuration information, the traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business pair The traffic source of elephant is analyzed.
17th aspect, the embodiment of the present application provide a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
The traffic source configuration information is sent to first server, for the first server based on the flow come Source configuration information generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
18th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage one or more program, one or more of programs are executed when the electronic equipment for being included multiple application programs When, so that the electronic equipment executes following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
The traffic source configuration information is sent to first server, for the first server based on the flow come Source configuration information generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
19th aspect, the embodiment of the present application provide a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
It obtains and links corresponding access log with service request, include the traffic source mark in the access log Know, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Based on the access log, the traffic source of the business object is analyzed.
20th aspect, the embodiment of the present application provide a kind of computer readable storage medium, the computer-readable storage Media storage one or more program, one or more of programs are executed when the electronic equipment for being included multiple application programs When, so that the electronic equipment executes following operation:
It obtains and links corresponding access log with service request, include the traffic source mark in the access log Know, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Based on the access log, the traffic source of the business object is analyzed.
20th on the one hand, and the embodiment of the present application provides a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the place when executed It manages device and executes following operation:
Traffic source mark is obtained from first server, the traffic source mark is based on business by the first server The traffic source configuration information of object generates, and includes and the one-to-one dimension of default dimension in the traffic source configuration information Description information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
The service request link is provided to second server, provides institute to fourth user terminal for the second server State service request link.
22nd aspect, the embodiment of the present application provide a kind of computer readable storage medium, described computer-readable to deposit Storage media stores one or more programs, and one or more of programs are executed when the electronic equipment for being included multiple application programs When, so that the electronic equipment executes following operation:
Traffic source mark is obtained from first server, the traffic source mark is based on business by the first server The traffic source configuration information of object generates, and includes and the one-to-one dimension of default dimension in the traffic source configuration information Description information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
The service request link is provided to second server, provides institute to fourth user terminal for the second server State service request link.
The embodiment of the present application use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
In traffic source analysis method provided by the embodiments of the present application, include in the traffic source configuration information of business object The default corresponding dimension description information of dimension matches confidence based on traffic source on the basis of determining traffic source configuration information Breath generates traffic source mark, also, includes and the one-to-one dimension identification information of default dimension in traffic source mark.By It is to be based on meeting preset data structure (can be understood as data structure corresponding with default dimension) in traffic source mark What traffic source configuration information generated, also, the dimension in the dimension identification information and flow configuration information in traffic source mark It spends description information to correspond, therefore, traffic source identifies the identification service object that can be uniquely determined, and reflection business object exists Relevant information in default dimension.Therefore, it can be based further on traffic source mark, the traffic source of business object is carried out Analysis monitors the implementation result of every migration efficiency so as to accurately position and analyze the traffic source of business platform.
Detailed description of the invention
The drawings described herein are used to provide a further understanding of the present application, constitutes part of this application, this Shen Illustrative embodiments and their description please are not constituted an undue limitation on the present application for explaining the application.In the accompanying drawings:
Fig. 1 is a kind of configuration diagram of application scenarios of the embodiment of the present application;
Fig. 2 is a kind of flow diagram of traffic source analysis method of the embodiment of the present application;
Fig. 3 is the interaction flow schematic diagram in the embodiment of the present application between each main body;
Fig. 4 is the flow diagram of the traffic source analysis method executed in the embodiment of the present application by first server;
Fig. 5 is the flow diagram of the traffic source analysis method executed in the embodiment of the present application by the first user terminal;
Fig. 6 is the flow diagram of the traffic source analysis method executed in the embodiment of the present application by second user terminal;
Fig. 7 is the flow diagram of the traffic source analysis method executed in the embodiment of the present application by third user terminal;
Fig. 8 is a kind of structural schematic diagram of traffic source analytical equipment in the embodiment of the present application;
Fig. 9 is the structural schematic diagram of second of traffic source analytical equipment in the embodiment of the present application;
Figure 10 is the structural schematic diagram of the third traffic source analytical equipment in the embodiment of the present application;
Figure 11 is the structural schematic diagram of the 4th kind of traffic source analytical equipment in the embodiment of the present application;
Figure 12 is the structural schematic diagram of the 5th kind of traffic source analytical equipment in the embodiment of the present application;
Figure 13 is the structural schematic diagram of a kind of electronic equipment in the embodiment of the present application.
Specific embodiment
To keep the purposes, technical schemes and advantages of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described in corresponding attached drawing.Obviously, described embodiment is only the application one Section Example, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
Below in conjunction with attached drawing, the technical scheme provided by various embodiments of the present application will be described in detail.
Fig. 1 gives a kind of schematic diagram of application scenarios of the embodiment of the present application.
In Fig. 1, first server can be used for the traffic source of management business object, and coordinate the throwing with business object Put the interaction between relevant each user terminal.First server is alternatively referred to as traffic source management server, can be also simply referred to as Origin server or traffic server.
In Fig. 1, the first user terminal may be used to provide the dispensing strategy to business object.In practical application scene In, the dispensing strategy of business object is usually determined by operation personnel, therefore, the first user terminal alternatively referred to as runs user client End, abbreviation operating side.
In Fig. 1, second user terminal can be used for identifying based on traffic source, carry out to the traffic source of business object Analysis.In practical application scene, usually analyzed by traffic source of the data analyst to business object, therefore, the Two user terminals alternatively referred to as analyze user client, referred to as analyze end.
In Fig. 1, third user terminal can be used for generating traffic source mark, and base based on traffic source configuration information The access to business object is provided in traffic source mark to link.In practical application scene, stream is usually determined by developer Source identification is measured, therefore, third user terminal is alternatively referred to as development of user client, referred to as develops end.
The above first server, the first user terminal, second user terminal and third user terminal constitute the application and implement Traffic source analysis system provided by example.The business datum returned based on operation system is removed due to the system and carries out traffic source Except analysis, it also can determine whether the dispensing strategy to business object and launch, therefore, traffic source analysis system is alternatively referred to as Traffic source management system.
In Fig. 1, operation system includes second server and fourth user terminal.Wherein, fourth user terminal can also claim For service-user client, for accessing business platform provided by second server, and business is initiated according to the needs of users Request.Second server is alternatively referred to as business system server, for providing business platform, for fourth user terminal access.
It should be noted that each executing subject described above, is execution made of being divided by function in logic Main body.In actual implementation, above each executing subject (including user terminal and server) physically can be identical set It is standby, it is also possible to different equipment, the embodiment of the present application does not limit this.
It is based primarily upon application scenarios schematic diagram shown in FIG. 1 below, illustrates traffic source provided by the embodiments of the present application point The specific implementation of analysis method.
Shown in Figure 2, the embodiment of the present application provides a kind of traffic source analysis method, may particularly include:
S101: the traffic source configuration information of business object is determined.
It is the dispensing strategy of business object it is understood that executing the traffic source configuration information that step S101 is determined A kind of concrete embodiment form.In the embodiment of the present application, comprising one-to-one with default dimension in traffic source configuration information Dimension description information, these dimension description informations launch the specific strategy of business object from corresponding default dimension description.
Optionally, default dimension may include the first dimension for describing the corresponding product information of business object.It can be with It is understood that dimension description information corresponding to the first dimension, can reflect product information corresponding to business object, that is, quasi- Launch the information of the product of business object.
It should be noted that the quasi- product for launching business object, can be a kind of third party application APP (full name Application), some functional module being also possible on certain APP.
For example, the dimension description information of the first dimension is " Alipay " (a kind of APP), then it will in traffic source configuration information Comprising " Alipay " this dimension description information, indicate that operation user wishes to launch business object in this APP of Alipay.
In another example the dimension description information of the first dimension is " Yuebao " (functional module in APP), then traffic source It will include " Yuebao " this dimension description information in configuration information, and indicate that operation user will wish in this functional module of Yuebao Middle dispensing business object.
Optionally, presetting in dimension can also include the second dimension for describing the corresponding page info of business object. It is understood that dimension description information corresponding to the second dimension, can reflect the page info of the carrying page of business object, The information of the namely quasi- page for launching business object.
It should be noted that the quasi- page for launching business object, is the product for belonging to business object and being launched;Also, These pages can be any of pages at different levels of the product, according to the requirement description of operation user.
Optionally, presetting in dimension can also include third dimension for describing the corresponding area information of business object. It is understood that dimension description information corresponding to third dimension, can reflect the area information of the display position of business object, The namely quasi- more specific location information for launching business object.
It should be noted that the quasi- position for launching business object, is to belong to the page (the i.e. business pair for carrying business object As the page launched), and then also belong to the product that business object is launched.The area information for launching business object, can be with Be business object the carrying page on arbitrarily allow use region, according to operation user requirement description.For example, third The dimension description information of dimension can describe launch business object using which " resource-niche " on the carrying page.
It should be noted that the quasi- region (can be embodied as resource-niche) for launching business object, is to belong to carry industry The page of business object, region herein can be some or multiple regions on the carrying page.In addition to this, the page Face is also to belong to the product launched and have business object, also, the page can be any of pages at different levels of the product.
Optionally, preset dimension in can also include for describe to service request link operation information fourth dimension Degree, wherein service request is linked for accessing business object.It is understood that dimension description information corresponding to fourth dimension degree, It can reflect the operation information that user's (specially fourth user terminal) links service request.For example, user is to service request Link carries out clicking operation, carries out duplication operation, carries out sharing operation, etc..
Optionally, presetting in dimension can also include tieing up for describing the 5th of business scenario information corresponding to business object the Degree.It is understood that dimension description information corresponding to the 5th dimension, can reflect the business scenario that business object is launched Information.It can also be with diversification to the understanding of business scenario.For example, dimension description information can be for " double 11 " indicate the business pair As that will be devoted to " in double 11 " promoting activities, at this point, business scenario can be understood as different advertising campaigns.
It can be understood that can also include the information that operation user thinks other dimensions needed to configure in default dimension, The embodiment of the present application does not limit this.
Optionally, in the traffic source configuration information for determining business object, the dispensing letter of business object can first be obtained Breath, wherein include the corresponding dimension description information of each default dimension in impression information.On this basis, it is based further on The corresponding dimension description information of each default dimension generates traffic source according to the preset data structure comprising presetting dimension Configuration information.
It is understood that above-mentioned impression information, reflection is operation user to the dispensing strategy of business object, is specifically included Wish to use what kind of mode, where launch business object etc., therefore, be retouched from different default dimensions to strategy is launched It states, it will be able to the dispensing demand of complete expression operation user.
It is also to be appreciated that when generating traffic source configuration information, according to the preset data structure comprising presetting dimension Carry out, so as to quickly determine traffic source configuration information in the one-to-one dimension description information of default dimension.
In the embodiment of the present application, it is assumed that default dimension includes above-mentioned first dimension, the second dimension and third dimension, then in advance If data structure can be expressed as: { product } { page } { region }.Assuming that default dimension includes above-mentioned first dimension, second Dimension, third dimension and fourth dimension degree, then preset data structure can be expressed as: { product } { page } { region } { behaviour Make information }.Assuming that default dimension includes above-mentioned first dimension, the second dimension, third dimension and the 5th dimension, then preset data knot Structure can be expressed as: { product } { page } { region } { business scenario }.
It should also be noted that, in implementation steps S101, it is different when determining the traffic source configuration information of business object Executing subject might have different specific implementation process.
For example, executing subject is the first user terminal, that is, shown in Figure 5 when runing user client, the first user is whole Executable step S301 is held, determines the traffic source configuration information of business object.Specifically, the throwing of business object can be obtained first Information is put, includes the corresponding dimension description information of each default dimension in impression information;It is then based on each default dimension difference Corresponding dimension description information generates traffic source configuration information according to the preset data structure comprising presetting dimension.
In another example executing subject is first server, i.e., traffic source management server when, shown in Figure 4, the first clothes Business device can execute step S201, receive from the first user terminal, business object traffic source configuration information, so as to Enough determine the traffic source configuration information of business object.
S103: being based on traffic source configuration information, generates traffic source mark.
It is understood that execute step S103, based on traffic source configuration information generate traffic source mark, be with it is right The dispensing strategy of business object is corresponding, can uniquely identify the dispensing strategy to business object.In the embodiment of the present application In, traffic source mark in comprising with the one-to-one dimension identification information of default dimension, meanwhile, traffic source mark with it is same Dimension description information in default dimension is also corresponding, these dimension identification informations can identify each default dimension correspondingly On dispensing business object specific strategy.
Optionally, step S103 is being executed, is being based on traffic source configuration information, when generating traffic source mark, Ke Yixian Based on preset data structure, the corresponding dimension description information of each default dimension in traffic source configuration information is determined.It can be with It is understood that traffic source configuration information is according to the corresponding dimension description information of each default dimension, according to preset data knot What structure generated.Therefore, it is based on preset data structure, also just can determine that each default dimension and its correspondence in traffic source configuration information Dimension description information.
It, can be further using any default dimension as current dimension, with the corresponding dimension of current dimension on the basis of above Description information is spent as current dimension description information, executes following steps, until traversing each default dimension:
Morphological analysis is carried out to current dimension description information, obtains current word corresponding with current dimension description information Sequence;
Syntactic analysis is carried out to current word sequence, determines current semantics character corresponding with current dimension description information String;
Based on current semantics character string, determine that leading dimension scale corresponding with current dimension knows letter in traffic source mark Breath.
It is understood that morphological analysis (lexical analysis) is that character string is converted to list in computer science The process of word (Token) sequence.The program or function for carrying out morphological analysis are properly termed as lexical analyzer (Lexical Analyzer, abbreviation Lexer), it is referred to as scanner (Scanner).A kind of implementation is that lexical analyzer is to current Dimension description information carries out scanning from left to right, identifies all kinds of words according to the morphological rule of language, and generate each word Attribute information.
Therefore, using lexical analyzer, morphological analysis is carried out to current dimension description information, will obtain retouching with current dimension State the corresponding current word sequence of information.It is understood that current dimension description information will be identified that at least one is current single Word sequence, also, all current word sequences are arranged in order, will form current dimension description information.
It is understood that after obtaining current word sequence corresponding with current dimension description information, it can be further right Current word sequence carries out syntactic analysis.The program for completing syntactic analysis task is properly termed as syntax analyzer or syntactic analysis Program.Syntax analyzer is identified according to the syntax rule of original language from the result (i.e. current word sequence) of morphological analysis Corresponding grammatical category out, while syntax check is carried out, provide current semantics character corresponding with current dimension description information String.And then it can be based on current semantics character string, determine that leading dimension scale corresponding with current dimension is known in traffic source mark Information.
It should be noted that the process of morphological analysis and syntactic analysis can combine, specifically, lexical analyzer can be with Exist in the form of function, is called for syntax analyzer.
It should also be noted that, being determined opposite with current dimension in traffic source mark being based on current semantics character string When the leading dimension degree identification information answered, the conversion of language can also be carried out.Using the linguistic form of dimension description information as source language Speech, using the linguistic form of dimension identification information as object language, determines leading dimension degree identification information.
A kind of scene is that (current) dimension description information is Chinese character form.In this case, current semantics character String will also be presented as Chinese character form.It therefore, can be with when determining leading dimension degree identification information based on current semantics character string The current semantics character string that the current semantics character string of Chinese character form is first converted to English character form, is then based on English The current semantics character string of Chinese character form determines that leading dimension scale corresponding with current dimension knows letter in traffic source mark Breath.
It is understood that preset dimension to each carries out above procedure respectively, it is right that each can be preset to dimension institute The dimension description information answered is converted into the dimension identification information of corresponding dimension.In this course, automatically dimension can be retouched It states information and carries out morphological analysis and syntactic analysis, obtain semantic character string, and then combination producing dimension identification information.Using this Mode runs user when providing the dimension description information of each default dimension, natural language description can be based on, without excessively examining Consider the accuracy and consistency of description;On this basis, by first server (or other executing subjects) to natural language body Dimension description information under system is automatically analyzed, and is generated in turn convenient for being transmitted (transparent transmission in other words) in systems and being held Wrong, to meet versatility requirement dimension identification information, so as to avoid the effect caused by artificial conversion is carried out by development of user Under rate and the problems such as consistency is bad.
It should be noted that above-mentioned steps S103, can be executed by first server, referring to fig. 4 shown in middle step S203. First server execute step S203 specific steps with it is described above identical, repeat no more.
S105: it is identified based on traffic source, the traffic source of business object is analyzed.
As previously described, because the traffic source for the identification service object that traffic source mark can uniquely determine, therefore, base In the traffic source of traffic source spectroscopic analysis business object, accurately analysis conclusion will be accessed, and then can benefit With the adjustment of analysis conclusion to the dispensing strategy of business object, to reach better operational effect.
Optionally, it in implementation steps S105, can first be identified based on traffic source, generation includes traffic source mark Service request link, service request link for accessing business object.It is understood that traffic source management system (can have Body is third user terminal, i.e. development of user client) generate service request link after, service request can be linked to launch and arrived Service server is provided from service server to service-user client.
Service-user may have access to corresponding to the link by operation service user client click-to-call service hyperlink request Business object.At the same time, service server, which also will acquire service-user client and access, accesses day caused by the link Will.
Optionally, it can recorde many-sided information related with access business object in access log, for example, service request The displaying time of link, the time of user's click-to-call service hyperlink request, the number of click rests on the next stage page after click Time, if be further formed sales order, etc..
On this basis, traffic source management system (can be specially at least one in first server and second user terminal It is a) can further obtain and link corresponding access log with service request, so as to based on access log to business object Traffic source is analyzed.Due to access log be the access request that service request links is generated based on service-user, and And in access log also include that traffic source identifies, therefore, based on also including corresponding with each default dimension in access log Dimension identification information.Therefore, analysis traffic source carried out based on access log, so that it may reflect that business object is being thrown to Actual access situation after service server, so as to reflect the dispensing effect of business object.
In addition to this, since service server can get access log in time, based on including traffic source The analysis that the access log of mark is carried out, timeliness is more preferable, to be conducive to analysis user much sooner to business object Access situation, so as to according to access situation adjust the dispensing strategy to business object in time, reach better operational effect.
Optionally, in implementation steps S105, traffic source management system (can be specially first server and second user At least one in terminal) it can also first obtain to bury and a little report log, and then log is a little reported based on burying, to the flow of business object It is analyzed in source.Log is a little reported to pass through receipts by fourth user terminal (i.e. service-user client) it should be noted that burying Collect the operation of user and generated using the case where corresponding A PP, and is reported to second server (i.e. business system server).
Optionally, bury and a little report in log, may include the operation behavior being able to reflect user in fourth user terminal, The access situation and customized event for each page that user provides second server are (for example, open commodity details page, choosing Select marque, shopping cart be added, places an order, buy the independent events such as completion) triggering situation etc..
In addition to this, it buries and a little reports in log, can also include the personal information of user (for example, User ID, Yong Huxing Not, age, location etc.), the environmental information of equipment is (for example, the Internet protocol IP of device id, equipment connected network Location is wirelessly connected WIFI, based on location-based service LBS etc.), the performance information (for example, power consumption of equipment etc.) of equipment and right Answer the time parameter etc. of information.
In the embodiment of the present application, it buries and a little reports in log especially including the mark of traffic source corresponding to business object. A little to report in log include the related many-sided information of fourth user terminal due to burying, log convection current is a little reported based on burying The analysis for measuring source can more comprehensively reflect the case where user accesses second server, to launch plan for business object Adjustment slightly provides reference.
It is understood that a little reporting the information for including in log more comprehensive, abundant due to burying, can reflect from many aspects User accesses the case where business object and user and is therefore buried using the overall condition of fourth user terminal and a little report log Data volume is also larger.To save Internet resources, fourth user terminal, which would generally periodically upload to bury, a little reports log, or full It just can upload to bury when a certain trigger condition of foot and a little report log.
And corresponding access log is linked with service request, due to being asked only for fourth user terminal request access business The behavior of link is asked, therefore, data volume is smaller, and fourth user terminal can be real after the request for issuing access service request link When report access log.
It can be seen that based on access log carry out traffic source analysis, with based on bury a little report log progress flow Source analysis emphasizes particularly on different fields a little: the former can collection information much sooner carry out traffic source analysis, so as to more and When the adjustment for launch strategy, timeliness is more preferable;And the latter can carry out traffic source analysis in conjunction with more fully information, The result of analysis is more accurate, reliable, comprehensive.
Therefore, when implementing the embodiment of the present application, preferably two ways is combined.Specifically, fourth user terminal Issue access service request link request after (to second server) real-time report access log, also, periodically or It uploads to bury (to second server) when meeting preset trigger condition and a little reports log, carry out flow for traffic source management system Source analysis.
It is corresponding, traffic source management system (can be specially at least one in first server and second user terminal) It obtains above-mentioned access log from second server and buries and a little report log, to carry out traffic source analysis.It is understood that stream Amount come management system obtain log concrete mode, can there are many.For example, can directly pull day from second server Will can send to second server and obtain the request of log, respond request transmission log by second server, can also connect Receive the log that second server directly pushes.
It should be noted that traffic source management system obtains the concrete mode of log from second server, one can be Kind, it is also possible to a variety of;For different Log Types, the mode for obtaining log be may be the same or different, and the application is real Example is applied not limit this.
It should be noted above-mentioned steps S105, can be executed by second user terminal (i.e. analysis user client), Referring in Fig. 6 shown in step S403.And the step of log is obtained before carrying out traffic source analysis based on log, it can be by the Two user terminals execute, referring in Fig. 6 shown in step S401.In addition to this, before carrying out traffic source analysis based on log The step of obtaining log, can also be executed by first server, and then provide log from first server to second user terminal, Traffic source analysis is carried out for second user terminal.
In traffic source analysis method provided by the embodiments of the present application, wrapped in the traffic source configuration information of business object Containing the corresponding dimension description information of default dimension, on the basis of determining traffic source configuration information, configured based on traffic source Information generates traffic source mark, also, includes and the one-to-one dimension identification information of default dimension in traffic source mark. Since traffic source mark is to be based on meeting preset data structure (can be understood as data structure corresponding with default dimension) Traffic source configuration information generate, also, traffic source mark in dimension identification information and flow configuration information in Dimension description information corresponds, and therefore, traffic source identifies the identification service object that can be uniquely determined, and reflects business object Relevant information in default dimension.Therefore, traffic source mark can be based further on, to the traffic source of business object into Row analysis monitors the implementation result of every migration efficiency so as to accurately position and analyze the traffic source of business platform.
Fig. 3 gives the interactive process in Fig. 1 in traffic source management system and operation system between each module.Below with For Fig. 3, it is described in detail and implements the detailed process that the embodiment of the present application carries out traffic source analysis.
The first step is runed user's operation operating side (i.e. the first user terminal), according to the present count for corresponding to default dimension According to structure, the corresponding dimension description information of each default dimension of typing provides industry to origin server (i.e. first server) The traffic source configuration information of business object.
Second step, origin server are based on traffic source configuration information, generate traffic source identification information.This process In, origin server can carry out morphological analysis and syntactic analysis to the corresponding dimension description information of each default dimension, also The conversion of language form can be carried out, the corresponding dimension identification information of each default dimension is generated, so that traffic source identifies Information can carry out accessible transmitting between computer systems.
Third step, development of user operation exploitation end (i.e. third user terminal) obtain traffic source mark from origin server Know information, and traffic source identification information is added into the link (i.e. uniform resource position mark URL) for being used to access business object In, generate service request link.
4th step, exploitation end provides service request link to service server (i.e. second server), for service server Service request link is provided to client (i.e. fourth user terminal).
5th step, user's operation client request accesses service request link, and accesses to service server real-time report Log, can also report to bury to service server and a little report log.
6th step, after service server receives the access log that client reports and/or buries and a little report log, Xiang Laiyuan Server and/or analysis end (i.e. second user terminal) provide.
7th step, analysis end gets access log and/or bury from service server and/or origin server a little reports day After will, based on access log and/or the analysis for a little reporting log to carry out traffic source is buried.
It is understood that the above is only the examples that the embodiment of the present application is implemented in concrete scene, not to the application reality It applies example and constitutes restriction.
Shown in Figure 4, the embodiment of the present application provides a kind of traffic source analysis method, is applied to first server, can It specifically includes:
S201: it receives from the first user terminal, business object traffic source configuration information, traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
S203: being based on traffic source configuration information, generates traffic source mark, includes and default dimension in traffic source mark Spend one-to-one dimension identification information;
S205: providing traffic source mark, is identified for second user terminal based on traffic source, to the flow of business object It is analyzed in source.
Optionally, above-mentioned default dimension may particularly include at least one of following:
For describing the first dimension of the corresponding product information of business object;
For describing the second dimension of the corresponding page info of business object;
For describing the third dimension of the corresponding area information of business object.
Optionally, above-mentioned default dimension may also include at least one of following:
Fourth dimension degree for the operation information for describing to link service request, service request are linked for accessing business pair As;
For describing the 5th dimension of business scenario information corresponding to the business object.
Optionally, first server is based on traffic source configuration information, when generating traffic source mark, may particularly include:
Preset data structure based on default dimension determines that each default dimension is corresponding in traffic source configuration information Dimension description information;
Using any default dimension as current dimension, retouched using the corresponding dimension description information of current dimension as current dimension Information is stated, following steps are executed, until traversing each default dimension:
Morphological analysis is carried out to current dimension description information, obtains current word corresponding with current dimension description information Sequence;
Syntactic analysis is carried out to current word sequence, determines current semantics character corresponding with current dimension description information String;
Based on current semantics character string, determine that leading dimension scale corresponding with current dimension knows letter in traffic source mark Breath.
Optionally, when above-mentioned dimension description information is Chinese character form, first server is based on current semantics character string, When determining leading dimension degree identification information corresponding with current dimension in traffic source mark, it may particularly include:
The current semantics character string of Chinese character form is converted to the current semantics character string of English character form;
Current semantics character string based on English character form determines corresponding with current dimension in traffic source mark Leading dimension degree identification information.
Optionally, first server provides traffic source mark, can specifically:
Traffic source mark is provided to third user terminal, is identified for third user terminal based on traffic source, generates packet Service request link containing traffic source mark, service request are linked for accessing business object.
Optionally, first server can further include after providing traffic source mark:
It is obtained from second server and links corresponding access log with service request, include traffic source in access log Mark, second server are used to provide service request link to fourth user terminal;
Access log is sent to second user terminal, access log is based on for second user terminal, to business object Traffic source is analyzed.
Optionally, first server can further include after providing traffic source mark:
It is buried from the acquisition of fourth user terminal and a little reports log, buried and a little report in log including traffic source mark;
It will bury and log is a little reported to be sent to second user terminal, and be based on burying for second user terminal a little reporting log, to industry The traffic source of business object is analyzed.
It is understood that first server as a part in traffic source management system, can execute by flow Lai It is some or all of in traffic source analysis method performed by management system, it is aforementioned to be held by traffic source management system Related content in capable traffic source analysis method is suitable for the traffic source analysis method executed by first server, this Place repeats no more.
Shown in Figure 5, the embodiment of the present application provides a kind of traffic source analysis method, is applied to the first user terminal, It may particularly include:
S301: it determines the traffic source configuration information of business object, includes and default dimension in traffic source configuration information One-to-one dimension description information;
S303: being sent to first server for traffic source configuration information, is configured for first server based on traffic source Information generates traffic source mark;
Wherein, include in traffic source mark and the one-to-one dimension identification information of default dimension, traffic source mark It is analyzed for the traffic source to business object.
Optionally, above-mentioned default dimension may particularly include at least one of following:
For describing the first dimension of the corresponding product information of business object;
For describing the second dimension of the corresponding page info of business object;
For describing the third dimension of the corresponding area information of business object.
Optionally, above-mentioned default dimension may also include at least one of following:
Fourth dimension degree for the operation information for describing to link service request, service request are linked for accessing business pair As;
For describing the 5th dimension of business scenario information corresponding to the business object.
Optionally, it when the first user terminal determines the traffic source configuration information of business object, may particularly include:
The impression information of business object is obtained, includes the corresponding dimension description letter of each default dimension in impression information Breath;
Based on the corresponding dimension description information of each default dimension, according to the preset data structure comprising presetting dimension, Generate traffic source configuration information.
It is understood that the first user terminal can be executed as a part in traffic source management system by flow Come it is some or all of in traffic source analysis method performed by management system, it is aforementioned by traffic source management system institute Related content in the traffic source analysis method of execution is suitable for the traffic source analysis side executed by the first user terminal Method, details are not described herein again.
Shown in Figure 6, the embodiment of the present application provides a kind of traffic source analysis method, is applied to second user terminal, It may particularly include:
S401: obtaining and link corresponding access log with service request, includes that traffic source identifies in access log, stream It measures in source identification and includes and the one-to-one dimension identification information of default dimension;
S403: it is based on access log, the traffic source of business object is analyzed.
Optionally, it when the acquisition of second user terminal links corresponding access log with service request, can specifically include At least one of below:
It is obtained from second server and links corresponding access log with service request, second server is used to use to the 4th Family terminal provides service request link;
Obtained from first server and link corresponding access log with service request, access log by first server from Second server obtains.
Optionally, the above method can also further comprise:
Acquisition, which is buried, a little reports log, buries and a little reports in log including traffic source mark;
Log is a little reported based on burying, the traffic source of business object is analyzed.
Optionally, second user terminal acquisition is buried when a little reporting log, can specifically:
It is buried from first server acquisition and a little reports log, buried and log is a little reported to be obtained by first server from fourth user terminal It takes.
It is understood that second user terminal can be executed as a part in traffic source management system by flow Come it is some or all of in traffic source analysis method performed by management system, it is aforementioned by traffic source management system institute Related content in the traffic source analysis method of execution is suitable for the traffic source analysis side executed by second user terminal Method, details are not described herein again.
Shown in Figure 7, the embodiment of the present application provides a kind of traffic source analysis method, is applied to third user terminal, It may particularly include:
S501: traffic source mark is obtained from first server, traffic source mark is based on business pair by first server The traffic source configuration information of elephant generates, comprising believing with the one-to-one dimension description of default dimension in traffic source configuration information Breath, traffic source mark in include and the one-to-one dimension identification information of default dimension;
S503: being identified based on traffic source, and generation includes the service request link of traffic source mark, service request chain It connects for accessing business object;
S505: providing service request link to second server, provides business to fourth user terminal for second server Hyperlink request.
It is understood that third user terminal can be executed as a part in traffic source management system by flow Come it is some or all of in traffic source analysis method performed by management system, it is aforementioned by traffic source management system institute Related content in the traffic source analysis method of execution is suitable for the traffic source analysis side executed by third user terminal Method, details are not described herein again.
The embodiment of the present application also provides a kind of traffic source analysis system, comprising:
First user terminal wraps in traffic source configuration information for determining the traffic source configuration information of business object Containing with the one-to-one dimension description information of default dimension;
First server generates traffic source mark, wraps in traffic source mark for being based on traffic source configuration information Containing with the one-to-one dimension identification information of default dimension;
Second user terminal analyzes the traffic source of business object for being identified based on traffic source.
It is understood that above-mentioned traffic source analysis system, is by traffic source management for realizing in previous embodiment The performed traffic source analysis method of system is suitable for traffic source previously with regard to related illustrate of traffic source analysis method Analysis system, details are not described herein again.
The embodiment of the present application also provides a kind of traffic source analysis system, comprising:
First server, for receiving from the first user terminal, business object traffic source configuration information, flow Include and the one-to-one dimension description information of default dimension in the configuration information of source;It is also used to based on traffic source with confidence Breath generates traffic source mark, includes and the one-to-one dimension identification information of default dimension in traffic source mark;It is also used to Traffic source mark is provided, is identified for second user terminal based on traffic source, the traffic source of business object is analyzed;
First user terminal wraps in traffic source configuration information for determining the traffic source configuration information of business object Containing with the one-to-one dimension description information of default dimension;It is also used to traffic source configuration information being sent to first server, It is based on traffic source configuration information for first server, generates traffic source mark;Wherein, traffic source mark in comprising with it is pre- If the one-to-one dimension identification information of dimension, traffic source mark is analyzed for the traffic source to business object;
Second user terminal links corresponding access log with service request for obtaining, includes stream in access log Source identification is measured, includes and the one-to-one dimension identification information of default dimension in traffic source mark;It is also used to based on access The traffic source of business object is analyzed in log;
Third user terminal, for obtaining traffic source mark from first server, traffic source is identified by first service Device is generated based on the traffic source configuration information of business object, comprising corresponding with default dimension in traffic source configuration information Dimension description information, traffic source mark in include and the one-to-one dimension identification information of default dimension;It is also used to be based on Traffic source mark, generation include the service request link of traffic source mark, and service request is linked for accessing business pair As;It is also used to provide service request link to second server, provides service request to fourth user terminal for second server Link.
It is understood that above-mentioned traffic source analysis system, for realizing in previous embodiment by first server, first The traffic source analysis method that user terminal, second user terminal, the cooperation of third user terminal execute, previously with regard to traffic source Related illustrate of analysis method is suitable for traffic source analysis system, and details are not described herein again.
Shown in Figure 8, the embodiment of the present application also provides a kind of traffic source analytical equipment, comprising:
Configuration information determining module 101, determines the traffic source configuration information of business object, in traffic source configuration information Comprising with the one-to-one dimension description information of default dimension;
Source identification generation module 103 is based on traffic source configuration information, generates traffic source mark, traffic source mark Include and the one-to-one dimension identification information of default dimension in knowledge;
Traffic source analysis module 105 is identified based on traffic source, is analyzed the traffic source of business object.
It is understood that traffic source analytical equipment herein, for realizing in previous embodiment by traffic source management Traffic source analysis method performed by system is applicable in previously with regard to related illustrate of traffic source analysis method shown in Fig. 2 In this traffic source analytical equipment, details are not described herein again.
Shown in Figure 9, the embodiment of the present application also provides a kind of traffic source analytical equipment, is applied to first server, Include:
Configuration information receiving module 201 receives and matches confidence from the first user terminal, business object traffic source Breath includes and the one-to-one dimension description information of default dimension in traffic source configuration information;
Source identification generation module 203 is based on traffic source configuration information, generates traffic source mark, traffic source mark Include and the one-to-one dimension identification information of default dimension in knowledge;
Source identification provides module 205, provides traffic source mark, is identified for second user terminal based on traffic source, The traffic source of business object is analyzed.
It is understood that traffic source analytical equipment herein, for realizing in previous embodiment by first server institute The traffic source analysis method of execution is suitable for this stream previously with regard to related illustrate of traffic source analysis method shown in Fig. 4 Source analysis device is measured, details are not described herein again.
Shown in Figure 10, the embodiment of the present application also provides a kind of traffic source analytical equipment, and it is whole to be applied to the first user End, comprising:
Configuration information determining module 301, determines the traffic source configuration information of business object, in traffic source configuration information Comprising with the one-to-one dimension description information of default dimension;
Traffic source configuration information is sent to first server, for first server base by configuration information sending module 303 In traffic source configuration information, traffic source mark is generated;
Wherein, include in traffic source mark and the one-to-one dimension identification information of default dimension, traffic source mark It is analyzed for the traffic source to business object.
It is understood that traffic source analytical equipment herein, for realizing in previous embodiment by the first user terminal The traffic source analysis method of execution is suitable for this stream previously with regard to related illustrate of traffic source analysis method shown in Fig. 5 Source analysis device is measured, details are not described herein again.
Shown in Figure 11, the embodiment of the present application provides a kind of traffic source analytical equipment, is applied to second user terminal, It may particularly include:
Access log obtains module 401, obtains and links corresponding access log with service request, includes in access log Traffic source mark, traffic source mark in include and the one-to-one dimension identification information of default dimension;
Traffic source analysis module 403 is based on access log, analyzes the traffic source of business object.
It is understood that traffic source analytical equipment herein, for realizing in previous embodiment by second user terminal The traffic source analysis method of execution is suitable for this stream previously with regard to related illustrate of traffic source analysis method shown in Fig. 6 Source analysis device is measured, details are not described herein again.
Shown in Figure 12, the embodiment of the present application also provides a kind of traffic source analytical equipment, and it is whole to be applied to third user End, may particularly include:
Source identification obtains module 501, obtains traffic source mark from first server, traffic source mark is by the first clothes Business device is generated based on the traffic source configuration information of business object, includes in traffic source configuration information and default dimension one is a pair of The dimension description information answered, traffic source mark in include and the one-to-one dimension identification information of default dimension;
Generation module 503 is linked, is identified based on traffic source, generation includes the service request chain of traffic source mark It connects, service request is linked for accessing business object;
Link provides module 505, provides service request link to second server, whole to fourth user for second server End provides service request link.
It is understood that traffic source analytical equipment herein, for realizing in previous embodiment by third user terminal The traffic source analysis method of execution is suitable for this stream previously with regard to related illustrate of traffic source analysis method shown in Fig. 7 Source analysis device is measured, details are not described herein again.
Figure 13 is the structural schematic diagram of one embodiment electronic equipment of the application.Figure 13 is please referred to, it, should in hardware view Electronic equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may be comprising interior It deposits, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile memories Device (non-volatile memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other Hardware required for business.
Processor, network interface and memory can be connected with each other by internal bus, which can be ISA (Industry Standard Architecture, industry standard architecture) bus, PCI (Peripheral Component Interconnect, Peripheral Component Interconnect standard) bus or EISA (Extended Industry Standard Architecture, expanding the industrial standard structure) bus etc..The bus can be divided into address bus, data/address bus, control always Line etc..Only to be indicated with a four-headed arrow in Figure 13, it is not intended that an only bus or a type of convenient for indicating Bus.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer Traffic source analytical equipment is formed on face.
When above-mentioned traffic source analytical equipment is applied to traffic source management system, processor executes memory and is deposited The program put, and be specifically used for executing following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
When above-mentioned traffic source analytical equipment is applied to first server, processor executes the journey that memory is stored Sequence, and be specifically used for executing following operation:
It receives from the first user terminal, business object traffic source configuration information, the traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business pair The traffic source of elephant is analyzed.
When above-mentioned traffic source analytical equipment is applied to the first user terminal, processor executes what memory was stored Program, and be specifically used for executing following operation:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
The traffic source configuration information is sent to first server, for the first server based on the flow come Source configuration information generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
When above-mentioned traffic source analytical equipment is applied to second user terminal, processor executes what memory was stored Program, and be specifically used for executing following operation:
It obtains and links corresponding access log with service request, include the traffic source mark in the access log Know, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Based on the access log, the traffic source of the business object is analyzed.
When above-mentioned traffic source analytical equipment is applied to third user terminal, processor executes what memory was stored Program, and be specifically used for executing following operation:
Traffic source mark is obtained from first server, the traffic source mark is based on business by the first server The traffic source configuration information of object generates, and includes and the one-to-one dimension of default dimension in the traffic source configuration information Description information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
The service request link is provided to second server, provides institute to fourth user terminal for the second server State service request link.
The method that the above-mentioned traffic source analytical equipment as disclosed in the embodiment of the present application executes can be applied in processor, Or it is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.In the process of realization In, each step of the above method can be complete by the integrated logic circuit of the hardware in processor or the instruction of software form At.Above-mentioned processor can be general processor, including central processing unit (Central Processing Unit, CPU), Network processing unit (Network Processor, NP) etc.;It can also be digital signal processor (Digital Signal Processor, DSP), it is specific integrated circuit (Application Specific Integrated Circuit, ASIC), existing Field programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device are divided Vertical door or transistor logic, discrete hardware components.It may be implemented or execute and is in the embodiment of the present application disclosed each Method, step and logic diagram.General processor can be microprocessor or the processor is also possible to any conventional place Manage device etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processor and execute At, or in decoding processor hardware and software module combination execute completion.Software module can be located at random access memory, This fields such as flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register maturation In storage medium.The storage medium is located at memory, and processor reads the information in memory, completes above-mentioned side in conjunction with its hardware The step of method.
The method that the electronic equipment can also carry out the execution of aforementioned flow source analysis device, and realize traffic source analysis dress The function in embodiment is set, details are not described herein for the embodiment of the present application.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which holds when by the electronic equipment including multiple application programs When row, the electronic equipment can be made to execute the method that traffic source analytical equipment executes in embodiment illustrated in fig. 2, and be specifically used for It executes:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which holds when by the electronic equipment including multiple application programs When row, the electronic equipment can be made to execute the method that traffic source analytical equipment executes in embodiment illustrated in fig. 4, and be specifically used for It executes:
It receives from the first user terminal, business object traffic source configuration information, the traffic source matches confidence Include and the one-to-one dimension description information of default dimension in breath;
Based on the traffic source configuration information, traffic source mark is generated, includes and institute in the traffic source mark State the one-to-one dimension identification information of default dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business pair The traffic source of elephant is analyzed.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which holds when by the electronic equipment including multiple application programs When row, the electronic equipment can be made to execute the method that traffic source analytical equipment executes in embodiment illustrated in fig. 5, and be specifically used for It executes:
It determines the traffic source configuration information of business object, includes and default dimension one in the traffic source configuration information One corresponding dimension description information;
The traffic source configuration information is sent to first server, for the first server based on the flow come Source configuration information generates traffic source mark;
Wherein, in traffic source mark comprising with the default one-to-one dimension identification information of dimension, it is described Traffic source mark is analyzed for the traffic source to the business object.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which holds when by the electronic equipment including multiple application programs When row, the electronic equipment can be made to execute the method that traffic source analytical equipment executes in embodiment illustrated in fig. 6, and be specifically used for It executes:
It obtains and links corresponding access log with service request, include the traffic source mark in the access log Know, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Based on the access log, the traffic source of the business object is analyzed.
The embodiment of the present application also proposed a kind of computer readable storage medium, the computer-readable recording medium storage one A or multiple programs, the one or more program include instruction, which holds when by the electronic equipment including multiple application programs When row, the electronic equipment can be made to execute the method that traffic source analytical equipment executes in embodiment illustrated in fig. 7, and be specifically used for It executes:
Traffic source mark is obtained from first server, the traffic source mark is based on business by the first server The traffic source configuration information of object generates, and includes and the one-to-one dimension of default dimension in the traffic source configuration information Description information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, the industry Business hyperlink request is for accessing the business object;
The service request link is provided to second server, provides institute to fourth user terminal for the second server State service request link.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (42)

1. a kind of traffic source analysis method, comprising:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
2. method according to claim 1, the default dimension includes at least one of the following:
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
3. method according to claim 2, the default dimension further includes at least one of following:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing the industry Business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
4. method according to claim 1, determining the traffic source configuration information of business object, comprising:
The impression information of the business object is obtained, includes the corresponding dimension description of each default dimension in the impression information Information;
Based on the corresponding dimension description information of each default dimension, according to the preset data structure comprising the default dimension, Generate the traffic source configuration information.
5. method according to claim 4 is based on the traffic source configuration information, traffic source mark is generated, comprising:
Based on the preset data structure, determine that the corresponding dimension of each default dimension is retouched in the traffic source configuration information State information;
Using any default dimension as current dimension, retouched using the corresponding dimension description information of the current dimension as current dimension Information is stated, following steps are executed, until traversing each default dimension:
Morphological analysis is carried out to the current dimension description information, is obtained corresponding with the current dimension description information current Word sequence;
Syntactic analysis carried out to the current word sequence, determining current semantics corresponding with the current dimension description information Character string;
Based on the current semantics character string, leading dimension corresponding with the current dimension in the traffic source mark is determined Spend identification information.
6. method according to claim 5, the dimension description information is Chinese character form;
It is then based on the current semantics character string, is determined corresponding with the current dimension current in the traffic source mark Dimension identification information, comprising:
The current semantics character string of Chinese character form is converted to the current semantics character string of English character form;
Current semantics character string based on English character form determines opposite with the current dimension in the traffic source mark The leading dimension degree identification information answered.
7. method according to claim 1, being identified based on the traffic source, the traffic source of the business object is carried out Analysis, comprising:
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, and the business is asked Ask link for accessing the business object;
It obtains and links corresponding access log with the service request, include the traffic source mark in the access log Know;
Based on the access log, the traffic source of the business object is analyzed.
8. method according to claim 7 is identified based on the traffic source, the traffic source of the business object is carried out Analysis, further includes:
Acquisition buries and a little reports log, and described bury a little reports in log including traffic source mark;
Log is a little reported based on described bury, the traffic source of the business object is analyzed.
9. a kind of traffic source analysis method is applied to first server, comprising:
It receives in the first user terminal, business object traffic source configuration information, the traffic source configuration information Comprising with the one-to-one dimension description information of default dimension;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business object Traffic source is analyzed.
10. method according to claim 9, the default dimension is included at least one of the following:
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
11. method according to claim 10, the default dimension further includes at least one of following:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing the industry Business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
12. method according to claim 9 is based on the traffic source configuration information, traffic source mark is generated, comprising:
Based on the preset data structure of the default dimension, determine that each default dimension is right respectively in the traffic source configuration information The dimension description information answered;
Using any default dimension as current dimension, retouched using the corresponding dimension description information of the current dimension as current dimension Information is stated, following steps are executed, until traversing each default dimension:
Morphological analysis is carried out to the current dimension description information, is obtained corresponding with the current dimension description information current Word sequence;
Syntactic analysis carried out to the current word sequence, determining current semantics corresponding with the current dimension description information Character string;
Based on the current semantics character string, leading dimension corresponding with the current dimension in the traffic source mark is determined Spend identification information.
13. method according to claim 12, the dimension description information is Chinese character form;
It is then based on the current semantics character string, is determined corresponding with the current dimension current in the traffic source mark Dimension identification information, comprising:
The current semantics character string of Chinese character form is converted to the current semantics character string of English character form;
Current semantics character string based on English character form determines opposite with the current dimension in the traffic source mark The leading dimension degree identification information answered.
14. method according to claim 9 provides the traffic source mark, specifically:
The traffic source mark is provided to third user terminal, is based on the traffic source mark for the third user terminal Know, generation includes the service request link of the traffic source mark, and the service request link is for accessing the business Object.
15. 4 the method according to claim 1, after the traffic source mark is provided, the method also includes:
It is obtained from second server and links corresponding access log with the service request, include described in the access log Traffic source mark, the second server are used to provide the service request link to fourth user terminal;
The access log is sent to the second user terminal, is based on the access log for the second user terminal, The traffic source of the business object is analyzed.
16. method according to claim 15, after the traffic source mark is provided, the method also includes:
It is buried from fourth user terminal acquisition and a little reports log, described bury a little reports in log including the traffic source mark Know;
It a little reports log to be sent to the second user terminal described bury, is based on described bury on a little for the second user terminal Log is reported, the traffic source of the business object is analyzed.
17. a kind of traffic source analysis method is applied to the first user terminal, comprising:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
The traffic source configuration information is sent to first server, the traffic source is based on for the first server and matches Confidence breath generates traffic source mark;
Wherein, include and the default one-to-one dimension identification information of dimension, the flow in the traffic source mark Source identification is for analyzing the traffic source of the business object.
18. 7 the method according to claim 1, the default dimension is included at least one of the following:
For describing the first dimension of the corresponding product information of the business object;
For describing the second dimension of the corresponding page info of the business object;
For describing the third dimension of the corresponding area information of the business object.
19. 8 the method according to claim 1, the default dimension further includes at least one of following:
Fourth dimension degree for the operation information for describing to link service request, the service request link is for accessing the industry Business object;
For describing the 5th dimension of business scenario information corresponding to the business object.
20. 7 the method according to claim 1 determines the traffic source configuration information of business object, comprising:
The impression information of the business object is obtained, includes the corresponding dimension description of each default dimension in the impression information Information;
Based on the corresponding dimension description information of each default dimension, according to the preset data structure comprising the default dimension, Generate the traffic source configuration information.
21. a kind of traffic source analysis method is applied to second user terminal, comprising:
It obtains and links corresponding access log with service request, include that the traffic source identifies in the access log, institute It states in traffic source mark and includes and the one-to-one dimension identification information of default dimension;
Based on the access log, the traffic source of the business object is analyzed.
22. according to claim 21 the method, obtain and link corresponding access log with service request, including it is following at least One:
It is obtained from second server and links corresponding access log with service request, the second server is used to use to the 4th Family terminal provides the service request link;
It is obtained from first server and links corresponding access log with service request, the access log is by the first service Device is obtained from the second server.
23. according to claim 21 the method, the method also includes:
Acquisition buries and a little reports log, and described bury a little reports in log including traffic source mark;
Log is a little reported based on described bury, the traffic source of the business object is analyzed.
24. according to claim 23 the method, acquisition, which is buried, a little reports log, specifically:
It is buried from first server acquisition and a little reports log, described bury a little reports log whole from fourth user by the first server End obtains.
25. a kind of traffic source analysis method is applied to third user terminal, comprising:
Traffic source mark is obtained from first server, the traffic source mark is based on business object by the first server Traffic source configuration information generate, include in the traffic source configuration information and the one-to-one dimension of default dimension describe Information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, and the business is asked Ask link for accessing the business object;
The service request link is provided to second server, provides the industry to fourth user terminal for the second server Business hyperlink request.
26. a kind of traffic source analysis system, comprising:
First user terminal wraps in the traffic source configuration information for determining the traffic source configuration information of business object Containing with the one-to-one dimension description information of default dimension;
First server generates traffic source mark, the traffic source mark for being based on the traffic source configuration information In include and the default one-to-one dimension identification information of dimension;
Second user terminal analyzes the traffic source of the business object for being identified based on the traffic source.
27. a kind of traffic source analysis system, comprising:
First server, for receiving from the first user terminal, business object traffic source configuration information, the flow Include and the one-to-one dimension description information of default dimension in the configuration information of source;It is also used to configure based on the traffic source Information, generates traffic source mark, includes to identify in the traffic source mark with the default one-to-one dimension of dimension Information;The traffic source mark is also provided for, is identified for second user terminal based on the traffic source, to the business The traffic source of object is analyzed;
First user terminal wraps in the traffic source configuration information for determining the traffic source configuration information of business object Containing with the one-to-one dimension description information of default dimension;It is also used to the traffic source configuration information being sent to first service Device is based on the traffic source configuration information for the first server, generates traffic source mark;Wherein, the flow comes It include to identify with the default one-to-one dimension identification information of dimension, the traffic source for the industry in the mark of source The traffic source of business object is analyzed;
Second user terminal links corresponding access log with service request for obtaining, includes institute in the access log Traffic source mark is stated, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;It is also used to Based on the access log, the traffic source of the business object is analyzed;
Third user terminal, for obtaining traffic source mark from first server, the traffic source mark is by described first Server is generated based on the traffic source configuration information of business object, includes and default dimension in the traffic source configuration information One-to-one dimension description information includes and the one-to-one dimension of default dimension identifies in the traffic source mark Information;It is also used to identify based on the traffic source, generation includes the service request link of the traffic source mark, described Service request is linked for accessing the business object;It is also used to provide the service request link to second server, for institute It states second server and provides the service request link to fourth user terminal.
28. a kind of traffic source analytical equipment, comprising:
Configuration information determining module determines the traffic source configuration information of business object, wraps in the traffic source configuration information Containing with the one-to-one dimension description information of default dimension;
Source identification generation module is based on the traffic source configuration information, generates traffic source mark, the traffic source mark Include and the default one-to-one dimension identification information of dimension in knowledge;
Traffic source analysis module is identified based on the traffic source, is analyzed the traffic source of the business object.
29. a kind of traffic source analytical equipment is applied to first server, comprising:
Configuration information receiving module is received from the first user terminal, business object traffic source configuration information, the stream It measures in the configuration information of source and includes and the one-to-one dimension description information of default dimension;
Source identification generation module is based on the traffic source configuration information, generates traffic source mark, the traffic source mark Include and the default one-to-one dimension identification information of dimension in knowledge;
Source identification provides module, provides the traffic source mark, is identified for second user terminal based on the traffic source, The traffic source of the business object is analyzed.
30. a kind of traffic source analytical equipment is applied to the first user terminal, comprising:
Configuration information determining module determines the traffic source configuration information of business object, wraps in the traffic source configuration information Containing with the one-to-one dimension description information of default dimension;
The traffic source configuration information is sent to first server, for the first server by configuration information sending module Based on the traffic source configuration information, traffic source mark is generated;
Wherein, include and the default one-to-one dimension identification information of dimension, the flow in the traffic source mark Source identification is for analyzing the traffic source of the business object.
31. a kind of traffic source analytical equipment is applied to second user terminal, comprising:
Access log obtains module, obtains and links corresponding access log with service request, includes institute in the access log Traffic source mark is stated, includes and the one-to-one dimension identification information of default dimension in the traffic source mark;
Traffic source analysis module is based on the access log, analyzes the traffic source of the business object.
32. a kind of traffic source analytical equipment is applied to third user terminal, comprising:
Source identification obtains module, obtains traffic source mark from first server, the traffic source mark is by described first Server is generated based on the traffic source configuration information of business object, includes and default dimension in the traffic source configuration information One-to-one dimension description information includes and the one-to-one dimension of default dimension identifies in the traffic source mark Information;
Generation module is linked, is identified based on the traffic source, generation includes the service request chain of the traffic source mark It connects, the service request link is for accessing the business object;
Link provides module, provides service request link to second server, for the second server to fourth user Terminal provides the service request link.
33. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
34. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
It is identified based on the traffic source, the traffic source of the business object is analyzed.
35. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
It receives in the first user terminal, business object traffic source configuration information, the traffic source configuration information Comprising with the one-to-one dimension description information of default dimension;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business object Traffic source is analyzed.
36. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
It receives in the first user terminal, business object traffic source configuration information, the traffic source configuration information Comprising with the one-to-one dimension description information of default dimension;
Based on the traffic source configuration information, generate traffic source mark, in the traffic source mark comprising with it is described pre- If the one-to-one dimension identification information of dimension;
The traffic source mark is provided, is identified for second user terminal based on the traffic source, to the business object Traffic source is analyzed.
37. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
The traffic source configuration information is sent to first server, the traffic source is based on for the first server and matches Confidence breath generates traffic source mark;
Wherein, include and the default one-to-one dimension identification information of dimension, the flow in the traffic source mark Source identification is for analyzing the traffic source of the business object.
38. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
It determines the traffic source configuration information of business object, includes a pair of with default dimension one in the traffic source configuration information The dimension description information answered;
The traffic source configuration information is sent to first server, the traffic source is based on for the first server and matches Confidence breath generates traffic source mark;
Wherein, include and the default one-to-one dimension identification information of dimension, the flow in the traffic source mark Source identification is for analyzing the traffic source of the business object.
39. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
It obtains and links corresponding access log with service request, include that the traffic source identifies in the access log, institute It states in traffic source mark and includes and the one-to-one dimension identification information of default dimension;
Based on the access log, the traffic source of the business object is analyzed.
40. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
It obtains and links corresponding access log with service request, include that the traffic source identifies in the access log, institute It states in traffic source mark and includes and the one-to-one dimension identification information of default dimension;
Based on the access log, the traffic source of the business object is analyzed.
41. a kind of electronic equipment, comprising:
Processor;And
It is arranged to the memory of storage computer executable instructions, the executable instruction makes the processor when executed Execute following operation:
Traffic source mark is obtained from first server, the traffic source mark is based on business object by the first server Traffic source configuration information generate, include in the traffic source configuration information and the one-to-one dimension of default dimension describe Information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, and the business is asked Ask link for accessing the business object;
The service request link is provided to second server, provides the industry to fourth user terminal for the second server Business hyperlink request.
42. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
Traffic source mark is obtained from first server, the traffic source mark is based on business object by the first server Traffic source configuration information generate, include in the traffic source configuration information and the one-to-one dimension of default dimension describe Information includes and the default one-to-one dimension identification information of dimension in traffic source mark;
It is identified based on the traffic source, generation includes the service request link of the traffic source mark, and the business is asked Ask link for accessing the business object;
The service request link is provided to second server, provides the industry to fourth user terminal for the second server Business hyperlink request.
CN201811343766.4A 2018-11-13 2018-11-13 Traffic source analysis method, system and device Pending CN109614566A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811343766.4A CN109614566A (en) 2018-11-13 2018-11-13 Traffic source analysis method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811343766.4A CN109614566A (en) 2018-11-13 2018-11-13 Traffic source analysis method, system and device

Publications (1)

Publication Number Publication Date
CN109614566A true CN109614566A (en) 2019-04-12

Family

ID=66003786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811343766.4A Pending CN109614566A (en) 2018-11-13 2018-11-13 Traffic source analysis method, system and device

Country Status (1)

Country Link
CN (1) CN109614566A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111628904A (en) * 2020-04-28 2020-09-04 广东职业技术学院 Quality evaluation method and system for cross-border E-commerce flow

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450460A (en) * 2014-06-03 2016-03-30 北京奇虎科技有限公司 Network operation recording method and system
CN105488077A (en) * 2014-10-10 2016-04-13 腾讯科技(深圳)有限公司 Content tag generation method and apparatus
CN107835132A (en) * 2017-10-17 2018-03-23 链家网(北京)科技有限公司 A kind of method and device of traffic source tracking

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105450460A (en) * 2014-06-03 2016-03-30 北京奇虎科技有限公司 Network operation recording method and system
CN105488077A (en) * 2014-10-10 2016-04-13 腾讯科技(深圳)有限公司 Content tag generation method and apparatus
CN107835132A (en) * 2017-10-17 2018-03-23 链家网(北京)科技有限公司 A kind of method and device of traffic source tracking

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111628904A (en) * 2020-04-28 2020-09-04 广东职业技术学院 Quality evaluation method and system for cross-border E-commerce flow

Similar Documents

Publication Publication Date Title
WO2021088724A1 (en) Testing method and apparatus
Balsamo et al. Model-based performance prediction in software development: A survey
CN109479061A (en) Compliance violates detection
CN104765689B (en) A kind of interface capability data supervise method and apparatus in real time
CN113987074A (en) Distributed service full-link monitoring method and device, electronic equipment and storage medium
CN107644286A (en) Workflow processing method and device
CN106657192B (en) Method and equipment for presenting service calling information
CN109032923A (en) Method for testing software, device based on call chain, terminal
CN110196790A (en) The method and apparatus of abnormal monitoring
CN108134812B (en) Data processing method and device
CN110363427A (en) Model quality evaluation method and apparatus
CN109684052A (en) Transaction analysis method, apparatus, equipment and storage medium
CN108074033A (en) Processing method, system, electronic equipment and the storage medium of achievement data
CN110162512A (en) A kind of log searching method, apparatus and storage medium
CN109150700A (en) A kind of method and device of data acquisition
CN110147315A (en) Concurrency performance test method, device, computer equipment and storage medium
CN111078276B (en) Application redundant resource processing method, device, equipment and storage medium
CN112860556A (en) Coverage rate statistical method, coverage rate statistical device, computer system and readable storage medium
CN107391528B (en) Front-end component dependent information searching method and equipment
CN106802865B (en) Response simulator and method for software test
Clark et al. Event driven architecture modelling and simulation
Han et al. PROV-IO: An I/O-centric provenance framework for scientific data on HPC systems
CN109614566A (en) Traffic source analysis method, system and device
CN114625407A (en) Method, system, equipment and storage medium for implementing AB experiment
Balsamo et al. Software performance: state of the art and perspectives

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20201012

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190412