CN110908881A - Method and device for sending buried point data, electronic equipment and computer readable storage medium - Google Patents
Method and device for sending buried point data, electronic equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110908881A CN110908881A CN201911077147.XA CN201911077147A CN110908881A CN 110908881 A CN110908881 A CN 110908881A CN 201911077147 A CN201911077147 A CN 201911077147A CN 110908881 A CN110908881 A CN 110908881A
- Authority
- CN
- China
- Prior art keywords
- buried point
- point data
- delivery rule
- delivery
- buried
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 52
- 230000001960 triggered effect Effects 0.000 claims abstract description 43
- 230000002452 interceptive effect Effects 0.000 claims description 35
- 230000005540 biological transmission Effects 0.000 claims description 25
- 238000004891 communication Methods 0.000 claims description 14
- 238000004590 computer program Methods 0.000 claims description 7
- 230000003993 interaction Effects 0.000 claims description 6
- 238000010586 diagram Methods 0.000 description 11
- 238000012544 monitoring process Methods 0.000 description 8
- 230000008569 process Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 5
- 230000009471 action Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 3
- 238000009933 burial Methods 0.000 description 3
- 238000007405 data analysis Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000008030 elimination Effects 0.000 description 1
- 238000003379 elimination reaction Methods 0.000 description 1
- 230000003203 everyday effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 1
- 238000013024 troubleshooting Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3409—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment for performance assessment
- G06F11/3428—Benchmarking
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D30/00—Reducing energy consumption in communication networks
- Y02D30/70—Reducing energy consumption in communication networks in wireless communication networks
Landscapes
- Engineering & Computer Science (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the invention provides a method and a device for sending buried point data, electronic equipment and a computer readable storage medium, wherein the method comprises the following steps: generating buried point data of the triggered buried points; judging whether the buried point data meets a delivery rule acquired in advance; sending the buried point data under the condition that the buried point data meets the delivery rule; and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data. The embodiment of the invention can reduce the ping back message received by the server and reduce the data processed by the server, thereby saving the server resource.
Description
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a method and an apparatus for sending buried point data, an electronic device, and a computer-readable storage medium.
Background
A point-of-burial technique may be employed in Application development and data analysis processes, and an Application may send buried point data (e.g., an automatic reference notification (pingback) message) to a server for analysis and troubleshooting. The buried point is a term in the field of data collection, and refers to collecting relevant data information when certain specific events occur in an application program, such as the number of visitors, the dwell time of a page, the click rate and the like.
The existing point burying mode has two types, the first type is manual point burying, and the point burying mode has the defect that mistakes and omissions are easy to occur. Based on the defects of the first point burying method, a second point burying method commonly adopted at present is to adopt a full burying point, which is to collect all behavior data of a user, that is, the point burying method deploys all basic codes on the bottom layer, and based on the basic codes, the behavior data of the user at all hotspots and controls (which may be called monitoring points) can be collected. Meanwhile, by adopting a full-buried point mode, the application program can also send all collected behavior data to the server for the server to analyze.
However, for an application program with a large number of users and a large number of interaction events generated every day, a large number of ping back messages generated in a full-buried-point manner may cause excessive consumption of server resources.
Disclosure of Invention
Embodiments of the present invention provide a method, an apparatus, an electronic device, and a computer-readable storage medium for sending embedded point data, so as to limit sending of a partial ping back message generated in a full embedded point manner, thereby achieving a purpose of saving server resources. The specific technical scheme is as follows:
in a first aspect of the present invention, there is provided a method for sending buried point data, where the method includes:
generating buried point data of the triggered buried points;
judging whether the buried point data meets a delivery rule acquired in advance;
sending the buried point data under the condition that the buried point data meets the delivery rule;
and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data.
In a second aspect of the present invention, there is also provided an apparatus for transmitting buried point data, the apparatus including:
the generating module is used for generating the data of the triggered buried points;
the judging module is used for judging whether the buried point data meets a delivery rule acquired in advance;
the sending module is used for sending the buried point data under the condition that the buried point data meets the delivery rule;
and the transmission forbidding module is used for forbidding to transmit the buried point data under the condition that the buried point data does not meet the delivery rule.
In yet another aspect of the present invention, there is also provided a computer-readable storage medium having stored therein instructions, which when run on a computer, cause the computer to execute any one of the above-described methods for transmitting buried point data.
In yet another aspect of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the above-described methods for sending buried point data.
According to the method and the device for sending the buried point data, the electronic equipment and the computer readable storage medium provided by the embodiment of the invention, whether the triggered buried point data of the buried point meets the delivery rule acquired in advance is judged; and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data. By limiting the transmission of part of the ping back messages generated by adopting the full-buried point mode, the ping back messages received by the server can be reduced, the data processed by the server can be reduced, and the server resources can be saved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below.
Fig. 1 is a flowchart illustrating a method for sending buried point data according to an embodiment of the present invention;
fig. 2 is a second schematic flow chart of a method for sending buried point data according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an interface relationship of an application program with a buried point;
FIG. 4 is a schematic structural diagram of a device for sending buried point data according to an embodiment of the present invention;
FIG. 5 is a schematic diagram illustrating a detailed structure of a generating module in the apparatus for sending buried point data according to the embodiment of the present invention;
FIG. 6 is a second schematic structural diagram of a device for sending buried point data according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of an electronic device in an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be described below with reference to the drawings in the embodiments of the present invention.
First, a method for transmitting embedded point data according to an embodiment of the present invention will be described.
It should be noted that the sending method of the buried point data provided by the embodiment of the present invention may be applied to electronic devices. Optionally, the electronic device may be a terminal, and the terminal may be a smart phone, a tablet Computer, a Personal Computer (PC), a wearable device, or the like, and is configured to limit sending of a partial ping back message generated in a full-buried-point manner, so as to achieve a purpose of saving server resources.
Referring to fig. 1, a flow diagram of a method for sending buried point data in an embodiment of the present invention is shown. As shown in fig. 1, the method may include the steps of:
103, sending the buried point data under the condition that the buried point data meets the delivery rule;
and 104, prohibiting transmitting the buried point data under the condition that the buried point data does not meet the delivery rule.
The application scenario of the present embodiment will be briefly described below.
The embedded points in the embodiments of the present invention may be monitoring points set on an application program or a website, where each monitoring point may be a hotspot or a control on the application program or the website, where the hotspot and the control refer to interfaces that can interact with a user, and embedded points may be set on some fixed monitoring points on the application program or the website, that is, embedded points may be set on some hotspots and/or controls on the application program or the website, or embedded points may be set on all monitoring points on the application program or the website, that is, embedded points may also be set on all hotspots and controls on the application program or the website. In the following embodiments, the detailed description will be given by taking an application scenario as a buried point set on an application program and a buried point set on all monitoring points on the application program as an example.
In step 101, there are two triggering methods for setting a buried point on an application program, where the first triggering method is to receive trigger information sent by the inside of a device or other devices, for example, when a specific trigger information sent by a server is received, the buried point is triggered, or in a scenario where a buried point B is automatically triggered when a buried point a is triggered, information generated when a buried point a is triggered may be trigger information sent by the inside of a device. The second triggering mode is to receive an input operation for an embedded point of the application program, and if the input operation for the embedded point of the application program is acquired, the embedded point is triggered. Correspondingly, the embedded point data of the triggered embedded point is generated, and the embedded point data can be a pingback message. In the following embodiments, the second triggering method will be described in detail as an example.
The input operation may be an interactive operation between a user and an application program, and the input operation may be a touch operation, a click operation, a gesture operation, a sliding operation, and the like. The triggered embedded point may be a control set on the application program or a hotspot of the application program, and when a user performs an input operation on a certain control or hotspot on the application program, the embedded point corresponding to the certain control or hotspot is triggered.
In general, when any embedded point is triggered, a delivery event is generated, where the delivery event may be understood as that a terminal delivers relevant data to a server, and in a full embedded point, an application program corresponding terminal sends the triggered embedded point data of all the embedded points to the server, that is, the application program corresponding terminal sends the embedded point data corresponding to all the delivery events to the server, which may cause excessive consumption of the server, and therefore, in step 102, sending of the embedded point data may be limited by delivery rules. Specifically, whether the buried point data meets a delivery rule acquired in advance is judged, the buried point data is sent under the condition that the buried point data meets the delivery rule, and the buried point data is forbidden to be sent under the condition that the buried point data does not meet the delivery rule.
The delivery rule can be pre-stored locally or issued by the server, and when the delivery rule is issued by the server, the delivery rule issued by the server is received. In the following embodiments, the delivery rule will be described in detail by taking the delivery by the server as an example.
Specifically, the delivery rule may limit sending of the buried point data by setting a white list or a black list, for example, allowing sending of the buried point data of some buried points, or prohibiting sending of the buried point data of some buried points. The data of the buried point satisfying the delivery rule can be understood as: and the buried points corresponding to the buried point data are in a white list set in the delivery rule, or the buried points corresponding to the buried point data are not in a black list set in the delivery rule.
That is, if only a white list is set in the delivery rule, when the buried point corresponding to the buried point data is in the white list, the buried point data satisfies the delivery rule; if only a blacklist is set in the delivery rule, when the buried point corresponding to the buried point data is not in the blacklist, the buried point data meets the delivery rule at the moment; if a white list and a black list are set in the delivery rule at the same time, when the embedded point corresponding to the embedded point data is in the white list or when the embedded point corresponding to the embedded point data is not in the black list, the embedded point data meets the delivery rule. Correspondingly, the buried point data is sent under the condition that the buried point data meets the delivery rule.
The data of the buried points not meeting the delivery rule can be understood as: and the buried points corresponding to the buried point data are not in a white list set in the delivery rule, or the buried points corresponding to the buried point data are in a black list set in the delivery rule.
That is, if only a white list is set in the delivery rule, when the buried point corresponding to the buried point data is not in the white list, the buried point data does not satisfy the delivery rule at this time; if only a blacklist is set in the delivery rule, when the buried point corresponding to the buried point data is in the blacklist, the buried point data does not meet the delivery rule at the moment; if a white list and a black list are simultaneously set in the delivery rule, when the embedded point corresponding to the embedded point data is not in the white list or when the embedded point corresponding to the embedded point data is in the black list, the embedded point data does not meet the delivery rule. Correspondingly, under the condition that the buried point data does not meet the delivery rule, the transmission of the buried point data is forbidden.
The delivery rule may also limit sending of the buried point data by setting a sending time of the buried point data or a sending prohibition time of the buried point data, for example, allowing sending of the buried point data generated after 7 am and before 12 pm, or prohibiting sending of the buried point data generated after 12 pm and before 7 am. The data of the buried point satisfying the delivery rule can be understood as: the time for generating the buried point data is within the time for allowing transmission in the delivery rule, or the time for generating the buried point data is not within the time for forbidding transmission in the delivery rule.
That is, if only the time allowed to be sent is set in the delivery rule, when the time for generating the buried point data is within the time allowed to be sent, the buried point data meets the delivery rule at this time; if the delivery rule only sets the sending forbidding time, when the time for generating the buried point data is not in the sending forbidding time, the buried point data meets the delivery rule; if the time for allowing transmission and the time for forbidding transmission are simultaneously set in the delivery rule, when the time for generating the embedded data is within the time for allowing transmission or when the time for generating the embedded data is not within the time for forbidding transmission, the embedded data meets the delivery rule. Correspondingly, the buried point data is sent under the condition that the buried point data meets the delivery rule.
The data of the buried points not meeting the delivery rule can be understood as: the time for generating the buried point data is not within the time for allowing transmission in the delivery rule, or the time for generating the buried point data is within the time for forbidding transmission in the delivery rule.
That is, if only the time for allowing transmission is set in the delivery rule, when the time for generating the buried point data is not within the time for allowing transmission, the buried point data does not satisfy the delivery rule at this time; if the delivery rule only sets the sending forbidding time, when the time for generating the buried point data is within the sending forbidding time, at the moment, the buried point data does not meet the delivery rule; if the time for allowing transmission and the time for forbidding transmission are simultaneously set in the delivery rule, when the time for generating the embedded data is not in the time for allowing transmission or when the time for generating the embedded data is in the time for forbidding transmission, the embedded data does not meet the delivery rule. Correspondingly, under the condition that the buried point data does not meet the delivery rule, the transmission of the buried point data is forbidden.
Of course, the delivery rule may also limit sending of the buried point data by mixing the two modes.
It should be noted that the delivery event may include a trigger event of an uninput state of the control, a trigger event of an input state of the control and a trigger event of a full input state of the control, and the delivery event may further include a trigger event for the hotspot.
The triggering event of the non-input state of the control can comprise two events, the first event is that the control is only used as a switch, information input is not needed after the control is triggered, when the control is triggered, the delivery event can be called as the triggering event of the non-input state of the control, the second event is that the control not only serves as a switch, but also needs to input information after the control is triggered, when the control is triggered, a page where the information is input is in the non-input state of the information, namely, the information needing to be input in the page where the information is input is blank, and the delivery event can also be called as the triggering event of the non-input state of the control.
The triggering event of the input state of the control can be understood as that when the control is triggered, the page of the information input is in the input state of the information, and the delivery event can also be called as the triggering event of the input state of the control. When the delivery event is confirmed, the information input position in the information input page can be monitored, when the information input position reaches the set buried point position, the buried point is confirmed to be triggered, and the event is the delivery event.
The trigger event of the full input state of the control can be understood as that when the control is triggered, the page of the information input is in the full input state of the information, and the delivery event can also be called as the trigger event of the input state of the control. When the delivery event is confirmed, the position of information input in the information input page can be monitored, when the position of the information input is monitored to reach the bottom of the information input, namely the information input required to be input in the information input page is input completely, or when confirmation information of the information input completion is received, the buried point is confirmed to be triggered, and the event is the delivery event.
Judging whether the buried point data meets a delivery rule acquired in advance, determining whether to execute step 103 or step 104, and in step 103, sending the buried point data under the condition that the buried point data meets the delivery rule. In step 104, in the case that the buried point data does not satisfy the delivery rule, the transmission of the buried point data is prohibited, in this case, the buried point data may be set in a transmission prohibited state, and accordingly, the buried point data in the transmission prohibited state is not transmitted.
The sending method of the buried point data provided by this embodiment judges whether the triggered buried point data of the buried point meets the delivery rule acquired in advance; and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data. By limiting the transmission of part of the ping back messages generated by adopting the full-buried point mode, the ping back messages received by the server can be reduced, the data processed by the server can be reduced, and the server resources can be saved.
And only transmitting the data of the embedded points meeting the delivery rule, more efficient and flexible pingback data can be obtained, and data analysis and fault elimination can be carried out on the application program more pertinently.
In addition, the delivery rule can be flexibly controlled in a mode of being issued by the server, so that convenience of full burial points can be achieved, and flexible control over data sending of the burial points can be achieved through cloud control.
Further, based on the first embodiment, referring to fig. 2, a second flow chart of the method for sending the buried point data in the embodiment of the present invention is shown. As shown in fig. 2, the method may include the steps of:
and step 207, prohibiting sending the buried point data under the condition that the buried point data does not meet the delivery rule.
In step 201, if a full-embedded point technology is adopted, a monitoring tool arranged on the terminal monitors all interactive interfaces on the application program, and if it is monitored that an input operation occurs on the interactive interfaces, a triggered interactive interface of the embedded point is obtained, where the interactive interface may be a control arranged on the application program or a hot spot that can be interacted on the application program.
In step 202 and step 203, a target identifier of the buried point may be obtained based on the interactive interface, and the target identifier may be used to identify the triggered buried point.
Specifically, the manner of obtaining the target identifier of the buried point may include two manners, the first manner may be a preset configuration file, the configuration file includes identifiers of all interactive interfaces on the application program, and the target identifier of the buried point may be obtained by querying in the configuration file based on the interactive interfaces.
In an optional embodiment, the interactive interface may be named in a manner of identifying a serial number, for example, the interactive interface is the 2 nd control of the application page 3, and there are 15 controls in the page 1 and the page 2, and the page 1, the page 2, and the page 3 are nested layer by layer, that is, triggering a certain hot spot from the page 1 may enter the page 2, triggering a certain hot spot from the page 2 may enter the page 3, and then naming the target identifier of the embedded point corresponding to the interactive interface as "button 17".
Of course, the naming of the target identifier is only used as a simple example, and there may be other naming rules, in order to achieve consistent format of the collected buried point data, all the applications may use the target identifier, and the embedded point identifier generation mode needs to make all the applications generally available. Further, the target identification of the buried point can be generated through an interface path of the interactive interface.
Specifically, each interactive interface on the application program generally has a unique interface path, for example, a hotspot view1 is deployed on the hotspot view0, and a control button1 is arranged on the hotspot view1, so the interface path of the interactive interface corresponding to the control button1 may be marked as view 0: view 1: button 1.
By adopting the full-buried-point technology, when the interactive interface of the buried point is triggered, the monitoring tool usually analyzes the triggered interactive interface of the buried point to obtain the interface stiffness of the interactive interface. Naming the buried point based on the interface path to obtain a target identifier of the buried point, for example, when the control button1 is triggered, the interface path of the interaction interface of the buried point is view 0: view 1: button1, view 0: view 1: button1 is used as the target identifier for the buried point.
It should be noted that, if the buried point corresponding to the interactive interface with the interface path as the starting point is set as the white list in the delivery rule, when it is determined whether the buried point data satisfies the delivery rule, the identifiers corresponding to all the interactive interfaces on the interface path belong to the first identifier set, and it is determined that the delivery rule is satisfied. Correspondingly, if the embedding point corresponding to the interactive interface with the interface path as the starting point is set as the blacklist in the delivery rule, when judging whether the embedding point data meets the delivery rule, the identifiers corresponding to all the interactive interfaces on the interface path belong to the second identifier set, and the delivery rule is determined not to be met.
In this embodiment, because the interface path based on the interactive interface is used, the manner of generating the target identifier of the buried point is universally available in each application program, so that the buried point data generated based on the target identifier have the same format, and thus the buried point data can be used in each application program.
In step 204, the buried point data of the buried point may include the target identifier, and whether the buried point data satisfies the pre-obtained delivery rule may be determined by the target identifier, and the delivery rule may include a first identifier set of a white list or a second identifier set of a black list.
Correspondingly, when the delivery rule includes the first identifier set of the white list, step 205 may specifically include:
determining that the buried point data meets the delivery rule under the condition that the target identifier belongs to a first identifier set in the delivery rule; and under the condition that the target identification does not belong to a first identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the first identification set is an identification set of buried points allowing delivery.
When the delivery rule includes the second identifier set of the blacklist, step 205 may specifically include:
determining that the buried point data meets the delivery rule under the condition that the target identifier does not belong to a second identifier set in the delivery rule; and under the condition that the target identification belongs to a second identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the second identification set is an identification set of buried points which are forbidden to be delivered.
Step 205 is similar to step 102 of the first embodiment, step 206 is similar to step 103 of the first embodiment, and step 207 is similar to step 104 of the first embodiment, so that the explanation thereof may refer to step 102, step 103, and step 104 of the first embodiment, respectively, and will not be repeated here.
In this embodiment, whether the buried point data meets a delivery rule acquired in advance is determined by a target identifier for identifying the triggered buried point, and the buried point data is prohibited from being sent when the target identifier does not belong to a first identifier set in the delivery rule or when the target identifier belongs to a second identifier set in the delivery rule. The method and the device have the advantages that the convenience of the full-buried point technology is achieved, meanwhile, the sending of partial ping back messages is limited, ping back messages received by the server can be reduced, data processed by the server are reduced, and therefore server resources can be saved.
Moreover, by adopting the full-embedded-point technology, embedding of points is not needed when new functions of the application program are developed, and online development can be rapidly realized.
In addition, in the above embodiments, the delivery rule may be issued by a server, and correspondingly, the terminal may obtain the delivery rule issued by the server. Specifically, there are two acquisition modes:
the first is an active acquisition mode, when an application program or a website with a buried point is started, an interface of a server is called, and the delivery rule is obtained from the server;
and the second is a passive acquisition mode, and receives a delivery message sent by a server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule.
And under the condition of establishing connection with the server, the server pushes the delivery message to the terminal through a long connection pushing rule, and correspondingly, the terminal receives the delivery message sent by the server.
It should be noted that, when the delivery rule is obtained through an active obtaining manner, the terminal may pull an interface of the server at preset intervals, so as to obtain the latest delivery rule from the server. When the delivery rule is acquired in a passive mode, if the server detects that the delivery rule is updated, the server pushes a delivery message carrying the updated delivery rule to the terminal, and correspondingly, the terminal receives the delivery message issued by the server.
The following describes a method for sending buried point data according to an embodiment of the present invention in detail by way of example.
Application scenarios: referring to fig. 3, an interface relationship schematic diagram of an application program provided with a buried point is shown, and as shown in fig. 3, the interface relationship schematic diagram includes a hotspot view0, a hotspot view1 is deployed on a hotspot view0, and a control button1 is arranged on a hotspot view 1.
Firstly, when the application program is started, an interface of a pull server acquires a delivery rule, or receives a delivery message sent by the server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule; wherein the delivery rule includes a second identifier set of a blacklist, and the second identifier set includes an interface path view 0: an identification of a target interaction interface on view1, the target interaction interface comprising an interaction interface corresponding to a control.
Then, receiving the input operation of the user for the control button 1;
then, responding to the input operation, and acquiring an interactive interface of the triggered buried point;
then, an interface path of the interactive interface is obtained, where the interface path is view 0: view 1: button 1;
then, based on the interface path, generating a target identifier of the buried point, where the target identifier is view 0: view 1: button 1;
next, it is determined whether the target identifier belongs to the second identifier set, since the target identifier is interface path view 0: the interactive interface on view1 belongs to the target interactive interface, therefore, the target identifier belongs to the second identifier set;
and finally, forbidding sending the buried point data of the buried point.
The following describes a transmission apparatus of embedded point data according to an embodiment of the present invention.
Referring to fig. 4, a schematic structural diagram of a transmitting apparatus of buried point data in an embodiment of the present invention is shown. As shown in fig. 4, the apparatus 400 for transmitting buried point data includes:
a generating module 401, configured to generate buried point data of the triggered buried point;
a judging module 402, configured to judge whether the buried point data meets a delivery rule acquired in advance;
a sending module 403, configured to send the buried point data when the buried point data meets the delivery rule;
a sending forbidding module 404, configured to forbid sending of the buried point data when the buried point data does not satisfy the delivery rule.
Optionally, referring to fig. 5, a schematic diagram of a detailed structure of a generating module in the apparatus for sending buried point data in the embodiment of the present invention is shown. As shown in fig. 5, the generating module 401 includes:
the first obtaining unit 4011 is configured to obtain an interactive interface of the triggered embedded point;
the second obtaining unit 4012 is configured to obtain an interface path of the interactive interface;
the first generating unit 4013 is configured to generate a target identifier of the buried point based on the interface path;
and the second generating unit 4014 is configured to generate the buried point data of the buried point based on the target identifier.
Optionally, the determining module 402 is specifically configured to determine that the buried point data satisfies the delivery rule when the target identifier belongs to the first identifier set in the delivery rule; and under the condition that the target identification does not belong to a first identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the first identification set is an identification set of buried points allowing delivery.
Optionally, the determining module 402 is further configured to determine that the buried point data satisfies the delivery rule when the target identifier does not belong to the second identifier set in the delivery rule; and under the condition that the target identification belongs to a second identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the second identification set is an identification set of buried points which are forbidden to be delivered.
Optionally, referring to fig. 6, a second schematic structural diagram of a device for sending buried point data in an embodiment of the present invention is shown. As shown in fig. 6, the apparatus further includes:
an obtaining module 405, configured to call an interface of a server when an application program or a website with a built-in point is started, and obtain the delivery rule from the server; or, receiving a delivery message sent by a server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule.
The device provided by the embodiment of the present invention can implement each process implemented in the above method embodiments, and is not described here again to avoid repetition.
The device for sending buried point data provided by this embodiment judges whether the triggered buried point data of the buried point meets the delivery rule acquired in advance; and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data. By limiting the transmission of part of the ping back messages generated by adopting the full-buried point mode, the ping back messages received by the server can be reduced, the data processed by the server can be reduced, and the server resources can be saved.
The following describes an electronic device provided in an embodiment of the present invention.
An embodiment of the present invention further provides an electronic device, as shown in fig. 7, including a processor 701, a communication interface 702, a memory 703 and a communication bus 704, where the processor 701, the communication interface 702, and the memory 703 complete mutual communication through the communication bus 704,
a memory 703 for storing a computer program;
the processor 701 is configured to implement the following steps when executing the program stored in the memory 703:
generating buried point data of the triggered buried points;
judging whether the buried point data meets a delivery rule acquired in advance;
sending the buried point data under the condition that the buried point data meets the delivery rule;
and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data.
Optionally, the processor 701 is specifically configured to:
acquiring an interactive interface of the triggered buried point;
acquiring an interface path of the interactive interface;
generating a target identifier of the buried point based on the interface path;
and generating buried point data of the buried point based on the target identification.
Optionally, the processor 701 is specifically configured to:
determining that the buried point data meets the delivery rule under the condition that the target identifier belongs to a first identifier set in the delivery rule; under the condition that the target identification does not belong to a first identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the first identification set is an identification set of buried points allowing delivery;
optionally, the processor 701 is specifically configured to:
determining that the buried point data meets the delivery rule under the condition that the target identifier does not belong to a second identifier set in the delivery rule; and under the condition that the target identification belongs to a second identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the second identification set is an identification set of buried points which are forbidden to be delivered.
Optionally, the processor 701 is further configured to:
when an application program or a website with a buried point is started, calling an interface of a server, and obtaining the delivery rule from the server; or,
and receiving a delivery message sent by the server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a non-volatile Memory (non-volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like; the device can also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component.
In yet another embodiment of the present invention, a computer-readable storage medium is further provided, which stores instructions that, when executed on a computer, cause the computer to execute the sending method of the buried point data described in any one of the above embodiments.
In another embodiment of the present invention, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform the method for sending buried point data as described in any one of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the invention to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
All the embodiments in the present specification are described in a related manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only for the preferred embodiment of the present invention, and is not intended to limit the scope of the present invention. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Claims (12)
1. A method for sending buried point data, the method comprising:
generating buried point data of the triggered buried points;
judging whether the buried point data meets a delivery rule acquired in advance;
sending the buried point data under the condition that the buried point data meets the delivery rule;
and under the condition that the buried point data does not meet the delivery rule, forbidding sending the buried point data.
2. The method of claim 1, wherein the generating the buried point data for the triggered buried point comprises:
acquiring an interactive interface of the triggered buried point;
acquiring an interface path of the interactive interface;
generating a target identifier of the buried point based on the interface path;
and generating buried point data of the buried point based on the target identification.
3. The method of claim 2, wherein said determining whether said buried point data satisfies pre-obtained delivery rules comprises:
determining that the buried point data meets the delivery rule under the condition that the target identifier belongs to a first identifier set in the delivery rule; and under the condition that the target identification does not belong to a first identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the first identification set is an identification set of buried points allowing delivery.
4. The method of claim 2, wherein said determining whether said buried point data satisfies pre-obtained delivery rules comprises:
determining that the buried point data meets the delivery rule under the condition that the target identifier does not belong to a second identifier set in the delivery rule; and under the condition that the target identification belongs to a second identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the second identification set is an identification set of buried points which are forbidden to be delivered.
5. The method of claim 1, wherein prior to generating the buried point data for the triggered buried point, the method further comprises:
when an application program or a website with a buried point is started, calling an interface of a server, and obtaining the delivery rule from the server; or,
and receiving a delivery message sent by the server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule.
6. An apparatus for transmitting buried point data, the apparatus comprising:
the generating module is used for generating the data of the triggered buried points;
the judging module is used for judging whether the buried point data meets a delivery rule acquired in advance;
the sending module is used for sending the buried point data under the condition that the buried point data meets the delivery rule;
and the transmission forbidding module is used for forbidding to transmit the buried point data under the condition that the buried point data does not meet the delivery rule.
7. The apparatus of claim 6, wherein the generating module comprises:
the first acquisition unit is used for acquiring the triggered interaction interface of the embedded point;
the second acquisition unit is used for acquiring an interface path of the interactive interface;
the first generation unit is used for generating a target identifier of the buried point based on the interface path;
and the second generation unit is used for generating the buried point data of the buried point based on the target identification.
8. The apparatus according to claim 7, wherein the determining module is specifically configured to determine that the buried point data satisfies the delivery rule if the target identifier belongs to a first identifier set in the delivery rule; and under the condition that the target identification does not belong to a first identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the first identification set is an identification set of buried points allowing delivery.
9. The apparatus of claim 7, wherein the determining module is further configured to determine that the buried point data satisfies the delivery rule if the target identifier does not belong to a second set of identifiers in the delivery rule; and under the condition that the target identification belongs to a second identification set in the delivery rule, determining that the buried point data does not meet the delivery rule, wherein the second identification set is an identification set of buried points which are forbidden to be delivered.
10. The apparatus of claim 6, further comprising:
the acquisition module is used for calling an interface of a server when an application program or a website with a buried point is started, and acquiring the delivery rule from the server; or, receiving a delivery message sent by a server under the condition of establishing connection with the server, wherein the delivery message comprises the delivery rule.
11. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any one of claims 1 to 5 when executing a program stored in the memory.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911077147.XA CN110908881B (en) | 2019-11-06 | 2019-11-06 | Buried point data transmitting method and device, electronic equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911077147.XA CN110908881B (en) | 2019-11-06 | 2019-11-06 | Buried point data transmitting method and device, electronic equipment and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110908881A true CN110908881A (en) | 2020-03-24 |
CN110908881B CN110908881B (en) | 2023-04-28 |
Family
ID=69816281
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911077147.XA Active CN110908881B (en) | 2019-11-06 | 2019-11-06 | Buried point data transmitting method and device, electronic equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110908881B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111737100A (en) * | 2020-06-09 | 2020-10-02 | 北京三快在线科技有限公司 | Data acquisition method, device, equipment and storage medium |
CN113177173A (en) * | 2021-04-27 | 2021-07-27 | 北京京东振世信息技术有限公司 | Data access method, device, equipment and storage medium |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108038053A (en) * | 2017-11-29 | 2018-05-15 | 上海恺英网络科技有限公司 | A kind of dynamic configuration buries method and apparatus a little |
WO2019100614A1 (en) * | 2017-11-22 | 2019-05-31 | 平安科技(深圳)有限公司 | Buried point data processing method, device, computer device and storage medium |
CN110362480A (en) * | 2019-06-19 | 2019-10-22 | 平安普惠企业管理有限公司 | Client buries a test method, device, equipment and storage medium |
-
2019
- 2019-11-06 CN CN201911077147.XA patent/CN110908881B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019100614A1 (en) * | 2017-11-22 | 2019-05-31 | 平安科技(深圳)有限公司 | Buried point data processing method, device, computer device and storage medium |
CN108038053A (en) * | 2017-11-29 | 2018-05-15 | 上海恺英网络科技有限公司 | A kind of dynamic configuration buries method and apparatus a little |
CN110362480A (en) * | 2019-06-19 | 2019-10-22 | 平安普惠企业管理有限公司 | Client buries a test method, device, equipment and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111737100A (en) * | 2020-06-09 | 2020-10-02 | 北京三快在线科技有限公司 | Data acquisition method, device, equipment and storage medium |
CN113177173A (en) * | 2021-04-27 | 2021-07-27 | 北京京东振世信息技术有限公司 | Data access method, device, equipment and storage medium |
CN113177173B (en) * | 2021-04-27 | 2023-09-05 | 北京京东振世信息技术有限公司 | Data access method, device, equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN110908881B (en) | 2023-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120222120A1 (en) | Malware detection method and mobile terminal realizing the same | |
CN104967550A (en) | Method and apparatus for displaying unread messages | |
CN103577757A (en) | Virus defending method and device | |
CN106658568B (en) | Method and equipment for providing available wireless access point information | |
CN105306318A (en) | Intelligent scene configuration method and device and server | |
CN111159269B (en) | Data processing method, device and system | |
CN103065083A (en) | Method and system for monitoring application program interface of intelligent mobile terminal | |
CN110908881B (en) | Buried point data transmitting method and device, electronic equipment and computer readable storage medium | |
CN111338710A (en) | Application program control method and device, electronic equipment and storage medium | |
CN107360179B (en) | Risk information sharing method, terminal and computer readable storage medium | |
CN109657485B (en) | Authority processing method and device, terminal equipment and storage medium | |
CN105656894A (en) | Main control intelligent terminal, controlled intelligent terminal and monitoring method | |
CN108984417B (en) | Software testing method, device, terminal and storage medium | |
CN107920383B (en) | Wireless hotspot connection method, mobile terminal and computer-readable storage medium | |
CN112788090B (en) | Network resource transmission method, device and system | |
CN111008209B (en) | Data reconciliation method, device and system, storage medium and electronic device | |
CN109976828B (en) | Method and device for configuring file | |
CN105225453B (en) | Multi-control-center-based household appliance linkage method and device and control center | |
CN114270309A (en) | Resource acquisition method and device and electronic equipment | |
CN114302351B (en) | Short message service processing method and device, computer equipment and storage medium | |
CN102868766A (en) | Method, system and device for achieving remote control | |
CN107766232B (en) | Plug-in management method and device | |
CN112804098B (en) | Domain name fault line switching method and device, terminal equipment and storage medium | |
CN110166633B (en) | Communication method, communication device, readable storage medium and electronic equipment | |
CN114726711A (en) | Method and system for cooperative processing service between devices |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |