CN111611141A - Reporting verification method and device of buried point data, electronic equipment and storage medium - Google Patents

Reporting verification method and device of buried point data, electronic equipment and storage medium Download PDF

Info

Publication number
CN111611141A
CN111611141A CN202010366145.9A CN202010366145A CN111611141A CN 111611141 A CN111611141 A CN 111611141A CN 202010366145 A CN202010366145 A CN 202010366145A CN 111611141 A CN111611141 A CN 111611141A
Authority
CN
China
Prior art keywords
buried point
point data
data
server
buried
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010366145.9A
Other languages
Chinese (zh)
Inventor
林佳铖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Huaduo Network Technology Co Ltd
Original Assignee
Guangzhou Huaduo Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Huaduo Network Technology Co Ltd filed Critical Guangzhou Huaduo Network Technology Co Ltd
Priority to CN202010366145.9A priority Critical patent/CN111611141A/en
Publication of CN111611141A publication Critical patent/CN111611141A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3452Performance evaluation by statistical analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Geophysics And Detection Of Objects (AREA)

Abstract

The application discloses a reporting verification method and device of buried point data, electronic equipment and a storage medium, and relates to the technical field of data processing, wherein the method comprises the following steps: acquiring buried point data received by a server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data; acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data; and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result. The method and the device realize the report verification of the buried point data and can determine the report loss condition of the buried point data.

Description

Reporting verification method and device of buried point data, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method and an apparatus for reporting verification of buried point data, an electronic device, and a storage medium.
Background
At present, the operation information of a user in the using process is usually obtained by setting a buried point in an Application program (App) or a webpage, so that the user group can be known from the perspective of the user and a product, and the App and a website are improved to be closer to the user. When a user uses a website or an APP to trigger a function corresponding to a buried point, a client reports data related to the buried point to a server so that the server performs data statistics and analysis according to the received buried point data.
However, due to the influence of a network environment or the possibility of code loss in terminal application software, the data of the embedded point received by the server end may be incomplete, and the situations of missing report and loss exist. The buried point data needs to be verified.
Disclosure of Invention
The embodiment of the application provides a reporting verification method and device for buried point data, electronic equipment and a storage medium, which can verify the reported buried point data.
In a first aspect, an embodiment of the present application provides a method for reporting and verifying buried point data, where the method includes: acquiring buried point data received by a server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data; acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data; and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result.
In a second aspect, an embodiment of the present application provides a device for reporting and verifying buried point data, where the device includes: acquiring buried point data received by a server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data; acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data; and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result.
In a third aspect, an embodiment of the present application provides an electronic device, including: a memory; one or more processors coupled with the memory; one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, and the one or more applications are configured to perform the above-mentioned method for reporting verification of buried point data provided in the first aspect.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, where a program code is stored in the computer-readable storage medium, and the program code may be called by a processor to execute the method for reporting and verifying the buried point data provided in the first aspect.
According to the reporting verification method, device, electronic equipment and storage medium of the buried point data, the buried point data received by the server after the test equipment reports the first buried point data in real time is used as the second buried point data, the buried point data received by the server after the same test equipment reports the first buried point data in a delayed mode is used as the third buried point data, then the second buried point data and the third buried point data are compared, and the reporting verification result of the buried point data can be determined based on the comparison result. Therefore, after the test equipment reports the buried point data in real time, the test equipment reports the buried point data in a delayed manner once, so that the server can determine the reporting loss condition of the buried point data according to the buried point data reported in real time and in a delayed manner by the same test equipment or the same batch of test equipment.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 shows an application scenario diagram of a reporting verification method for buried point data according to an embodiment of the present application.
Fig. 2 is a flowchart illustrating a method for reporting verification of buried point data according to an embodiment of the present application.
Fig. 3 is a flowchart illustrating a method for reporting verification of buried point data according to another embodiment of the present application.
Fig. 4 is another flow chart illustrating a reporting verification method for buried point data according to another embodiment of the present application.
Fig. 5 shows a schematic flow chart of step S230 in fig. 3.
Fig. 6 shows another schematic flow chart of step S230 in fig. 3.
Fig. 7 shows another flowchart of step S230 in fig. 3.
Fig. 8 shows a further flowchart of step S230 in fig. 3.
Fig. 9 shows a schematic flow chart of step S230 in fig. 3.
Fig. 10 is a schematic overall flow chart of a verification method for reporting buried point data according to an embodiment of the present disclosure.
Fig. 11 is a schematic overall flowchart of another verification method for reporting buried point data according to an embodiment of the present disclosure.
Fig. 12 is a flowchart illustrating a reporting verification method for buried point data according to still another embodiment of the present application.
Fig. 13 is a block diagram illustrating a reporting verification apparatus for buried point data according to an embodiment of the present application.
Fig. 14 shows a block diagram of a reporting verification apparatus for buried point data according to another embodiment of the present application.
Fig. 15 shows a block diagram of an electronic device according to an embodiment of the present application.
Fig. 16 illustrates a storage unit for storing or carrying program codes for implementing a method for reporting verification of buried point data according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
With the continuous development of internet technology, various websites and APPs come into operation, and users can realize various functions through the websites or APPs to meet daily life or entertainment requirements. When a user uses a website or an APP interactively, a large amount of behavior data can be generated, and based on the behavior data, the behavior data can be used as a basis for updating iteration of the website or the APP, or a new product can be developed according to the behavior data of the user, so that the requirements of the user can be met.
In some embodiments, user behavior data may be obtained by placing a buried point in the App or web page. And after the server collects, counts and analyzes the user behavior data, the statistical data for reference can be finally formed. However, due to the influence of the network environment or the possible absence of codes in the terminal application software, the data of the buried point received by the server terminal may be incomplete, and therefore the data of the buried point needs to be checked. At present, the embedded point verification usually adopts a manual verification mode, but when the embedded point data is more, the efficiency of manual verification is not high, and errors are easy to occur.
The inventor has studied for a long time and proposed a method, an apparatus, an electronic device and a storage medium for verifying the reporting of buried point data in the embodiment of the present application, which can perform automatic verification on the reported buried point data, thereby improving the integrity of the collected buried point data and improving the efficiency of the buried point verification. The following will be described in detail by way of specific examples.
Referring to fig. 1, fig. 1 is a schematic diagram illustrating an application scenario of a method for reporting and verifying buried point data according to an embodiment of the present application, where the application scenario includes a buried point verification system 10 according to an embodiment of the present application. This buried point verification system 10 includes: test equipment 100 and server 200. Wherein, the test device 100 and the server 200 are located in a wireless network or a wired network, and the test device 100 and the server 200 can perform data interaction. In some embodiments, there may be a plurality of test devices 100, the server 200 may be communicatively connected to a plurality of test devices 100, and the plurality of test devices 100 may also be communicatively connected to each other via the internet.
In this embodiment of the application, the testing device 100 may be a mobile phone, a smart phone, a notebook computer, a desktop computer, a tablet computer, a Personal Digital Assistant (PDA), a media player, a smart television, a wearable electronic device, and other user devices capable of running an application program, and a specific type of the testing device may not be limited in this embodiment of the application. The server 200 may be a single server, or a server cluster, or a local server, or a cloud server, and a specific server type may not be limited in this embodiment of the application.
In some embodiments, a client may be installed within the test equipment 100. The client may be a computer Application (APP) installed on the terminal device 100, or may be a Web client, which may refer to an Application developed based on a Web architecture. For example, microblogs, WeChat, various live APP, various browsers, and the like. One or more embedded points are arranged in the client to be tested and are used for analyzing the operation behavior of a user on the client and/or testing the functional effect of the client. When the user uses the client, the embedded point is triggered, and the functional module corresponding to the embedded point is executed, so that the embedded point data can be obtained. The test equipment may send the buried point data to the server 200, and the server 200 may process and analyze the received buried point data.
In some examples, the server 200 may be a currently existing server supporting the receipt of the buried point data and the real-time/offline calculation service, which may store the received buried point data and may also check and calculate the accuracy and integrity of the buried point data in real time. In some embodiments, after the verification result of the buried point data is calculated, the result may be returned to the buried point configuration background of the tester.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating a reporting verification method for buried point data according to an embodiment of the present application, and the method is applicable to the server. In a specific embodiment, the reporting verification method for buried point data can also be applied to the reporting verification apparatus 600 for buried point data shown in fig. 13 and the electronic device 800 shown in fig. 15. The flow shown in fig. 2 will be described in detail below. The reporting verification method of the buried point data can comprise the following steps:
step S110: and acquiring buried point data received by the server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data.
In the embodiment of the application, when the buried point set in the test equipment is triggered, the test equipment can report the correspondingly generated first buried point data to the server in real time. The first buried point data is used for representing complete buried point data actually generated by the test equipment, and may be one piece of data or multiple pieces of data.
The embedded point is a common data acquisition method, and captures, processes and transmits specific user behaviors or events. The method mainly monitors events in the running process of the software application, and judges and captures the events when the events needing attention occur. The method for embedding the points can be code embedding, the code embedding refers to embedding some codes in a webpage or APP and other clients installed on the test equipment, when a user triggers a corresponding behavior, the client acquires the embedded data through the codes, and meanwhile, the acquired embedded data can be reported to the server. The embedded point code can be generated correspondingly according to actual test requirements.
As a mode, a tester may input event information in a background configured at a buried point, where the event information may include an interface and an interaction result that trigger interaction in a client, reported field information, and a definition of an event. And then the embedded point configuration background can generate a corresponding embedded point code according to the input information. The event may be a click event, a page event, or the like, and the specific event type is not limited at this time. The click event may refer to a click behavior of a user in an application to be tested in the test device, such as clicking a tab tag, clicking a button, and the like. The page event may refer to a page that a user browses, such as a home page, a detail page, and the like.
Of course, the specific embedding method is not limited herein, and other embedding methods may be used, such as visual embedding, non-embedding, and the like.
For example, after the user opens the client application installed on the test device, the service operation may be performed on the service data on the page of the application, and an operation carrier (which may be a button or another Action, such as a control, for sending the data operation) for the user to perform the service operation is provided on the page. The control can be preset with a buried point to monitor the business operation of the user through the control, so that the change of the business data and the information of the business operation (such as operator and operation time) can be monitored through the buried point code
It can be understood that, due to the network environment influence or the occurrence of a problem in the setting of the buried point code, the buried point data reported by the test device may be missed and lost, and therefore, the server may not receive the complete buried point data in practice, that is, may not be consistent with the first buried point data. In the embodiment of the application, the data of the buried point received by the server after the test equipment reports the data of the first buried point in real time can be used as the data of the second buried point. When reporting verification of the buried point data is needed, the server can obtain the second buried point data.
In some embodiments, after receiving the buried point data reported by the test device in real time, the server may store the received second buried point data in the database. When reporting verification of the buried point data is needed, the server can acquire corresponding second buried point data from the database.
Step S120: and acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data.
In the embodiment of the application, after reporting the first embedded point data to the server in real time, the test device may report the first embedded point data to the server in a delayed manner, that is, for the generated embedded point data, the test device reports the first embedded point data twice from front to back. Therefore, after receiving the data of the buried point reported by the test equipment in real time, the server can also receive the data of the buried point reported by the same test equipment in a delayed mode.
Similarly, since the reported buried point data may be missed and lost, and the data received by the server may not be complete buried point data in practice, that is, may not be consistent with the first buried point data, in this embodiment of the present application, the data received by the server after the test device reports the first buried point data in a delayed manner may be used as the third buried point data. When reporting verification of the buried point data is required, the server can obtain the third buried point data.
In some embodiments, after receiving the buried point data reported by the test device in a delayed manner, the server may also store the received third buried point data in the database. When reporting verification of the buried point data is needed, the server can obtain corresponding third buried point data from the database.
In some embodiments, each piece of buried point data reported in real-time and delayed may contain a client identification (device ID) of the testing device. Each piece of reported buried point data needs to contain a unique identifier (report ID). As one approach, the unique identification may be generated by using the MD5(message-digest algorithm 5) or base64 (binary data is represented based on 64 printable characters) processed device ID + client unix timestamp. In some embodiments, each piece of reported buried point data may also include network configuration, event ID, and the like.
Step S130: and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result.
The server receives the data after the second buried point data and the third buried point data are reported by the same test equipment in real time and are reported in a delayed manner, so that the second buried point data and the third buried point data can be compared, and a reporting verification result of the buried point data is determined based on a comparison result. The reporting verification result can be used for representing the report missing and loss conditions of the buried point data in the reporting process.
In some embodiments, when the second buried point data and the third buried point data are not consistent, it may be indicated that conditions of missing report, loss and the like may exist in the reporting process of the buried point data, that is, the uploaded buried point data is likely to be incomplete, and for the accuracy of subsequent analysis, the second buried point data or the third buried point data may not be used as a basis for a user behavior of subsequent analysis.
In some embodiments, when the second buried point data and the third buried point data are consistent, it may be indicated that the possibility of missing report and loss in the reporting process of the buried point data is low, that is, the uploaded buried point data may be complete, so that the second buried point data or the third buried point data may be used as the basis for the user behavior of the subsequent analysis.
In some embodiments, a data tolerance may also be set, and when data of the second buried point data and the third buried point data that are inconsistent exceeds the data tolerance, it may be indicated that conditions such as missing report and loss exist in the reporting process of the buried point data, and the number of lost data is large, which may possibly affect subsequent analysis. Therefore, the second buried point data or the third buried point data can not be used as the basis of the user behavior of the subsequent analysis. On the contrary, when the inconsistent data of the second buried point data and the third buried point data does not exceed the tolerance of the data, the situation that the influence is not large although the situations of missing report, loss and the like exist in the reporting process of the buried point data can be shown, and the second buried point data or the third buried point data can be still used as the basis of the user behavior of the subsequent analysis.
In some embodiments, the number of the test devices may be multiple, and the server may compare the buried point data reported by the multiple test devices in real time with the same buried point data reported in a delayed manner, so as to obtain the reporting loss rate of the buried point data of the multiple test devices. Therefore, the report loss rate verification of batch user data under the real network environment is realized.
According to the verification method for reporting buried point data provided by the embodiment of the application, the buried point data received by the server after the test equipment reports the first buried point data in real time is used as the second buried point data, the buried point data received by the server after the same test equipment reports the first buried point data in a delayed manner is used as the third buried point data, then the second buried point data and the third buried point data are compared, and the verification result for reporting the buried point data can be determined based on the comparison result. Therefore, after the test equipment reports the buried point data in real time, the test equipment reports the buried point data in a delayed manner once, so that the server can determine the reporting loss condition of the buried point data according to the buried point data reported in real time and in a delayed manner by the same test equipment or the same batch of test equipment, the integrity of the buried point data of the internet product can be effectively improved, and the accuracy of subsequent user behavior analysis is ensured.
Referring to fig. 3, fig. 3 is a schematic flow chart illustrating a reporting verification method for buried point data according to another embodiment of the present application, which is applicable to the server, where the reporting verification method for buried point data may include:
step S210: and acquiring buried point data received by the server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data.
Step S220: and acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data.
In the embodiment of the present application, steps S210 and S220 may refer to the contents of the foregoing embodiments, and are not described herein again.
In some embodiments, the delayed reporting may also be a timed reporting. As an implementation manner, the timed reporting may refer to reporting all the buried point data generated within a preset time interval at a preset time interval. Specifically, the data of the buried point received by the server after the test device reports the data of the first buried point at regular time may be used as the data of the third buried point, and the reporting verification of the data of the buried point may be performed. The preset duration may refer to a time length between a current time of the delayed report and a last time of the delayed report of the test device. The specific value can be set reasonably according to specific situations, and is not limited herein.
In some embodiments, the preset duration may be 1 day. That is, if the date of the day is T, all the data of the buried point triggered by the user on the day can be reported in real time according to normal logic by the testing device, and all the data of the buried point can be stored in full. And when the date reaches T +1, reporting the total data of the buried points in the day T. That is, the data of the buried point reported in real time today can be reported in a delayed manner in the tomorrow. Further, as a mode, the time for delayed reporting may be fixed, such as 9 am, 12 pm, etc. every day. Alternatively, when the client program of the test is started for the first time every day, all the buried point data of the previous day can be packed, compressed and reported. The specific timing is not limited herein. In some embodiments, after receiving the data of the buried point reported by the test device, the server may store the file in units of a preset time duration, and may separate the real-time file from the delay file for subsequent use in the buried point verification.
As another embodiment, the timing reporting may also refer to reporting the first buried point data once every time the test device reports the first buried point data in real time, after a fixed time interval, the first buried point data is reported again. The fixed time period may be 1 hour, 6 hours, 1 day, etc., and is not limited herein. For example, assuming that the fixed time duration is 1 hour, the test equipment reports the first buried point data a in real time at 9 am, and after reporting the first buried point data B in real time at 9 am for 30 am, it needs to report the first buried point data a again at 10 am, and report the first buried point data B again at 10 am for 30 am. Therefore, the data of the buried point received by the server after the test equipment reports the data of the first buried point at regular time can be used as the data of the third buried point, and the reporting verification of the data of the buried point is carried out.
In some embodiments, the buried point test of the present application may be performed in the grayscale phase of the client product. The gray-scale stage may refer to that before the new function of the product is released to the outside, the gray-scale release may be performed in a small range, so that one part of users continues to use the old function of the product, and another part of users starts to use the new function of the product. The buried point checking object is the formal client side of the gray scale. For example, an online version of an APP is 1.0, and in order to test the functional effect of the version 1.1 of the APP, part of user equipment installed with the version 1.1 of the APP may be extracted from a large number of online user equipment for testing, where the extracted part of user equipment is user equipment corresponding to a formal client with a grayscale.
In some embodiments, the ue usually reports the buried point data in real time, and when the ue needs to report the buried point data in a delayed manner, the ue can determine whether the data needs to be reported in a delayed manner by sending a notification through the server. Specifically, referring to fig. 4, the method for verifying reporting of buried point data according to the present application may further include:
step S200: at least one test device to be tested is obtained.
The server can select at least one user device from the online real user devices as a testing device for the buried point test. The selection may be random, or may be based on the activity level of the line, which is not limited herein. The number of the user equipments to be selected may be set according to the test requirement, and is not limited herein. For example, 500 online real user devices may be extracted.
Step S201: and sending a preset instruction to the at least one test device, wherein the preset instruction is used for instructing the at least one test device to report the data of the buried point in real time and then reporting the data of the buried point in a delayed manner.
After acquiring at least one testing device to be tested, the server may send a preset instruction to the at least one testing device, where the preset instruction is used to instruct the at least one testing device to report the data of the buried point in real time, and then report the data of the buried point in a delayed manner. Therefore, after the test equipment receives the preset instruction issued by the service, the buried point data can be reported in real time and then automatically reported again in a delayed manner.
Step S230: and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result.
In some embodiments, the server may directly perform the buried point data verification after acquiring the third buried point data corresponding to the delayed report; or, at every interval of specified duration, performing primary buried point data verification according to one or more received delay reports corresponding third buried point data in the specified duration. The specified duration may be a time length between a current time of performing the embedded point verification and a last time of performing the embedded point verification. The values are set according to actual test requirements. And is not limited herein. For example, if the specified duration is 1 day, after the server acquires the third buried point data corresponding to the delay report, the buried point data needs to be verified every other day.
In a specific embodiment, when the delayed reporting is the "package and compression reporting of all buried point data of the previous day when the client program of the test is started for the first time every day", since the delayed reporting is performed when the user starts the application program of the test, it is not determined at this time whether the user of the previous day starts the application program of the test again today, nor is it determined when the user starts, so that the time point for checking the buried point data is not determined. Therefore, the time length can be specified through the interval and then the post-processing is carried out, at the moment, the verified time point can be unified, and enough buried point data can be obtained for analysis. For example, the server may automatically match and check all the third buried point data corresponding to the delayed reports received the previous day with the second buried point data corresponding to the corresponding real-time reports received, that is, the server may compare and check the third buried point data corresponding to the delayed reports received on day T +1 and the second buried point data corresponding to the real-time reports received on day T +2, and determine the report verification result of the buried point data.
In some embodiments, the comparison check of the buried data may be a comparison of the number of data pieces. Specifically, referring to fig. 5, step S230 may include:
step S231: and counting the data number of the second buried point data to obtain a first numerical value.
Step S232: and counting the data number of the third buried point data to obtain a second numerical value.
Step S233: calculating a ratio of the first value to the second value.
Step S234: and determining a first verification result of the buried point data according to the ratio, wherein the first verification result is used for representing the loss condition reported by the buried point data.
In some embodiments, after the server obtains the second buried point data and the third buried point data, the server may respectively count the number of data pieces of the second buried point data and the third buried point data to obtain a corresponding first numerical value and a corresponding second numerical value, and then may determine whether the report of the buried point data is lost or missed by comparing the first numerical value and the second numerical value.
As one way, it may be determined whether the first numerical value and the second numerical value are consistent, and when the first numerical value and the second numerical value are inconsistent, it is indicated that the second data of the embedded point or the third data of the embedded point received by the server is likely to be incomplete, so that the second data of the embedded point or the third data of the embedded point may not be used as a basis for a user behavior of a subsequent analysis. When the data is consistent with the data, it is very likely that the data received by the server is complete, and therefore, the data of the second buried point or the data of the third buried point can be used as the basis for the user behavior of the subsequent analysis.
As another mode, a ratio of the first value to the second value may be calculated, so as to determine a first verification result of the buried point data according to the ratio, where the first verification result is used to characterize a loss condition reported by the buried point data. It can be understood that when the ratio is not 1, it indicates that the data of the second buried point or the data of the third buried point received by the server are inconsistent, and it is highly probable that the data of the second buried point or the data of the third buried point received by the server is incomplete. When the ratio is 1, it indicates that the data of the second buried point or the data of the third buried point received by the server are consistent, and the data of the second buried point or the data of the third buried point received by the server is probably complete. Therefore, integrity verification of the buried point data is realized.
In some embodiments, the test device may also count the number of the first buried point data reported, and report the condition value obtained by the counting to the server, so that the server may know the number of the actual complete buried point data of the test device, and may determine whether the reporting of the buried point data is incomplete according to the number. Specifically, referring to fig. 6, the method for verifying reporting of buried point data according to the present application may further include:
step S235: and acquiring a third value reported by the test equipment, wherein the third value is a total number of data obtained by counting the number of the data of the first buried point data reported in a delayed manner by the test equipment.
Step S236: and judging whether the third numerical value is consistent with the second numerical value. If yes, go to step S233; if not, step S237 is executed. Wherein:
step S237: and determining a second verification result of the buried point data, wherein the second verification result is used for representing the loss condition of the buried point data reported in a delayed manner.
In some embodiments, after the test device reports the first buried point data in a delayed manner, the test device may also count the number of the reported first buried point data, and report a third value obtained by the counting to the server. For example, after the test device reports the buried point data in real time on day T, it may report all the detailed buried point data on day T once again in a delayed manner on day T +1, and report the total number (i.e. the total value) of the detailed buried point data.
When the test equipment reports the first buried point data in a delayed manner, the situations of data loss and missing report can exist, so that the situation of loss of the buried point data reported in a delayed manner can be verified. Specifically, after receiving the detail data reported in a delayed manner and storing the detail data in the database, the server may perform statistics on the received detail data reported in a delayed manner, that is, a second numerical value obtained by performing statistics on the third buried point data. Then, before comparing the second embedded point data with the third embedded point data, the server may first determine whether the detail number, i.e., the second numerical value, of the received third embedded point data is consistent with the actual and complete third numerical value counted by the testing device. And if the third numerical value is consistent with the second numerical value, the step of calculating the ratio of the first numerical value to the second numerical value can be executed to determine a first verification result of the buried point data, wherein the first verification result is used for representing the loss condition reported by the buried point data. If the third numerical value is inconsistent with the second numerical value, a second verification result of the buried point data can be directly determined, and the second verification result is used for representing the loss condition of the buried point data reported in a delayed mode.
It can be understood that if the values are consistent, the number of pieces of buried point data reported in a delayed manner is complete, and is not lost. Based on the above, the server may use the third buried point data corresponding to the received delayed report as the actual complete buried point data, and compare the actual complete buried point data with the second buried point data corresponding to the received real-time report, so as to obtain the loss condition of the real-time reported buried point data. If the above-mentioned method of calculating the ratio is adopted, the loss rate of the buried point data reported in real time can be obtained.
If the data is inconsistent with the data reported in the delayed mode, the number of the buried point data reported in the delayed mode is not complete, and the data is lost, namely a second verification result of the buried point data can be determined, and the second verification result is used for representing the loss condition of the buried point data reported in the delayed mode. As a mode, the loss rate of the buried point data reported in a delayed manner can be obtained by calculating the ratio of the second value to the third value.
In some embodiments, when a plurality of test devices are provided, after each test device reports the first buried point data in real time and in a delayed manner, the server may receive the buried point data reported by the plurality of test devices at the same time, that is, the second buried point data and the third buried point data corresponding to each test device may be obtained. The server may obtain one or more target test devices with a third value consistent with the second value from the plurality of test devices, and the target test devices serve as verification objects for real-time reporting of the buried point data, that is, the step of comparing the second buried point data and the third buried point data corresponding to the target test devices may be performed. It can be understood that, if there is a test device in the plurality of test devices whose third value is inconsistent with the second value, it indicates that there is a loss in the delayed reporting of the buried point data of the test device.
For example, the server may first report the corresponding second data (marked as a1) in real time for day T and the corresponding third buried point data (marked as a2) in delayed reporting for day T +1, take out all the detailed buried point data with the above target test device IDs, and then calculate the ratio of the first value and the second value of the target test device, respectively, to obtain the reported verification result of the buried point data of each target test device.
In some embodiments, when the delayed reporting is the timed reporting of "reporting all the buried point data generated in the preset time every interval preset time", the buried point data during the preset time period may be verified. Specifically, referring to fig. 7, step S230 may also include:
step S238 a: and determining the earliest time and the latest time of the preset duration corresponding to the third buried point data.
Step S239 a: and comparing the buried point data with the third buried point data, wherein the triggering time in the second buried point data is between the earliest time and the latest time, and the triggering time is the time for generating the buried point data by the test equipment.
Since the buried point data reported by the test equipment at each time is all the buried point data generated within the preset time length, in some embodiments, the server may also directly verify the buried point data within the preset time length after receiving the third buried point data corresponding to the reported time length.
Specifically, the third embedded point data received by the server is generated within the preset time, so that the earliest time and the latest time of the preset time can be determined, and the second embedded point data with the trigger time between the earliest time and the latest time can be screened out from the second embedded point data corresponding to the real-time report received by the server, so that the screened second embedded point data is also generated within the preset time, and further the embedded point data report verification during the preset time is realized. The triggering time is the time for generating the buried point data by the test equipment. The server compares the screened second buried point data with the received third buried point data to obtain a reporting verification result of the buried point data within a preset time length. For a specific comparison method, reference may be made to the foregoing embodiments, which are not described herein again.
For example, if the whole time is selected for regular reporting (the preset duration is 1 hour), the buried point data reported by the test equipment at 8 am in a fixed time mode is all the buried point data generated between 7 am and 8 am. The server can receive first buried point data reported by the test equipment in real time between 7 a.m. and 8 a.m. as second buried point data, and can also receive buried point data reported at 8 a.m. at fixed time as third buried point data, wherein the buried point data reported at 8 a.m. can be data obtained by packing the first buried point data reported in real time between 7 a.m. and 8 a.m. together. The server can compare the data conditions of the second buried point data and the third buried point data in the period from 7 am to 8 am, and the reporting loss condition of the buried point data in the preset time length can be obtained. The above processes are repeated, and then the timed reporting and the timed verification can be realized.
In some embodiments, the data of the buried point in the selected test time can also be verified. Specifically, referring to fig. 8, step S230 may also include:
step S238 b: and acquiring a test time period to be tested.
Step S239 b: and comparing the buried point data with the triggering time in the testing time period in the second buried point data with the triggering time in the testing time period in the third buried point data, wherein the triggering time is the time for generating the buried point data by the testing equipment.
In some embodiments, the tester may pre-configure the time range to be tested so that the server may obtain the test time period to be tested. And then, second buried point data with the trigger time in the test time period can be screened out from the received second buried point data corresponding to the real-time report, and third buried point data with the trigger time in the test time period can be screened out from the received third buried point data corresponding to the delayed report, so that the screened second buried point data and the screened third buried point data are ensured to be in the test time period. Then the server can compare the two, and the reporting loss condition of the buried point data in the testing time period can be obtained. For a specific comparison, reference may be made to the contents of the foregoing embodiments, which are not described herein again.
In some embodiments, the time for the server to issue the preset instruction to the test equipment may be determined according to the obtained test time period to be tested. As one mode, the server may send a preset instruction to the test device in advance of the test time period, and the test device starts to report the buried point data in a delayed manner only when receiving the preset instruction. Therefore, the test equipment does not need to report the buried point data all the time doubly, and the occupation of the storage space is reduced.
In some embodiments, the data of the buried site of the selected test event may also be verified. Specifically, referring to fig. 9, step S230 may also include:
step S238 c: acquiring a buried point control to be tested, and generating buried point data when the buried point control is triggered.
Step S239 c: and comparing the embedded point data corresponding to the embedded point control element in the second embedded point data with the embedded point data corresponding to the embedded point control element in the third embedded point data, and determining a third verification result of the embedded point data based on the comparison result, wherein the third verification result is used for representing the reporting loss condition of the embedded point data corresponding to the embedded point control element.
In some embodiments, a buried point control to be tested may be determined according to a current test requirement, the buried point control is set in a client application program of the test device, and the client may generate buried point data when the buried point control is triggered. The server can screen out second buried point data corresponding to the buried point control element from the received second buried point data and screen out third buried point data corresponding to the buried point control element from the received third buried point data, so that real-time reporting buried point data and delayed reporting buried point data of the buried point control element can be obtained. The server can determine the reporting loss condition of the data of the buried point corresponding to the buried point control element by comparing the screened second data of the buried point with the screened third data of the buried point. Therefore, the loss rate of the event corresponding to each embedded point control element in the current network environment can be obtained.
In some embodiments, after the server obtains the reported verification result of the buried point data, the server may return the result to the buried point configuration background corresponding to the tester for display. When the verification result does not accord with the set value, the tester can correspondingly check the embedded point code of the client according to the corresponding reported verification result and re-verify the embedded point data. When the verification result meets the set value, the verification can be ended.
In an embodiment, please refer to fig. 10, where fig. 10 is a schematic diagram illustrating an overall process of reporting verification of buried point data according to an embodiment of the present application. After the tester inputs the event information into the buried point configuration background, the buried point configuration background can generate a corresponding event ID and a buried point code according to the input information. The buried point code can then be embedded in the client version and provided for use by real users online. A tester can configure a background at a buried point to select an event to be tested, and select a time range and a client version to be tested. At this time, after receiving a preset instruction (delayed report notification) issued by the server, the test device may trigger the dual report verification. And reporting the T day in real time, reporting the T +1 day in a delayed mode, calculating and comparing the T +2 days, and displaying the result. When the display result does not accord with the set value, the codes of the client side can be detected, and the embedded point test is restarted.
In some embodiments, the mainstream site-burying management system lacks a method for real-time verification of site data in a multi-network environment of different countries, different operators and the like. Therefore, in the test stage before the gray level stage, the accuracy of the buried point reporting is verified by adopting a buried point data verification mode in a multi-network environment, the gray level stage can be performed after the accuracy verification is passed, and the integrity (namely the loss condition) of the buried point data reporting is verified by adopting the double reporting verification mode.
The forwarding proxy servers can be deployed correspondingly by a tester under a network environment needing to be verified, so that each forwarding proxy server can simulate the embedded point report of the test equipment under the network environment where the forwarding proxy server is located. As one way, the forwarding proxy service may be implemented by renting one server, such as by the ariloc and amazon, or the forwarding proxy service may be implemented by using an existing server, so as to reduce the deployment cost, such as by using cloud servers provided by cloud service vendors that have deployed servers in multiple national regions. Of course, the specific type of forwarding proxy server is not limited herein, and it only needs to be in the network environment to be tested and it can receive the embedded data and send the embedded data to the server.
As one way, the tester may pre-log the network environment to be tested. Therefore, when receiving the buried point data reported by the local test equipment, the server can distribute the buried point data to the servers (namely forwarding proxy servers) of the tested network environments, and the servers of the tested network environments can simulate real user equipment and report (return) the buried point data to the servers. Therefore, data reporting of foreign environments can be simulated at home, which is equivalent to simulating that testers exist in other countries and regions, and the test equipment triggers a reporting flow of buried point data. The method and the device realize that even if the local embedded point system is managed, the test equipment under different network environments can be verified in real time, and whether the reported embedded point data is accurate and complete or not.
For example, referring to fig. 11, fig. 11 is a schematic view illustrating an overall process of reporting verification of another buried point data according to an embodiment of the present application. The buried point test of the application can be applied to the gray scale release stage. Before the embedded point test of the application, the embedded point can be manually triggered by a tester to perform single-point multi-network test on the test version of the client. Specifically, a client developer can implant the buried point code in the version of the test client according to the business specification. Then, a tester selects an event to be tested in a buried point configuration background, and after selecting a network environment of a country, an operator and the like to be tested, the buried point configuration background generates a two-dimensional code. And (4) scanning the two-dimensional code by a tester at the client side implanted with the embedded point code, and automatically accessing the reported embedded point data stream to the server by the client side. When the server is not successfully accessed, the embedded point code of the testing client version and the network state can be checked to determine whether the network state is normal. And then scanning the code again to access the server.
The tester can click the interactive content corresponding to the test event at the client, and the client reports the buried point data to the server. If a plurality of network environments are selected in the test, the server forwards the reported data to the proxy servers of different network environments according to the network environment configuration. The proxy server can simulate clients under different network environments to report buried point data to the service server. After receiving the buried point data returned by the proxy server, the server can analyze the buried point value in the buried point data and compare the buried point value with the buried point value in the buried point code generated during the event pre-recorded. If the comparison result is correct, the buried point configuration background can display a corresponding interactive interface (namely a pre-recorded event interactive graph used for determining whether the currently triggered interactive content is correct) and network information; if the comparison has no result or is not finished, an interface is automatically popped up after ten minutes to prompt that the comparison is overtime. The buried point code can be rechecked. If the comparison is needed again, the page needs to be refreshed. When the testing personnel passes the test of the test version of the client, the test version of the client can be subjected to gray release, and at the moment, the real users on the line of the extractable part can be subjected to double reporting verification.
For example, if the pre-entered event interaction interface is a mobile phone login interface, and a tested embedded point event, such as a "mobile phone number one-key login" button, can be marked in the mobile phone login interface (for example, the button is framed by a frame with a striking color), a tester can configure the pre-entered mobile phone login interface popped up in the background through the embedded point, and determine whether an event actually clicked on the mobile phone login interface of the test client is the "mobile phone number one-key login" button. If yes, the buried point is correct. In addition, the embedded point configuration background may also pop up a data list of embedded points that is successfully verified, where the list includes network environment information such as country, region, and operator, and also includes other information such as receiving time and ID of the testing device, which is not limited herein.
Furthermore, when a plurality of network environments to be tested exist, a tester can determine whether the data of the buried points in all the network environments meet a set value according to the data information of the buried points displayed by the buried point configuration background. The number of the network environments to be tested and the number of the network environments which actually receive the verification result are judged to be consistent, and if the number of the network environments to be tested and the number of the network environments which actually receive the verification result are inconsistent, the problem of the buried point reporting of part of the network environments can be shown. The tester can determine whether to recheck the lacking network environment according to the verification result of the lacking network environment. When the tester determines to re-check, it may first check whether it is a network problem with the forwarding proxy server. When the network abnormality of the forwarding proxy server is detected, the backup proxy server can be switched to carry out re-verification.
According to the verification method for reporting buried point data provided by the embodiment of the application, the buried point data received by the server after the test equipment reports the first buried point data in real time is used as the second buried point data, the buried point data received by the server after the same test equipment reports the first buried point data in a delayed manner is used as the third buried point data, then the data strip number of the second buried point data and the data strip number of the third buried point data are compared, and the reporting loss condition of the buried point data can be determined based on the comparison result. Therefore, after the buried point data reported by the batch of user equipment in real time is collected, the data is compared and verified with the secondary data collected by the same batch of user equipment through offline comparison, so that the server can determine the reporting loss condition of the buried point data according to the buried point data reported in real time and delayed by the same or same batch of test equipment, the integrity of the buried point data of the internet products can be effectively improved, and the verification of the reporting loss rate of the buried point data of the batch of user equipment in a real network environment is realized.
Referring to fig. 12, fig. 12 is a flowchart illustrating a verification method for reporting buried point data according to another embodiment of the present application, which can be applied to the test equipment, and in a specific embodiment, the verification method for reporting buried point data can also be applied to the verification apparatus 600 for reporting buried point data shown in fig. 14 and the electronic device 800 shown in fig. 15. The reporting verification method of the buried point data can comprise the following steps:
step S310: and reporting the first embedded data to a server in real time.
In some embodiments, the testing device may be a user device that has installed a testing application program for embedding the embedded point code, and the embedded point is triggered by a tester to perform the testing of the embedded point data; or the user equipment which is installed with a formal version application program with embedded point codes can trigger embedded point interaction in the application program by an online real user. When the buried point is triggered, the test equipment can send the generated buried point data to the server through the current network of the user in real time. Therefore, the server can receive the first buried point data reported by the test equipment in real time.
Step S320: and the server is used for comparing the data of the embedded points received in the first data of the embedded points reported in real time with the data of the embedded points received in the first data of the embedded points reported in a delayed manner, and determining a reporting verification result of the data of the embedded points based on a comparison result.
In some embodiments, after the test device reports the first embedded data to the server in real time, the test device may report the first embedded data to the server again with a delay. Therefore, after receiving the buried point data reported in real time, the server can also receive the buried point data reported in a delayed manner. The server receives the data of the buried points which may be incomplete due to the problems of missing report and loss in the reporting process, so that the server can compare the data of the buried points received in the first data of the buried points reported in real time with the data of the buried points received in the first data of the buried points reported in a delayed mode, and determine the reporting verification result of the data of the buried points based on the comparison result.
In some embodiments, the test device generally reports the buried point data to the server in real time at a single time, the server needs to issue a preset instruction to the test device to be tested, and the test device can automatically report the first buried point data again with a delay after reporting the first buried point data in real time after receiving the preset instruction. The preset instruction is used for indicating the testing equipment to report the data of the buried point in real time and then reporting the data of the buried point in a delayed manner.
According to the verification method for reporting buried point data provided by the embodiment of the application, after the test equipment is controlled to report the first buried point data in real time, the first buried point data is reported in a delayed manner, so that the server can determine the reporting verification result of the buried point data according to the comparison result of the buried point data received in the first buried point data reported in real time and the buried point data received in the first buried point data reported in a delayed manner. The integrity of the collected buried point data is improved, and meanwhile, the buried point verification efficiency is also improved.
In some practical application scenarios, before performing the data verification of the buried point, the relevant personnel may perform early deployment, which may include: the system comprises a buried point configuration background (buried point background), a test client, a formal client, a distribution server, a forwarding proxy server and a receiving and computing server. Wherein:
buried point configuration background (buried point background): the contents such as event ID, embedded point code, two-dimensional code and the like can be automatically generated according to the input information; the event needing to trigger the verification is selected by a tester, and after the verification of the client is completed, the buried point data and the statistical result reported by the client can be displayed. If the existing embedded point management background is available, the embedded point management background can be used as a component of the existing background to supplement missing functions based on the existing background. In some embodiments, the tester may enter a threshold in advance (e.g., 95% to verify the reasonableness of the data of the buried points), and if the ratio of the data of the buried points is lower than the threshold, the statistical result may be set to different colors to remind the relevant people to pay attention. For example, when performing embedded point verification of an application login event, if the ratio of the total number of devices receiving the embedded point data to the total number of test devices (i.e., login rate) is too low, it means that there are too few login users, which is problematic and needs attention.
Testing the client: the user equipment with the application program needing to be tested/verified is installed and is provided for testing by a tester. The embedded point codes are embedded into the application programs, and the embedded point data are reported to the distribution server after the two-dimensional codes are scanned and embedded point interaction is triggered.
And (3) formal client side: after the user equipment installed with the formal version application program embedded with the embedded point codes triggers embedded point interaction by an online real user, the embedded point data is sent to a receiving server through a user current network. Whether the delayed report is needed can be judged by a mode of sending the notice by the receiving server.
A distribution server: and distributing the received client embedded data to each network forwarding proxy server according to the pre-recorded information. Or sending the notice of whether to open the delayed report to the formal client.
The forwarding proxy server: and deploying a server in a region needing verification, and simulating a client under different network environments to send the buried point data to a receiving server. The cloud server provided by a cloud service manufacturer can be used, and the deployment cost is reduced.
Receiving and computing a server: and receiving the data of the buried point returned by each forwarding proxy server, checking and calculating the accuracy and the integrity of the data of the buried point in real time, returning the result to a buried point configuration background, and storing the reported data of the buried point test/check. If the existing buried data receiving and real-time/off-line computing server exists, the existing receiving and computing server can be directly used to ensure the consistency of the test data and the on-line data.
Referring to fig. 13, fig. 16 is a block diagram illustrating a structure of an apparatus 600 for verifying reporting of buried point data according to an embodiment of the present application, where the apparatus 600 is applied to a server. The reporting verification apparatus 600 for buried point data may include: a real-time data acquisition module 610, a delayed data acquisition module 620, and a data verification module 630. The real-time data acquisition module 610 is configured to acquire buried point data received by the server after the test device reports the first buried point data in real time, and use the buried point data as second buried point data; a delay data obtaining module 620, configured to obtain buried point data received by the server after the test device reports the first buried point data in a delay manner, where the buried point data is used as third buried point data; and a data verification module 630, configured to compare the second buried point data with the third buried point data, and determine a verification result of reporting the buried point data based on the comparison result.
In some embodiments, the data verification module 630 may include: the real-time counting unit is used for counting the data number of the second buried point data to obtain a first numerical value; the delay counting unit is used for counting the data number of the third buried point data to obtain a second numerical value; the comparison unit is used for calculating the ratio of the first numerical value to the second numerical value; and the result determining unit is used for determining a first verification result of the buried point data according to the ratio, wherein the first verification result is used for representing the loss condition reported by the buried point data.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: and the standard value acquisition module is used for acquiring a third value reported by the test equipment, wherein the third value is the total number of data obtained by counting the number of the data of the first buried point data reported in a delayed manner by the test equipment.
In this embodiment, the apparatus 600 for reporting and verifying buried point data may further include: and a first judgment execution module, configured to execute the step of calculating the ratio of the first value to the second value when the third value is consistent with the second value.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: and the second judgment execution module is used for determining a second verification result of the buried point data when the third numerical value is inconsistent with the second numerical value, and the second verification result is used for representing the loss condition of the buried point data reported in a delayed manner.
In some embodiments, the delayed data obtaining module 620 may be specifically configured to: and acquiring data of the buried point received by the server after the test equipment regularly reports the first data of the buried point, wherein the data of the buried point is used as third data of the buried point, the regular reporting is used for representing the preset time length of the test equipment at each interval, and reporting all data of the buried point generated in the preset time length.
In some embodiments, the data validation module 630 may be specifically configured to: determining the earliest time and the latest time of the preset duration corresponding to the third buried point data; and comparing the buried point data with the third buried point data, wherein the triggering time in the second buried point data is between the earliest time and the latest time, and the triggering time is the time for generating the buried point data by the test equipment.
In some embodiments, the data verification module 630 may also be specifically configured to: acquiring a test time period to be tested; and comparing the buried point data with the triggering time in the testing time period in the second buried point data with the triggering time in the testing time period in the third buried point data, wherein the triggering time is the time for generating the buried point data by the testing equipment.
In some embodiments, the data verification module 630 may be further specifically configured to: acquiring a buried point control to be tested, and generating buried point data when the buried point control is triggered; and comparing the embedded point data corresponding to the embedded point control element in the second embedded point data with the embedded point data corresponding to the embedded point control element in the third embedded point data, and determining a third verification result of the embedded point data based on the comparison result, wherein the third verification result is used for representing the reporting loss condition of the embedded point data corresponding to the embedded point control element.
In some embodiments, the reporting verification apparatus 600 for buried point data may further include: the device comprises a device selection module and an instruction issuing module. The equipment selection module is used for acquiring at least one piece of test equipment to be tested; the instruction issuing module is used for sending a preset instruction to the at least one test device, wherein the preset instruction is used for instructing the at least one test device to report the data of the buried point in real time and then to report the data of the buried point in a delayed manner.
The device for verifying reporting of buried point data provided in the embodiment of the present application is used to implement the method for verifying reporting of buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Referring to fig. 14, fig. 14 is a block diagram illustrating another apparatus 700 for verifying reporting of buried point data according to an embodiment of the present disclosure, where the apparatus 700 is applied to a test device. The device 700 for reporting and verifying the buried point data may include: a real-time reporting module 710 and a delayed reporting module 720. The real-time reporting module 710 is configured to report the first buried point data to the server in real time; and a delayed reporting module 720, configured to report the first buried point data to the server in a delayed manner, where the server is configured to compare the data of the buried point received in the first buried point data reported in real time with the data of the buried point received in the first buried point data reported in a delayed manner, and determine a reporting verification result of the data of the buried point based on a comparison result.
The device for verifying reporting of buried point data provided in the embodiment of the present application is used to implement the method for verifying reporting of buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses and modules may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, the coupling or direct coupling or communication connection between the modules shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or modules may be in an electrical, mechanical or other form.
In addition, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module. The integrated module can be realized in a hardware mode, and can also be realized in a software functional module mode.
Referring to fig. 15, fig. 15 is a block diagram illustrating a structure of an electronic device according to an embodiment of the present disclosure. The electronic device 800 may be the server or the testing device, and the testing device is installed with a client to be tested. The testing device can be a user device which can run an application program, such as a smart phone, a tablet computer, a notebook computer, a desktop computer and wearable terminal equipment. The electronic device 800 in the present application may include one or more of the following components: a processor 810, a memory 820, and one or more applications, wherein the one or more applications may be stored in the memory 820 and configured to be executed by the one or more processors 810, the one or more applications configured to perform the methods described in the above method embodiments applied to a server, and also configured to perform the methods described in the above method embodiments applied to a test device.
Processor 810 may include one or more processing cores. The processor 810 interfaces with various interfaces and circuitry throughout the electronic device 800 to perform various functions and process data of the electronic device 800 by executing or executing instructions, programs, code sets, or instruction sets stored in the memory 820 and invoking data stored in the memory 820. Alternatively, the processor 810 may be implemented in hardware using at least one of Digital Signal Processing (DSP), Field-Programmable Gate Array (FPGA), and Programmable Logic Array (PLA). The processor 810 may integrate one or a combination of a Central Processing Unit (CPU), a Graphic Processing Unit (GPU), a modem, and the like. Wherein, the CPU mainly processes an operating system, a user interface, an application program and the like; the GPU is used for rendering and drawing display content; the modem is used to handle wireless communications. It is understood that the modem may not be integrated into the processor 810, but may be implemented by a communication chip.
The Memory 820 may include a Random Access Memory (RAM) or a Read-Only Memory (Read-Only Memory). The memory 820 may be used to store instructions, programs, code sets, or instruction sets. The memory 820 may include a stored program area and a stored data area, wherein the stored program area may store instructions for implementing an operating system, instructions for implementing at least one function (such as a touch function, a sound playing function, an image playing function, etc.), instructions for implementing various method embodiments described below, and the like. The stored data area may also store data created during use by the electronic device 800, and the like.
Those skilled in the art will appreciate that the structure shown in fig. 15 is a block diagram of only a portion of the structure relevant to the present application, and does not constitute a limitation on the electronic device to which the present application is applied, and a particular electronic device may include more or less components than those shown in the drawings, or combine certain components, or have a different arrangement of components.
In summary, the electronic device provided in the embodiment of the present application is used to implement the method for reporting and verifying the corresponding buried point data in the foregoing method embodiment, and has the beneficial effects of the corresponding method embodiment, which are not described herein again.
Referring to fig. 16, a block diagram of a computer-readable storage medium according to an embodiment of the present disclosure is shown. The computer-readable storage medium 900 stores program codes, which can be called by a processor to execute the methods described in the above embodiments of the method applied to the client, and can also be called by a processor to execute the methods described in the above embodiments of the method applied to the server.
The computer-readable storage medium 900 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. Alternatively, the computer-readable storage medium 900 includes a non-transitory computer-readable storage medium. The computer readable storage medium 900 has storage space for program code 910 to perform any of the method steps of the method described above. The program code can be read from or written to one or more computer program products. The program code 910 may be compressed, for example, in a suitable form.
In the description herein, reference to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the application. In this specification, the schematic representations of the terms used above are not necessarily intended to refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the same; although the present application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not necessarily depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (14)

1. A reporting verification method of buried point data is characterized by being applied to a server and comprising the following steps:
acquiring buried point data received by a server after the test equipment reports the first buried point data in real time, and taking the data as second buried point data;
acquiring buried point data received by the server after the test equipment reports the first buried point data in a delayed manner, and taking the data as third buried point data;
and comparing the second buried point data with the third buried point data, and determining a reporting verification result of the buried point data based on a comparison result.
2. The method of claim 1, wherein comparing the second buried point data with the third buried point data and determining a reported verification result of the buried point data based on the comparison result comprises:
counting the data number of the second buried point data to obtain a first numerical value;
counting the data number of the third buried point data to obtain a second numerical value;
calculating the ratio of the first value to the second value;
and determining a first verification result of the buried point data according to the ratio, wherein the first verification result is used for representing the loss condition reported by the buried point data.
3. The method of claim 2, wherein after obtaining the buried point data received by the server after the test device reports the first buried point data in a delayed manner, the method further comprises:
acquiring a third value reported by the test equipment, wherein the third value is a total number of data obtained by counting the number of data of the first buried point data reported in a delayed manner by the test equipment;
after the counting of the number of the data of the third buried point data to obtain a second value, the method further includes:
when the third value and the second value are consistent, the step of calculating the ratio of the first value to the second value is executed.
4. The method of claim 3, further comprising:
and when the third numerical value is inconsistent with the second numerical value, determining a second verification result of the buried point data, wherein the second verification result is used for representing the loss condition of the buried point data reported in a delayed manner.
5. The method according to any one of claims 1 to 4, wherein the obtaining of the buried point data received by the server after the test device reports the first buried point data in a delayed manner serves as a third buried point data, and the method includes:
and acquiring data of the buried point received by the server after the test equipment regularly reports the first data of the buried point, wherein the data of the buried point is used as third data of the buried point, the regular reporting is used for representing the preset time length of the test equipment at each interval, and reporting all data of the buried point generated in the preset time length.
6. The method of claim 5, wherein comparing the second buried point data to the third buried point data comprises:
determining the earliest time and the latest time of the preset duration corresponding to the third buried point data;
and comparing the buried point data with the third buried point data, wherein the triggering time in the second buried point data is between the earliest time and the latest time, and the triggering time is the time for generating the buried point data by the test equipment.
7. The method of any one of claims 1-4, wherein said comparing said second buried point data to said third buried point data comprises:
acquiring a test time period to be tested;
and comparing the buried point data with the triggering time in the testing time period in the second buried point data with the triggering time in the testing time period in the third buried point data, wherein the triggering time is the time for generating the buried point data by the testing equipment.
8. The method according to any one of claims 1 to 4, wherein the comparing the second buried point data with the third buried point data and determining the reported verification result of the buried point data based on the comparison result comprises:
acquiring a buried point control to be tested, and generating buried point data when the buried point control is triggered;
and comparing the embedded point data corresponding to the embedded point control element in the second embedded point data with the embedded point data corresponding to the embedded point control element in the third embedded point data, and determining a third verification result of the embedded point data based on the comparison result, wherein the third verification result is used for representing the reporting loss condition of the embedded point data corresponding to the embedded point control element.
9. The method as claimed in any one of claims 1 to 4, wherein before the obtaining test device reports the data of the first buried point in real time and the data of the buried point received by the server is used as the data of the second buried point, the method further comprises:
acquiring at least one test device to be tested;
and sending a preset instruction to the at least one test device, wherein the preset instruction is used for instructing the at least one test device to report the data of the buried point in real time and then reporting the data of the buried point in a delayed manner.
10. A reporting verification method of buried point data is characterized by being applied to test equipment, and comprises the following steps:
reporting the first buried point data to a server in real time;
and the server is used for comparing the data of the embedded points received in the first data of the embedded points reported in real time with the data of the embedded points received in the first data of the embedded points reported in a delayed manner, and determining a reporting verification result of the data of the embedded points based on a comparison result.
11. A device for reporting and verifying buried point data is applied to a server and comprises:
the real-time data acquisition module is used for acquiring buried point data received by the server after the test equipment reports the first buried point data in real time and using the buried point data as second buried point data;
a delay data obtaining module, configured to obtain buried point data received by the server after the test device reports the first buried point data in a delay manner, where the buried point data is used as third buried point data;
and the data verification module is used for comparing the second buried point data with the third buried point data and determining a reporting verification result of the buried point data based on a comparison result.
12. A device for reporting and verifying buried point data is applied to test equipment, and comprises:
the real-time reporting module is used for reporting the first buried point data to the server in real time;
and the server is used for comparing the data of the embedded points received in the first embedded point data reported in real time with the data of the embedded points received in the first embedded point data reported in a delayed manner, and determining a reporting verification result of the data of the embedded points based on a comparison result.
13. An electronic device, comprising:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more applications configured to perform the method of any of claims 1-10.
14. A computer-readable storage medium, having stored thereon program code that can be invoked by a processor to perform the method according to any one of claims 1 to 10.
CN202010366145.9A 2020-04-30 2020-04-30 Reporting verification method and device of buried point data, electronic equipment and storage medium Pending CN111611141A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010366145.9A CN111611141A (en) 2020-04-30 2020-04-30 Reporting verification method and device of buried point data, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010366145.9A CN111611141A (en) 2020-04-30 2020-04-30 Reporting verification method and device of buried point data, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN111611141A true CN111611141A (en) 2020-09-01

Family

ID=72198058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010366145.9A Pending CN111611141A (en) 2020-04-30 2020-04-30 Reporting verification method and device of buried point data, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111611141A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442225A (en) * 2022-08-01 2022-12-06 上海数禾信息科技有限公司 Method and device for reporting buried point log and method and device for monitoring buried point quality

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054449A1 (en) * 1999-03-06 2000-09-14 Robert Bosch Gmbh Data transmission device and method
CN106294101A (en) * 2015-05-19 2017-01-04 阿里巴巴集团控股有限公司 The page gets method of testing and device ready
CN108063691A (en) * 2016-11-08 2018-05-22 阿里巴巴集团控股有限公司 One kind buries point data consistency detecting method, apparatus and system
CN108319552A (en) * 2018-02-07 2018-07-24 优信数享(北京)信息技术有限公司 One kind burying a test method, apparatus and system
CN108363657A (en) * 2018-01-25 2018-08-03 上海连尚网络科技有限公司 Monitoring APP clients bury method, equipment and the medium of point data acquisition integrality
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000054449A1 (en) * 1999-03-06 2000-09-14 Robert Bosch Gmbh Data transmission device and method
CN106294101A (en) * 2015-05-19 2017-01-04 阿里巴巴集团控股有限公司 The page gets method of testing and device ready
CN108063691A (en) * 2016-11-08 2018-05-22 阿里巴巴集团控股有限公司 One kind buries point data consistency detecting method, apparatus and system
WO2019100614A1 (en) * 2017-11-22 2019-05-31 平安科技(深圳)有限公司 Buried point data processing method, device, computer device and storage medium
CN108363657A (en) * 2018-01-25 2018-08-03 上海连尚网络科技有限公司 Monitoring APP clients bury method, equipment and the medium of point data acquisition integrality
CN108319552A (en) * 2018-02-07 2018-07-24 优信数享(北京)信息技术有限公司 One kind burying a test method, apparatus and system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115442225A (en) * 2022-08-01 2022-12-06 上海数禾信息科技有限公司 Method and device for reporting buried point log and method and device for monitoring buried point quality

Similar Documents

Publication Publication Date Title
US10210036B2 (en) Time series metric data modeling and prediction
CN111611140B (en) Report verification method and device for buried point data, electronic equipment and storage medium
US10671469B2 (en) High-volume distributed script error handling
US8914504B2 (en) End user performance monitoring for mobile applications
CN108073506B (en) Test method and device
US20150019715A1 (en) Methods and Systems for Performance Monitoring for Mobile Applications
CN108134708B (en) Method and device for monitoring third-party interface
CN107168844B (en) Performance monitoring method and device
CN109618176A (en) A kind of processing method of live broadcast service, equipment and storage medium
CN114584829B (en) Method and system for managing list active page
CN114168429A (en) Error reporting analysis method and device, computer equipment and storage medium
US20180285490A1 (en) Method, apparatus, and computer program product for simulating client and application interface integration
CN111611141A (en) Reporting verification method and device of buried point data, electronic equipment and storage medium
US10432490B2 (en) Monitoring single content page application transitions
CN113312237A (en) Information feedback method and device, electronic equipment and storage medium
CN106482742B (en) The acquisition methods and device of step counting data
US20230053592A1 (en) Performance profiler of third party automations
CN113946515B (en) Code coverage rate testing method and device, computer equipment and storage medium
CN113836013A (en) Embedded point testing method and device, computer equipment and computer readable storage medium
Zhu et al. Challenges in practicing high frequency releases in cloud environments
CN114463044A (en) Advertisement plan adjusting method, device, computer equipment and storage medium
US20170068988A1 (en) Device integrity based assessment of indication of user action associated with an advertisement
CN112835780A (en) Service detection method and device
CN115242615B (en) Server operation management method and device, electronic equipment and storage medium
CN115330466A (en) Advertisement traffic cheating interception method and device, server and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
EE01 Entry into force of recordation of patent licensing contract
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20200901

Assignee: GUANGZHOU CUBESILI INFORMATION TECHNOLOGY Co.,Ltd.

Assignor: GUANGZHOU HUADUO NETWORK TECHNOLOGY Co.,Ltd.

Contract record no.: X2021440000031

Denomination of invention: Report verification method, device, electronic equipment and storage medium of buried point data

License type: Common License

Record date: 20210125

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200901