CN111736918A - Buried point configuration method and device and electronic equipment - Google Patents

Buried point configuration method and device and electronic equipment Download PDF

Info

Publication number
CN111736918A
CN111736918A CN202010536672.XA CN202010536672A CN111736918A CN 111736918 A CN111736918 A CN 111736918A CN 202010536672 A CN202010536672 A CN 202010536672A CN 111736918 A CN111736918 A CN 111736918A
Authority
CN
China
Prior art keywords
configuration
buried point
webpage
target page
point configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010536672.XA
Other languages
Chinese (zh)
Other versions
CN111736918B (en
Inventor
孙春清
易潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010536672.XA priority Critical patent/CN111736918B/en
Publication of CN111736918A publication Critical patent/CN111736918A/en
Application granted granted Critical
Publication of CN111736918B publication Critical patent/CN111736918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the disclosure provides a buried point configuration method and device and electronic equipment, and belongs to the technical field of computers. The method comprises the following steps: receiving a preset type of clicking operation acting on a target page; generating a buried point configuration request according to a preset type of clicking operation, wherein the buried point configuration request comprises identification information of a target page; sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page; linking to a buried point configuration webpage and collecting configuration input acting on the buried point configuration webpage; and sending the configuration input to a configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input. According to the scheme, the embedded point configuration of the page is realized by applying operation on the mobile terminal by a mobile terminal user, so that the inaccuracy possibly caused by simulating the mobile terminal configuration page at the configuration server end can be effectively avoided, and the authenticity of the running environment and the convenience of embedded point configuration are improved.

Description

Buried point configuration method and device and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for configuring a buried point, and an electronic device.
Background
The embedded point is to set a code in the web page for recording the interactive operation of the user on the web page element. For example, in the webpage, there is an advertisement-like interactive area, and through the code of the embedded point setting, it can be checked whether the user clicks on the advertisement.
In the prior art, a method for configuring a buried point generally simulates a configuration page of a mobile terminal in a page of a Personal Computer (PC) of a configuration server, and then performs a buried point configuration operation on the simulated mobile terminal web page from a web page of the PC.
Because the operation mode adopts a mode that the PC side simulates the mobile side webpage, 2 problems can exist: (1) the simulated page is not a real operating environment, so that the result is not always completely correct. (2) The simulated page usually needs to be configured by a special PC and special software, so that the user is inconvenient to configure at any time and any place.
Therefore, the technical problems of poor accuracy and convenience of point burying exist in a point burying configuration scheme in the prior art.
Disclosure of Invention
In view of the above, the embodiments of the present disclosure provide a buried point configuration, which at least partially solves the problems in the prior art.
In a first aspect, an embodiment of the present disclosure provides a method for configuring a buried point, which is applied to a mobile terminal, and the method includes:
receiving a preset type of clicking operation acting on a target page;
generating a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
linking to the buried point configuration webpage and collecting configuration input acting on the buried point configuration webpage;
and sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page includes:
sending the target page and the embedded point configuration request to the configuration server so that the configuration server generates a two-dimensional code of an embedded point configuration webpage corresponding to the target page;
the step of linking to the buried point configuration webpage comprises:
receiving and scanning the two-dimensional code;
and linking to the buried point configuration webpage, and starting a buried point configuration mode.
According to a specific implementation manner of the embodiment of the present disclosure, the step of collecting the configuration input acting on the buried point configuration webpage includes:
monitoring and collecting configuration input of a corresponding target buried point project acting on the buried point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs the embedded point configuration on the target page according to the configuration input includes:
and sending the configuration input of the buried point configuration webpage corresponding to the target buried point project to the configuration server so that the configuration server configures the target buried point project for the target page.
According to a specific implementation manner of the embodiment of the present disclosure, after the step of sending the configuration input to the configuration server to enable the configuration server to perform the embedded point configuration on the target page according to the configuration input, the method further includes:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
sending the embedded point detection request to a configuration server so that the configuration server returns an embedded point detection webpage corresponding to the target page;
linking to the buried point detection webpage, and capturing user behaviors acting on the buried point detection webpage;
and sending the captured user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains the embedded point detection result of the target page.
In a second aspect, an embodiment of the present disclosure provides a method for configuring a buried point, where the method is applied to a configuration server, and the method includes:
receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of the target page requesting for buried point configuration;
generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
and performing embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating the buried point configuration webpage corresponding to the target page according to the buried point configuration request includes:
generating a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage includes:
and sending the two-dimension code to the mobile terminal so that the mobile terminal scans the two-dimension code and links to the embedded point configuration webpage, and starting an embedded point configuration mode.
According to a specific implementation manner of the embodiment of the present disclosure, the step of receiving the embedded point configuration request sent by the mobile terminal includes:
the step of performing the embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input corresponding to the target buried point project, which is acquired by the mobile terminal and acts on the buried point configuration page;
and configuring the target buried point project for the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target buried point item for the target page according to the configuration input includes:
extracting a target buried point category and a configuration parameter in the target buried point project corresponding to the configuration input;
searching a buried point code segment corresponding to the target buried point category from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted code segment of the buried point to the target page.
In a third aspect, an embodiment of the present disclosure provides a buried point configuration method, including:
the method comprises the steps that a mobile terminal receives a click operation of a preset type acting on a target page and generates a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
the mobile terminal sends the embedded point configuration request to a configuration server;
the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request and sends the buried point configuration webpage to the mobile terminal;
the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
the mobile terminal sends the configuration input to the configuration server;
and the configuration server performs embedded point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, by the configuration server, a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sending the buried point configuration webpage to the mobile terminal includes:
the configuration server generates a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the buried point configuration webpage includes:
the mobile terminal receives and scans the two-dimension code;
and linking to the buried point configuration webpage, and starting a buried point configuration mode.
In a fourth aspect, an embodiment of the present disclosure provides a buried point configuration device, including:
the receiving module is used for receiving the clicking operation of the preset type acting on the target page;
a generating module, configured to generate a buried point configuration request according to the click operation of the preset type, where the buried point configuration request includes identification information of the target page;
the first sending module is used for sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
the acquisition module is used for linking to the embedded point configuration webpage and acquiring configuration input acting on the embedded point configuration webpage;
and the second sending module is used for sending the configuration input to the configuration server so that the configuration server carries out embedded point configuration on the target page according to the configuration input.
In a fifth aspect, an embodiment of the present disclosure further provides an electronic device, where the electronic device includes:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of configuring a buried point in any of the implementations of the first aspect or the first aspect.
In a sixth aspect, the disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing a computer to perform the method of configuring a buried point in any implementation manner of the first aspect or the first aspect.
In a seventh aspect, the disclosed embodiments also provide a computer program product, the computer program product comprising a computer program stored on a non-transitory computer-readable storage medium, the computer program comprising program instructions that, when executed by a computer, cause the computer to perform the method of configuring a buried point in any of the implementations of the first aspect or the foregoing first aspect.
The buried point configuration scheme in the embodiment of the present disclosure includes: receiving a preset type of clicking operation acting on a target page; generating a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page; sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page; linking to the buried point configuration webpage and collecting configuration input acting on the buried point configuration webpage; and sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input. By the scheme, the user-defined embedded point configuration for the page is realized by utilizing the interactive process between the mobile terminal and the configuration server and applying specific operation acting on the target page on the mobile terminal by a mobile terminal user. Therefore, the inaccuracy possibly caused by simulating the mobile terminal configuration page at the configuration server can be effectively avoided, and the authenticity of the operating environment and the convenience of the embedded point configuration are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings needed to be used in the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present disclosure, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for configuring a buried point applied to a mobile terminal according to an embodiment of the present disclosure;
fig. 2 is a partial schematic flow chart of another method for configuring a buried point applied to a mobile terminal according to an embodiment of the present disclosure;
fig. 3 is a schematic partial flowchart of a buried point configuration method applied to a configuration server according to an embodiment of the present disclosure;
fig. 4 is a schematic flow chart of another method for configuring a buried point according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a buried point configuration device according to an embodiment of the present disclosure;
fig. 6 is a schematic view of an electronic device provided in an embodiment of the present disclosure.
Detailed Description
The embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
The embodiments of the present disclosure are described below with specific examples, and other advantages and effects of the present disclosure will be readily apparent to those skilled in the art from the disclosure in the specification. It is to be understood that the described embodiments are merely illustrative of some, and not restrictive, of the embodiments of the disclosure. The disclosure may be embodied or carried out in various other specific embodiments, and various modifications and changes may be made in the details within the description without departing from the spirit of the disclosure. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the appended claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the disclosure, one skilled in the art should appreciate that one aspect described herein may be implemented independently of any other aspects and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. Additionally, such an apparatus may be implemented and/or such a method may be practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present disclosure, and the drawings only show the components related to the present disclosure rather than the number, shape and size of the components in actual implementation, and the type, amount and ratio of the components in actual implementation may be changed arbitrarily, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided to facilitate a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
Referring to fig. 1, a flow chart of a buried point configuration method provided in the embodiment of the present disclosure is schematically shown, and the provided buried point configuration method is applied to a mobile terminal. As shown in fig. 1, the method mainly includes:
s101, receiving a preset type of clicking operation acting on a target page;
the method for configuring the embedded point provided by the embodiment is applied to a scene of configuring the embedded point in a set page. The point burying is that certain information is collected in a specific process in the application to track the using condition of the application, and is subsequently used for further optimizing products or providing data support of operation, wherein the data support comprises access numbers Visits, Visitor numbers Vistor, dwell Time OnSite, Page browsing numbers Page View and outbound rates Bounce Rate. Such information gathering can be broadly divided into two categories: the page statistics Track this virtual page view and the statistics operation behavior Track this button by event.
The method for configuring the embedded points provided by the embodiment is applied to the mobile terminal, and data interaction is also performed between the configuration servers through the operation of the mobile terminal, so that the embedded point configuration of the page is realized. And defining the current page to be subjected to the embedded point configuration as a target page, wherein the target page is usually a set advertisement page.
When a user of the mobile terminal wants to trigger the embedded point configuration process, a preset type of clicking operation is applied to a target control which can apply configuration operation on a display interface of the mobile terminal, and the preset type of clicking operation can be clicking operation or sliding operation acting on the embedded point configuration control of a target page.
S102, generating a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
after receiving the click operation of the preset type acting on the target page, the mobile terminal determines the embedded point configuration requirement of the user, namely generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct the configuration server to process the embedded point configuration request.
Considering that there may be a plurality of pages in the mobile terminal, in order to explicitly indicate a target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S103, sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
after the mobile terminal generates a buried point configuration request containing identification information of a target page, the buried point configuration request can be sent to a configuration server, so that the configuration server processes the buried point configuration request.
And after receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target page and sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at the moment, the configuration server monitors and displays the embedded point configuration webpage corresponding to the target page operated by the mobile terminal.
S104, linking to the buried point configuration webpage, and collecting configuration input acting on the buried point configuration webpage;
after receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and an embedded point configuration flow of the target page is developed through the embedded point configuration webpage.
And after the mobile terminal is linked to the buried point configuration webpage, displaying a target configuration page on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for a specific buried point item on the buried point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
According to a specific implementation manner of the embodiment of the present disclosure, the step of sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page includes:
s201, sending the target page and the embedded point configuration request to the configuration server so that the configuration server generates a two-dimensional code of an embedded point configuration webpage corresponding to the target page;
the step of linking to the buried point configuration webpage comprises:
s202, receiving and scanning the two-dimensional code;
in this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server generates a two-dimensional code corresponding to the embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
S203, linking to the buried point configuration webpage, and starting a buried point configuration mode.
And the mobile terminal receives and scans the two-dimension code to be connected to the embedded point configuration webpage, and starts an embedded point inspection mode, namely, starts to capture the user behavior acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer, more convenient and easier to transmit.
S105, sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input.
After acquiring the configuration input acting on the embedded point configuration webpage, the mobile terminal sends the acquired configuration input to the configuration server, so that the configuration server performs embedded point configuration on the target page according to the configuration input.
In addition, according to another specific implementation manner of the embodiment of the present disclosure, the step of collecting configuration input acting on the buried point configuration webpage includes:
monitoring and collecting configuration input of a corresponding target buried point project acting on the buried point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs the embedded point configuration on the target page according to the configuration input includes:
and sending the configuration input of the buried point configuration webpage corresponding to the target buried point project to the configuration server so that the configuration server configures the target buried point project for the target page.
In this embodiment, the specific fixed-point placement is defined for some fixed-point items in the target page, and the fixed-point item to be currently placed is set as the target fixed-point item, and the target fixed-point item may be any of all fixed-point items in the target page.
For example, the target buried point item targeted by the buried point configuration request is set to be a buried point statistic item of a call control dialed by a user of the mobile terminal on the target page. If the mobile terminal captures the statistical buried point item of the dialing control of the touch target page, configuring the buried point item of the information such as the times of triggering the dialing control for the target page.
Further, according to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target buried point item for the target page according to the configuration input includes:
extracting a target buried point category and a configuration parameter in the target buried point project corresponding to the configuration input;
searching a buried point code segment corresponding to the target buried point category from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted code segment of the buried point to the target page.
In this embodiment, a scheme in which the configuration server adaptively performs page configuration according to the configuration input of the mobile terminal user is further defined. Specifically, after receiving the configuration input, the target buried point category and the configuration parameter in the corresponding target buried point item are extracted from the configuration input, for example, counting the click operation applied to the dialing control or the search operation of the search keyword, where the counting time period is eight points earlier to six points later.
The configuration server is internally pre-stored with a buried point code set, and provides a universal buried point code segment for each buried point category. Thus, the configuration server can find out the corresponding embedded point code segment from the embedded point code set according to the determined embedded point configuration type, adaptively adjust the embedded point code segment according to the configuration parameters, and finally configure the adjusted embedded point code segment into the target page, namely, the embedded point configuration process of the target page is completed.
On the basis of the foregoing embodiment, according to another specific implementation manner of the embodiment of the present disclosure, after the step of sending the configuration input to the configuration server so that the configuration server performs the embedded point configuration on the target page according to the configuration input, the method may further include:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
sending the embedded point detection request to a configuration server so that the configuration server returns an embedded point detection webpage corresponding to the target page;
linking to the buried point detection webpage, and capturing user behaviors acting on the buried point detection webpage;
and sending the captured user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains the embedded point detection result of the target page.
In this embodiment, a process of performing embedded point inspection on a page after the embedded point configuration is completed is added. Specifically, when a mobile terminal user wants to trigger a buried point inspection process, a preset type of clicking operation is applied to a target page of the mobile terminal, where the preset type of clicking operation may be a clicking operation or a sliding operation acting on a buried point inspection control of the target page. After receiving the preset type of clicking operation acting on the target page, the mobile terminal determines the embedded point inspection requirement of the user, namely generates an embedded point inspection request corresponding to the target page according to the clicking operation so as to instruct the configuration server to process the embedded point inspection request.
After the mobile terminal generates a buried point check request containing the identification information of the target page, the buried point check request can be sent to the configuration server, so that the configuration server processes the buried point check request.
And after receiving the embedded point detection request, the configuration server generates an embedded point detection webpage corresponding to the target page, and monitors and displays the embedded point detection webpage of the target page.
After receiving the embedded point detection webpage returned by the configuration server, the mobile terminal can be linked to the embedded point detection webpage, and an embedded point detection process for the target page is developed through the embedded point detection webpage.
After the mobile terminal is linked to the buried point detection webpage, a target page is displayed on an interface of the mobile terminal, and meanwhile, a buried point script is operated. At this time, the user of the mobile terminal may apply the user behavior for a specific buried point item on the buried point detection webpage, and the mobile terminal may capture the user behavior.
After obtaining the embedded point check result, the configuration server may further send the embedded point check result to the mobile terminal, so that a user of the mobile terminal obtains the embedded point check result and performs corresponding processing according to the embedded point check result. For example, if the embedded point is correct, the target page with the embedded point configuration completed and the embedded point correct may be released for use, and if the embedded point is wrong, the embedded point configuration scheme may be modified or the embedded point configuration may be performed again, and the target page may be released for use after the embedded point is checked to be correct again.
To sum up, the embedded point configuration scheme applied to the mobile terminal provided by the embodiment of the present disclosure utilizes an interaction process between the mobile terminal and the configuration server, and implements the user-defined embedded point configuration for the page by applying a specific operation acting on the target page on the mobile terminal by the mobile terminal user. Therefore, inaccuracy possibly caused by mobile terminal configuration page can be effectively simulated at the configuration server side, and the authenticity of the operating environment and the convenience of buried point configuration are improved. For a specific implementation process of this embodiment, reference may be made to the specific implementation process of the buried point inspection method provided in the embodiments shown in fig. 1 to fig. 3, which is not described in detail herein.
Referring to fig. 3, a schematic flow chart of another buried point configuration method provided in the embodiment of the present disclosure is shown, where the difference between the buried point configuration method provided in this embodiment and the above-mentioned embodiment is that a buried point configuration flow is described from the perspective of a configuration server. As shown in fig. 3, the method mainly comprises the following steps:
s301, receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of the target page requesting to perform buried point configuration;
the method for configuring the embedded point provided by the embodiment is applied to a scene that the configuration server cooperates with the mobile terminal to configure the embedded point in the set page. Specifically, when a user of the mobile terminal wants to trigger the embedded point configuration process, a preset type of clicking operation is applied to a target control that can apply configuration operation on a display interface of the mobile terminal, where the preset type of clicking operation may be a clicking operation or a sliding operation that acts on the embedded point configuration control of the target page.
After receiving the click operation of the preset type acting on the target page, the mobile terminal determines the embedded point configuration requirement of the user, namely generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct the configuration server to process the embedded point configuration request.
Considering that there may be a plurality of pages in the mobile terminal, in order to explicitly indicate a target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S302, generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
after the mobile terminal generates a buried point configuration request containing identification information of a target page, the buried point configuration request can be sent to a configuration server, so that the configuration server processes the buried point configuration request.
And after receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target page.
S303, sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
and the configuration server sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at the moment, the configuration server monitors and displays the embedded point configuration webpage of the corresponding target page operated by the mobile terminal.
After receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and an embedded point configuration flow of the target page is developed through the embedded point configuration webpage.
And after the mobile terminal is linked to the buried point configuration webpage, displaying a target configuration page on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for a specific buried point item on the buried point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating the buried point configuration webpage corresponding to the target page according to the buried point configuration request includes:
generating a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage includes:
and sending the two-dimension code to the mobile terminal so that the mobile terminal scans the two-dimension code and links to the embedded point configuration webpage, and starting an embedded point configuration mode.
In this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server generates a two-dimensional code corresponding to the embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
And the mobile terminal receives and scans the two-dimension code to be connected to the embedded point configuration webpage, and starts an embedded point inspection mode, namely, starts to capture the user behavior acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer, more convenient and easier to transmit.
S304, according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage, the embedded point configuration is carried out on the target webpage.
After acquiring the configuration input acting on the embedded point configuration webpage, the mobile terminal sends the acquired configuration input to the configuration server, so that the configuration server performs embedded point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of receiving the embedded point configuration request sent by the mobile terminal includes:
the step of performing the embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input corresponding to the target buried point project, which is acquired by the mobile terminal and acts on the buried point configuration page;
and configuring the target buried point project for the target page according to the configuration input.
In this embodiment, the specific fixed-point placement is defined for some fixed-point items in the target page, and the fixed-point item to be currently placed is set as the target fixed-point item, and the target fixed-point item may be any of all fixed-point items in the target page.
According to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target buried point item for the target page according to the configuration input includes:
extracting a target buried point category and a configuration parameter in the target buried point project corresponding to the configuration input;
searching a buried point code segment corresponding to the target buried point category from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted code segment of the buried point to the target page.
In this embodiment, a scheme in which the configuration server adaptively performs page configuration according to the configuration input of the mobile terminal user is further defined. Specifically, after receiving the configuration input, the target buried point category and the configuration parameter in the corresponding target buried point item are extracted from the configuration input, for example, counting the click operation applied to the dialing control or the search operation of the search keyword, where the counting time period is eight points earlier to six points later.
The configuration server is internally pre-stored with a buried point code set, and provides a universal buried point code segment for each buried point category. Thus, the configuration server can find out the corresponding embedded point code segment from the embedded point code set according to the determined embedded point configuration type, adaptively adjust the embedded point code segment according to the configuration parameters, and finally configure the adjusted embedded point code segment into the target page, namely, the embedded point configuration process of the target page is completed.
To sum up, the embedded point configuration scheme applied to the configuration server provided by the embodiment of the present disclosure utilizes an interaction process between the mobile terminal and the configuration server, and implements the user-defined embedded point configuration for the page by applying a specific operation acting on the target page on the mobile terminal by the mobile terminal user. Therefore, inaccuracy possibly caused by mobile terminal configuration page can be effectively simulated at the configuration server side, and the authenticity of the operating environment and the convenience of buried point configuration are improved. For a specific implementation process of this embodiment, reference may be made to the specific implementation process of the buried point inspection method provided in the embodiments shown in fig. 1 and fig. 2, and details are not repeated here.
Referring to fig. 4, a schematic flow chart of another method for configuring a buried point according to an embodiment of the present disclosure is provided. Unlike the above-described embodiment, the present embodiment fully explains the buried point configuration flow from both sides of the mobile terminal and the configuration server. As shown in fig. 4, the method mainly includes:
s401, a mobile terminal receives a click operation of a preset type acting on a target page and generates a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
after receiving the click operation of the preset type acting on the target page, the mobile terminal determines the embedded point configuration requirement of the user, namely generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct the configuration server to process the embedded point configuration request.
Considering that there may be a plurality of pages in the mobile terminal, in order to explicitly indicate a target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S402, the mobile terminal sends the embedded point configuration request to a configuration server;
after the mobile terminal generates a buried point configuration request containing identification information of a target page, the buried point configuration request can be sent to a configuration server, so that the configuration server processes the buried point configuration request.
S403, the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the buried point configuration webpage to the mobile terminal;
and after receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target page. And the configuration server sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at the moment, the configuration server monitors and displays the embedded point configuration webpage of the corresponding target page operated by the mobile terminal.
S404, the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
after receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and an embedded point configuration flow of the target page is developed through the embedded point configuration webpage.
And after the mobile terminal is linked to the buried point configuration webpage, displaying a target configuration page on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for a specific buried point item on the buried point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
S405, the mobile terminal sends the configuration input to the configuration server;
after the mobile terminal collects the configuration input acting on the embedded point configuration webpage, the collected configuration input is sent to the configuration server.
S406, the configuration server performs embedded point configuration on the target page according to the configuration input.
And the configuration server performs embedded point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, by the configuration server, a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sending the buried point configuration webpage to the mobile terminal includes:
the configuration server generates a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the buried point configuration webpage includes:
the mobile terminal receives and scans the two-dimension code;
and linking to the buried point configuration webpage, and starting a buried point configuration mode.
In this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server generates a two-dimensional code corresponding to the embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
And the mobile terminal receives and scans the two-dimension code to be connected to the embedded point configuration webpage, and starts an embedded point inspection mode, namely, starts to capture the user behavior acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer, more convenient and easier to transmit.
Corresponding to the above method embodiment, referring to fig. 5, an embodiment of the present disclosure further provides a buried point configuration device 50, where the buried point configuration device 50 is loadable in the mobile terminal involved in the above method embodiment. As shown in fig. 5, the buried point configuration device 50 mainly includes:
a receiving module 501, configured to receive a preset type of click operation applied to a target page;
a generating module 502, configured to generate a buried point configuration request according to the click operation of the preset type, where the buried point configuration request includes identification information of the target page;
a first sending module 503, configured to send the embedded point configuration request to a configuration server, so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
an acquisition module 504, configured to link to the buried point configuration web page and acquire configuration input acting on the buried point configuration web page;
a second sending module 505, configured to send the configuration input to the configuration server, so that the configuration server performs a site-based configuration on the target page according to the configuration input.
The apparatus shown in fig. 5 may correspondingly execute the content in the method embodiments shown in fig. 1 and fig. 2, and details of parts not described in detail in this embodiment refer to the content described in the method embodiments, which is not described herein again.
Referring to fig. 6, an embodiment of the present disclosure further provides an electronic device 60, where the electronic device 60 may be a mobile terminal or an electronic device as referred to in the foregoing embodiments. The electronic device may include:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of buried point allocation in the above method embodiments.
The disclosed embodiments also provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the method of buried point configuration in the aforementioned method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the method of buried point configuration in the aforementioned method embodiments.
Referring now to FIG. 6, a schematic diagram of an electronic device 60 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., car navigation terminals), and the like, and fixed terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 6, the electronic device 60 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 60 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
Generally, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touch pad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; output devices 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 60 to communicate with other devices wirelessly or by wire to exchange data. While the figures illustrate an electronic device 60 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided.
In particular, according to an embodiment of the present disclosure, the processes described above with reference to the flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network via the communication means 609, or may be installed from the storage means 608, or may be installed from the ROM 602. The computer program, when executed by the processing device 601, performs the above-described functions defined in the methods of the embodiments of the present disclosure.
It should be noted that the computer readable medium in the present disclosure can be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer readable signal medium may comprise a propagated data signal with computer readable program code embodied therein, either in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
The computer readable medium may be embodied in the electronic device; or may exist separately without being assembled into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, enable the electronic device to implement the schemes provided by the method embodiments.
Alternatively, the computer readable medium carries one or more programs, which when executed by the electronic device, enable the electronic device to implement the schemes provided by the method embodiments.
Computer program code for carrying out operations for aspects of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or configuration server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in the embodiments of the present disclosure may be implemented by software or hardware. Where the name of a unit does not in some cases constitute a limitation of the unit itself, for example, the first retrieving unit may also be described as a "unit for retrieving at least two internet protocol addresses".
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The above description is only for the specific embodiments of the present disclosure, but the scope of the present disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present disclosure should be covered within the scope of the present disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (13)

1. A method for configuring a buried point is applied to a mobile terminal, and comprises the following steps:
receiving a preset type of clicking operation acting on a target page;
generating a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
linking to the buried point configuration webpage and collecting configuration input acting on the buried point configuration webpage;
and sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input.
2. The method of claim 1, wherein the step of sending the buried point configuration request to a configuration server to enable the configuration server to return a buried point configuration webpage corresponding to the target page comprises:
sending the target page and the embedded point configuration request to the configuration server so that the configuration server generates a two-dimensional code of an embedded point configuration webpage corresponding to the target page;
the step of linking to the buried point configuration webpage comprises:
receiving and scanning the two-dimensional code;
and linking to the buried point configuration webpage, and starting a buried point configuration mode.
3. The method of claim 1, wherein the step of collecting configuration input that acts on the buried site configuration web page comprises:
monitoring and collecting configuration input of a corresponding target buried point project acting on the buried point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs the embedded point configuration on the target page according to the configuration input includes:
and sending the configuration input of the buried point configuration webpage corresponding to the target buried point project to the configuration server so that the configuration server configures the target buried point project for the target page.
4. The method of any one of claims 1 to 3, wherein after the step of sending the configuration input to the configuration server to cause the configuration server to perform the landed configuration on the target page according to the configuration input, the method further comprises:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
sending the embedded point detection request to a configuration server so that the configuration server returns an embedded point detection webpage corresponding to the target page;
linking to the buried point detection webpage, and capturing user behaviors acting on the buried point detection webpage;
and sending the captured user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains the embedded point detection result of the target page.
5. A buried point configuration method is applied to a configuration server, and comprises the following steps:
receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of the target page requesting for buried point configuration;
generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
and performing embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage.
6. The method of claim 5, wherein the step of generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request comprises:
generating a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so that the mobile terminal is linked to the embedded point configuration webpage includes:
and sending the two-dimension code to the mobile terminal so that the mobile terminal scans the two-dimension code and links to the embedded point configuration webpage, and starting an embedded point configuration mode.
7. The method according to claim 5 or 6, wherein the step of receiving the request for the fixed-point configuration sent by the mobile terminal comprises:
the step of performing the embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input corresponding to the target buried point project, which is acquired by the mobile terminal and acts on the buried point configuration page;
and configuring the target buried point project for the target page according to the configuration input.
8. The method of claim 7, wherein said step of configuring said target pit entry for said target page according to said configuration input comprises:
extracting a target buried point category and a configuration parameter in the target buried point project corresponding to the configuration input;
searching a buried point code segment corresponding to the target buried point category from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted code segment of the buried point to the target page.
9. A method for deploying a buried point, comprising:
the method comprises the steps that a mobile terminal receives a click operation of a preset type acting on a target page and generates a buried point configuration request according to the click operation of the preset type, wherein the buried point configuration request comprises identification information of the target page;
the mobile terminal sends the embedded point configuration request to a configuration server;
the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request and sends the buried point configuration webpage to the mobile terminal;
the mobile terminal is linked to the embedded point configuration webpage and collects configuration input acting on the embedded point configuration webpage;
the mobile terminal sends the configuration input to the configuration server;
and the configuration server performs embedded point configuration on the target page according to the configuration input.
10. The method according to claim 9, wherein the step of the configuration server generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request and sending the buried point configuration webpage to the mobile terminal includes:
the configuration server generates a two-dimensional code of a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the buried point configuration webpage includes:
the mobile terminal receives and scans the two-dimension code;
and linking to the buried point configuration webpage, and starting a buried point configuration mode.
11. A buried point deployment apparatus, comprising:
the receiving module is used for receiving the clicking operation of the preset type acting on the target page;
a generating module, configured to generate a buried point configuration request according to the click operation of the preset type, where the buried point configuration request includes identification information of the target page;
the first sending module is used for sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
the acquisition module is used for linking to the embedded point configuration webpage and acquiring configuration input acting on the embedded point configuration webpage;
and the second sending module is used for sending the configuration input to the configuration server so that the configuration server carries out embedded point configuration on the target page according to the configuration input.
12. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of landed site configuration of any of preceding claims 1-10.
13. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of landed point configuration of any of the preceding claims 1-10.
CN202010536672.XA 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment Active CN111736918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010536672.XA CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010536672.XA CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111736918A true CN111736918A (en) 2020-10-02
CN111736918B CN111736918B (en) 2023-11-28

Family

ID=72648953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010536672.XA Active CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111736918B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055435A (en) * 2021-02-04 2021-06-29 北京淇瑀信息科技有限公司 Cross-environment unified buried point data transmission method and device and electronic equipment
CN113642047A (en) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 Buried point data verification method and system
CN113779474A (en) * 2021-08-17 2021-12-10 中移(杭州)信息技术有限公司 Webpage point burying method, device, equipment and computer program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915398A (en) * 2015-05-29 2015-09-16 北京京东尚科信息技术有限公司 Method and device for webpage point burying
CN107832218A (en) * 2017-11-10 2018-03-23 平安科技(深圳)有限公司 A processing method, device and computer equipment are buried in dynamic page
CN107909494A (en) * 2017-12-08 2018-04-13 中国平安财产保险股份有限公司 Collocation method, device, computer equipment and the storage medium of insurance data information
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
CN110059282A (en) * 2019-04-23 2019-07-26 北京奇艺世纪科技有限公司 A kind of acquisition methods and system of interactive class data
CN111241444A (en) * 2020-01-09 2020-06-05 深圳壹账通智能科技有限公司 Webpage embedded point code adding method and device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915398A (en) * 2015-05-29 2015-09-16 北京京东尚科信息技术有限公司 Method and device for webpage point burying
CN107832218A (en) * 2017-11-10 2018-03-23 平安科技(深圳)有限公司 A processing method, device and computer equipment are buried in dynamic page
CN107909494A (en) * 2017-12-08 2018-04-13 中国平安财产保险股份有限公司 Collocation method, device, computer equipment and the storage medium of insurance data information
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
CN110059282A (en) * 2019-04-23 2019-07-26 北京奇艺世纪科技有限公司 A kind of acquisition methods and system of interactive class data
CN111241444A (en) * 2020-01-09 2020-06-05 深圳壹账通智能科技有限公司 Webpage embedded point code adding method and device, computer equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055435A (en) * 2021-02-04 2021-06-29 北京淇瑀信息科技有限公司 Cross-environment unified buried point data transmission method and device and electronic equipment
CN113642047A (en) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 Buried point data verification method and system
CN113779474A (en) * 2021-08-17 2021-12-10 中移(杭州)信息技术有限公司 Webpage point burying method, device, equipment and computer program product

Also Published As

Publication number Publication date
CN111736918B (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN108345543B (en) Data processing method, device, equipment and storage medium
CN111736918B (en) Buried point configuration method and device and electronic equipment
CN105260082B (en) A kind of test data methods of exhibiting and exploitation terminal
CN111177617A (en) Web direct operation and maintenance method and device based on operation and maintenance management system and electronic equipment
CN111694757B (en) Application program testing method and device, electronic equipment and computer readable storage medium
CN109446025B (en) Operation behavior playback method and device, electronic equipment and readable medium
CN111352836A (en) Pressure testing method and related device
CN112684968A (en) Page display method and device, electronic equipment and computer readable medium
CN110619100B (en) Method and apparatus for acquiring data
CN111813641B (en) Method, device, medium and equipment for collecting crash information
CN111813685B (en) Automatic test method and device
CN110097397A (en) Information-pushing method, device and electronic equipment based on feedback
CN112131092A (en) Page debugging method and device
CN111597107B (en) Information output method and device and electronic equipment
CN110717122B (en) Page performance acquisition method and device and electronic equipment
CN111258803A (en) Collapse positioning method and device and electronic equipment
CN108282542A (en) Remote operation method and device for test equipment
CN111736919A (en) Buried point inspection method and device and electronic equipment
CN113608997B (en) Remote debugging method and device for embedded webpage of application program and electronic equipment
CN112291121B (en) Data processing method and related equipment
CN112558933B (en) Component rendering method and device, readable medium and electronic equipment
CN109741099B (en) Method and device for acquiring equipment characteristic information
CN115022328B (en) Server cluster, testing method and device of server cluster and electronic equipment
CN111198853B (en) Data processing method, device, electronic equipment and computer readable storage medium
CN106383765A (en) Data monitoring method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant