CN111736918B - Buried point configuration method and device and electronic equipment - Google Patents

Buried point configuration method and device and electronic equipment Download PDF

Info

Publication number
CN111736918B
CN111736918B CN202010536672.XA CN202010536672A CN111736918B CN 111736918 B CN111736918 B CN 111736918B CN 202010536672 A CN202010536672 A CN 202010536672A CN 111736918 B CN111736918 B CN 111736918B
Authority
CN
China
Prior art keywords
configuration
webpage
embedded point
point configuration
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010536672.XA
Other languages
Chinese (zh)
Other versions
CN111736918A (en
Inventor
孙春清
易潇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing ByteDance Network Technology Co Ltd
Original Assignee
Beijing ByteDance Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing ByteDance Network Technology Co Ltd filed Critical Beijing ByteDance Network Technology Co Ltd
Priority to CN202010536672.XA priority Critical patent/CN111736918B/en
Publication of CN111736918A publication Critical patent/CN111736918A/en
Application granted granted Critical
Publication of CN111736918B publication Critical patent/CN111736918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the disclosure provides a buried point configuration method and device and electronic equipment, and belongs to the technical field of computers. The method comprises the following steps: receiving a click operation of a preset type acting on a target page; generating a buried point configuration request according to a preset type of click operation, wherein the buried point configuration request comprises identification information of a target page; sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target webpage; the method comprises the steps of linking to a buried point configuration webpage, and collecting configuration input acting on the buried point configuration webpage; and sending the configuration input to a configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input. According to the scheme, the embedded point configuration of the page is realized by the mobile terminal user applying the operation on the mobile terminal, so that the possible inaccuracy caused by the simulation of the mobile terminal configuration page at the configuration server side can be effectively avoided, and the reality of the operation environment and the convenience of embedded point configuration are improved.

Description

Buried point configuration method and device and electronic equipment
Technical Field
The disclosure relates to the technical field of computers, and in particular relates to a buried point configuration method, a buried point configuration device and electronic equipment.
Background
The embedded point is to set a section of code in the webpage for recording the interactive operation of the user on the webpage elements. For example, there is an interactive area of an advertisement class in a web page, and through the code set by burying points, whether the user has a click operation on the advertisement or not can be checked.
In the prior art, a configuration page of a mobile terminal is simulated in a page of a personal computer (Personal Computer, abbreviated as PC) of a configuration server, and then the simulated mobile terminal webpage is subjected to embedded point configuration operation from the webpage of the PC terminal.
The operation mode adopts a mode of simulating a mobile terminal webpage by a PC terminal, so that 2 problems exist: (1) The simulated page is not a real running environment, resulting in results that are not necessarily completely correct. (2) The simulated page usually needs to be configured by a special PC and special software, so that the user is inconvenient to configure at any time and any place.
Therefore, the technical problems of poor accuracy and convenience of buried points exist in the buried point configuration scheme in the prior art.
Disclosure of Invention
Accordingly, embodiments of the present disclosure provide a buried point configuration, which at least partially solves the problems in the prior art.
In a first aspect, an embodiment of the present disclosure provides a method for configuring a buried point, which is applied to a mobile terminal, where the method includes:
receiving a click operation of a preset type acting on a target page;
generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
the buried point configuration request is sent to a configuration server, so that the configuration server returns a buried point configuration webpage corresponding to the target webpage;
the embedded point configuration webpage is linked, and configuration input acting on the embedded point configuration webpage is collected;
and sending the configuration input to the configuration server so that the configuration server performs buried point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of sending the embedded point configuration request to a configuration server, so that the configuration server returns an embedded point configuration webpage corresponding to the target page includes:
the target page and the embedded point configuration request are sent to the configuration server, so that the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target page;
The step of linking to the embedded point configuration webpage comprises the following steps:
receiving and scanning the two-dimensional code;
and linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
According to a specific implementation manner of the embodiment of the present disclosure, the step of collecting configuration input acting on the embedded point configuration webpage includes:
monitoring and collecting configuration input of a corresponding target embedded point item acting on the embedded point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input comprises the following steps:
and sending configuration input of the embedded point configuration webpage corresponding to the target embedded point item to the configuration server so that the configuration server configures the target embedded point item for the target webpage.
According to a specific implementation manner of the embodiment of the present disclosure, after the step of sending the configuration input to the configuration server, so that the configuration server performs the embedded point configuration on the target page according to the configuration input, the method further includes:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
Sending the buried point checking request to a configuration server so that the configuration server returns a buried point detecting webpage corresponding to the target page;
the embedded point detection webpage is linked, and user behaviors acting on the embedded point detection webpage are captured;
and sending the grasped user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains an embedded point detection result of the target webpage.
In a second aspect, an embodiment of the present disclosure provides a method for configuring a buried point, which is applied to a configuration server, where the method includes:
receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of the target page for requesting buried point configuration;
generating a buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
the embedded point configuration webpage is sent to the mobile terminal, so that the mobile terminal is linked to the embedded point configuration webpage, and configuration input acting on the embedded point configuration webpage is collected;
and performing embedded point configuration on the target page according to configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, according to the embedded point configuration request, an embedded point configuration web page corresponding to the target page includes:
generating a two-dimensional code of the buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so as to link the mobile terminal to the embedded point configuration webpage comprises the following steps:
and sending the two-dimensional code to the mobile terminal, so that the mobile terminal scans the two-dimensional code and links to the embedded point configuration webpage, and opening an embedded point configuration mode.
According to a specific implementation manner of the embodiment of the present disclosure, the step of receiving a buried point configuration request sent by a mobile terminal includes:
the step of performing embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input which is acquired by the mobile terminal and acts on the target embedded point item corresponding to the embedded point configuration page;
and configuring the target embedded point item for the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target embedded point item for the target page according to the configuration input includes:
extracting a target buried point category and configuration parameters in the target buried point project corresponding to the configuration input;
searching buried point code segments corresponding to the target buried point categories from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted embedded point code segment to the target page.
In a third aspect, an embodiment of the present disclosure provides a method for configuring a buried point, including:
the method comprises the steps that a mobile terminal receives a preset type of click operation acting on a target page, and generates a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
the mobile terminal sends the embedded point configuration request to a configuration server;
the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the buried point configuration webpage to the mobile terminal;
the mobile terminal is linked to the embedded point configuration webpage and acquires configuration input acting on the embedded point configuration webpage;
The mobile terminal sends the configuration input to the configuration server;
and the configuration server performs embedded point configuration on the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, by the configuration server, a buried point configuration web page corresponding to the target page according to the buried point configuration request, and sending the buried point configuration web page to the mobile terminal includes:
the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target webpage according to the embedded point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the embedded point configuration webpage comprises the following steps:
the mobile terminal receives and scans the two-dimensional code;
and linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
In a fourth aspect, an embodiment of the present disclosure provides a buried point configuration apparatus, including:
the receiving module is used for receiving a preset type of click operation acted on the target page;
the generation module is used for generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
The first sending module is used for sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target webpage;
the acquisition module is used for being linked to the embedded point configuration webpage and acquiring configuration input acting on the embedded point configuration webpage;
and the second sending module is used for sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input.
In a fifth aspect, embodiments of the present disclosure further provide an electronic device, including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the buried point configuration method of the first aspect or any implementation of the first aspect.
In a sixth aspect, the disclosed embodiments also provide a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the buried point configuration method of the first aspect or any implementation manner of the first aspect.
In a seventh aspect, the presently disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the buried point configuration method of the first aspect or any implementation of the first aspect.
The buried point configuration scheme in the embodiment of the disclosure comprises the following steps: receiving a click operation of a preset type acting on a target page; generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page; the buried point configuration request is sent to a configuration server, so that the configuration server returns a buried point configuration webpage corresponding to the target webpage; the embedded point configuration webpage is linked, and configuration input acting on the embedded point configuration webpage is collected; and sending the configuration input to the configuration server so that the configuration server performs buried point configuration on the target page according to the configuration input. According to the scheme, the user-defined embedded point configuration for the page is realized by applying specific operation acting on the target page on the mobile terminal by the mobile terminal user through the interaction process between the mobile terminal and the configuration server. Thus, the possible inaccuracy caused by the simulation of the mobile terminal configuration page at the configuration server side can be effectively avoided, and the authenticity of the operation environment and the convenience of buried point configuration are improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings that are needed in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to a person of ordinary skill in the art.
Fig. 1 is a schematic flow chart of a buried point configuration method applied to a mobile terminal according to an embodiment of the disclosure;
fig. 2 is a schematic partial flow chart of another buried point configuration method applied to a mobile terminal according to an embodiment of the present disclosure;
fig. 3 is a schematic partial flow chart of a buried point configuration method applied to a configuration server according to an embodiment of the disclosure;
fig. 4 is a flow chart of another method for configuring buried points according to an embodiment of the present disclosure;
fig. 5 is a schematic structural diagram of a buried point configuration device according to an embodiment of the disclosure;
fig. 6 is a schematic diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Embodiments of the present disclosure are described in detail below with reference to the accompanying drawings.
Other advantages and effects of the present disclosure will become readily apparent to those skilled in the art from the following disclosure, which describes embodiments of the present disclosure by way of specific examples. It will be apparent that the described embodiments are merely some, but not all embodiments of the present disclosure. The disclosure may be embodied or practiced in other different specific embodiments, and details within the subject specification may be modified or changed from various points of view and applications without departing from the spirit of the disclosure. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict. All other embodiments, which can be made by one of ordinary skill in the art without inventive effort, based on the embodiments in this disclosure are intended to be within the scope of this disclosure.
It is noted that various aspects of the embodiments are described below within the scope of the following claims. It should be apparent that the aspects described herein may be embodied in a wide variety of forms and that any specific structure and/or function described herein is merely illustrative. Based on the present disclosure, one skilled in the art will appreciate that one aspect described herein may be implemented independently of any other aspect, and that two or more of these aspects may be combined in various ways. For example, an apparatus may be implemented and/or a method practiced using any number of the aspects set forth herein. In addition, such apparatus may be implemented and/or such methods practiced using other structure and/or functionality in addition to one or more of the aspects set forth herein.
It should also be noted that the illustrations provided in the following embodiments merely illustrate the basic concepts of the disclosure by way of illustration, and only the components related to the disclosure are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
In addition, in the following description, specific details are provided in order to provide a thorough understanding of the examples. However, it will be understood by those skilled in the art that the aspects may be practiced without these specific details.
Referring to fig. 1, a flow chart of a buried point configuration method provided by an embodiment of the present disclosure is provided, and the provided buried point configuration method is applied to a mobile terminal. As shown in fig. 1, the method mainly includes:
s101, receiving a preset type of click operation acting on a target page;
the buried point configuration method provided by the embodiment is applied to a scene of buried point configuration in a set page. The embedded point is used for collecting some information in a specific process in the application, and is used for tracking the use condition of the application, and is used for further optimizing products or providing data support for operation, and the information comprises an access number Viis, a Visitor number Viactor, a stay Time TimeOn Site, a Page browsing number Page View and a jump Rate Bounce Rate. Such information collection can be roughly classified into two types: page statistics Track this virtual page view, and statistics operations act Track this button by an event.
The embedded point configuration method provided by the embodiment is applied to the mobile terminal, and the server is also configured to perform data interaction through the operation of the mobile terminal, so that embedded point configuration on the page is realized. And defining the page to be subjected to embedded point configuration as a target page, wherein the target page is usually a set advertisement page.
When a user of the mobile terminal wants to trigger the embedded point configuration flow, a preset type of click operation is applied to a target control which can be applied with configuration operation on a display interface of the mobile terminal, and the preset type of click operation can be a click operation or a sliding operation on the embedded point configuration control acting on a target page.
S102, generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
after receiving a preset type of click operation acting on a target page, the mobile terminal determines the embedded point configuration requirement of a user, namely, generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct a configuration server to process the embedded point configuration request.
In consideration of that a plurality of pages in the mobile terminal may exist, in order to explicitly indicate the target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S103, sending the buried point configuration request to a configuration server so that the configuration server returns a buried point configuration webpage corresponding to the target webpage;
After the mobile terminal generates the embedded point configuration request containing the identification information of the target page, the embedded point configuration request can be sent to the configuration server, so that the configuration server processes the embedded point configuration request.
After receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target page, and sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at this time, the configuration server monitors and displays the embedded point configuration webpage of the corresponding target page operated by the mobile terminal.
S104, linking to the embedded point configuration webpage, and collecting configuration input acting on the embedded point configuration webpage;
after receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and the embedded point configuration flow of the target page is expanded through the embedded point configuration webpage.
And after the mobile terminal is linked to the embedded point configuration webpage, displaying a target configuration webpage on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for the specific embedded point item on the embedded point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
According to a specific implementation manner of the embodiment of the present disclosure, the step of sending the embedded point configuration request to a configuration server, so that the configuration server returns an embedded point configuration webpage corresponding to the target page includes:
s201, the target page and the embedded point configuration request are sent to the configuration server, so that the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target page;
the step of linking to the embedded point configuration webpage comprises the following steps:
s202, receiving and scanning the two-dimensional code;
in this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server firstly generates a two-dimensional code of the corresponding embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
S203, linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
The mobile terminal receives and scans the two-dimensional code to be connected to the embedded point configuration webpage, and starts an embedded point checking mode, namely, the mobile terminal starts to capture user behaviors acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer and more convenient, and transmission is easy.
S105, the configuration input is sent to the configuration server, so that the configuration server performs embedded point configuration on the target page according to the configuration input.
After acquiring the configuration input acting on the embedded point configuration webpage, the mobile terminal sends the acquired configuration input to the configuration server, so that the configuration server performs embedded point configuration on the target webpage according to the configuration input.
Furthermore, according to another specific implementation of the embodiment of the present disclosure, the step of collecting configuration input acting on the embedded point configuration web page includes:
monitoring and collecting configuration input of a corresponding target embedded point item acting on the embedded point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input comprises the following steps:
and sending configuration input of the embedded point configuration webpage corresponding to the target embedded point item to the configuration server so that the configuration server configures the target embedded point item for the target webpage.
In this embodiment, the limiting buried point configuration specifically sets, for a part of specific buried point items in the target page, a buried point item to be currently configured as a target buried point item, and the target buried point item may be any one of all the buried point items in the target page.
For example, the target embedded point item for which the embedded point configuration request is set is an embedded point statistics item of a call control made by a user of the mobile terminal on the target page. If the mobile terminal grabs the statistic buried point item of the dialing control of the touch control target page, configuring the buried point item of the information such as the counting triggering times of the dialing control for the target page.
Further, according to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target embedded point item for the target page according to the configuration input includes:
extracting a target buried point category and configuration parameters in the target buried point project corresponding to the configuration input;
searching buried point code segments corresponding to the target buried point categories from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted embedded point code segment to the target page.
In this embodiment, the scheme of adaptively configuring the page by the configuration server according to the configuration input of the mobile terminal user is further defined. Specifically, after receiving the configuration input, the target embedded point category and the configuration parameter in the corresponding target embedded point item are extracted from the configuration input, for example, the click operation acting on the control for dialing a call or the search operation of the search keyword is counted, and the counted time period is from eight early points to six late points.
The configuration server is pre-stored with a buried point code set, and a universal buried point code segment is provided for each buried point type. In this way, the configuration server can find out the corresponding embedded point code segment from the embedded point code set according to the determined embedded point configuration category, adaptively adjust the embedded point code segment according to the configuration parameter, and finally configure the adjusted embedded point code segment into the target page, namely, the embedded point configuration process of the target page is completed.
On the basis of the foregoing embodiment, according to another specific implementation manner of the embodiment of the present disclosure, after the step of sending the configuration input to the configuration server, so that the configuration server performs the embedded point configuration on the target page according to the configuration input, the method may further include:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
sending the buried point checking request to a configuration server so that the configuration server returns a buried point detecting webpage corresponding to the target page;
the embedded point detection webpage is linked, and user behaviors acting on the embedded point detection webpage are captured;
And sending the grasped user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains an embedded point detection result of the target webpage.
In this embodiment, a flow of performing buried point inspection on a page after the buried point arrangement is completed is added. Specifically, when the mobile terminal user wants to trigger the embedded point inspection flow, a preset type of click operation is applied to the target page of the mobile terminal, and the preset type of click operation can be a click operation or a sliding operation on an embedded point inspection control of the target page. After receiving a preset type of click operation acting on a target page, the mobile terminal determines the embedded point checking requirement of a user, namely, generates an embedded point checking request corresponding to the target page according to the click operation so as to instruct a configuration server to process the embedded point checking request.
After the mobile terminal generates the embedded point checking request containing the identification information of the target page, the embedded point checking request can be sent to the configuration server, so that the configuration server processes the embedded point checking request.
After receiving the buried point inspection request, the configuration server generates a buried point detection webpage corresponding to the target page, and monitors and displays the buried point detection webpage of the target page.
After receiving the buried point detection webpage returned by the configuration server, the mobile terminal can be linked to the buried point detection webpage, and the buried point detection webpage is used for expanding a buried point checking flow of the target webpage.
After the mobile terminal is linked to the embedded point detection webpage, displaying a target page on an interface of the mobile terminal, and running the embedded point script. At this time, the user of the mobile terminal may apply a user behavior for a specific embedded point item on the embedded point detection web page, and the mobile terminal may capture the user behavior.
After obtaining the buried point inspection result, the configuration server may also send the buried point inspection result to the mobile terminal, so that a user of the mobile terminal obtains the buried point inspection result and performs corresponding processing according to the buried point inspection result. For example, if the buried point is correct, the target page with the correct buried point can be put into use after the buried point is arranged, if the buried point is incorrect, the buried point arrangement scheme can be modified or the buried point arrangement can be carried out again, and the target page can be put into use after the correct buried point is checked again.
In summary, according to the embedded point configuration scheme applied to the mobile terminal provided by the embodiment of the disclosure, the user-defined embedded point configuration for the page is realized by applying a specific operation acting on the target page on the mobile terminal by the mobile terminal user through the interaction process between the mobile terminal and the configuration server. Therefore, the possible inaccuracy of the mobile terminal configuration page can be effectively simulated at the configuration server side, and the authenticity of the operation environment and the convenience of buried point configuration are improved. The specific implementation process of the present embodiment may refer to the specific implementation process of the buried point inspection method provided in the embodiment shown in fig. 1 to 3, which is not described herein.
Referring to fig. 3, a flow chart of another method for configuring buried points according to an embodiment of the present disclosure is shown, where the method for configuring buried points according to the present embodiment is different from the above embodiment in that the flow of configuring buried points is described from the perspective of a configuration server. As shown in fig. 3, the method mainly comprises the following steps:
s301, receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of the target page for requesting buried point configuration;
the buried point configuration method provided by the embodiment is applied to a scene that the configuration server cooperates with the mobile terminal to perform buried point configuration in the set page. Specifically, when the user of the mobile terminal wants to trigger the embedded point configuration flow, a preset type of click operation is applied to a target control, on which configuration operation can be applied, on a display interface of the mobile terminal, and the preset type of click operation can be a click operation or a sliding operation applied to the embedded point configuration control of the target page.
After receiving a preset type of click operation acting on a target page, the mobile terminal determines the embedded point configuration requirement of a user, namely, generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct a configuration server to process the embedded point configuration request.
In consideration of that a plurality of pages in the mobile terminal may exist, in order to explicitly indicate the target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S302, generating a buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
after the mobile terminal generates the embedded point configuration request containing the identification information of the target page, the embedded point configuration request can be sent to the configuration server, so that the configuration server processes the embedded point configuration request.
And after receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target webpage.
S303, sending the embedded point configuration webpage to the mobile terminal so as to enable the mobile terminal to be linked to the embedded point configuration webpage, and collecting configuration input acting on the embedded point configuration webpage;
and the configuration server sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at the moment, the configuration server monitors and displays the embedded point configuration webpage of the corresponding target page operated by the mobile terminal.
After receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and the embedded point configuration flow of the target page is expanded through the embedded point configuration webpage.
And after the mobile terminal is linked to the embedded point configuration webpage, displaying a target configuration webpage on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for the specific embedded point item on the embedded point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, according to the embedded point configuration request, an embedded point configuration web page corresponding to the target page includes:
generating a two-dimensional code of the buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so as to link the mobile terminal to the embedded point configuration webpage comprises the following steps:
and sending the two-dimensional code to the mobile terminal, so that the mobile terminal scans the two-dimensional code and links to the embedded point configuration webpage, and opening an embedded point configuration mode.
In this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server firstly generates a two-dimensional code of the corresponding embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
The mobile terminal receives and scans the two-dimensional code to be connected to the embedded point configuration webpage, and starts an embedded point checking mode, namely, the mobile terminal starts to capture user behaviors acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer and more convenient, and transmission is easy.
S304, embedding point configuration is carried out on the target page according to configuration input which is sent by the mobile terminal and acts on the embedding point configuration webpage.
After acquiring the configuration input acting on the embedded point configuration webpage, the mobile terminal sends the acquired configuration input to the configuration server, so that the configuration server performs embedded point configuration on the target webpage according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of receiving a buried point configuration request sent by a mobile terminal includes:
The step of performing embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input which is acquired by the mobile terminal and acts on the target embedded point item corresponding to the embedded point configuration page;
and configuring the target embedded point item for the target page according to the configuration input.
In this embodiment, the limiting buried point configuration specifically sets, for a part of specific buried point items in the target page, a buried point item to be currently configured as a target buried point item, and the target buried point item may be any one of all the buried point items in the target page.
According to a specific implementation manner of the embodiment of the present disclosure, the step of configuring the target embedded point item for the target page according to the configuration input includes:
extracting a target buried point category and configuration parameters in the target buried point project corresponding to the configuration input;
searching buried point code segments corresponding to the target buried point categories from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted embedded point code segment to the target page.
In this embodiment, the scheme of adaptively configuring the page by the configuration server according to the configuration input of the mobile terminal user is further defined. Specifically, after receiving the configuration input, the target embedded point category and the configuration parameter in the corresponding target embedded point item are extracted from the configuration input, for example, the click operation acting on the control for dialing a call or the search operation of the search keyword is counted, and the counted time period is from eight early points to six late points.
The configuration server is pre-stored with a buried point code set, and a universal buried point code segment is provided for each buried point type. In this way, the configuration server can find out the corresponding embedded point code segment from the embedded point code set according to the determined embedded point configuration category, adaptively adjust the embedded point code segment according to the configuration parameter, and finally configure the adjusted embedded point code segment into the target page, namely, the embedded point configuration process of the target page is completed.
In summary, according to the embedded point configuration scheme applied to the configuration server provided by the embodiment of the disclosure, the user-defined embedded point configuration for the page is realized by applying a specific operation acting on the target page on the mobile terminal by the mobile terminal user through the interaction process between the mobile terminal and the configuration server. Therefore, the possible inaccuracy of the mobile terminal configuration page can be effectively simulated at the configuration server side, and the authenticity of the operation environment and the convenience of buried point configuration are improved. The specific implementation process of the present embodiment may refer to the specific implementation process of the buried point inspection method provided in the embodiment shown in fig. 1 and fig. 2, which is not described herein.
Referring to fig. 4, a flow chart of another method for configuring buried points according to an embodiment of the present disclosure is shown. Unlike the above-described embodiments, the present embodiment fully explains the buried point configuration flow from both sides of the mobile terminal and the configuration server. As shown in fig. 4, the method mainly includes:
s401, a mobile terminal receives a preset type of click operation acting on a target page, and generates a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
after receiving a preset type of click operation acting on a target page, the mobile terminal determines the embedded point configuration requirement of a user, namely, generates an embedded point configuration request corresponding to the target page according to the click operation so as to instruct a configuration server to process the embedded point configuration request.
In consideration of that a plurality of pages in the mobile terminal may exist, in order to explicitly indicate the target page corresponding to the embedded point configuration request, the generated embedded point configuration request includes identification information of the target page, where the identification information may be information capable of specifically and uniquely identifying the target page, such as a tag of the page, a web page link, and the like.
S402, the mobile terminal sends the buried point configuration request to a configuration server;
After the mobile terminal generates the embedded point configuration request containing the identification information of the target page, the embedded point configuration request can be sent to the configuration server, so that the configuration server processes the embedded point configuration request.
S403, the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the buried point configuration webpage to the mobile terminal;
and after receiving the embedded point configuration request, the configuration server generates an embedded point configuration webpage corresponding to the target webpage. And the configuration server sends the embedded point configuration webpage to the mobile terminal for embedded point configuration, and at the moment, the configuration server monitors and displays the embedded point configuration webpage of the corresponding target page operated by the mobile terminal.
S404, the mobile terminal is linked to the embedded point configuration webpage and acquires configuration input acting on the embedded point configuration webpage;
after receiving the embedded point configuration webpage returned by the configuration server, the mobile terminal can be linked to the embedded point configuration webpage, and the embedded point configuration flow of the target page is expanded through the embedded point configuration webpage.
And after the mobile terminal is linked to the embedded point configuration webpage, displaying a target configuration webpage on an interface of the mobile terminal. At this time, the user of the mobile terminal may apply the configuration for the specific embedded point item on the embedded point configuration web page, and the mobile terminal may monitor and collect the configuration input applied by the user.
S405, the mobile terminal sends the configuration input to the configuration server;
after the mobile terminal acquires the configuration input acting on the embedded point configuration webpage, the acquired configuration input is sent to the configuration server.
S406, the configuration server performs embedded point configuration on the target page according to the configuration input.
And the configuration server performs buried point configuration for the target page according to the configuration input.
According to a specific implementation manner of the embodiment of the present disclosure, the step of generating, by the configuration server, a buried point configuration web page corresponding to the target page according to the buried point configuration request, and sending the buried point configuration web page to the mobile terminal includes:
the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target webpage according to the embedded point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the embedded point configuration webpage comprises the following steps:
the mobile terminal receives and scans the two-dimensional code;
and linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
In this embodiment, the type of information between the configuration server and the mobile terminal is further defined. Specifically, after the mobile terminal sends the embedded point configuration request to the configuration server, the configuration server firstly generates a two-dimensional code of the corresponding embedded point configuration webpage by using the received embedded point configuration request, and sends the two-dimensional code to the mobile terminal.
The mobile terminal receives and scans the two-dimensional code to be connected to the embedded point configuration webpage, and starts an embedded point checking mode, namely, the mobile terminal starts to capture user behaviors acting on the embedded point configuration webpage. The two-dimensional code is used as an information medium, so that information transmission is safer and more convenient, and transmission is easy.
Corresponding to the above method embodiments, referring to fig. 5, the present disclosure also provides a buried point configuration device 50, which may be loaded to the mobile terminal involved in the above method embodiments. As shown in fig. 5, the buried point configuration device 50 mainly includes:
a receiving module 501, configured to receive a preset type of click operation acting on a target page;
the generating module 502 is configured to generate a buried point configuration request according to the preset type of clicking operation, where the buried point configuration request includes identification information of the target page;
a first sending module 503, configured to send the embedded point configuration request to a configuration server, so that the configuration server returns an embedded point configuration webpage corresponding to the target page;
the acquisition module 504 is configured to link to the embedded point configuration webpage and acquire configuration input acting on the embedded point configuration webpage;
And the second sending module 505 is configured to send the configuration input to the configuration server, so that the configuration server performs embedded point configuration on the target page according to the configuration input.
The apparatus shown in fig. 5 may correspondingly perform the content of the method embodiment shown in fig. 1 and fig. 2, and the portions not described in detail in this embodiment are referred to the content described in the method embodiment and are not described herein again.
Referring to fig. 6, the embodiment of the present disclosure further provides an electronic device 60, where the electronic device 60 may be a mobile terminal or an electronic device as referred to in the above embodiment. The electronic device may include:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the buried point configuration method of the foregoing method embodiments.
The disclosed embodiments also provide a non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the buried point configuration method in the foregoing method embodiments.
The disclosed embodiments also provide a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a computer, cause the computer to perform the buried point configuration method in the foregoing method embodiments.
Referring now to fig. 6, a schematic diagram of an electronic device 60 suitable for use in implementing embodiments of the present disclosure is shown. The electronic devices in the embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), in-vehicle terminals (e.g., in-vehicle navigation terminals), and the like, and stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 6 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 6, the electronic device 60 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 601, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 602 or a program loaded from a storage means 608 into a Random Access Memory (RAM) 603. In the RAM 603, various programs and data necessary for the operation of the electronic device 60 are also stored. The processing device 601, the ROM 602, and the RAM 603 are connected to each other through a bus 604. An input/output (I/O) interface 605 is also connected to bus 604.
In general, the following devices may be connected to the I/O interface 605: input devices 606 including, for example, a touch screen, touchpad, keyboard, mouse, image sensor, microphone, accelerometer, gyroscope, etc.; an output device 607 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 608 including, for example, magnetic tape, hard disk, etc.; and a communication device 609. The communication means 609 may allow the electronic device 60 to communicate with other devices wirelessly or by wire to exchange data. While an electronic device 60 having various means is shown, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via communication means 609, or from storage means 608, or from ROM 602. The above-described functions defined in the methods of the embodiments of the present disclosure are performed when the computer program is executed by the processing device 601.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be contained in the electronic device; or may exist alone without being incorporated into the electronic device.
The computer readable medium carries one or more programs which, when executed by the electronic device, enable the electronic device to implement the solutions provided by the method embodiments described above.
Alternatively, the computer readable medium carries one or more programs, which when executed by the electronic device, enable the electronic device to implement the solutions provided by the method embodiments described above.
Computer program code for carrying out operations of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or configuration server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The name of the unit does not in any way constitute a limitation of the unit itself, for example the first acquisition unit may also be described as "unit acquiring at least two internet protocol addresses".
It should be understood that portions of the present disclosure may be implemented in hardware, software, firmware, or a combination thereof.
The foregoing is merely specific embodiments of the disclosure, but the protection scope of the disclosure is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the disclosure are intended to be covered by the protection scope of the disclosure. Therefore, the protection scope of the present disclosure shall be subject to the protection scope of the claims.

Claims (10)

1. A buried point configuration method, which is applied to a mobile terminal, the method comprising:
receiving a click operation of a preset type acting on a target page;
generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
the buried point configuration request is sent to a configuration server, so that the configuration server returns a buried point configuration webpage corresponding to the target webpage;
the embedded point configuration webpage is linked, and configuration input acting on the embedded point configuration webpage is collected;
transmitting the configuration input to the configuration server so that the configuration server performs buried point configuration on the target page according to the configuration input;
The step of sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target page comprises the following steps:
the target page and the embedded point configuration request are sent to the configuration server, so that the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target page;
the step of linking to the embedded point configuration webpage comprises the following steps:
receiving and scanning the two-dimensional code;
and linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
2. The method of claim 1, wherein the step of gathering configuration input for the embedded configuration web page comprises:
monitoring and collecting configuration input of a corresponding target embedded point item acting on the embedded point configuration webpage;
the step of sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input comprises the following steps:
and sending configuration input of the embedded point configuration webpage corresponding to the target embedded point item to the configuration server so that the configuration server configures the target embedded point item for the target webpage.
3. The method according to any one of claims 1 to 2, wherein after the step of sending the configuration input to the configuration server to cause the configuration server to embed the target page according to the configuration input, the method further comprises:
generating a buried point checking request according to a preset operation acting on the target page, wherein the buried point checking request comprises identification information of the target page;
sending the buried point checking request to a configuration server so that the configuration server returns a buried point detecting webpage corresponding to the target page;
the embedded point detection webpage is linked, and user behaviors acting on the embedded point detection webpage are captured;
and sending the grasped user behavior acting on the embedded point detection webpage to the configuration server so that the configuration server obtains an embedded point detection result of the target webpage.
4. A method for configuring a buried point, applied to a configuration server, the method comprising:
receiving a buried point configuration request sent by a mobile terminal, wherein the buried point configuration request comprises identification information of a target page for requesting buried point configuration;
Generating a buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
the embedded point configuration webpage is sent to the mobile terminal, so that the mobile terminal is linked to the embedded point configuration webpage, and configuration input acting on the embedded point configuration webpage is collected;
performing embedded point configuration on the target page according to configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage;
the step of generating the buried point configuration webpage corresponding to the target webpage according to the buried point configuration request comprises the following steps:
generating a two-dimensional code of the buried point configuration webpage corresponding to the target webpage according to the buried point configuration request;
the step of sending the embedded point configuration webpage to the mobile terminal so as to link the mobile terminal to the embedded point configuration webpage comprises the following steps:
and sending the two-dimensional code to the mobile terminal, so that the mobile terminal scans the two-dimensional code and links to the embedded point configuration webpage, and opening an embedded point configuration mode.
5. The method of claim 4, wherein the step of receiving the buried point configuration request sent by the mobile terminal comprises:
The step of performing embedded point configuration on the target page according to the configuration input which is sent by the mobile terminal and acts on the embedded point configuration webpage comprises the following steps:
acquiring configuration input of a corresponding target buried point item which acts on the buried point configuration page and is acquired by the mobile terminal;
and configuring the target embedded point item for the target page according to the configuration input.
6. The method of claim 5, wherein the step of configuring the target embedded point item for the target page according to the configuration input comprises:
extracting a target buried point category and configuration parameters in the target buried point project corresponding to the configuration input;
searching buried point code segments corresponding to the target buried point categories from a buried point code set;
adjusting the embedded point code segment according to the configuration parameters;
and configuring the adjusted embedded point code segment to the target page.
7. A buried point configuration method, comprising:
the method comprises the steps that a mobile terminal receives a preset type of click operation acting on a target page, and generates a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
The mobile terminal sends the embedded point configuration request to a configuration server;
the configuration server generates a buried point configuration webpage corresponding to the target page according to the buried point configuration request, and sends the buried point configuration webpage to the mobile terminal;
the mobile terminal is linked to the embedded point configuration webpage and acquires configuration input acting on the embedded point configuration webpage;
the mobile terminal sends the configuration input to the configuration server;
the configuration server performs embedded point configuration on the target page according to the configuration input;
the step of generating a buried point configuration webpage corresponding to the target page according to the buried point configuration request by the configuration server and sending the buried point configuration webpage to the mobile terminal comprises the following steps:
the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target webpage according to the embedded point configuration request, and sends the two-dimensional code to the mobile terminal;
the step of linking the mobile terminal to the embedded point configuration webpage comprises the following steps:
the mobile terminal receives and scans the two-dimensional code;
and linking to the embedded point configuration webpage, and starting an embedded point configuration mode.
8. A buried point arrangement apparatus, comprising:
the receiving module is used for receiving a preset type of click operation acted on the target page;
the generation module is used for generating a buried point configuration request according to the preset type of click operation, wherein the buried point configuration request comprises identification information of the target page;
the first sending module is used for sending the embedded point configuration request to a configuration server so that the configuration server returns an embedded point configuration webpage corresponding to the target webpage;
the acquisition module is used for being linked to the embedded point configuration webpage and acquiring configuration input acting on the embedded point configuration webpage;
the second sending module is used for sending the configuration input to the configuration server so that the configuration server performs embedded point configuration on the target page according to the configuration input;
the first sending module includes:
the first sending unit is used for sending the target page and the embedded point configuration request to the configuration server so that the configuration server generates a two-dimensional code of the embedded point configuration webpage corresponding to the target page;
the acquisition module comprises:
The two-dimensional code receiving unit is used for receiving and scanning the two-dimensional code;
the acquisition unit is used for being linked to the embedded point configuration webpage and starting an embedded point configuration mode.
9. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the buried point configuration method of any of the preceding claims 1-7.
10. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the buried point configuration method of any of the preceding claims 1-7.
CN202010536672.XA 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment Active CN111736918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010536672.XA CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010536672.XA CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Publications (2)

Publication Number Publication Date
CN111736918A CN111736918A (en) 2020-10-02
CN111736918B true CN111736918B (en) 2023-11-28

Family

ID=72648953

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010536672.XA Active CN111736918B (en) 2020-06-12 2020-06-12 Buried point configuration method and device and electronic equipment

Country Status (1)

Country Link
CN (1) CN111736918B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113055435B (en) * 2021-02-04 2022-12-02 北京淇瑀信息科技有限公司 Cross-environment unified buried point data transmission method and device and electronic equipment
CN113642047A (en) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 Buried point data verification method and system
CN113779474A (en) * 2021-08-17 2021-12-10 中移(杭州)信息技术有限公司 Webpage point burying method, device, equipment and computer program product

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915398A (en) * 2015-05-29 2015-09-16 北京京东尚科信息技术有限公司 Method and device for webpage point burying
CN107832218A (en) * 2017-11-10 2018-03-23 平安科技(深圳)有限公司 A processing method, device and computer equipment are buried in dynamic page
CN107909494A (en) * 2017-12-08 2018-04-13 中国平安财产保险股份有限公司 Collocation method, device, computer equipment and the storage medium of insurance data information
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
CN110059282A (en) * 2019-04-23 2019-07-26 北京奇艺世纪科技有限公司 A kind of acquisition methods and system of interactive class data
CN111241444A (en) * 2020-01-09 2020-06-05 深圳壹账通智能科技有限公司 Webpage embedded point code adding method and device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915398A (en) * 2015-05-29 2015-09-16 北京京东尚科信息技术有限公司 Method and device for webpage point burying
CN107832218A (en) * 2017-11-10 2018-03-23 平安科技(深圳)有限公司 A processing method, device and computer equipment are buried in dynamic page
CN107909494A (en) * 2017-12-08 2018-04-13 中国平安财产保险股份有限公司 Collocation method, device, computer equipment and the storage medium of insurance data information
CN108920354A (en) * 2018-05-07 2018-11-30 上海陆家嘴国际金融资产交易市场股份有限公司 Bury a management method, device, computer equipment and storage medium
CN110059282A (en) * 2019-04-23 2019-07-26 北京奇艺世纪科技有限公司 A kind of acquisition methods and system of interactive class data
CN111241444A (en) * 2020-01-09 2020-06-05 深圳壹账通智能科技有限公司 Webpage embedded point code adding method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN111736918A (en) 2020-10-02

Similar Documents

Publication Publication Date Title
CN111736918B (en) Buried point configuration method and device and electronic equipment
CN108345543B (en) Data processing method, device, equipment and storage medium
US20150293929A1 (en) Method and apparatus for processing webpage in terminal device by using cloud server
CN111813641B (en) Method, device, medium and equipment for collecting crash information
WO2020199749A1 (en) Feedback-based information pushing method and apparatus, and electronic device
CN109446025B (en) Operation behavior playback method and device, electronic equipment and readable medium
CN111694757B (en) Application program testing method and device, electronic equipment and computer readable storage medium
CN111597065A (en) Method and device for collecting equipment information
CN111597466A (en) Display method and device and electronic equipment
KR102034510B1 (en) A visitor behavior alalysis appratus of dynamic webpages and a method for analysing a visitor behavior of webpages using it
CN111597107B (en) Information output method and device and electronic equipment
CN109902726B (en) Resume information processing method and device
CN109491908B (en) Page detection method and device, electronic equipment and storage medium
CN111552620B (en) Data acquisition method, device, terminal and storage medium
CN111783010B (en) Webpage blank page monitoring method, device, terminal and storage medium
CN112558933A (en) Component rendering method and device, readable medium and electronic equipment
CN111710017A (en) Display method and device and electronic equipment
CN109542743B (en) Log checking method and device, electronic equipment and computer readable storage medium
CN113590985B (en) Page jump configuration method and device, electronic equipment and computer readable medium
CN115379245B (en) Information display method and device and electronic equipment
CN111736919A (en) Buried point inspection method and device and electronic equipment
CN112363885B (en) Method, device, electronic equipment and computer readable medium for detecting application abnormality
CN110633182B (en) System, method and device for monitoring server stability
CN112379967B (en) Simulator detection method, device, equipment and medium
CN111309323B (en) Parameter initialization method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant