CN111752797A - Terminal log processing method and device, terminal and storage medium - Google Patents

Terminal log processing method and device, terminal and storage medium Download PDF

Info

Publication number
CN111752797A
CN111752797A CN202010581151.6A CN202010581151A CN111752797A CN 111752797 A CN111752797 A CN 111752797A CN 202010581151 A CN202010581151 A CN 202010581151A CN 111752797 A CN111752797 A CN 111752797A
Authority
CN
China
Prior art keywords
terminal
log
target
hash value
determining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010581151.6A
Other languages
Chinese (zh)
Other versions
CN111752797B (en
Inventor
陈方毅
高才龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Meishao Co ltd
Original Assignee
Xiamen Meishao Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Meishao Co ltd filed Critical Xiamen Meishao Co ltd
Priority to CN202010581151.6A priority Critical patent/CN111752797B/en
Publication of CN111752797A publication Critical patent/CN111752797A/en
Application granted granted Critical
Publication of CN111752797B publication Critical patent/CN111752797B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3065Monitoring arrangements determined by the means or processing involved in reporting the monitored data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/13File access structures, e.g. distributed indices
    • G06F16/137Hash-based
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/16File or folder operations, e.g. details of user interfaces specifically adapted to file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Computing Systems (AREA)
  • Human Computer Interaction (AREA)
  • Mathematical Physics (AREA)
  • Library & Information Science (AREA)
  • Stored Programmes (AREA)

Abstract

The application discloses a terminal log processing method and device, a terminal and a storage medium. The method comprises the following steps: acquiring terminal information of a target terminal running a target application; determining a check hash value of the terminal information; verifying the verification hash value; if the verification is successful, determining a history log of the target application running on the target terminal; acquiring a new log of a target application running on a target terminal; and processing the target application running on the target terminal based on the history updating log. The method has the advantages that the terminal information is converted into the check hash value to verify the target terminal, so that the uniqueness of the terminal is guaranteed, the management of the application is accurate to the terminal, the same management of the application on the same terminal is facilitated, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.

Description

Terminal log processing method and device, terminal and storage medium
Technical Field
The application relates to the technical field of computers, in particular to a method and a device for processing a terminal log, a terminal and a storage medium.
Background
With the development of intelligent terminals, management of various applications running on the intelligent terminals becomes more and more important. Especially for management after multiple installations, uninstallations of the same application. Because the log system of the application can manage various behaviors (including system behaviors, user behaviors, network behaviors and the like) generated by the terminal, after the application is uninstalled, if the application is downloaded to the terminal again, the log generated before uninstalling has the possibility of being lost, thereby influencing the follow-up tracking management of the application. For example, messages cannot be pushed to an application accurately.
Disclosure of Invention
In order to solve at least one technical problem, the present application provides a method and an apparatus for processing a terminal log, a terminal, and a storage medium.
According to a first aspect of the present application, a method for processing a terminal log is provided, where the method includes:
acquiring terminal information of a target terminal running a target application;
determining a check hash value of the terminal information;
verifying the verification hash value;
if the verification is successful, determining a history log of the target application running on the target terminal;
acquiring a new log of a target application running on a target terminal;
and processing the target application running on the target terminal based on the history updating log.
Further, the terminal information includes at least one of:
operating system identification, equipment identification and a user account of the target application.
Further, the step of determining the check hash value of the terminal information further includes:
according to a text format corresponding to the operating system identifier, the equipment identifier and the user account of the target application, packaging the terminal information to obtain a file to be processed;
and determining a check hash value corresponding to the file to be processed based on a preset hash encryption algorithm.
Further, before the step of determining the check hash value corresponding to the file to be processed based on the preset hash encryption algorithm, the method further includes:
if the file to be processed comprises the vacant item, determining a sequence code corresponding to the vacant item;
and adding the sequence code at the position of the vacant item of the file to be processed.
Further, the step of verifying the verification hash value includes:
matching the check hash values in a pre-stored hash value list, wherein the hash value list comprises a plurality of pre-stored hash values;
and judging whether the verification is successful or not according to the matching result.
Further, if the verification is successful, the step of determining the history log of the target application running on the target terminal includes:
determining a pre-stored hash value which is verified successfully;
and determining the historical logs corresponding to the pre-stored hash values based on the historical logs corresponding to the pre-stored hash values respectively.
Further, processing the target application running on the target terminal based on the history update log includes:
determining operation related information respectively corresponding to the multiple types of information according to the history updating log;
determining user interest points based on operation related information respectively corresponding to the various types of information;
and generating a recommendation information list according to the user interest points so as to push the recommendation information list to the target terminal.
According to a second aspect of the present application, there is provided an apparatus for processing a terminal log, the apparatus including:
the terminal information acquisition module is used for acquiring the terminal information of a target terminal running a target application;
the hash value determining module is used for determining a check hash value of the terminal information;
the hash value checking module is used for checking the checked hash value;
the history log determining module is used for determining the history log of the target application running on the target terminal if the verification is successful;
the new log acquisition module is used for acquiring a new log of a target application running on a target terminal;
the log updating processing module is used for updating the historical log according to the new log to obtain a historical updating log;
and the terminal application processing module is used for processing the target application running on the target terminal based on the history update log.
Further, the terminal information includes at least one of:
operating system identification, equipment identification and a user account of the target application.
Further, the hash value determination module includes: a packaging sub-module and a hash calculation sub-module,
the packaging submodule is used for packaging the terminal information according to a text format corresponding to the operating system identifier, the equipment identifier and the user account of the target application to obtain a file to be processed;
and the hash calculation submodule is used for determining a check hash value corresponding to the file to be processed based on a preset hash encryption algorithm.
Further, before the step of determining the check hash value corresponding to the file to be processed based on the preset hash encryption algorithm, the hash calculation sub-module further includes: a sequence code unit and a sequence code processing unit,
the sequence code unit is used for determining a sequence code corresponding to a vacancy item if the file to be processed comprises the vacancy item;
and the sequence code processing unit is used for adding the sequence code at the position of the vacant item of the file to be processed.
Further, the hash value check module includes: a hash value matching sub-module and a match determination sub-module (not shown in the figure).
The hash value matching submodule is used for matching the check hash value in a pre-stored hash value list, and the hash value list comprises a plurality of pre-stored hash values;
and the matching judgment submodule is used for judging whether the verification is successful or not according to the matching result.
Further, the history log determination module comprises: a pre-stored hash value determination sub-module and a history log query sub-module,
the pre-stored hash value determining submodule is used for determining a pre-stored hash value which is verified successfully;
and the historical log query submodule is used for determining the historical logs corresponding to the pre-stored hash values based on the historical logs corresponding to the pre-stored hash values respectively.
Further, the terminal application processing module comprises: an operation information determining submodule, an interest point determining submodule and a recommendation information generating submodule,
the operation information determining submodule is used for determining operation related information corresponding to the various types of information respectively according to the history updating log;
the interest point determining submodule is used for determining user interest points based on operation related information respectively corresponding to the multi-class information;
and the recommendation information generation submodule is used for generating a recommendation information list according to the user interest points so as to push the recommendation information list to the target terminal.
According to a third aspect of the present application, there is provided a terminal comprising: the terminal log processing method comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the terminal log processing method.
According to a fourth aspect of the present application, there is provided a computer-readable storage medium storing computer-executable instructions for performing the above-described method for processing a terminal log.
According to the method and the device, the terminal information of the target terminal running the target application is obtained, the check hash value of the terminal information is determined, so that the check hash value is verified, under the condition that verification is successful, the history log and the new log of the target application running on the target terminal are determined, the history log is updated according to the new log, and the target application running on the target terminal is processed according to the updated history log. The mode of converting the terminal information into the check hash value to verify the target terminal not only ensures the uniqueness of the terminal, but also can fuse the logs of the terminal, so that the management of the application is accurate to the terminal, the same application can be managed on the same terminal conveniently, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a method for processing a terminal log according to an embodiment of the present application;
fig. 2 is a schematic flowchart illustrating a process of processing a target application in a method for processing a terminal log according to an embodiment of the present application; and
fig. 3 is a schematic block diagram of a processing apparatus for a terminal log according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that although functional blocks are partitioned in a schematic diagram of an apparatus and a logical order is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the partitioning of blocks in the apparatus or the order in the flowchart.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
According to an embodiment of the present application, a method for processing a terminal log is provided, as shown in fig. 1, the method includes steps S101 to S107.
Step S101: and acquiring terminal information of a target terminal running the target application.
Specifically, the server acquires terminal information of a target terminal running a target application.
Specifically, the target terminal may acquire terminal information of the target terminal and send the terminal information to the server when detecting at least one of initialization of the target application on the target terminal, downloading operation of the target application, and starting operation of the target application; or the server can also acquire the terminal information from the target terminal according to a preset period.
Specifically, the target terminal may be an electronic device such as a mobile phone, a tablet, a PC, a wearable device, and the like.
Specifically, the target application may be an information application, a music application, a video application, etc., which are not listed here.
Step S102: and determining a check hash value of the terminal information.
Specifically, the terminal information may be calculated by using a preconfigured hash algorithm, and a check hash value of the terminal information may be determined. The preconfigured hash algorithm may be MD5 algorithm, SHAR1 algorithm, CRC32 algorithm, or the like. Thus, the check hash value may be an MD5 code, a SHA1 code, or a CRC32 code. More specifically, the server may be preconfigured with a verification tool integrated with a plurality of hash algorithms, so as to calculate the terminal information according to the hash algorithm selected by the user.
For example, when the terminal information is input to the MD5 verification tool, the MD5 verification tool outputs an MD5 value corresponding to the terminal information, and the target terminal is determined according to the MD5 value.
Step S103: and checking the check hash value.
Specifically, the server side completes the verification by comparing the verification hash value with a pre-stored hash value.
For example, if the check hash value is the MD5 code, the MD5 code is compared with the pre-stored MD5 code, and if the two codes are consistent, the check is successful, otherwise, the check fails.
Step S104: and if the verification is successful, determining the history log of the target application running on the target terminal.
In the embodiment of the application, the history log is used for representing the historical operation related information of the target application running on the target terminal. For example, the history operation related information includes the time when the target terminal downloads the target application, the operation history of the target terminal on the target application, and the like.
Specifically, the history log is uploaded to the server by the target terminal within a predetermined time period in the past.
Step S105: a new log of a target application running on a target terminal is obtained.
In the embodiment of the application, the new log is used for representing the operation related information of the target application running on the target terminal in the latest period of time.
Specifically, the target application generally sends the log to the server according to a predetermined upload period. For example, every 1 hour, every time the target application is unloaded, etc.
Step S106: and updating the historical log according to the new log to obtain a historical updating log.
Specifically, the uploading time of the new log may be used as a log label of the new log, the uploading time of the historical log may be used as a log label of the historical log, and the uploading time of the historical log may be sorted according to the time sequence and then spliced into a file to be used as the historical update log.
Step S107: and processing the target application running on the target terminal based on the history updating log.
Specifically, the message pushing can be performed to the target application according to the updated history log.
According to the method and the device, the terminal information of the target terminal running the target application is obtained, the check hash value of the terminal information is determined, so that the check hash value is verified, under the condition that verification is successful, the history log and the new log of the target application running on the target terminal are determined, the history log is updated according to the new log, and the target application running on the target terminal is processed according to the updated history log. The mode of converting the terminal information into the check hash value to verify the target terminal not only ensures the uniqueness of the terminal, but also can fuse the logs of the terminal, so that the management of the application is accurate to the terminal, the same application can be managed on the same terminal conveniently, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.
In the embodiment of the application, the terminal information includes at least one of the following items:
operating system identification, equipment identification and user account of the application program.
Specifically, the operating system of the target terminal is generally an android system or an IOS system, and therefore, the operating system identifier is generally an android system identifier or an IOS system identifier.
In the embodiment of the application, the device identifier is used for representing a unique device identifier of the target terminal, identifying the target terminal and tracking the user activity of the target terminal. Device identification is typically represented by a UDID.
Specifically, the user agent UA may be used to identify an operating system adopted by the target terminal, and determine an operating system identifier, a device identifier, and a user account of the target application of the target terminal. The user account of the target application is generally a mobile phone number, a mailbox number, and the like.
In some embodiments, step S102 further comprises: step S1021 and step S1022 (not shown in the figure), wherein,
step S1021: according to a text format corresponding to the operating system identifier, the equipment identifier and the user account of the target application, packaging the terminal information to obtain a file to be processed;
step S1022: and determining a check hash value corresponding to the file to be processed based on a preset hash encryption algorithm.
In the embodiment of the present application, the text format is used to characterize the operating system identifier, the device identifier, and the ordering rule of the user account of the target application, and the respective byte lengths. For example, the length of the file to be processed, the file header and the number of bytes thereof, the location of the operating system identifier and the number of bytes thereof, the location of the device identifier and the number of bytes thereof, the location of the user account of the target application and the number of bytes thereof, and the file trailer and the number of bytes thereof.
Specifically, the MD5 algorithm may be used as a preset hash encryption algorithm to obtain an MD5 value, and this MD5 value is used as the data fingerprint of the file to be processed. The operating system identifier, the device identifier and the user account are all fixed and unchangeable. Therefore, the value of MD5 is also unchanged, and the check can be carried out according to the value of MD 5.
In some embodiments, before step S1022, the method further includes:
if the file to be processed comprises the vacant item, determining a sequence code corresponding to the vacant item;
and adding the sequence code at the position of the vacant item of the file to be processed.
Specifically, different terminal information corresponds to different sequence codes, and the sequence codes are generally determined according to various collected terminal information when the target terminal downloads the target application for the first time, so that the consistency of the check hash table of the device information of the same application running at the same target terminal can be ensured.
Specifically, the number of the blank items included in the file to be processed may be 1 or 2.
Specifically, the position of the empty item may be determined to determine a sequence code corresponding to the empty item, so as to supplement the sequence code into the file to be processed.
In some embodiments, step S103 further comprises:
matching the check hash values in a pre-stored hash value list, wherein the hash value list comprises a plurality of pre-stored hash values;
and determining whether the verification is successful according to the matching result.
Specifically, hash values respectively corresponding to different terminals are stored in the hash value list to be used as verification basic data. More specifically, the hash value list is generally obtained by performing hash calculation on the acquired terminal information corresponding to different terminals when the different terminals download the target application for the first time.
Specifically, if the matching is successful, the verification is determined to be successful; and if the matching fails, determining that the verification fails.
In some embodiments, step S104 further comprises:
determining a pre-stored hash value which is verified successfully;
and determining the historical logs corresponding to the pre-stored hash values based on the historical logs corresponding to the pre-stored hash values respectively.
Specifically, the association relationship between a plurality of pre-stored hash values and their respectively corresponding history logs may be established through mapping.
In some embodiments, as shown in fig. 2, step S107 further includes:
step S1071: determining operation related information respectively corresponding to the multiple types of information according to the history updating log;
step S1072: determining user interest points based on operation related information respectively corresponding to the various types of information;
step S1073: and generating a recommendation information list according to the user interest points so as to push the recommendation information list to the target terminal.
Specifically, the operation-related information generally includes browsing duration, browsing frequency, browsing times, review times, praise times, and the like.
Specifically, the user interest point may be determined according to any one of the operation-related information. For example, if the browsing duration of any type of information is greater than a preset browsing duration threshold, determining that any type of information is a user interest point; and if the browsing frequency of any type of information is greater than a preset browsing frequency threshold value, determining that the any type of information is the user interest point.
Another embodiment of the present application provides a device for processing a terminal log, as shown in fig. 3, where the device 30 includes: a terminal information acquisition module 301, a hash value determination module 302, a hash value check module 303, a history log determination module 304, a new log acquisition module 305, a log update processing module 306, and a terminal application processing module 307.
A terminal information obtaining module 301, configured to obtain terminal information of a target terminal running a target application;
a hash value determining module 302, configured to determine a check hash value of the terminal information;
a hash value verification module 303, configured to verify a verified hash value;
a history log determining module 304, configured to determine a history log of the target application running on the target terminal if the verification is successful;
a new log obtaining module 305, configured to obtain a new log of a target application running on a target terminal;
the log updating processing module 306 is used for updating the history log according to the new log;
and a terminal application processing module 307, configured to process the target application running on the target terminal based on the updated history log.
According to the method and the device, the terminal information of the target terminal running the target application is obtained, the check hash value of the terminal information is determined, so that the check hash value is verified, under the condition that verification is successful, the history log and the new log of the target application running on the target terminal are determined, the history log is updated according to the new log, and the target application running on the target terminal is processed according to the updated history log. The mode of converting the terminal information into the check hash value to verify the target terminal not only ensures the uniqueness of the terminal, but also can fuse the logs of the terminal, so that the management of the application is accurate to the terminal, the same application can be managed on the same terminal conveniently, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.
Further, the terminal information includes at least one of:
operating system identification, equipment identification and a user account of the target application.
Further, the hash value determination module includes: a packaging sub-module and a hash calculation sub-module (not shown in the figure).
The packaging submodule is used for packaging the terminal information according to a text format corresponding to the operating system identifier, the equipment identifier and the user account of the target application to obtain a file to be processed;
and the hash calculation submodule is used for determining a check hash value corresponding to the file to be processed based on a preset hash encryption algorithm.
Further, before the step of determining the check hash value corresponding to the file to be processed based on the preset hash encryption algorithm, the hash calculation sub-module further includes: a sequence code unit and a sequence code processing unit (not shown in the figure).
The sequence code unit is used for determining a sequence code corresponding to a vacancy item if the file to be processed comprises the vacancy item;
and the sequence code processing unit is used for adding the sequence code at the position of the vacant item of the file to be processed.
Further, the hash value check module includes: a hash value matching sub-module and a match determination sub-module (not shown in the figure).
The hash value matching submodule is used for matching the check hash value in a pre-stored hash value list, and the hash value list comprises a plurality of pre-stored hash values;
and the matching judgment submodule is used for judging whether the verification is successful or not according to the matching result.
Further, the history log determination module comprises: a pre-stored hash value determination sub-module and a history log query sub-module (not shown).
The pre-stored hash value determining submodule is used for determining a pre-stored hash value which is verified successfully;
and the historical log query submodule is used for determining the historical logs corresponding to the pre-stored hash values based on the historical logs corresponding to the pre-stored hash values respectively.
Further, the terminal application processing module comprises: an operation information determination sub-module, an interest point determination sub-module, and a recommendation information generation sub-module (not shown in the figure).
The operation information determining submodule is used for determining operation related information corresponding to the various types of information respectively according to the history updating log;
the interest point determining submodule is used for determining user interest points based on operation related information respectively corresponding to the multi-class information;
and the recommendation information generation submodule is used for generating a recommendation information list according to the user interest points so as to push the recommendation information list to the target terminal.
The processing apparatus of the terminal log in this embodiment can execute the processing method of the terminal log provided in this embodiment, and the implementation principles are similar, and are not described herein again.
Another embodiment of the present application provides a terminal, including: the terminal log processing method comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein the processor executes the computer program to realize the terminal log processing method.
In particular, the processor may be a CPU, general purpose processor, DSP, ASIC, FPGA or other programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. A processor may also be a combination of computing functions, e.g., comprising one or more microprocessors, a DSP and a microprocessor, or the like.
In particular, the processor is coupled to the memory via a bus, which may include a path for communicating information. The bus may be a PCI bus or an EISA bus, etc. The bus may be divided into an address bus, a data bus, a control bus, etc.
The memory may be, but is not limited to, a ROM or other type of static storage device that can store static information and instructions, a RAM or other type of dynamic storage device that can store information and instructions, an EEPROM, a CD-ROM or other optical disk storage, optical disk storage (including compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), magnetic disk storage media or other magnetic storage devices, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
Optionally, the memory is used for storing codes of computer programs for executing the scheme of the application, and the processor is used for controlling the execution. The processor is configured to execute the application program codes stored in the memory to implement the actions of the processing device of the terminal log provided by the embodiment shown in fig. 3.
According to the method and the device, the terminal information of the target terminal running the target application is obtained, the check hash value of the terminal information is determined, so that the check hash value is verified, under the condition that verification is successful, the history log and the new log of the target application running on the target terminal are determined, the history log is updated according to the new log, and the target application running on the target terminal is processed according to the updated history log. The mode of converting the terminal information into the check hash value to verify the target terminal not only ensures the uniqueness of the terminal, but also can fuse the logs of the terminal, so that the management of the application is accurate to the terminal, the same application can be managed on the same terminal conveniently, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.
Yet another embodiment of the present application provides a computer-readable storage medium storing computer-executable instructions for performing the method for processing the terminal log shown in fig. 1 or fig. 2.
According to the method and the device, the terminal information of the target terminal running the target application is obtained, the check hash value of the terminal information is determined, so that the check hash value is verified, under the condition that verification is successful, the history log and the new log of the target application running on the target terminal are determined, the history log is updated according to the new log, and the target application running on the target terminal is processed according to the updated history log. The mode of converting the terminal information into the check hash value to verify the target terminal not only ensures the uniqueness of the terminal, but also can fuse the logs of the terminal, so that the management of the application is accurate to the terminal, the same application can be managed on the same terminal conveniently, the tracking effect of the target application on the target terminal is played, and the use experience of a user on the application is improved.
The above-described embodiments of the apparatus are merely illustrative, and the units illustrated as separate components may or may not be physically separate, may be located in one place, or may be distributed over a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps, systems, and methods disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof. Some or all of the physical components may be implemented as software executed by a processor, such as a central processing unit, digital signal processor, or microprocessor, or as hardware, or as an integrated circuit, such as an application specific integrated circuit. Such software may be distributed on computer readable media, which may include computer storage media (or non-transitory media) and communication media (or transitory media). The term computer storage media includes volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data, as is well known to those of ordinary skill in the art. Computer storage media includes, but is not limited to, RAM, ROM, EEPROM, flash memory or other memory technology, CD-ROM, Digital Versatile Disks (DVD) or other optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium which can be used to store the desired information and which can accessed by a computer. In addition, communication media typically embodies computer readable instructions, data structures, program modules or other data in a modulated data signal such as a carrier wave or other transport mechanism and includes any information delivery media as known to those skilled in the art.
While the present invention has been described with reference to the preferred embodiments, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A method for processing a terminal log is characterized by comprising the following steps:
acquiring terminal information of a target terminal running a target application;
determining a check hash value of the terminal information;
checking the check hash value;
if the verification is successful, determining a history log of the target application running on the target terminal;
acquiring a new log of the target application running on the target terminal;
updating the historical log according to the new log to obtain a historical updating log;
and processing the target application running on the target terminal based on the history updating log.
2. The method of claim 1, wherein the terminal information comprises at least one of:
an operating system identifier, a device identifier, and a user account of the target application.
3. The method of claim 2, wherein the step of determining the check hash value of the terminal information further comprises:
according to a text format corresponding to the operating system identifier, the equipment identifier and the user account of the target application, packaging the terminal information to obtain a file to be processed;
and determining the check hash value corresponding to the file to be processed based on a preset hash encryption algorithm.
4. The method according to claim 3, wherein before the step of determining the check hash value corresponding to the file to be processed based on a preset hash encryption algorithm, the method further comprises:
if the file to be processed comprises a vacant item, determining a sequence code corresponding to the vacant item;
adding the sequence code at the position of the vacant item of the file to be processed.
5. The method of claim 1, wherein the step of verifying the verification hash value comprises:
matching the check hash value in a pre-stored hash value list, wherein the hash value list comprises a plurality of pre-stored hash values;
and judging whether the verification is successful or not according to the matching result.
6. The method of claim 5, wherein the step of determining the history log of the target application running on the target terminal if the verification is successful comprises:
determining a pre-stored hash value which is verified successfully;
and determining the historical logs corresponding to the pre-stored hash values based on the historical logs corresponding to the pre-stored hash values respectively.
7. The method of claim 1, wherein the processing the target application running on the target terminal based on the history update log comprises:
determining operation related information respectively corresponding to the multiple types of information according to the history updating log;
determining user interest points based on operation related information respectively corresponding to the multiple types of information;
and generating a recommendation information list according to the user interest points so as to push the recommendation information list to the target terminal.
8. An apparatus for processing a terminal log, comprising:
the terminal information acquisition module is used for acquiring the terminal information of a target terminal running a target application;
the hash value determining module is used for determining a check hash value of the terminal information;
the hash value checking module is used for checking the checking hash value;
the history log determining module is used for determining the history log of the target application running on the target terminal if the verification is successful;
a new log obtaining module, configured to obtain a new log of the target application running on the target terminal;
the log updating processing module is used for updating the historical log according to the new log to obtain a historical updating log;
and the terminal application processing module is used for processing the target application running on the target terminal based on the history updating log.
9. A terminal, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor executes the computer program to implement the method of any of claims 1 to 7.
10. A computer-readable storage medium storing computer-executable instructions for performing the method of any one of claims 1 to 7.
CN202010581151.6A 2020-06-23 2020-06-23 Terminal log processing method and device, terminal and storage medium Active CN111752797B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010581151.6A CN111752797B (en) 2020-06-23 2020-06-23 Terminal log processing method and device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010581151.6A CN111752797B (en) 2020-06-23 2020-06-23 Terminal log processing method and device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN111752797A true CN111752797A (en) 2020-10-09
CN111752797B CN111752797B (en) 2022-06-17

Family

ID=72676822

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010581151.6A Active CN111752797B (en) 2020-06-23 2020-06-23 Terminal log processing method and device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN111752797B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112862454A (en) * 2021-03-02 2021-05-28 岭东核电有限公司 Test execution work order updating method and device, computer equipment and storage medium
CN115357762A (en) * 2022-10-19 2022-11-18 支付宝(杭州)信息技术有限公司 Data verification method and device, storage medium and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856530A (en) * 2012-12-05 2014-06-11 腾讯科技(深圳)有限公司 Operation log managing method, server, terminal and system
CN107016103A (en) * 2017-04-12 2017-08-04 北京焦点新干线信息技术有限公司 A kind of method and device for building user's portrait
CN109408330A (en) * 2018-10-15 2019-03-01 东软集团股份有限公司 Log analysis method, device, terminal device and readable storage medium storing program for executing
US20190114363A1 (en) * 2017-10-17 2019-04-18 Baidu Online Network Technology (Beijing) Co., Ltd. Method And Apparatus For Pushing Information
CN110839015A (en) * 2019-10-12 2020-02-25 深圳壹账通智能科技有限公司 Log storage and reading method, device, equipment and medium based on block chain
CN111159549A (en) * 2019-12-27 2020-05-15 飞狐信息技术(天津)有限公司 Information recommendation method and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103856530A (en) * 2012-12-05 2014-06-11 腾讯科技(深圳)有限公司 Operation log managing method, server, terminal and system
CN107016103A (en) * 2017-04-12 2017-08-04 北京焦点新干线信息技术有限公司 A kind of method and device for building user's portrait
US20190114363A1 (en) * 2017-10-17 2019-04-18 Baidu Online Network Technology (Beijing) Co., Ltd. Method And Apparatus For Pushing Information
CN109408330A (en) * 2018-10-15 2019-03-01 东软集团股份有限公司 Log analysis method, device, terminal device and readable storage medium storing program for executing
CN110839015A (en) * 2019-10-12 2020-02-25 深圳壹账通智能科技有限公司 Log storage and reading method, device, equipment and medium based on block chain
CN111159549A (en) * 2019-12-27 2020-05-15 飞狐信息技术(天津)有限公司 Information recommendation method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112862454A (en) * 2021-03-02 2021-05-28 岭东核电有限公司 Test execution work order updating method and device, computer equipment and storage medium
CN115357762A (en) * 2022-10-19 2022-11-18 支付宝(杭州)信息技术有限公司 Data verification method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN111752797B (en) 2022-06-17

Similar Documents

Publication Publication Date Title
CN107516038B (en) Method and device for determining device fingerprint
CN107547239B (en) Configuration object updating method and device
CN110442377B (en) Patch package generation method, application updating method, device and electronic equipment
CN111752797B (en) Terminal log processing method and device, terminal and storage medium
CN109391673B (en) Method, system and terminal equipment for managing update file
CN105389177A (en) Software version confirmation method, device and system
CN106980565B (en) Upgrading process monitoring method and device
CN111083214A (en) Method, device, client, server and system for updating application software
CN111343267B (en) Configuration management method and system
CN110597764B (en) File downloading and version management method and device
CN112995806A (en) Method, device, system and storage medium for upgrading optical network unit
CN111176685A (en) Upgrading method and device
CN114461217A (en) Code compiling method and device, electronic equipment and storage medium
CN111046377A (en) Method and device for loading dynamic link library, electronic equipment and storage medium
CN114879993A (en) Upgrading processing method of software installation package, server and client
CN113609088A (en) File processing method, device and equipment
CN110825406A (en) Software upgrading method and related equipment
CN113672349A (en) Mirror image updating method, device, equipment and medium
CN112328288A (en) Method, system, equipment and storage medium for updating server component
CN117560285B (en) Intelligent control internet of things OTA upgrading method, client and server
CN113709195A (en) Vehicle software upgrading method, device and system
CN112748931B (en) Compiled file management method, calling method and device and electronic equipment
CN110471782B (en) Configuration information consistency processing method and device and electronic equipment
CN112733210B (en) Equipment identifier obtaining method and device and computer readable storage medium
CN103761247A (en) Processing method and device for error files

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant