CN112965877A - Qt desktop point burying system, method and device based on database configuration - Google Patents

Qt desktop point burying system, method and device based on database configuration Download PDF

Info

Publication number
CN112965877A
CN112965877A CN202110265850.4A CN202110265850A CN112965877A CN 112965877 A CN112965877 A CN 112965877A CN 202110265850 A CN202110265850 A CN 202110265850A CN 112965877 A CN112965877 A CN 112965877A
Authority
CN
China
Prior art keywords
event
user behavior
database
behavior
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110265850.4A
Other languages
Chinese (zh)
Inventor
宋廷宇
黄河
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Vishee Medical Technology Co Ltd
Original Assignee
Nanjing Vishee Medical Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Vishee Medical Technology Co Ltd filed Critical Nanjing Vishee Medical Technology Co Ltd
Priority to CN202110265850.4A priority Critical patent/CN112965877A/en
Publication of CN112965877A publication Critical patent/CN112965877A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24564Applying rules; Deductive queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2465Query processing support for facilitating data mining operations in structured databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/254Extract, transform and load [ETL] procedures, e.g. ETL data flows in data warehouses
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/284Relational databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques

Abstract

The invention discloses a Qt desktop point burying system, method and device based on database configuration, which monitor all events of Qt by inheriting QAPPLICATION and overwriting a notify function to add an event filter, screen user behavior related events according to a monitoring rule based on a regular expression configured in a database, and record corresponding operation, interface access and other user behaviors. By the method and the device, the cost of embedded point development and use of the Qt desktop application program is greatly reduced, the flexibility of user behavior monitoring is improved, and meanwhile, the security is improved as the rule is configured in a database with an access control mechanism.

Description

Qt desktop point burying system, method and device based on database configuration
Technical Field
The invention relates to a Qt desktop point burying system, method and device based on database configuration, and belongs to the information processing technology.
Background
User Behavior Statistics (UBS) is commonly called as a buried point and is a very important link in the research and development process of internet products; user behavior data can be acquired through the buried point, and whether the business logic of the product is smooth or not is integrally verified.
In the prior art, a point is usually embedded in a Web program of a Web page and an APP (Application) program of a mobile terminal for analyzing a behavior of a network user, and the Web page and the mobile terminal are usually analyzed and embedded based on a tree control relationship of an interface. For example, CN110674017A proposes to add a Hook handler based on an event, and identify a control organized in a tree structure through XPath to perform user behavior monitoring on a specific control, but XPath cannot handle a non-tree structure interface control and cannot handle a non-interface user behavior. In a PC desktop application program, a clear tree relationship of controls is lacked, when a point needs to be buried or a developer develops the application program, a point-buried code is inserted into a service code of each interface control, the service code and the point-buried code are mixed, time and labor are wasted, labor cost is too high, and meanwhile, the controls are additionally added with a specific click event for monitoring, so that the risk of influencing the response logic of the controls possibly exists. The dynamic point burying method provided by CN107436832B and operating in the IOS system adopts a configuration file to configure the point burying processing logic, but the configuration file has no access control mechanism, so that there is a potential safety hazard.
Disclosure of Invention
The purpose of the invention is as follows: in order to overcome the defects in the prior art, the invention provides a Qt desktop embedded point system, method and device based on database configuration, wherein embedded point codes and specific interface controls or event processing logics are separated and decoupled, embedded point configuration information is stored in a database, when the embedded point requirement is changed, desktop application programs do not need to be released again, only the embedded point configuration information needs to be changed, so that the embedded point development and use cost of the Qt desktop application programs is reduced, and the flexibility of user behavior monitoring is improved.
The technical scheme is as follows: in order to achieve the purpose, the invention adopts the technical scheme that:
a Qt desktop embedded point system based on database configuration comprises an event filter, a rule mapping module, a target matching module, a behavior recording module, a user behavior database, a user behavior analysis module and a configuration import module; the event filter is added in a global event processing function of the Qt desktop application program, and all events are filtered by calling a rule mapping module; the rule mapping module determines whether the event is a user behavior related event needing monitoring or not by judging whether a matching rule corresponding to the event exists or not; the target matching module filters the user behavior related events needing to be monitored by carrying out rule matching on the behavior types of the events and the attributes of the event trigger objects, wherein the filtering rules of the attributes of the event trigger objects are defined by regular expressions; the behavior recording module stores the events meeting the filtering rules as user behavior records of corresponding behavior types; user behavior records of different behavior types are stored in user behavior record tables of different behavior types in a user behavior database, and embedded point configuration information is simultaneously stored in the user behavior database; the user behavior analysis module analyzes the user behavior by reading the user behavior record in the user behavior database; when the Qt desktop application program is started, the configuration import module imports buried point configuration information from the user behavior database, wherein the buried point configuration information comprises user behaviors needing to be monitored, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules.
Preferably, the global event processing function of the Qt desktop application is a notify function of QApplication, and when an event filter is added, the QApplication is inherited and the notify function is overwritten, and the event filter is added to the overwritten notify function.
Preferably, the event and the matching rule establish a mapping relation through a Hash algorithm.
Preferably, the matching rule includes a behavior type and a corresponding filtering rule, the behavior type includes user operation and interface access, the filtering rule is defined by a regular expression, and the filtering rule includes a regular expression based on an event trigger object name and/or a regular expression based on an event trigger object type name.
Preferably, the user behavior database is a relational database with an access control mechanism.
Preferably, the user behavior analysis module performs post-incident analysis on the user behavior.
Preferably, the configuration importing module imports the embedded point configuration information from the user behavior database when the Qt desktop application is started, and the embedded point configuration information resides in the memory after importing.
A Qt desktop point burying method based on database configuration comprises the following steps:
(1) writing buried point configuration information into a user behavior database, wherein the buried point configuration information comprises user behaviors needing to be monitored, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules;
(2) when the Qt desktop application program is started, the configuration import module imports the embedded point configuration information from the user behavior database, and the embedded point configuration information is resident in the memory after being imported;
(3) triggering events by user behaviors, and calling a rule mapping module by an event filter to filter all events;
(4) the rule mapping module judges whether a matching rule corresponding to the event exists: if the matching rule corresponding to the event does not exist, determining that the event is not the user behavior related event needing to be monitored, and directly transmitting the event to a next-stage event filter; if the matching rule corresponding to the event exists, determining that the event is a user behavior related event needing to be monitored, and sending the corresponding event trigger object and the matching rule to a target matching module for matching;
(5) the target matching module adopts a matching rule to carry out target matching on the event trigger object, wherein the matching rule comprises a behavior type and a corresponding filtering rule: if the event trigger object meets the filtering rule, the target matching is considered to be successful, the matching result is sent to the behavior recording module, and the event is transmitted to a next-stage event filter; if the event trigger object does not meet the filtering rule, the target matching is considered to be failed, and the event is transmitted to a next-level event filter;
(6) the behavior recording module records the matching result and stores the user behavior records of different behavior types in user behavior record tables corresponding to different behavior types in a user behavior database;
(7) and the user behavior analysis module reads the user behavior record from the user behavior database and performs post analysis on the user behavior.
A Qt desktop embedded point device based on database configuration comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the computer program is used for executing the Qt desktop embedded point method based on database configuration.
Has the advantages that: according to the Qt desktop embedded point system, the Qt desktop embedded point method and the Qt desktop embedded point device based on database configuration, events and filtering rules are realized in a database configuration mode with access control outside a program, the event and the filtering rules are decoupled from a service program, when embedded point changing requirements are met, desktop application programs do not need to be released again, only configuration rules need to be changed, and embedded point updating rules are convenient to update; and the matching rule adopts a regular expression, and can support a complex matching rule through a short character string, thereby greatly reducing the cost of embedded point development and use of the Qt desktop application program, improving the flexibility of user behavior monitoring, and improving the safety by configuring the rule in a database with an access control mechanism.
Drawings
FIG. 1 is a system framework diagram of the present invention;
FIG. 2 is a schematic flow chart of the method of the present invention;
FIG. 3 is a schematic view of the structure of the device of the present invention.
Detailed Description
The invention is described in detail below with reference to the figures and the embodiments.
In the description of the present invention, it is to be understood that the terms "center", "longitudinal", "lateral", "up", "down", "front", "back", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like, indicate orientations or positional relationships based on those shown in the drawings, and are used only for convenience in describing the present invention and for simplicity in description, and do not indicate or imply that the referenced devices or elements must have a particular orientation, be constructed and operated in a particular orientation, and thus, are not to be construed as limiting the present invention. Furthermore, the terms "first" and "second" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance.
Fig. 1 shows a Qt desktop node burying system based on database configuration, which includes an event filter, a rule mapping module, a target matching module, a behavior recording module, a user behavior database, a user behavior analysis module, and a configuration importing module; the event filter is added in a global event processing function of the Qt desktop application program, and all events are filtered by calling a rule mapping module; the rule mapping module determines whether the event is a user behavior related event needing monitoring or not by judging whether a matching rule corresponding to the event exists or not; the target matching module filters the user behavior related events needing to be monitored by carrying out rule matching on the attributes of the event trigger object, and the filtering rules are defined by regular expressions; the behavior recording module stores the events meeting the filtering rules as user behavior records of corresponding behavior types; user behavior records of different behavior types are stored in user behavior record tables of different behavior types in a user behavior database, and embedded point configuration information is simultaneously stored in the user behavior database; the user behavior analysis module analyzes the user behavior by reading the user behavior record in the user behavior database; when the Qt desktop application program is started, the configuration import module imports buried point configuration information from the user behavior database, wherein the buried point configuration information comprises user behaviors needing to be monitored, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules.
In the system, an event filter, a rule mapping module, a target matching module, a behavior recording module, a user behavior database, a user behavior analysis module and a configuration import module are designed, and the specific steps are as follows.
Event filter
1.1, adding an event filter into a global event processing function of the Qt desktop application program, and filtering all events including user operation events, interface access events, network events, timing trigger events and the like through the event filter; the global event processing function of the Qt desktop application program is a notify function of QAPPLICATION, the QAPPLICATION is inherited when the event filter is added, the notify function is overwritten, and the event filter is added into the overwritten notify function;
1.2, the event filter calls a rule mapping module for each event, and judges whether a matching rule corresponding to the event exists in the rule mapping module.
(II) rule mapping module
2.1, the rule mapping module receives the calling of the event filter;
2.2, the rule mapping module imports the mapping relation between the event and the matching rule through the configuration import module during system initialization;
2.3, establishing a mapping relation between the event and the matching rule through a Hash algorithm;
2.4, if the matching rule corresponding to the event does not exist, the event is not considered to be a user behavior related event needing to be monitored, and the event is directly transmitted to a next-stage event filter;
and 2.5, if the matching rule corresponding to the event exists, the event is regarded as a user behavior related event needing monitoring, and the corresponding event trigger object and the matching rule are sent to a target matching module for matching.
(III) target matching module
3.1, the target matching module receives the event trigger object and the matching rule sent by the rule mapping module;
3.2, the matching rule comprises a filtering rule and a behavior type corresponding to the event;
3.3, the filtering rule is defined by a regular expression, and the regular expression based on the event trigger object name and/or the regular expression based on the event trigger object type name are/is adopted; only one regular expression can be configured during configuration, two regular expressions can also be configured simultaneously, and if two regular expressions are configured simultaneously, the target matching is considered to be successful when the two regular expressions are satisfied simultaneously during target matching; complex matching rules can be edited through regular expressions to adapt to complex and flexible embedded point requirements;
3.5, if the event trigger object meets the filtering rule, the target matching is considered to be successful, the event trigger object and the matching result are sent to a behavior recording module for user behavior recording, and the corresponding event is transmitted to a next-level event filter;
3.6, matching results comprise behavior types corresponding to the events, event trigger object names and/or event trigger object type names;
and 3.7, if the event trigger object does not meet the filtering rule, considering that the target matching fails, and transmitting the corresponding event to a next-level event filter.
(IV) behavior recording module
4.1, receiving an event trigger object and a matching result sent by a target matching module;
4.2, storing the user behavior as a user behavior record corresponding to the corresponding behavior type according to the behavior type;
and 4.3, the user behavior record comprises the unique identifier of the user behavior, and the unique identifier of the user behavior record adopts UUID (user authentication ID), so that the conflict generated when multiple devices record together is prevented.
The record of the user operation behavior comprises the time for triggering the user behavior, the Qt application program for triggering the user behavior, the interface for triggering the user behavior, the user name for triggering the user behavior, the specific object name or class name of the user behavior and the like.
The record of the interface access behavior comprises the time of interface access, the application program to which the interface belongs, the object name of the interface, the user name of the access interface, the residence time of the interface and the like.
And 4.4, the behavior recording module sends the user behavior record to a user behavior database.
(V) user behavior database
5.1, the user behavior database stores the user behavior record sent by the behavior recording module;
5.2, storing user behavior records of different behavior types in user behavior record tables corresponding to different behavior types, storing user operation behaviors in the user operation behavior record tables, and storing interface access behaviors in the interface access behavior record tables;
5.3, adopting a relational database with an access control mechanism, such as a Mysql database, as the user behavior database;
and 5.4, storing the buried point configuration information in a user behavior database.
(VI) user behavior analysis module
6.1, the user behavior analysis module is independent of the application program, and carries out post analysis on the user behavior record when needed, so that the influence of the statistical calculation of large data quantity on the response speed of the event is avoided;
6.2, reading a user behavior record from a user behavior database by a user behavior analysis module;
and 6.3, analyzing the characteristics of the user behaviors through statistics by the user behavior analysis module so as to obtain the application program function points and the use data of the interface.
(VII) configuration import Module
7.1, when the Qt desktop application program is started, importing buried point configuration information from a user behavior database;
7.2, the buried point configuration information comprises user behaviors needing monitoring, behavior types (such as user operation, interface access and the like) corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules;
7.3, the embedded point configuration information is resident in the memory after being imported, so that the influence on the normal event is reduced, and the processing speed of the normal event is ensured.
Fig. 2 shows a Qt desktop embedding method based on the above system, which includes the following steps:
(1) and writing buried point configuration information into the user behavior database, wherein the buried point configuration information comprises user behaviors needing monitoring, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules.
(2) When the Qt desktop application program is started, the configuration import module imports the embedded point configuration information from the user behavior database, establishes the connection between the embedded point system and the user behavior database, and the embedded point configuration information is resident in the memory after being imported.
(3) The user behavior triggers the event, and the event filter calls a rule mapping module to filter all the events.
(4) The rule mapping module takes the event type as a keyword to carry out Hash query and judge whether a matching rule corresponding to the event exists: if the matching rule corresponding to the event does not exist, determining that the event is not the user behavior related event needing to be monitored, and directly transmitting the event to a next-stage event filter; and if the matching rule corresponding to the event exists, determining that the event is a user behavior related event needing to be monitored, and sending the corresponding event trigger object and the matching rule to a target matching module for matching.
(5) The target matching module adopts a matching rule to carry out target matching on the event trigger object, wherein the matching rule comprises a behavior type and a corresponding filtering rule: if the event trigger object meets the matching rule, the target matching is considered to be successful, the matching result is sent to the behavior recording module, and the event is transmitted to a next-stage event filter; and if the event trigger object does not meet the matching rule, the target matching is considered to be failed, and the event is transmitted to a next-stage event filter.
The filtering rules are defined by regular expressions, and the filtering rules comprise regular expressions based on event trigger object names and/or regular expressions based on event trigger object type names: if only the regular expression based on the event trigger object name is used as the filtering rule, the target matching is considered to be successful if the regular expression is satisfied; if only the regular expression based on the event trigger object type name is used as the filtering rule, the target matching is considered to be successful if the regular expression is satisfied; if the regular expression based on the event trigger object name and the regular expression based on the event trigger object type name are jointly used as the filtering rule, the target matching is considered to be successful only if the two regular expressions are met simultaneously.
(6) The behavior recording module records the matching result and stores the user behavior records of different behavior types in user behavior record tables corresponding to different behavior types in a user behavior database; if the user behavior is user operation, storing the user behavior record in a user operation record table; if the user behavior is interface access, storing the user behavior record in an interface access record table; and if the user behavior is of other behavior types, storing the user behavior record in a corresponding record table.
(7) The user behavior analysis module reads a user behavior record from the user behavior database, performs post analysis on the user behavior, acquires the user behavior needing attention, and performs statistics in a counting mode; arranging event sequences according to operation events of a user to form an operation path, analyzing software operation habits of the user, comparing user task requirement design of the software, evaluating the rationality of the user requirement design and providing a basis for optimizing a functional operation path of the software; analyzing the residence time of the user in each interface according to the interface access event of the user, and setting the time of entering the interface event trigger ast 0The moment of exiting the interface event trigger ist 1If the dwell time ist 1-t 0And analyzing and comparing the residence time of each interface, judging the functional preference of the user, and providing data basis for the functional optimization key of the software.
Fig. 3 shows a Qt desktop burying point device based on the above system, which includes a memory, a processor, and a computer program stored in the memory and capable of running on the processor, the computer program being used for executing the Qt desktop burying point method based on the database configuration.
In the description of the present invention, it should be noted that, unless otherwise explicitly specified or limited, the terms "mounted," "connected," and "connected" are to be construed broadly, e.g., as meaning either a fixed connection, a removable connection, or an integral connection; can be mechanically or electrically connected; they may be connected directly or indirectly through intervening media, or they may be interconnected between two elements. The specific meanings of the above terms in the present invention can be understood in specific cases to those skilled in the art.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. In this specification, the schematic representations of the terms used above do not necessarily refer to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples.
The foregoing illustrates and describes the principles, general features, and advantages of the present invention. It should be understood by those skilled in the art that the above embodiments do not limit the present invention in any way, and all technical solutions obtained by using equivalent alternatives or equivalent variations fall within the scope of the present invention.

Claims (9)

1. A Qt desktop embedded point system based on database configuration is characterized in that: the system comprises an event filter, a rule mapping module, a target matching module, a behavior recording module, a user behavior database, a user behavior analysis module and a configuration import module; the event filter is added in a global event processing function of the Qt desktop application program, and all events are filtered by calling a rule mapping module; the rule mapping module determines whether the event is a user behavior related event needing monitoring or not by judging whether a matching rule corresponding to the event exists or not; the target matching module filters the user behavior related events needing to be monitored by carrying out rule matching on the behavior types of the events and the attributes of the event trigger objects, wherein the filtering rules of the attributes of the event trigger objects are defined by regular expressions; the behavior recording module stores the events meeting the filtering rules as user behavior records of corresponding behavior types; user behavior records of different behavior types are stored in user behavior record tables of different behavior types in a user behavior database, and embedded point configuration information is simultaneously stored in the user behavior database; the user behavior analysis module analyzes the user behavior by reading the user behavior record in the user behavior database; when the Qt desktop application program is started, the configuration import module imports buried point configuration information from the user behavior database, wherein the buried point configuration information comprises user behaviors needing to be monitored, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules.
2. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: the global event processing function of the Qt desktop application is a notify function of QAPPLICATION, the QAPPLICATION is inherited when the event filter is added, the notify function is overwritten, and the event filter is added into the overwritten notify function.
3. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: and a mapping relation is established between the event and the matching rule through a Hash algorithm.
4. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: the matching rules comprise behavior types and corresponding filtering rules, the behavior types comprise user operation and interface access, the filtering rules are defined by regular expressions, and the filtering rules comprise regular expressions based on event trigger object names and/or regular expressions based on event trigger object type names.
5. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: the user behavior database adopts a relational database with an access control mechanism.
6. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: and the user behavior analysis module performs post analysis on the user behavior.
7. The database configuration based Qt desktop site burying system as claimed in claim 1 wherein: and when the Qt desktop application program is started, the configuration import module imports the embedded point configuration information from the user behavior database, and the embedded point configuration information is resident in the memory after being imported.
8. A Qt desktop point burying method based on database configuration is characterized in that: the method comprises the following steps:
(1) writing buried point configuration information into a user behavior database, wherein the buried point configuration information comprises user behaviors needing to be monitored, behavior types corresponding to the user behaviors, events related to the user behaviors, matching rules corresponding to the events, and mapping relations between the events and the matching rules;
(2) when the Qt desktop application program is started, the configuration import module imports the embedded point configuration information from the user behavior database, and the embedded point configuration information is resident in the memory after being imported;
(3) triggering events by user behaviors, and calling a rule mapping module by an event filter to filter all events;
(4) the rule mapping module judges whether a matching rule corresponding to the event exists: if the matching rule corresponding to the event does not exist, determining that the event is not the user behavior related event needing to be monitored, and directly transmitting the event to a next-stage event filter; if the matching rule corresponding to the event exists, determining that the event is a user behavior related event needing to be monitored, and sending the corresponding event trigger object and the matching rule to a target matching module for matching;
(5) the target matching module adopts a matching rule to carry out target matching on the event trigger object, wherein the matching rule comprises a behavior type and a corresponding filtering rule: if the event trigger object meets the filtering rule, the target matching is considered to be successful, the matching result is sent to the behavior recording module, and the event is transmitted to a next-stage event filter; if the event trigger object does not meet the filtering rule, the target matching is considered to be failed, and the event is transmitted to a next-level event filter;
(6) the behavior recording module records the matching result and stores the user behavior records of different behavior types in user behavior record tables corresponding to different behavior types in a user behavior database;
(7) and the user behavior analysis module reads the user behavior record from the user behavior database and performs post analysis on the user behavior.
9. The utility model provides a Qt desktop fixed point device based on database configuration which characterized in that: comprising a memory, a processor, and a computer program stored on the memory and operable on the processor for performing the Qt desktop burying method based on the database configuration of claim 8.
CN202110265850.4A 2021-03-11 2021-03-11 Qt desktop point burying system, method and device based on database configuration Pending CN112965877A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110265850.4A CN112965877A (en) 2021-03-11 2021-03-11 Qt desktop point burying system, method and device based on database configuration

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110265850.4A CN112965877A (en) 2021-03-11 2021-03-11 Qt desktop point burying system, method and device based on database configuration

Publications (1)

Publication Number Publication Date
CN112965877A true CN112965877A (en) 2021-06-15

Family

ID=76277273

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110265850.4A Pending CN112965877A (en) 2021-03-11 2021-03-11 Qt desktop point burying system, method and device based on database configuration

Country Status (1)

Country Link
CN (1) CN112965877A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030084053A1 (en) * 2001-11-01 2003-05-01 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device
CN111737100A (en) * 2020-06-09 2020-10-02 北京三快在线科技有限公司 Data acquisition method, device, equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030084053A1 (en) * 2001-11-01 2003-05-01 Actimize Ltd. System and method for analyzing and utilizing data, by executing complex analytical models in real time
CN107992506A (en) * 2016-10-27 2018-05-04 北京京东尚科信息技术有限公司 Information processing method and device
CN111737100A (en) * 2020-06-09 2020-10-02 北京三快在线科技有限公司 Data acquisition method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US11768811B1 (en) Managing user data in a multitenant deployment
US11809405B2 (en) Generating and distributing delta files associated with mutable events in a distributed system
US10997190B2 (en) Context-adaptive selection options in a modular visualization framework
US11567959B2 (en) Self-contained files for generating a visualization of query results
US7765540B2 (en) Use of attribution to describe management information
KR101323073B1 (en) Declarative management framework
CN104360878B (en) A kind of method and device of application software deployment
US7650346B2 (en) User-defined type consistency checker
US20110016451A1 (en) Method and system for generating test cases for a software application
CN112564988A (en) Alarm processing method and device and electronic equipment
CN111930706B (en) Remote call-based distributed network file storage system and method
CN116185754A (en) Data monitoring method, device, equipment, computer storage medium and program product
CN110941629B (en) Metadata processing method, apparatus, device and computer readable storage medium
CN115827380A (en) Cloud platform monitoring method and cloud platform monitoring system
CN112965877A (en) Qt desktop point burying system, method and device based on database configuration
CN114390016B (en) Mailbox rule management method and device, computer equipment and storage medium
CN113238901B (en) Multi-device automatic testing method and device, storage medium and computer device
US9436538B2 (en) Computer-readable recording medium, log acquisition device, and log acquisition method
CN114281549A (en) Data processing method and device
CN114020589A (en) Embedded point processing method and device, computer equipment and storage medium
CN115686583B (en) Mass Internet of things equipment upgrading method and device, electronic equipment and storage medium
Hu et al. Reconfigurable middleware for sensor based applications
US7917887B2 (en) DDEX (data designer extensibility) default object implementations for software development processes
CN114090506A (en) Log creating method and device and storage medium
CN114153864A (en) Method and device for generating API

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination