CN113010395B - Data acquisition method, device, apparatus, medium and program product - Google Patents

Data acquisition method, device, apparatus, medium and program product Download PDF

Info

Publication number
CN113010395B
CN113010395B CN202110232588.3A CN202110232588A CN113010395B CN 113010395 B CN113010395 B CN 113010395B CN 202110232588 A CN202110232588 A CN 202110232588A CN 113010395 B CN113010395 B CN 113010395B
Authority
CN
China
Prior art keywords
page
target control
user
embedded point
configuration
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110232588.3A
Other languages
Chinese (zh)
Other versions
CN113010395A (en
Inventor
臧博
罗涛
李思
李可
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110232588.3A priority Critical patent/CN113010395B/en
Publication of CN113010395A publication Critical patent/CN113010395A/en
Application granted granted Critical
Publication of CN113010395B publication Critical patent/CN113010395B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure provides a data acquisition method, comprising: the method comprises the steps of obtaining and responding to a connection request of a first application program to a second application program, wherein the connection request is used for indicating to establish and maintain visual embedded point connection with the second application program, displaying a visual embedded point interface in the first application program, displaying a starting page of the second application program on the visual embedded point interface, responding to a first selected operation of a first user on the starting page, determining a first target control, triggering the first target control to be configured to collect user data, reporting configuration information associated with the first target control to a server, enabling the server to generate and return embedded point configuration files based on the configuration information, responding to the fact that the second user accesses the starting page through a second terminal, and collecting user data of the second user based on the embedded point configuration files. The present disclosure also provides a data acquisition apparatus, device, medium and program product. The methods and apparatus provided by the present disclosure may be applied, for example, in the financial or other fields.

Description

Data acquisition method, device, apparatus, medium and program product
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a data acquisition method, apparatus, device, medium, and program product.
Background
The client or referred to as the client refers to an application program corresponding to a server and providing local services for users. After development of the internet, more commonly used clients include Web browsers such as those used by the World Wide Web (WWW), email clients when receiving email, and client software for instant messaging. Behind the client is a living mass user with personalized differences, the user data is an important asset as one of the core powers of the driving business, and if no accurate and comprehensive user identity and behavior data are used as input, the possibility of obtaining accurate insight of the user behavior in the subsequent analysis process is uncertain. Capturing, i.e. acquiring, user data is therefore of great importance. The user data can be obtained through active registration of the user, and the other part of the user data is mainly obtained through buried points, and then the obtained user data is analyzed by means of a professional user analysis tool so as to mine deep reasons behind certain actions or no actions of the user.
The related technology also provides some client embedded point schemes, but corresponding codes are required to be added for embedded points of each control, the embedded point cost is high, the codes are required to be changed for each updating of the embedded point scheme, and the cost for updating the embedded point is high, so that the acquisition efficiency of user behavior data is restricted to a certain extent.
Disclosure of Invention
The present disclosure provides a data acquisition method, apparatus, device, medium, and program product.
To achieve the above object, an aspect of the present disclosure provides a data acquisition method, applied to a first terminal, the method may include: and acquiring a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain the visual buried point connection with the second application program. And responding to the connection request, and displaying a visual embedded point interface in the first application program, wherein the visual embedded point interface displays a starting page of the second application program. And in response to a first selected operation of a first user on the starting page, determining a first target control configured on the starting page, wherein triggering the first target control is configured to collect user data. And reporting configuration information associated with the first target control to a server, so that the server generates and returns a buried point configuration file based on the configuration information, and acquiring user data of a second user based on the buried point configuration file in response to monitoring that the second user accesses the starting page through a second terminal.
According to an embodiment of the present disclosure, displaying the start page in the first display area of the visual embedded point interface, and reporting configuration information associated with the first target control to the server may include: and displaying a first configuration page of the first target control in a second display area of the visual embedded point interface, wherein the second display area is a display area except the first display area in the visual embedded point interface. And responding to the input operation of the first user on the first configuration page, obtaining configuration information associated with the first target control, and reporting the configuration information associated with the first target control to the server.
According to an embodiment of the present disclosure, the displaying, in the second display area of the visual embedded point interface, the first configuration page of the first target control may include: displaying a second configuration page of the first target control in a third display area of the visual embedded point interface, wherein the second configuration page is used for configuring page attribute information related to the first target control, and displaying a third configuration page of the first target control in a fourth display area of the visual embedded point interface, wherein the third configuration page is used for configuring event attribute information related to the first target control, and the fourth display area is a display area except the third display area in the second display area.
According to an embodiment of the present disclosure, the above method may further include: and responding to the jump operation of the first user on the starting page, and switching the starting page displayed in the first display area of the visual embedded point interface to the jump page. And in response to a second selected operation of the first user on the jump page, determining a second target control configured on the jump page, wherein triggering the second target control is configured to collect user data. And reporting configuration information associated with the second target control to a server, so that the server returns a buried point configuration file based on the configuration information, and acquiring user data of the second user based on the buried point configuration file in response to monitoring that the second user accesses the jump page through the second client.
According to an embodiment of the present disclosure, the reporting, to the server, configuration information associated with the second target control may include: and switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to a fourth configuration page of the second target control. And responding to the input operation of the first user on the fourth configuration page, obtaining configuration information associated with the second target control, and reporting the configuration information associated with the second target control to a server.
According to an embodiment of the present disclosure, the switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to the fourth configuration page of the second target control may include: switching a second configuration page of the first target control displayed in a third display area of the visual embedded point interface to a fifth configuration page of the second target control, wherein the fifth configuration page is used for configuring page attribute information related to the second target control, and switching a third configuration page of the first target control displayed in a fourth display area of the visual embedded point interface to a sixth configuration page of the second target control, wherein the sixth configuration page is used for configuring event attribute information related to the second target control, and the fourth display area is a display area except the third display area in the second display area.
According to an embodiment of the present disclosure, the collecting the user data of the second user based on the embedded point configuration file may include: and responding to the triggering operation of the second user on the starting page, and acquiring a triggering object aimed at by the triggering operation. And monitoring whether the triggering object is a first target control corresponding to the embedded point configuration file, and if so, acquiring user data of the second user.
In order to achieve the above object, another aspect of the present disclosure provides a data collection method, applied to a server, where the method may include: and receiving configuration information which is reported by a first terminal and is associated with a first target control, wherein the first target control is configured on a starting page of a second application program, the starting page is displayed on a visual embedded point interface displayed on the first application program, and the visual embedded point interface is displayed in response to a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain visual embedded point connection with the second application program. And auditing the configuration information and obtaining an auditing result. And generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed, and responding to the condition that a second user accesses the starting page through a second terminal, and issuing the buried point configuration file to the second terminal so as to acquire user data of the second user based on the buried point configuration file.
According to an embodiment of the present disclosure, the above method further includes: and receiving configuration information which is reported by the first terminal and is associated with a second target control, wherein the second target control is configured on a skip page of a second application program, and the skip page is displayed by switching the start page in response to the skip operation of the first user on the start page. And auditing the configuration information and obtaining an auditing result. And generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed, and responding to the condition that the second user accesses the skip page through the second terminal, and issuing the buried point configuration file to the second terminal so as to acquire the user data of the second user based on the buried point configuration file.
In order to achieve the above object, another aspect of the present disclosure provides a data acquisition device, applied to a first terminal, the device may include: the first acquisition module is used for acquiring a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain the visual buried point connection with the second application program. The first display module is used for responding to the connection request and displaying a visual embedded point interface in the first application program, wherein the visual embedded point interface displays a starting page of the second application program. And the first determining module is used for responding to a first selected operation of the first user on the starting page and determining a first target control arranged on the starting page, wherein the first target control is triggered to be configured to collect user data. The first reporting module is used for reporting configuration information associated with the first target control to the server so that the server generates and returns a buried point configuration file based on the configuration information, and the first collecting module is used for responding to the monitoring that a second user accesses the starting page through a second terminal and collecting user data of the second user based on the buried point configuration file.
According to an embodiment of the present disclosure, the starting page is displayed in a first display area of the visual embedded point interface, and the first reporting module may include: the first display sub-module is used for displaying the first configuration page of the first target control in a second display area of the visual embedded point interface, wherein the second display area is a display area except the first display area in the visual embedded point interface. The first obtaining sub-module is used for responding to the input operation of the first user on the first configuration page to obtain the configuration information related to the first target control, and the first reporting sub-module is used for reporting the configuration information related to the first target control to the server.
According to an embodiment of the present disclosure, the first display submodule includes: the first display unit is used for displaying a second configuration page of the first target control in a third display area of the visual embedded point interface, the second configuration page is used for configuring page attribute information related to the first target control, the second display unit is used for displaying a third configuration page of the first target control in a fourth display area of the visual embedded point interface, the third configuration page is used for configuring event attribute information related to the first target control, and the fourth display area is a display area except the third display area in the second display area.
According to an embodiment of the present disclosure, the above apparatus may further include: and the second display module is used for responding to the jump operation of the first user on the starting page and switching the starting page displayed in the first display area of the visual embedded point interface to the jump page. And the second determining module is used for responding to a second selected operation of the first user on the jump page and determining a second target control arranged on the jump page, wherein triggering the second target control is configured to collect user data. The second reporting module is configured to report configuration information associated with the second target control to a server, so that the server returns a buried point configuration file based on the configuration information, and the second collecting module is configured to collect user data of the second user based on the buried point configuration file in response to monitoring that the second user accesses the skip page through the second client.
According to an embodiment of the present disclosure, the second reporting module may include: and the second display sub-module is used for switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to a fourth configuration page of the second target control. The second obtaining sub-module is used for responding to the input operation of the first user on the fourth configuration page to obtain the configuration information related to the second target control, and the second reporting sub-module is used for reporting the configuration information related to the second target control to the server.
According to an embodiment of the present disclosure, the second display sub-module may include: the third display unit is configured to switch a second configuration page of the first target control displayed in a third display area of the visual embedded point interface to a fifth configuration page of the second target control, where the fifth configuration page is configured to configure page attribute information associated with the second target control, and the fourth display unit is configured to switch a third configuration page of the first target control displayed in a fourth display area of the visual embedded point interface to a sixth configuration page of the second target control, where the sixth configuration page is configured to configure event attribute information associated with the second target control, and the fourth display area is a display area other than the third display area in the second display area.
According to an embodiment of the present disclosure, the first acquisition module may include: and the acquisition sub-module is used for responding to the triggering operation of the second user on the starting page and acquiring a triggering object aimed at by the triggering operation. The monitoring sub-module is used for monitoring whether the triggering object is a first target control corresponding to the embedded point configuration file or not, and the acquisition sub-module is used for acquiring the user data of the second user if the triggering object is the first target control corresponding to the embedded point configuration file.
To achieve the above object, another aspect of the present disclosure provides a data acquisition device, applied to a server, the device may include: the first receiving module is used for receiving configuration information related to a first target control reported by a first terminal, wherein the first target control is configured on a starting page of a second application program, the starting page is displayed on a visual embedded point interface displayed on the first application program, and the visual embedded point interface is displayed in response to a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain visual embedded point connection with the second application program. And the first auditing module is used for auditing the configuration information and obtaining auditing results. The first generation module is used for generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed, and the first issuing module is used for issuing the buried point configuration file to the second terminal in response to the fact that the second user accesses the starting page through the second terminal, so as to acquire user data of the second user based on the buried point configuration file.
According to an embodiment of the present disclosure, the above apparatus may further include: the second receiving module is configured to receive configuration information associated with a second target control reported by the first terminal, where the second target control is configured on a skip page of a second application program, and the skip page is displayed by switching the start page in response to a skip operation of the first user on the start page. And the second auditing module is used for auditing the configuration information and obtaining auditing results. The second generation module is used for generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed, and the second issuing module is used for responding to the condition that the second user accesses the skip page through the second terminal and issuing the buried point configuration file to the second terminal so as to acquire the user data of the second user based on the buried point configuration file.
To achieve the above object, another aspect of the present disclosure provides an electronic device, including: and one or more processors, a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the data collection method as described above.
To achieve the above object, another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, are configured to implement the data acquisition method as described above.
To achieve the above object, another aspect of the present disclosure provides a computer program comprising computer executable instructions for implementing the data acquisition method as described above when executed.
The method comprises the steps of displaying a starting interface of an application program on a visual embedded point interface, responding to a first selected operation of a first user on the starting page, determining a first target control configured on the starting page, reporting configuration information associated with the first target control to a server because the user can directly operate the embedded point on a real interface of the application program, and acquiring user data of a second user when the second user accesses the starting page through a second terminal is monitored, so that acquisition efficiency of user behavior data can be improved.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
FIG. 1 schematically illustrates an application scenario in which data acquisition methods and apparatus may be applied, suitable for use with embodiments of the present disclosure;
FIG. 2 schematically illustrates a system architecture to which data acquisition methods and apparatus may be applied, suitable for use with embodiments of the present disclosure;
FIG. 3 schematically illustrates a flow chart of a data acquisition method according to an embodiment of the disclosure;
FIG. 4 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure;
FIG. 7 schematically illustrates a schematic diagram of a client buried point according to an embodiment of the present disclosure;
FIG. 8 schematically illustrates a schematic view of a visual buried point interface according to an embodiment of the present disclosure;
FIG. 9 schematically illustrates a block diagram of a data acquisition device according to an embodiment of the disclosure;
FIG. 10 schematically illustrates a block diagram of a data acquisition device according to another embodiment of the present disclosure;
FIG. 11 schematically illustrates a schematic diagram of a computer-readable storage medium product suitable for implementing the data acquisition method described above, in accordance with an embodiment of the present disclosure; and
Fig. 12 schematically illustrates a block diagram of an electronic device adapted to implement the data acquisition method described above, according to an embodiment of the disclosure.
In the drawings, the same or corresponding reference numerals indicate the same or corresponding parts.
It should be noted that the figures are not drawn to scale and that elements of similar structures or functions are generally represented by like reference numerals throughout the figures for illustrative purposes.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components. All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some of the block diagrams and/or flowchart illustrations are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations of blocks in the block diagrams and/or flowchart illustrations, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data acquisition device such that the instructions, when executed by the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). Additionally, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon, the computer program product being for use by or in connection with an instruction execution system.
For clients based on user behavior, contacts that occur at the user interface and that can obtain user information are direct sources of user data, and the manner in which these contacts are established is called burial. After the user behavior and identity data are obtained through the contacts, the user behavior and identity data can be transmitted to a server through a network for subsequent analysis and processing. From the viewpoint of accuracy, the buried points may be classified into client-side buried points (i.e., front-end buried points) and server-side buried points (i.e., back-end buried points). The embedded point of the client can be embedded in an operation interface of the user, the behavior and the identity of the user can be recorded when the user acts on the contact, the behavior can only occur at the client and cannot be transmitted to the server, the embedded point of the server is usually embedded in an interface where the client and the database interact, the embedded point can more accurately record the change of data, and meanwhile, the uncertainty risk caused by network transmission and other reasons can be reduced. The Web application or the page of the APP has its own structure, which is the document object model (Document Object Model, DOM) structure for the Web application and the relationship between elements such as UIView, UIResponder for the APP.
The client embedded point scheme provided by the related technology needs to add corresponding codes aiming at embedded points of each control, the embedded point cost is high, the codes are required to be changed every time the embedded point scheme is updated, the embedded point updating cost is high, and the acquisition efficiency of user data is restricted.
In view of this, the present disclosure provides a data acquisition method, which includes a buried point configuration stage and a data acquisition stage. In the embedded point configuration stage, a connection request of a first application program to a second application program for indicating to establish and maintain visual embedded point connection with the second application program is firstly obtained, then a visual embedded point interface is displayed in the first application program in response to the connection request, a starting page of the second application program is displayed on the visual embedded point interface, then a first target control configured on the starting page is determined in response to a first selected operation of a first user on the starting page, the first target control is triggered to be configured to collect user data, and finally configuration information related to the first target control is reported to a server, so that the server generates and returns an embedded point configuration file based on the configuration information. And in the data acquisition stage, responding to the monitoring that the second user accesses the starting page through the second terminal, and acquiring user data of the second user based on the embedded point configuration file.
It should be noted that the data acquisition method and device provided by the present disclosure may be used in the financial field, and may also be used in any field other than the financial field. Therefore, the application fields of the data acquisition method and device provided by the present disclosure are not limited.
Fig. 1 schematically illustrates an application scenario 100 in which data acquisition methods and apparatus may be applied, suitable for use with embodiments of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but it does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments, or scenarios.
As shown in fig. 1, an application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, among others.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various clients (or clients) may be installed on the terminal devices 101, 102, 103, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients, social platform software, etc. (just examples).
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server that provides services for various clients, such as a background management server (by way of example only) that provides support for websites browsed by users using the terminal devices 101, 102, 103. The server 105 may perform processing such as analysis on the received data such as the user request, and may feed back the processing result (e.g., web pages, information, or data acquired or generated according to the user request) to the terminal devices 101, 102, 103.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically illustrates a system architecture 200 to which data acquisition methods and apparatus may be applied, suitable for use with embodiments of the present disclosure. It should be noted that fig. 2 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but it does not mean that the embodiments of the present disclosure may not be applied to other system architectures.
As shown in fig. 2, a system architecture 200 according to an embodiment of the present disclosure may include a first terminal 210, a second terminal 220, a first server side 230, and a second server side 240. The first terminal 210 and the second terminal 220 may be any one of the terminal devices 101, 102, and 103 shown in fig. 1 as terminal devices used by users with different roles, and the first terminal 210 and the second terminal 220 may access a client, i.e., an application program, and the client is integrated with a software development kit (Software Development Kit, SDK) without code embedded points. The present disclosure will take a mobile terminal (mobile phone) as an example, and the client is an application program that can run on the mobile terminal, which is the mobile phone.
According to the embodiment of the disclosure, a business person (e.g., an operator) at one end of the application program can perform visual embedded point configuration on one or more pages configured by the application program integrated with the code embedded point SDK through the first terminal 210, generate original data (interface time consumption, program installation/startup, user interaction data, etc.) with some operation properties through embedded point technology, and analyze the original data to obtain some abstract indexes (retention rate, conversion rate), thereby determining the direction of product operation or code optimization.
According to the embodiment of the disclosure, a user (e.g., a user) at the other end of the application program may perform access operations on one or more pages configured by the application program integrated with the code embedded point SDK through the second terminal 220, including but not limited to opening and browsing a starting page of the application program, clicking a page element (e.g., an interactable control) on the starting page jumps a currently displayed starting page to an associated page, clicking an intra-page link on the associated page may jump from the associated page to other pages, so as to implement information interaction with the application program. It should be noted that, the first terminal and the second terminal in the present disclosure are only a name for serving different roles in the process of burying a point by a client, and do not mean that the first terminal and the second terminal are necessarily two completely different types of terminal devices, i.e., the first terminal and the second terminal in the present disclosure may be the same type of terminal device or different types of terminal devices.
According to the embodiment of the present disclosure, the first server 230 is configured to receive the embedded point configuration information reported by the service personnel through the first terminal 210 to perform visualization of the embedded point configuration, verify and audit the embedded point configuration information, and may issue the embedded point configuration file generated based on the configuration information to the second terminal 220 after the audit is passed. It should be understood that the number of first terminals, second terminals and server side in fig. 2 is merely illustrative. There may be any number of first terminals, second terminals, first server side, and second server side, as desired for a particular implementation.
The principles of the present disclosure are explained in detail below with reference to several representative embodiments of the present invention.
Fig. 3 schematically illustrates a flow chart of a data acquisition method according to an embodiment of the present disclosure. As shown in fig. 3, the method 300 is applied to a first terminal and may include operations S310 to S350.
In operation S310, a connection request of the first application to the second application is acquired.
According to the embodiment of the disclosure, the first application program may be a code-free embedded point SDK, after the client integrates the code-free embedded point SDK, a hierarchical relationship of each object in a page of the client may be obtained to execute embedding of the point on the second application program by a visual embedded point method, and the second application program may be any client to be embedded with the point. The first terminal may be a terminal device configured by a service person (e.g., an operator) at one end of the application program to perform visualization of one or more pages configured by the application program integrated with the code embedded point SDK. In the present disclosure, the connection request is used to instruct the establishment and maintenance of a visual buried point connection with the second application. Alternatively, the visual buried point connection may be established and maintained by scanning a two-dimensional code, or may be other ways, which is not limited in the present disclosure. Because the client-side buried points comprise the webpage buried points and the mobile APP buried points, and the webpage of the Web application or the APP has a structure of the client-side buried points, the mobile APP buried points are taken as an example in the present disclosure, and the webpage buried points are not described repeatedly. Controls, i.e., elements, of the present disclosure refer to interactable elements, which may include, but are not limited to: links, form items (e.g., buttons, input boxes, etc.).
In operation S320, a visual buried point interface is exposed in the first application in response to the connection request. According to embodiments of the present disclosure, the visual embedded point interface may be used to expose one or more pages of a to-be-embedded point client configuration. It should be noted that, in a normal case, the first start page of the client, that is, the first page of the client, is displayed in the first application program in response to the connection request. The user may implement a jump between pages at the same or different levels by clicking on an interactable page element or intra-page link that initiates the page configuration.
According to the embodiment of the disclosure, the embedded point method is realized on a visual embedded point interface displayed in the first application program. In implementation, a starting webpage of a client is opened at a visual embedded point interface, and an editable graphical interface corresponding to the client webpage is generated, wherein the editable graphical interface can be a screen drawing image of the client starting interface.
In operation S330, a first target control configured on the launch page is determined in response to a first selected operation of the first user on the launch page. According to the embodiment of the disclosure, one or more elements are configured on the starting page, which may be interactable elements or non-interactable elements. The interactable element may be a control to which a click event is bound and may include, but is not limited to, a button, a carousel advertisement, a grid.
According to an embodiment of the present disclosure, the first selected operation may be a click operation for indicating that a circling operation is performed on any interactable element on the launch page, the circled one or more interactable controls being a first target control, which is a contact point capable of acquiring user information, is a direct source of user data, triggers the first target control to be configured to acquire the user data, and completes the embedding of the point once the circling is successful. In the method, the starting page of the point to be buried is displayed in the editable graphic page, and business personnel can realize the point to be buried on the starting page of the point to be buried according to the point selection and editing in the editable graphic page. In particular, the embedded point position of the element to be embedded is determined by clicking one or more elements on the displayed webpage of the point to be embedded in the editable graphic page.
In operation S340, the configuration information associated with the first target control is reported to the server, so that the server generates and returns the embedded point configuration file based on the configuration information.
According to embodiments of the present disclosure, after the first target control is determined, configuration information associated with the first target control may be automatically reported to the server, which may include, but is not limited to, path location information (e.g., time name, attribute) associated with the event and page information (e.g., page name, location) associated with the launch page, the path location information associated with the event being a unique identifier of the control. And the server checks the received configuration information, and if the checking is passed, a buried point configuration file is generated. If the auditing is not passed, the auditing failure information is fed back to inform the business personnel of the point burying failure, so that the business personnel can determine the first target control configured on the starting page again, and the configuration information associated with the first target control is reported again. The method and the system can automatically collect events in full quantity and report embedded point data through the code-free embedded point SDK codes integrated by the client, and can present full quantity and real-time user behavior data such as each click, each jump, each login and the like of user behavior.
In operation S350, in response to monitoring that the second user accesses the start page through the second terminal, user data of the second user is collected based on the buried point configuration file.
According to an embodiment of the present disclosure, the second terminal is a terminal device in which a user (e.g., user) at the other end of the application program performs an access operation to one or more pages configured by the application program integrated with the code embedded point SDK. When the second user starts the client through the second terminal, the embedded point configuration file is dynamically updated, configuration information is deployed to the client in real time, and when the client is monitored to be accessed by the second user from the second terminal, for example, a certain element on a client starting page is clicked, user data of the second user can be collected according to the embedded point configuration file which is effective in configuration, the embedded point configuration file can comprise but not limited to user behavior data and user identity data, and the behavior data can provide data support for solving user interaction behavior, widening user information and advancing camping opportunities. The access operation of the second user from the second terminal may include, but is not limited to, common mouse clicking, mouse sliding, screen scrolling, cursor selection even stationary, clicking, multi-finger opening and closing, pulling, forceful pressing, which is not limited by the present disclosure.
In the related art, when a user accesses a client installed on a mobile phone, a large amount of user data is generated by skipping the user operation performed on the same page or among a plurality of different pages, and in order to count the clicking times of a button in an APP, a data transmission interface is required to be implanted in a clicking event corresponding to the button to achieve the purpose of burying points, so that when the button is clicked, the collected data of the button can be transmitted to a server through the data transmission interface to provide a data basis for the clicking times. And each time the service requirement is changed, the position of a control to be embedded is required to be found, the embedded point code is researched and developed by research personnel, after the embedded point code is tested by a tester, the embedded point is realized in a code embedding mode, and when a certain event occurs, a data transmission interface which is implanted in advance by the research personnel is called to transmit data.
The present disclosure balances the ease of use and accuracy of embedding points at clients, provides a visual code-free embedding method that is different from code embedding points and full embedding points, and can directly operate embedding points on a real interface of mobile applications, and can verify whether embedding points are correct immediately after embedding points, and deployment of embedding points to all clients is almost real-time effective.
As an optional embodiment, displaying the start page in the first display area of the visual embedded point interface, and reporting the configuration information associated with the first target control to the server may include: and displaying the first configuration page of the first target control in a second display area of the visual embedded point interface, wherein the second display area is a display area except the first display area in the visual embedded point interface. And responding to the input operation of the first user on the first configuration page, obtaining configuration information associated with the first target control, and reporting the configuration information associated with the first target control to the server.
According to the embodiment of the disclosure, the display area of the first target control for performing attribute editing can be displayed on the visual embedded point interface in addition to the display area of the editable graphical interface corresponding to the client webpage. In the implementation, after the business personnel clicks the control to be selected to determine the first target control, the information of 'event name' can be input.
According to the embodiment of the disclosure, the configuration information associated with the first target control is obtained in response to the input operation of the first user on the first configuration page, the configuration information can be bound with the event path (namely the unique mark) of the control through the custom event name, the event can be named in a meaningful way according to the mode of service personnel when the collected user data is required, and therefore analysis of the subsequent buried point data can be assisted when the collected user data is subjected to secondary carding and processing analysis.
As an alternative embodiment, the displaying the first configuration page of the first target control in the second display area of the visual embedded point interface may include: displaying a second configuration page of the first target control in a third display area of the visual embedded point interface, wherein the second configuration page is used for configuring page attribute information associated with the first target control, and displaying a third configuration page of the first target control in a fourth display area of the visual embedded point interface, wherein the third configuration page is used for configuring event attribute information associated with the first target control, and the fourth display area is a display area except the third display area in the second display area.
According to an embodiment of the present disclosure, the configuration information may include page attribute information and event attribute information, and the third display area configured for the page attribute information and the fourth display area configured for the event attribute information may be disposed at one side of the start page of the client or may be disposed at two sides of the start page of the client, which is not limited in this disclosure.
In the implementation, after the business personnel clicks the control to be selected to determine the first target control, the embedded point configuration can be performed on the embedded point element at the embedded point position through an editing column and the like in the editable graphic page. The embedding point configuration of the embedding point element of the embedding point position may include, but is not limited to, configuring a reporting trigger event of the embedding point position based on the embedding point position, configuring a data reporting configuration of the embedding point position based on the embedding point position. Therefore, when the embedded point element monitors the user operation in the follow-up process, the embedded point element can trigger the reporting of the data according to the configured reporting trigger event, and the reporting information of the reported data type, data attribute and the like can be determined according to the configured data reporting configuration. The embedded point configuration can be automatically configured by a visual embedded point platform, and personalized configuration can be performed according to different embedded points.
According to the embodiment of the disclosure, the attribute information, namely the page attribute information and the event attribute information, of the embedded point configuration of the first target control is displayed on the visual embedded point interface, and the custom attribute and the custom event can be conveniently set, so that the method is suitable for user data acquisition scenes which need deep drill down and fine custom analysis.
As an alternative embodiment, the data acquisition method may further include, in addition to the foregoing operations S310 to S350: and responding to the jump operation of the first user on the start page, and switching the start page displayed in the first display area of the visual embedded point interface to the jump page. In response to a second selected operation of the first user on the jump page, a second target control configured on the jump page is determined, the triggering of the second target control configured to collect user data. And reporting configuration information associated with the second target control to the server, so that the server returns the embedded point configuration file based on the configuration information, and acquiring user data of the second user based on the embedded point configuration file in response to monitoring that the second user accesses the jump page through the second client.
According to the embodiment of the disclosure, the starting page of the client, namely the first page of the client, is displayed in the first application program firstly in response to the connection request, but the user may not stay on the starting page all the time, the starting page currently displayed on the visual embedded point interface can be switched to a display jump page by clicking the interactive control or the intra-page link, at the moment, the jump page of the client is opened on the visual embedded point interface, and an editable graphical interface corresponding to the webpage of the client is generated, wherein the editable graphical interface can be a screen drawing image of the jump page of the client. The embedded point mode of the jump page can refer to the embedded point mode of the start page.
The embedded point method provided by the disclosure decouples the core code from the embedded point configuration, service personnel generate embedded point configuration files in a mode of circling on a visual interface, mark the information of the embedded point name readable by the service personnel for each click event, dynamically update the embedded point configuration files when the APP is started, and enable the embedded point configuration to take effect; when the embedded point data is reported, the information of the embedded point name defined by the service personnel is uploaded, so that the subsequent data analysis is convenient, and the data access cost of a user can be reduced.
As an alternative embodiment, reporting the configuration information associated with the second target control to the server may include: and switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to a fourth configuration page of the second target control. And responding to the input operation of the first user on the fourth configuration page, obtaining configuration information associated with the second target control, and reporting the configuration information associated with the second target control to the server.
According to an embodiment of the present disclosure, the fourth configuration page and the first configuration page may be displayed at the same position of the visual embedded point interface, or may be displayed at different positions of the visual embedded point interface, which is not limited in this disclosure. The visual embedded point interface can display a display area of the second target control for attribute editing besides the display area of the editable graphical interface corresponding to the client webpage. According to the method, the embedded point of the page can be automatically increased through a tangent plane (Aspect Oriented Programming, AOP) technology, namely, corresponding events in the user interaction process are captured, and the acquisition of user behavior data is realized through a mode of a running period hook, so that service operators can rapidly complete visual circle selection configuration of the embedded point, research and development of embedded point codes by research and development testers are not needed, the user behavior data can be acquired, the service requirements are rapidly responded to promote agility, and real visual code-free embedded point is realized. It should be noted that the embedding point information of each control includes a path of the control, the embedding point mode of the present disclosure can realize differential updating, when the version iteration of the APP is performed, and when the page is adjusted, as long as the level of the control is not changed, the control does not need to be embedded again, if the level of the control is changed, the control needs to be embedded again, i.e. the existing embedding point can be used by the storage embedding point control in the page, and only the differential control needs to be embedded again.
According to the embodiment of the disclosure, the configuration information associated with the second target control is obtained in response to the input operation of the first user on the fourth configuration page, the configuration information can be bound with the event path (namely the unique mark) of the control through the custom event name, the event can be named in a meaningful way according to the mode of service personnel when the collected user data is required, and therefore analysis of the subsequent buried point data can be assisted when the collected user data is subjected to secondary carding and processing analysis.
As an alternative embodiment, switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to the fourth configuration page of the second target control may include: switching a second configuration page of the first target control displayed in a third display area of the visual embedded point interface to a fifth configuration page of the second target control, wherein the fifth configuration page is used for configuring page attribute information related to the second target control, and switching the third configuration page of the first target control displayed in a fourth display area of the visual embedded point interface to a sixth configuration page of the second target control, wherein the sixth configuration page is used for configuring event attribute information related to the second target control, and the fourth display area is a display area except the third display area in the second display area.
According to an embodiment of the present disclosure, the configuration information may include page attribute information and event attribute information, and the third display area configured for the page attribute information and the fourth display area configured for the event attribute information may be disposed at one side of the start page of the client or may be disposed at two sides of the start page of the client, which is not limited in this disclosure.
As an alternative embodiment, based on the buried point profile, collecting the user data of the second user may include: and responding to the triggering operation of the second user on the starting page, and acquiring a triggering object aimed at by the triggering operation. And monitoring whether the triggering object is a first target control corresponding to the embedded point configuration file, and if so, acquiring user data of a second user.
According to the embodiment of the disclosure, the corresponding data can be recorded in a life cycle mode of monitoring the page and a mode of intercepting the page jump life cycle in the user interaction process, so that automatic acquisition of the page data is realized.
According to the embodiment of the disclosure, whether the new buried point exists or not can be checked from the server when the monitoring client is accessed, if the new buried point is found, the new buried point is downloaded from the server and is immediately effective, and therefore after the server receives the latest buried point, all clients can be deployed in the next access.
Fig. 4 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure. The method 400 shown in fig. 4 is applied to a server side, and includes operations S410 to S440.
In operation S410, configuration information associated with a first target control, which is reported by a first terminal, is received. According to an embodiment of the disclosure, a first target control is configured on a launch page of a second application, the launch page is presented on a visual embedded point interface presented on a first application, and the visual embedded point interface is presented in response to a connection request of the first application to the second application for indicating to establish and maintain a visual embedded point connection with the second application.
In operation S420, the configuration information is audited, and an audit result is obtained. According to the embodiment of the disclosure, in a background visual circle selection system, visual configuration information is checked, a configuration file is audited and generated, and an recorded event name can be selected in the visual circle by service personnel to serve as a distinguishing mark of a control and be used for uniquely marking a click event.
In operation S430, in the case that the audit result characterizes the passing of the audit, a buried point configuration file is generated. According to the embodiment of the disclosure, under the condition that the audit is not passed, a prompt message of the point burying failure is returned to the first terminal so as to prompt a service person to re-bury the point and report the point burying configuration information.
In operation S440, in response to monitoring that the second user accesses the start page through the second terminal, the embedded point configuration file is issued to the second terminal to collect user data of the second user based on the embedded point configuration file.
According to the embodiment of the disclosure, the server performs verification on the embedded point configuration information of the starting page reported by the first terminal, so that whether the embedded point of the starting page is correct or not can be verified immediately after the embedded point is embedded, and under the condition that verification and verification pass, the embedded point configuration file of the starting page is generated, the embedded point is deployed to all clients in real time, the operation is simple and convenient, and the data access cost of service operators can be reduced.
As an alternative embodiment, the data acquisition method may further include, in addition to the foregoing operations S410 to S440: and receiving configuration information which is reported by the first terminal and is associated with a second target control, wherein the second target control is configured on a skip page of a second application program, and the skip page is displayed by switching the start page in response to the skip operation of the first user on the start page. And auditing the configuration information and obtaining an auditing result. And generating a buried point configuration file under the condition that the auditing result characterizes that the auditing is passed, and sending the buried point configuration file to the second terminal in response to the fact that the second user accesses the skip page through the second terminal, so as to collect user data of the second user based on the buried point configuration file.
According to the embodiment of the disclosure, the server performs verification and verification on the embedded point configuration information of the skip page reported by the first terminal, so that whether the embedded point of the skip page is correct or not can be verified immediately after the embedded point is embedded, and the embedded point configuration file of the skip page is generated under the condition that verification and verification pass, so that the embedded point is deployed to all clients in real time, the operation is simple and convenient, and the data access cost is reduced.
Fig. 5 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure. The method 500 as shown in fig. 5 includes operations S510-S5110. In specific implementation, the codeless embedded point SDK is integrated at the client, the APP is started (executing operation S510) firstly by automatically collecting full data of a user click event through switch control, then the two-dimensional code is scanned, the visual embedded point interface is entered (executing operation S520) to establish a visual embedded point connection to realize the visual embedded point, after the visual circling control (executing operation S530) and uploading visual circling information (executing operation S540), the configuration file is checked and generated (executing operation S550), then the APP is started to pull the configuration file (executing operation S560), whether the configuration file is matched with the visual circling configuration is detected (executing operation S580) or not in response to the actual click of the user (executing operation S570), and if not, the full embedded point data is reported (executing operation S5100). If yes, the visual tag information is supplemented according to the configuration file (execution operation S590), and finally the visual circling data is reported (execution operation S5110).
The data acquisition method at least partially overcomes the defect that a developer is required to embed a code in the code embedding technology in the related technology, can perform visual circle selection on controls (such as buttons, carousel advertisements, palace grids and the like) of binding click events on pages by using a mouse, acquires related data of user behavior events, and uploads the data to provide the data acquisition method which does not need research and development of embedding codes by research and development testers and shortens embedding time period.
Fig. 6 schematically illustrates a flow chart of a data acquisition method according to another embodiment of the present disclosure. As shown in fig. 6, illustrating the data collection method provided in the present disclosure from the interaction between the mobile phone side and the Web side, the data collection method 600 may include operations S610 to S6100. In specific implementation, firstly, the mobile phone terminal integrates the SDK (executing operation S610), then the scanning code opens the APP, establishes connection with the Web terminal (executing operation S620), after the mobile phone terminal is connected, sends a request for acquiring equipment information (executing operation S630), the Web terminal returns the equipment information (executing operation S640), verifies the equipment information, requests to draw a screen (executing operation S650), draws the screen, returns control information and screen capture (executing operation S660), displays a mobile phone interface according to the screen capture and the control information (executing operation S670), generates a configuration file (executing operation S680) in response to user configuration through the interface, updates the configuration by the APP, adds an event monitor for the control (executing operation S690), and finally responds to user clicking the control, and sends an event (executing operation S6100). The client point burying method is simple and easy to use, accurate in point burying, capable of reducing data access cost of service operators and achieving the purpose of rapidly acquiring user behavior data of the mobile client.
Fig. 7 schematically illustrates a schematic diagram of a client buried point according to an embodiment of the present disclosure.
As shown in fig. 7, client buried points are generally classified into a buried point at a page level, a buried point at an access level, and a buried point at an intra-page behavior level. The user accesses a website or starts a client to automatically collect and report the access of the user by default under the normal condition, when the user accesses different pages, the user selects to automatically collect without default and gives the user as an option, and for the detailed operation behavior of the user in a certain page, the automatic collection and report is supported by a few embedded point methods. But the acquisition of the intra-page behavior level can also further explore the range of the acquisition. The most common is the difference between automatically collecting interactable elements and automatically collecting all elements. Interactable elements include, but are not limited to: links, form items (e.g., buttons, input boxes, etc.), object level elements of HTML. Non-interactable elements may include, but are not limited to, page elements. Since many interfaces that can be seen in web pages and mobile applications are not standard elements in practice, many seemingly interactable elements on an interface are not able to automatically collect and report the same in practice.
If the data volume is increased at the cost of collecting the reported full data volume, the probability of the client running is increased as the data volume is increased. Especially at the mobile end, more data volume means more power, flow and memory consumption. Even if all behavioral data can be received back, secondary combing and processing at the time of specific analysis is unavoidable and even painful. Because the machine cannot name all events in a meaningful way as we want at the time of collection, it cannot even be guaranteed that the collected events are exactly correct. Therefore, labor cost is saved in the early stage of point burying, and the point burying is carried in the later stage of analysis. Therefore, the selection right of the buried point is determined by the business personnel in a visual buried point mode, the visual code-free buried point is realized in a circling mode on a visual buried point interface, the buried point operation is simple, the deployment is implemented, and the buried point efficiency can be improved.
Fig. 8 schematically illustrates a schematic diagram of a visual buried point interface according to an embodiment of the present disclosure. As shown in fig. 8, the visual buried point interface 800 is configured with a first display region 810 and a second display region other than the first display region 810, specifically the second display region includes a third display region 820 and a fourth display region 830.
In accordance with the context of the present disclosure, the first display area 810 is used to present an editable graphical interface corresponding to a launch page or a jump page of the client, which may be a screen drawn image of the client launch page or the jump page. Taking a starting page as an example, six interactable controls are distributed on the starting page, and are distributed in a layout of three horizontal and two vertical, and each control is bound with a designated click event. The second display area displays a first configuration page of the first target control or a fourth configuration page of the second target control. Specifically, the third display area 820 displays a second configuration page of the first target control or a fifth configuration page of the second target control that is displayed in a switching manner, where the fifth configuration page is used to configure page attribute information corresponding to the corresponding target control, such as a page path, a page name, and a report click position. The fourth display area 830 presents a third configuration page of the first target control or switches a sixth configuration page of the second target control displayed. The sixth configuration page is used for configuring event attribute information, such as event paths, event names and event types, such as clicks, corresponding to the corresponding target controls.
It should be noted that the visual embedded point interface shown above is merely schematic, and is not limited to a display area on the visual embedded point interface, and a person skilled in the art may design a layout of the display area of the visual embedded point interface according to actual needs, which is not limited in this disclosure.
Fig. 9 schematically illustrates a block diagram of a data acquisition device according to an embodiment of the disclosure.
As shown in fig. 9, the data acquisition device 900 is applied to a first terminal, and includes a first acquisition module 910, a first display module 920, a first determination module 930, a first reporting module 940, and a first acquisition module 950.
A first obtaining module 910, configured to obtain a connection request of the first application to the second application, where the connection request is used to instruct to establish and maintain a visual buried point connection with the second application. Optionally, the first obtaining module 910 is configured to perform the foregoing operation S310, for example.
The first display module 920 is configured to respond to the connection request, and display a visual embedded point interface in the first application program, where the visual embedded point interface displays a start page of the second application program. Optionally, the first display module 920 is, for example, configured to perform the foregoing operation S320.
A first determining module 930 is configured to determine a first target control configured on the launch page in response to a first selected operation by the first user on the launch page. Optionally, the first determining module 930 is configured to perform the foregoing operation S330, for example.
The first reporting module 940 is configured to report configuration information associated with the first target control to the server, so that the server generates and returns the embedded point configuration file based on the configuration information. Optionally, the first reporting module 940 is, for example, configured to perform the foregoing operation S340.
The first collection module 950 is configured to collect user data of the second user based on the embedded point configuration file in response to monitoring that the second user accesses the start page through the second terminal. Optionally, the first acquisition module 950 is, for example, configured to perform the aforementioned operation S350.
As an optional embodiment, the starting page is displayed in a first display area of the visual embedded point interface, and the first reporting module includes: the first display sub-module is used for displaying a first configuration page of the first target control in a second display area of the visual embedded point interface, wherein the second display area is a display area except the first display area in the visual embedded point interface. The first obtaining sub-module is used for responding to the input operation of the first user on the first configuration page, obtaining the configuration information associated with the first target control, and the first reporting sub-module is used for reporting the configuration information associated with the first target control to the server.
As an alternative embodiment, the first presentation submodule includes: the first display unit is used for displaying a second configuration page of the first target control in a third display area of the visual embedded point interface, wherein the second configuration page is used for configuring page attribute information related to the first target control, and the second display unit is used for displaying the third configuration page of the first target control in a fourth display area of the visual embedded point interface, wherein the third configuration page is used for configuring event attribute information related to the first target control, and the fourth display area is a display area except the third display area in the second display area.
As an alternative embodiment, the data collecting apparatus further includes, in addition to the foregoing first obtaining module 910, the first displaying module 920, the first determining module 930, the first reporting module 940, and the first collecting module 950, a first collecting module: the second display module is used for responding to the jump operation of the first user on the starting page and switching the starting page displayed in the first display area of the visual embedded point interface to the jump page. And the second determining module is used for responding to a second selected operation of the first user on the jump page and determining a second target control configured on the jump page, wherein triggering the second target control is configured to collect user data. The second reporting module is used for reporting configuration information associated with the second target control to the server so that the server returns the embedded point configuration file based on the configuration information, and the second collecting module is used for responding to the detection that the second user accesses the jump page through the second client and collecting user data of the second user based on the embedded point configuration file.
As an optional embodiment, the second reporting module includes: and the second display sub-module is used for switching the first configuration page of the first target control displayed in the second display area of the visual embedded point interface to the fourth configuration page of the second target control. The second obtaining sub-module is used for responding to the input operation of the first user on the fourth configuration page, obtaining the configuration information associated with the second target control, and the second reporting sub-module is used for reporting the configuration information associated with the second target control to the server.
As an alternative embodiment, the second presentation submodule includes: the third display unit is used for switching the second configuration page of the first target control displayed in the third display area of the visual embedded point interface to a fifth configuration page of the second target control, wherein the fifth configuration page is used for configuring page attribute information related to the second target control, and the fourth display unit is used for switching the third configuration page of the first target control displayed in the fourth display area of the visual embedded point interface to a sixth configuration page of the second target control, wherein the sixth configuration page is used for configuring event attribute information related to the second target control, and the fourth display area is a display area except the third display area in the second display area.
As an alternative embodiment, the first acquisition module comprises: the acquisition sub-module is used for responding to the triggering operation of the second user on the starting page and acquiring a triggering object aimed at by the triggering operation. The monitoring sub-module is used for monitoring whether the triggering object is a first target control corresponding to the embedded point configuration file or not, and the acquisition sub-module is used for acquiring user data if yes.
Fig. 10 schematically illustrates a block diagram of a data acquisition device according to another embodiment of the present disclosure. The apparatus 1000 shown in fig. 10 is applied to a server, and includes a first receiving module 1010, a first auditing module 1020, a first generating module 1030, and a first issuing module 1040.
The first receiving module 1010 is configured to receive configuration information associated with a first target control reported by a first terminal, where the first target control is configured on a start page of a second application, and the start page is displayed on a visual embedded point interface displayed on the first application, where the visual embedded point interface is displayed in response to a connection request of the first application to the second application, where the connection request is used to instruct to establish and maintain a visual embedded point connection with the second application. Optionally, the first receiving module 1010 is, for example, configured to perform the foregoing operation S410, which is not described herein.
And a first auditing module 1020, configured to audit the configuration information and obtain an auditing result. Optionally, the first audit module 1020 is for example configured to perform the aforementioned operation S420.
The first generating module 1030 is configured to generate a buried point configuration file if the auditing result passes. Alternatively, the first generating module 1030 is used, for example, to perform the aforementioned operation S430.
The first issuing module 1040 is configured to issue the embedded point configuration file to the second terminal in response to monitoring that the second user accesses the start page through the second terminal, so as to collect user data of the second user based on the embedded point configuration file. Optionally, the first issuing module 1040 is used, for example, to perform the aforementioned operation S440.
As an alternative embodiment, the data collecting apparatus further includes, in addition to the foregoing first receiving module 1010, first checking module 1020, first generating module 1030, and first issuing module 1040: the second receiving module is used for receiving configuration information which is reported by the first terminal and is associated with a second target control, wherein the second target control is configured on a skip page of the second application program, and the skip page is displayed by switching the start page in response to the skip operation of the first user on the start page. And the second auditing module is used for auditing the configuration information and obtaining auditing results. The second generation module is used for generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed, and the second issuing module is used for issuing the buried point configuration file to the second terminal in response to the fact that the second user accesses the skip page through the second terminal, so as to acquire user data of the second user based on the buried point configuration file.
It should be noted that, the implementation manner, the solved technical problem, the realized function and the achieved technical effect of each module in the data acquisition device part embodiment are the same as or similar to the implementation manner, the solved technical problem, the realized function and the achieved technical effect of each corresponding step in the data acquisition method part embodiment, and are not described herein again.
Any number of the modules, sub-modules, units, or at least some of the functionality of any number of the modules, sub-modules, units, may be implemented in one module in accordance with embodiments of the present disclosure. Any one or more of the modules, sub-modules, units according to embodiments of the present disclosure may be implemented as a split into multiple modules. Any one or more of the modules, sub-modules, units according to embodiments of the present disclosure may be implemented at least in part as hardware circuitry, such as a field programmable gate array (FNGA), a programmable logic array (NLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware in any other reasonable manner of integrating or packaging circuitry, or in any one of, or in any suitable combination of, three of software, hardware, and firmware. Or one or more of the modules, sub-modules, units according to embodiments of the present disclosure may be at least partially implemented as computer program modules which, when executed, may perform the corresponding functions.
For example, the first acquisition module, the first display module, the first determination module, the first reporting module, the first acquisition module, the first display sub-module, the first acquisition sub-module, the first reporting sub-module, the first display unit, the second display module, the second determination module, the second reporting module, the second acquisition module, the second display sub-module, the second acquisition sub-module, the second reporting sub-module, the third display unit, the fourth display unit, the acquisition sub-module, the monitoring sub-module, and the acquisition sub-module may be combined and implemented in one module. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules. According to embodiments of the present disclosure, at least one of the first acquisition module, the first display module, the first determination module, the first reporting module, the first acquisition module, the first display sub-module, the first acquisition sub-module, the first reporting sub-module, the first display unit, the second display module, the second determination module, the second reporting module, the second acquisition module, the second display sub-module, the second acquisition sub-module, the second reporting sub-module, the third display unit, the fourth display unit, the acquisition sub-module, the monitoring sub-module, and the acquisition sub-module may be implemented at least in part as hardware circuitry, such as a field programmable gate array (FNGA), a programmable logic array (NLA), a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or any other reasonable manner of integrating or packaging the circuitry, or any other hardware or firmware implementation, or any three or any suitable combination of these. Or at least one of the first acquisition module, the first display module, the first determination module, the first reporting module, the first acquisition module, the first display sub-module, the first acquisition sub-module, the first reporting sub-module, the first display unit, the second display module, the second determination module, the second reporting module, the second acquisition module, the second display sub-module, the second acquisition sub-module, the second reporting sub-module, the third display unit, the fourth display unit, the acquisition sub-module, the monitoring sub-module and the acquisition sub-module may be implemented at least in part as a computer program module, which may perform a corresponding function when being run.
Fig. 11 schematically illustrates a schematic diagram of a computer-readable storage medium product suitable for implementing the data acquisition method described above, in accordance with an embodiment of the present disclosure.
In some possible implementations, the aspects of the present invention may also be implemented in the form of a program product comprising program code for causing an apparatus to carry out the aforementioned operations (or steps) of a data acquisition method according to the various exemplary embodiments of the present invention as described in the section "exemplary method" above in this specification, when the program product is run on an apparatus, for example, an electronic apparatus may carry out the operations as shown in fig. 3, 4, 5 and 6.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium would include the following: an electrical connection having one or more wires, a portable disk, a hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (ENROM or flash memory), optical fiber, portable compact disc read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing.
As shown in fig. 11, a program product 1100 of data acquisition is depicted, which may employ a portable compact disc read-only memory (CD-ROM) and include program code, and which may be run on a device, such as a personal computer, in accordance with an embodiment of the present invention. However, the program product of the present invention is not limited thereto, and in this document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, or device.
The readable signal medium may include a data signal propagated in baseband or as part of a carrier wave with readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, or device. Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may connect to the user computing device through any kind of network, including a local area network (LAA) or wide area network (WAA), or may connect to an external computing device (e.g., through an internet connection using an internet service provider).
Fig. 12 schematically illustrates a block diagram of an electronic device adapted to implement the data acquisition method described above, according to an embodiment of the disclosure. The electronic device shown in fig. 12 is merely an example and should not be construed to limit the functionality and scope of use of the disclosed embodiments.
As shown in fig. 12, an electronic device 1200 according to an embodiment of the present disclosure includes a processor 1201, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1202 or a program loaded from a storage section 1208 into a Random Access Memory (RAM) 1203. Processor 1201 may include, for example, a general purpose microprocessor (e.g., CNU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., application Specific Integrated Circuit (ASIC)), or the like. Processor 1201 may also include on-board memory for caching purposes. The processor 1201 may include a single processing unit or multiple processing units for performing the different actions of the method flows according to embodiments of the disclosure.
In the RAM 1203, various programs and data required for the operation of the electronic apparatus 1200 are stored. The processor 1201, the ROM1202, and the RAM 1203 are connected to each other through a bus 1204. The processor 1201 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM1202 and/or RAM 1203. Note that the program may be stored in one or more memories other than the ROM1202 and the RAM 1203. The processor 1201 may also perform operations illustrated in fig. 3, 4, 5, and 6 according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 1200 may also include an input/output (I/O) interface 1205, the input/output (I/O) interface 1205 also being connected to the bus 1204. The electronic device 1200 may also include one or more of the following components connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 1208 including a hard disk or the like; and a communication section 1209 including a network interface card such as an LAA card, modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. The drive 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1210 so that a computer program read out therefrom is installed into the storage section 1208 as needed.
According to embodiments of the present disclosure, the method flow according to embodiments of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1209, and/or installed from the removable media 1211. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1201. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs that, when executed, implement a data acquisition method according to an embodiment of the present disclosure, including the operations shown in fig. 3, 4, 5, and 6.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to: portable computer diskette, hard disk, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (ENROM or flash memory), portable compact disk read-only memory (CD-ROM), optical storage device, magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include the ROM 1202 and/or the RAM 1203 and/or one or more memories other than the ROM 1202 and the RAM 1203 described above.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.

Claims (12)

1. The data acquisition method is applied to a first terminal and comprises the following steps:
Acquiring a connection request of a first application program to a second application program, wherein the connection request is used for indicating to establish and maintain a visual buried point connection with the second application program;
Responding to the connection request, and displaying a visual embedded point interface in the first application program, wherein the visual embedded point interface displays a starting page of the second application program;
determining a first target control configured on the starting page in response to a first selected operation of a first user on the starting page, wherein triggering the first target control is configured to collect user data;
reporting configuration information associated with the first target control to a server, so that the server generates and returns a buried point configuration file based on the configuration information;
Responding to the monitoring that a second user accesses the starting page through a second terminal, and acquiring user data of the second user based on the embedded point configuration file;
Responding to the jump operation of the first user on the starting page, and switching the starting page displayed in a first display area of the visual embedded point interface to a jump page;
Determining a second target control configured on the jump page in response to a second selected operation of the first user on the jump page, wherein triggering the second target control is configured to collect user data;
Reporting configuration information associated with the second target control to a server so that the server returns a buried point configuration file based on the configuration information;
And responding to the monitoring that the second user accesses the jump page through the second terminal, and acquiring user data of the second user based on the embedded point configuration file.
2. The method of claim 1, wherein the displaying the start page in the first display area of the visual embedded point interface, the reporting configuration information associated with the first target control to a server comprises:
Displaying a first configuration page of the first target control in a second display area of the visual embedded point interface, wherein the second display area is a display area except the first display area in the visual embedded point interface;
responding to the input operation of the first user on the first configuration page, and obtaining configuration information associated with the first target control;
and reporting the configuration information associated with the first target control to the server.
3. The method of claim 2, wherein the presenting the first configuration page of the first target control in the second display area of the visual embedded point interface comprises:
displaying a second configuration page of the first target control in a third display area of the visual embedded point interface, wherein the second configuration page is used for configuring page attribute information associated with the first target control;
And displaying a third configuration page of the first target control in a fourth display area of the visual embedded point interface, wherein the third configuration page is used for configuring event attribute information associated with the first target control, and the fourth display area is a display area except the third display area in the second display area.
4. The method of claim 1, wherein the reporting configuration information associated with the second target control to a server comprises:
Switching a first configuration page of the first target control displayed in a second display area of the visual embedded point interface to a fourth configuration page of a second target control;
Responding to the input operation of the first user on the fourth configuration page, and obtaining configuration information associated with the second target control;
And reporting the configuration information associated with the second target control to a server.
5. The method of claim 4, wherein the switching the first configuration page of the first target control presented in the second display area of the visual embedded point interface to the fourth configuration page of the second target control comprises:
Switching a second configuration page of the first target control displayed in a third display area of the visual embedded point interface to a fifth configuration page of the second target control, wherein the fifth configuration page is used for configuring page attribute information associated with the second target control;
And a third configuration page of the first target control displayed in a fourth display area of the visual embedded point interface is configured to a sixth configuration page of the second target control, wherein the sixth configuration page is used for configuring event attribute information associated with the second target control, and the fourth display area is a display area except the third display area in the second display area.
6. The method of claim 1, wherein the gathering user data for the second user based on the buried point profile comprises:
Responding to the triggering operation of the second user on the starting page, and acquiring a triggering object aimed at by the triggering operation;
monitoring whether the triggering object is a first target control corresponding to the buried point configuration file;
and if yes, acquiring the user data of the second user.
7. A data acquisition method is applied to a server side and comprises the following steps:
Receiving configuration information which is reported by a first terminal and is associated with a first target control, wherein the first target control is configured on a starting page of a second application program, the starting page is displayed on a visual embedded point interface displayed on the first application program, and the visual embedded point interface is displayed in response to a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain visual embedded point connection with the second application program;
auditing the configuration information and obtaining an auditing result;
generating a buried point configuration file under the condition that the auditing result characterizes that the auditing is passed;
Responding to the monitoring that a second user accesses the starting page through a second terminal, and issuing the embedded point configuration file to the second terminal so as to acquire user data of the second user based on the embedded point configuration file;
receiving configuration information which is reported by the first terminal and is associated with a second target control, wherein the second target control is configured on a skip page of a second application program, and the skip page is displayed by switching the start page in response to the skip operation of a first user on the start page;
auditing configuration information associated with a second target control, and obtaining a second auditing result;
generating a second buried point configuration file under the condition that the second audit result represents that the audit is passed;
And responding to the monitoring that the second user accesses the skip page through the second terminal, and issuing the second embedded point configuration file to the second terminal so as to acquire user data of the second user based on the second embedded point configuration file.
8. A data acquisition device applied to a first terminal, comprising:
The first acquisition module is used for acquiring a connection request of a first application program to a second application program, wherein the connection request is used for indicating to establish and maintain a visual buried point connection with the second application program;
The first display module is used for responding to the connection request and displaying a visual embedded point interface in the first application program, wherein the visual embedded point interface displays a starting page of the second application program;
the first determining module is used for responding to a first selected operation of a first user on the starting page, determining a first target control configured on the starting page, wherein triggering the first target control is configured to collect user data;
the first reporting module is used for reporting configuration information associated with the first target control to a server so that the server generates and returns a buried point configuration file based on the configuration information;
The first acquisition module is used for responding to the detection that a second user accesses the starting page through a second terminal and acquiring user data of the second user based on the embedded point configuration file;
the second display module is used for responding to the jump operation of the first user on the starting page and switching the starting page displayed in the first display area of the visual embedded point interface to a jump page;
a second determining module, configured to determine a second target control configured on the jump page in response to a second selected operation of the first user on the jump page, wherein triggering the second target control is configured to collect user data;
the second reporting module is used for reporting configuration information associated with the second target control to a server so that the server returns a buried point configuration file based on the configuration information; and
And the second acquisition module is used for responding to the detection that the second user accesses the jump page through the second terminal and acquiring user data of the second user based on the embedded point configuration file.
9. A data acquisition device applied to a server, comprising:
The first receiving module is used for receiving configuration information which is reported by the first terminal and is associated with a first target control, wherein the first target control is configured on a starting page of a second application program, the starting page is displayed on a visual embedded point interface displayed on the first application program, and the visual embedded point interface is displayed in response to a connection request of the first application program to the second application program, wherein the connection request is used for indicating to establish and maintain visual embedded point connection with the second application program;
the first auditing module is used for auditing the configuration information and obtaining auditing results;
The first generation module is used for generating a buried point configuration file under the condition that the auditing result represents that the auditing is passed;
The first issuing module is used for issuing the embedded point configuration file to the second terminal in response to the fact that the second user accesses the starting page through the second terminal, so as to acquire user data of the second user based on the embedded point configuration file;
The second receiving module is used for receiving configuration information which is reported by the first terminal and is associated with a second target control, wherein the second target control is configured on a jump page of a second application program, and the jump page is switched and displayed by the start page in response to the jump operation of the first user on the start page;
the second auditing module is used for auditing the configuration information associated with the second target control and obtaining a second auditing result;
The second generation module is used for generating a second buried point configuration file under the condition that the second examination result represents that the examination is passed; and
And the second issuing module is used for issuing the second embedded point configuration file to the second terminal in response to the fact that the second user accesses the jump page through the second terminal, so as to acquire user data of the second user based on the second embedded point configuration file.
10. An electronic device, comprising:
One or more processors; and
A memory for storing one or more programs,
Wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 7.
11. A computer readable storage medium storing computer executable instructions which, when executed, are adapted to carry out the method of any one of claims 1 to 7.
12. A computer program product comprising computer readable instructions, wherein the computer readable instructions, when executed, are for performing the method of any one of claims 1 to 7.
CN202110232588.3A 2021-03-02 2021-03-02 Data acquisition method, device, apparatus, medium and program product Active CN113010395B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110232588.3A CN113010395B (en) 2021-03-02 2021-03-02 Data acquisition method, device, apparatus, medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110232588.3A CN113010395B (en) 2021-03-02 2021-03-02 Data acquisition method, device, apparatus, medium and program product

Publications (2)

Publication Number Publication Date
CN113010395A CN113010395A (en) 2021-06-22
CN113010395B true CN113010395B (en) 2024-06-25

Family

ID=76403005

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110232588.3A Active CN113010395B (en) 2021-03-02 2021-03-02 Data acquisition method, device, apparatus, medium and program product

Country Status (1)

Country Link
CN (1) CN113010395B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113448804B (en) * 2021-06-29 2023-06-27 四川长虹电器股份有限公司 Equipment state data processing method and system
CN113505302A (en) * 2021-07-26 2021-10-15 中国工商银行股份有限公司 Method, device and system for supporting dynamic acquisition of buried point data and electronic equipment
CN113821206A (en) * 2021-09-26 2021-12-21 北京沃东天骏信息技术有限公司 Page embedded point information display method and device
CN113885995A (en) * 2021-10-18 2022-01-04 上海哔哩哔哩科技有限公司 Data processing method and device
CN114116089B (en) * 2021-11-08 2024-07-12 广州鸿大智能科技有限公司 Data visualization method, device, equipment and storage medium
CN114416192A (en) * 2021-12-13 2022-04-29 珠海格力电器股份有限公司 Client starting page display method and device, computer equipment and storage medium
CN114510305B (en) * 2022-01-20 2024-01-23 北京字节跳动网络技术有限公司 Model training method and device, storage medium and electronic equipment

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489312A (en) * 2019-06-27 2019-11-22 苏宁云计算有限公司 Data correlation method and device for control trigger data acquisition
CN111581067A (en) * 2020-04-21 2020-08-25 北京龙云科技有限公司 Data acquisition method and device

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104572043B (en) * 2013-10-16 2018-01-19 阿里巴巴集团控股有限公司 A kind of control to client application carries out burying method and device a little in real time
CN108255993A (en) * 2017-12-29 2018-07-06 北京三快在线科技有限公司 Extract method, apparatus, electronic equipment and the storage medium of service fields
CN111367562B (en) * 2018-12-25 2023-05-02 阿里巴巴集团控股有限公司 Data acquisition method, device, storage medium and processor
CN110928755A (en) * 2019-11-21 2020-03-27 中国银行股份有限公司 User behavior data processing method and device
CN111858252B (en) * 2020-07-23 2023-08-18 中国工商银行股份有限公司 Dynamic point burying method and device based on front end frame
CN112162740A (en) * 2020-09-25 2021-01-01 北京易观智库网络科技有限公司 Visual data acquisition method and system based on IOS-SDK
CN112230917B (en) * 2020-10-12 2024-04-30 上海赛可出行科技服务有限公司 Mobile application point burying method based on data and state
CN112394908A (en) * 2020-11-19 2021-02-23 平安普惠企业管理有限公司 Method and device for automatically generating embedded point page, computer equipment and storage medium
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110489312A (en) * 2019-06-27 2019-11-22 苏宁云计算有限公司 Data correlation method and device for control trigger data acquisition
CN111581067A (en) * 2020-04-21 2020-08-25 北京龙云科技有限公司 Data acquisition method and device

Also Published As

Publication number Publication date
CN113010395A (en) 2021-06-22

Similar Documents

Publication Publication Date Title
CN113010395B (en) Data acquisition method, device, apparatus, medium and program product
US10003671B2 (en) Capturing and replaying application sessions using resource files
US8640037B2 (en) Graphical overlay related to data mining and analytics
US10469902B2 (en) Apparatus and method for confirming content viewing
CN106105160B (en) Prefetch the application data for disconnecting the period
US20150106723A1 (en) Tools for locating, curating, editing, and using content of an online library
CN108334641B (en) Method, system, electronic equipment and storage medium for collecting user behavior data
CN113868557A (en) Client device application interaction monitoring
CN111045653B (en) System generation method and device, computer readable medium and electronic equipment
KR20100095208A (en) System and method for tracking webpage click information
CN110851326A (en) Point burying method, data acquisition method and device
CN110704102A (en) Page jump protocol interface document generation method, system, medium and electronic device
KR102054896B1 (en) A visitor behavior alalysis appratus of dynamic webpages and a method for analysing a visitor behavior of webpages using it
CN113505302A (en) Method, device and system for supporting dynamic acquisition of buried point data and electronic equipment
KR20140060217A (en) System and method for posting message by audio signal
US20170147159A1 (en) Capturing and storing dynamic page state data
CN109446451B (en) Webpage display method, device, medium and computing equipment
CN116756016A (en) Multi-browser testing method, device, equipment, medium and program product
CN110674426A (en) Webpage behavior reporting method and device
CN113282285B (en) Code writing method, device, electronic equipment and storage medium
KR101174390B1 (en) Effective graphic format image file searching system and method therefor
CN115292440A (en) Remote guidance method, apparatus, device and medium
CN111767447A (en) Method and device for determining user traffic path
KR101863721B1 (en) Method for providing mobile research service and recording medium thereof
KR101517611B1 (en) Method for Providing Multimedia Except for Communication Load

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant