CN113014623A - Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium - Google Patents

Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium Download PDF

Info

Publication number
CN113014623A
CN113014623A CN202110158160.9A CN202110158160A CN113014623A CN 113014623 A CN113014623 A CN 113014623A CN 202110158160 A CN202110158160 A CN 202110158160A CN 113014623 A CN113014623 A CN 113014623A
Authority
CN
China
Prior art keywords
event
target
buried point
code value
events
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110158160.9A
Other languages
Chinese (zh)
Other versions
CN113014623B (en
Inventor
杨进波
吕坤原
洪智
李少华
梁万山
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhaolian Consumer Finance Co ltd
Original Assignee
Merchants Union Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Merchants Union Consumer Finance Co Ltd filed Critical Merchants Union Consumer Finance Co Ltd
Priority to CN202110158160.9A priority Critical patent/CN113014623B/en
Publication of CN113014623A publication Critical patent/CN113014623A/en
Application granted granted Critical
Publication of CN113014623B publication Critical patent/CN113014623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/55Push-based network services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/953Querying, e.g. by the use of web search engines
    • G06F16/9535Search customisation based on user profiles and personalisation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2209/00Indexing scheme relating to G06F9/00
    • G06F2209/54Indexing scheme relating to G06F9/54
    • G06F2209/548Queue

Abstract

The application relates to a buried point data processing method and device, computer equipment and a storage medium. The method comprises the following steps: receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; combining the embedded point events corresponding to the same execution destination to form corresponding key events; acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; generating a buried point code value, a key event code value, a service code value and an interface calling code value which respectively correspond to each event; loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value; and acquiring a target event corresponding to the target code value, and pushing the target event to the subscriber. By adopting the method, the system development efficiency can be improved.

Description

Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium
Technical Field
The present application relates to the field of data analysis and processing technologies, and in particular, to a method and an apparatus for processing real-time streaming data of a buried point, a computer device, and a storage medium.
Background
With the rapid development of front-end technologies, the collection of user behavior data by using a buried point technology appears. The so-called embedded point technology is to embed code values in a front-end product in advance, and when a user uses the front-end product and triggers embedded points, the user behavior data is collected in real time. In addition, the user behavior data collected in real time is used as a buried data packet, is uploaded to a data gateway through the front end to be subjected to splitting and completion processing, and is uploaded to a buried data database to be used as offline data.
However, for real-time applications such as real-time marketing, real-time wind control, real-time monitoring, etc., if the real-time applications need to use richer nodes to perform more logic functions, the existing data streams cannot be satisfied, that is, the conventional scheme cannot interface different stream data sources in real time, and cannot perform effective data push. .
Disclosure of Invention
In view of the above, it is desirable to provide a buried point real-time stream data processing apparatus, a computer device, and a storage medium capable of improving the effectiveness of data push.
A buried point data processing method, the method comprising:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the buried point data comprises a plurality of fields for recording at least one of user information, device information and session information; before combining the buried point events corresponding to the same execution destination to form corresponding key events, the method further comprises the following steps:
screening out a plurality of target buried point data lacking user information from the plurality of buried point data;
and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, before loading the subscription application configuration written in the memory in advance, the method further includes:
determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a business event and an interface calling event;
configuring a target code value corresponding to a target event in a page of the application program;
and generating corresponding subscription application configuration based on the configured target code value and corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the obtaining of the plurality of interface call events uploaded by the interface gateway includes:
acquiring a plurality of interface calling events output by an interface gateway in real time through an information acquisition tool; the information collection tool comprises at least one of a Filebeat (a log data collector of local files, which can monitor log directories or specific log files) tool and a Logstash (a platform for transmitting, processing, managing and searching application program logs and events, which can be used for uniformly collecting and managing the application program logs).
In one embodiment, the pushing the target event to a corresponding subscriber includes:
sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue;
and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, each service event carries a corresponding attribute field, and before the target event is pushed to a corresponding subscriber, the method further includes:
determining a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each business event;
renaming each target attribute field according to a uniform identification naming mode;
and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the subscriber includes at least one of a marketing application, a wind control application, a loan monitoring application, and an exhibition data application provided in an application server, and the method further includes:
when a corresponding subscriber receives a target event, the subscriber triggers a corresponding service processing process according to the target event and when determining that a user executes a preset operation behavior in the page; the service processing process comprises at least one of preset information pushing and access interception.
A buried point real-time streaming data processing apparatus, the apparatus comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for receiving a plurality of buried point data acquired through an application program and determining corresponding buried point events according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
the merging module is used for merging the embedded point events corresponding to the same execution destination to form corresponding key events;
the second acquisition module is used for acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
a code value acquisition module, configured to acquire a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event;
a loading module, configured to load a subscription application configuration written in advance in a memory, and determine target code values corresponding to respective subscribers based on the subscription application configuration, where the target code values include at least one of the buried point code value, the key event code value, the service code value, and the interface call code value;
the pushing module is used for acquiring a target event corresponding to the target code value and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
The buried point data processing method, the buried point data processing device, the computer equipment and the storage medium receive a plurality of buried point data acquired through different application programs, and merge buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
Drawings
FIG. 1 is a diagram of an exemplary implementation of a buried point data processing method;
FIG. 2 is a flow chart illustrating an embodiment of a buried point data processing method;
FIG. 3 is a diagram of the overall system architecture of the buried point data processing method in one embodiment;
FIG. 4 is a diagram of a front-end interface for setting a subscription application configuration, under an embodiment;
FIG. 5 is a block diagram showing a structure of a buried point data processing apparatus according to an embodiment;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The buried point data processing method provided by the application can be applied to the application environment shown in fig. 1. Wherein, the terminal 102, the plurality of service systems 104, the interface gateway 106, and the plurality of subscribers 108 communicate with the server 110 through the network, respectively. The application program is arranged in the terminal 102, and firstly, the server 110 receives a plurality of embedded point data collected by the application program and determines corresponding embedded point events according to the embedded point data; currently, the server 110 merges the events corresponding to the same execution destination into corresponding key events. Second, the server 110 obtains a plurality of service events uploaded by the service system 104 and a plurality of interface calling events uploaded by the interface gateway 106. Next, the server 110 generates a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event. Finally, the server 110 loads the pre-written subscription application configuration in the memory, and determines target code values respectively corresponding to all subscribers based on the subscription application configuration; by obtaining the target event corresponding to the target code value, the target event is pushed to the corresponding subscriber 108.
The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 110 may be implemented by an independent first server or a server cluster formed by a plurality of first servers. The plurality of business systems 104 may also operate in separate second servers or may each operate in a different second server. The plurality of subscribers 108 may include, but are not limited to, a marketing application, a wind control application, a loan monitoring application, and an exhibition data application hosted in an application server.
In one embodiment, as shown in fig. 2, a method for processing buried point data is provided, which is exemplified by the application of the method to the server 110 in fig. 1, and includes the following steps:
step S202, receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behaviors executed by a user on the page of the application program.
Wherein, the application program can be deployed in a plurality of execution terminals. The embedded point event refers to a specific operation event for which a user executes corresponding operation in a page or a program and triggers a corresponding embedded point; the embedded point is some information collected from a specific process in an application or an interface running on a device such as a terminal, and is used for tracking the use condition of the application, which refers to a related technology for collecting and processing user behaviors and an implementation process thereof, such as the number of clicks of a certain button in a page by a user, the duration of watching a certain video, and the like. The data of the embedded points can be used for optimizing the application or providing data support for subsequent operation of the application, and the data can be identified and applied by the server after screening, processing and integrating the information of the embedded points; the embedded point information may include access number, visitor, dwell time, page browsing number, hop rate, and the like, which is not limited in this embodiment of the present application.
Specifically, the server receives the data of the buried point fed back by each execution terminal, and determines the corresponding buried point event according to the received data of the buried point. The server may receive a buried point data packet composed of a plurality of buried point data, and when the server acquires the buried point data packet, the server splits the corresponding buried point data from the buried point data packet, and determines a corresponding buried point event according to the split buried point data.
In one embodiment, referring to fig. 3, an application program may be an APP provided in an execution terminal, where by performing embedded point setting in the APP in advance, when a user calls a plurality of interfaces provided by an interface gateway to execute a service function provided by the APP and triggers an embedded point, the embedded point data is collected, where the collected embedded point data is asynchronously reported to a server, and the data gateway provided in the server receives and processes the embedded point data.
In the above embodiment, when the embedded point is triggered, the embedded point data is collected through an application program, wherein the collected embedded point data is asynchronously reported to the server and is uniformly processed by the server. Therefore, the subscriber does not need to be connected to different streaming data sources, and can acquire the required subscription data only when being connected to the server. Therefore, the current embodiment can improve development efficiency and guarantee data quality.
And step S204, combining the embedded point events corresponding to the same execution destination to form corresponding key events.
The buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information. It should be noted that the user information refers to some basic information about the user, such as user preferences, user details, user requirements, and user contact information. The device information refers to some basic information about the device, such as device identification, device location, device number, etc., and the session information refers to some basic information about the session, such as access address, access object, session identification, etc., involved in the session.
Specifically, the server determines the execution purpose corresponding to each embedded point time, and merges embedded point data having the same execution purpose.
In one embodiment, before the server merges the embedded point events corresponding to the same execution destination to form the corresponding key event, in order to further ensure the integrity of the embedded point data, the server also needs to screen out a plurality of target embedded point data lacking user information from a plurality of embedded point data; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In the embodiment, based on the data analysis requirement, the server merges the embedded point events corresponding to the same execution destination, so that a foundation is laid for the subsequent data analysis work, and the accuracy of data analysis can be effectively improved.
Step S206, acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected.
The service system can be a back-end service processing system, and the interface calling event can be acquired in real time through an information acquisition tool; in one embodiment, the information gathering tool comprises at least one of a Filebeat tool and a Logstash tool. Illustratively, the back-end service processing system may be a service system dedicated to processing user identity registration. Currently, after a user inputs corresponding user identity information in a terminal with a front-end interface, the input user identity information is further fed back to a back-end service processing system, the back-end service processing system judges whether the user meets an application condition according to the received user information, and if the user meets the application condition, execution result information such as 'successful registration' and the like is output, namely, a corresponding service event is generated.
Step S208, generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event.
The embedded point code value, the key event code value, the service code value and the interface calling code value are defined by the server and used for identifying corresponding events, and the embedded point code value, the key event code value, the service code value and the interface calling code value specifically play a role in identification.
Step S210, the subscription application configuration written in the memory in advance is loaded, and target code values corresponding to all subscribers are determined based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value.
Before the subscription application configuration written in the memory in advance is loaded, the user needs to set the relevant information of the subscription application configuration, where the relevant information may be a target event that needs to be pushed to the subscriber, a target code value corresponding to the target event, and the like.
Specifically, before the subscription application configuration written in the memory in advance is loaded, the server determines a plurality of target events to be pushed, wherein the target events include at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, please refer to fig. 4, which is a front-end interface diagram of a configuration of a subscription application. Determining a plurality of target events needing to be pushed by a target user currently, wherein the target events comprise at least one of a buried point event, a key event, a business event and an interface calling event; the target user clicks a code value adding button in a page of an application program, and configures a target code value corresponding to a target event in a configuration page switched therewith; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory. The information of the configurator may be a page name and an affiliated module (an exemplary affiliated module may be a default module and a standard application flow). In the currently displayed front-end interface of the subscription application configuration, the type of the application program, the application scene, the application description, and the like may be determined according to the displayed basic information. Illustratively, when the previously configured target code value and the corresponding configurator information need to be deleted, the deletion link is triggered to delete the target code and the configurator information, and the change notification instruction is generated while the deletion link is triggered, and the server receives the change notification instruction and updates the configuration data in the memory in time.
In the embodiment, before the subscription application configuration written in the memory in advance is loaded, the user sets the relevant information of the subscription application configuration, so that the server can realize the directional pushing of the target event under the condition of determining the subscription requirement of the user, and the system development efficiency is improved.
Step S212, acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
The server sends the target event to a designated message queue, the message queue stores the target event, and after the subscriber completes the subscription operation, the target event stored in the message queue is pushed to the corresponding subscriber.
Specifically, the subscriber includes at least one of a marketing application, a wind control application, a loan monitoring application, and an exhibition data application provided in the application server. When a corresponding subscriber receives a target event, the subscriber triggers a corresponding service processing process according to the target event when determining that a user executes a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception. In addition, each service event carries a corresponding attribute field. In the current embodiment, the server further needs to determine a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each service event; renaming each target attribute field by the server according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, when the marketing application finds that the target user enters the borrowing page according to the received target event, a preset message pushing processing process is triggered, and the interest-free ticket is pushed to the target user. In another embodiment, when the wind control application finds that the target user executes illegal operation behaviors according to the received target event, a preset access interception process is triggered to carry out access interception.
In the embodiment, because the identification identifiers corresponding to the same type of service events uploaded by different service systems may have different conditions, in order to facilitate subsequent uniform management of data, the server renames each target identification identifier according to a uniform identifier naming mode, thereby effectively improving the system development efficiency.
According to the buried point data processing method, a plurality of buried point data acquired through different application programs are received, buried point events with the same execution purpose are combined into corresponding key events based on data analysis requirements, a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
It should be understood that although the steps in the flowcharts of fig. 2 and 3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 5, there is provided a buried point data processing apparatus 500 including: a first obtaining module 501, a merging module 502, a second obtaining module 503, a code value obtaining module 504, a loading module 505, and a pushing module 506, wherein:
a first obtaining module 501, configured to receive multiple buried point data acquired by an application program, and determine a corresponding buried point event according to the buried point data; the buried point data represents the operation behaviors performed by the user on the page of the application program.
The merging module 502 is configured to merge the embedded point events corresponding to the same execution destination to form corresponding key events.
A second obtaining module 503, configured to obtain multiple service events uploaded by different service systems and multiple interface call events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected.
A code value obtaining module 504, configured to obtain a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event.
The loading module 505 is configured to load a subscription application configuration written in the memory in advance, and determine target code values corresponding to each subscriber based on the subscription application configuration, where the target code values include at least one of a buried point code value, a key event code value, a service code value, and an interface call code value.
The pushing module 506 is configured to obtain a target event corresponding to the target code value, and push the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the buried point data processing apparatus 500 further comprises a screening module, wherein:
the screening module is used for screening out a plurality of target buried point data lacking user information from the plurality of buried point data; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the buried point data processing apparatus 500 further comprises a configuration module, wherein:
the system comprises a configuration module, a service module and a service module, wherein the configuration module is used for determining a plurality of target events needing to be pushed, and the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the second obtaining module 503 is further configured to perform real-time collection on a plurality of interface call events output by the interface gateway through an information collection tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In an embodiment, the pushing module 506 is further configured to send the target event obtained by the corresponding screening to an assigned message queue, and store the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the buried point data processing apparatus 500 further comprises an update module, wherein:
the updating module is used for determining a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each business event; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the buried point data processing apparatus 500 further comprises an execution module, wherein:
the execution module is used for triggering a corresponding service processing process when the corresponding subscriber receives the target event and the subscriber determines that the user executes the preset operation behavior in the page according to the target event; the service processing process comprises at least one of preset information pushing and access interception.
The embedded point real-time stream data processing device receives a plurality of embedded point data acquired through different application programs, and based on data analysis requirements, embedded point events with the same execution purpose are combined into corresponding key events, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
For specific limitations of the device for processing the real-time stream data of the buried point, reference may be made to the above limitations on the method for processing the real-time stream data of the buried point, which are not described herein again. All or part of the modules in the device for processing the real-time streaming data of the embedded point can be realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used to store the target time. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of processing the buried point real-time stream data.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program: receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program; combining the embedded point events corresponding to the same execution destination to form corresponding key events; acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected; generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event; loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value; acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information; screening out a plurality of target buried point data lacking user information from a plurality of buried point data before merging corresponding embedded point events corresponding to the same execution destination to form corresponding key events; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the processor, when executing the computer program, further performs the steps of: before the pre-written subscription application configuration in a memory is loaded, determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring a plurality of interface calling events output by an interface gateway in real time through an information acquisition tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the processor, when executing the computer program, further performs the steps of: each business event carries a corresponding attribute field, and a plurality of target attribute fields which belong to different event types and have different naming modes are determined based on the attribute fields corresponding to each business event before the target event is pushed to a corresponding subscriber; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the method comprises the steps that a subscriber comprises at least one of a marketing application, a wind control application, a borrowing monitoring application and an exhibition data application which are arranged in an application server, and when the corresponding subscriber receives a target event, the subscriber triggers a corresponding business processing process according to the target event and when the user is determined to execute a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception.
The computer equipment receives a plurality of buried point data acquired through different application programs, and merges the buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program; combining the embedded point events corresponding to the same execution destination to form corresponding key events; acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when the embedded point event is collected; generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event; loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of a buried point code value, a key event code value, a service code value and an interface calling code value; acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
In one embodiment, the computer program when executed by the processor further performs the steps of: the buried point data comprises a plurality of fields, and the fields are used for recording at least one of user information, equipment information and session information; screening out a plurality of target buried point data lacking user information from a plurality of buried point data before merging corresponding embedded point events corresponding to the same execution destination to form corresponding key events; and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
In one embodiment, the computer program when executed by the processor further performs the steps of: before the pre-written subscription application configuration in a memory is loaded, determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a service event and an interface calling event; configuring a target code value corresponding to a target event in a page of an application program; and generating corresponding subscription application configuration based on the configured target code value and the corresponding configurator information, and writing the subscription application configuration into a memory.
In one embodiment, the computer program when executed by the processor further performs the steps of collecting in real time a plurality of interface call events output by the interface gateway via the information collection tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue; and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
In one embodiment, the computer program when executed by the processor further performs the steps of: each business event carries a corresponding attribute field, and a plurality of target attribute fields which belong to different event types and have different naming modes are determined based on the attribute fields corresponding to each business event before the target event is pushed to a corresponding subscriber; renaming each target attribute field according to a uniform identification naming mode; and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method comprises the steps that a subscriber comprises at least one of a marketing application, a wind control application, a borrowing monitoring application and an exhibition data application which are arranged in an application server, and when the corresponding subscriber receives a target event, the subscriber triggers a corresponding business processing process according to the target event and when the user is determined to execute a preset operation behavior in a page; the service processing process comprises at least one of preset information pushing and access interception.
The storage medium receives a plurality of buried point data acquired by different application programs, and merges the buried point events with the same execution purpose into corresponding key events based on data analysis requirements, so that a foundation is laid for subsequent data analysis work, and the accuracy of data analysis can be effectively improved. Meanwhile, a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway can be acquired. Therefore, different data sources can be docked in advance, and different types of events can be acquired and processed. And then, by loading the pre-written subscription application configuration in the memory, determining target code values corresponding to all the subscribers respectively, and determining the target events to be pushed based on the target code values, the target events from different data streams can be pushed to the corresponding subscribers in a directional manner under the condition that the subscription requirements of users are clear and the subscribers do not need to be connected with different stream data sources, so that the effectiveness and efficiency of event pushing are greatly improved. Moreover, when the target events corresponding to the behavior of the embedded points are pushed, the system does not need to be re-developed, the development efficiency of the system is improved, and the application cost is reduced.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), for example.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A buried point data processing method is characterized by comprising the following steps:
receiving a plurality of buried point data collected by an application program, and determining a corresponding buried point event according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
combining the embedded point events corresponding to the same execution destination to form corresponding key events;
acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by an interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
generating a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface calling code value corresponding to each interface calling event;
loading a pre-written subscription application configuration in a memory, and determining target code values respectively corresponding to all subscribers based on the subscription application configuration, wherein the target code values comprise at least one of the buried point code values, the key event code values, the service code values and the interface calling code values;
acquiring a target event corresponding to the target code value, and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
2. The method of claim 1, wherein the buried point data comprises a plurality of fields for recording at least one of user information, device information, and session information; before combining the buried point events corresponding to the same execution destination to form corresponding key events, the method further comprises the following steps:
screening out a plurality of target buried point data lacking user information from the plurality of buried point data;
and for each target buried point event, performing associated completion of user information through a preset device identifier and/or a preset session identifier.
3. The method of claim 1, wherein prior to loading the pre-written subscription application configuration in memory, the method further comprises:
determining a plurality of target events needing to be pushed, wherein the target events comprise at least one of a buried point event, a key event, a business event and an interface calling event;
configuring a target code value corresponding to a target event in a page of the application program;
and generating corresponding subscription application configuration based on the configured target code value and corresponding configurator information, and writing the subscription application configuration into a memory.
4. The method of claim 1, wherein obtaining the plurality of interface invocation events uploaded by the interface gateway comprises:
acquiring a plurality of interface calling events output by an interface gateway in real time through an information acquisition tool; the information collection tool comprises at least one of a Filebeat tool and a Logstash tool.
5. The method of claim 1, wherein pushing the target event to a corresponding subscriber comprises:
sending the target event obtained by corresponding screening to a specified message queue, and storing the target event by the message queue;
and after the subscriber completes the subscription operation, pushing the target event stored in the message queue to the corresponding subscriber.
6. The method according to any one of claims 1 to 5, wherein each service event carries a corresponding attribute field, and before the target event is pushed to a corresponding subscriber, the method further comprises:
determining a plurality of target attribute fields which belong to different event types and have different naming modes based on the attribute fields respectively corresponding to each business event;
renaming each target attribute field according to a uniform identification naming mode;
and updating the attribute fields carried by the corresponding service events based on the renamed target attribute fields.
7. The method of any one of claims 1-5, wherein the subscriber comprises at least one of a marketing application, a wind control application, a loan monitoring application, and an exhibition data application hosted by an application server, the method further comprising:
when a corresponding subscriber receives a target event, the subscriber triggers a corresponding service processing process according to the target event and when determining that a user executes a preset operation behavior in the page; the service processing process comprises at least one of preset information pushing and access interception.
8. A device for processing embedded point real-time stream data, the device comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for receiving a plurality of buried point data acquired through an application program and determining corresponding buried point events according to the buried point data; the buried point data represents the operation behavior executed by the user on the page of the application program;
the merging module is used for merging the embedded point events corresponding to the same execution destination to form corresponding key events;
the second acquisition module is used for acquiring a plurality of service events uploaded by different service systems and a plurality of interface calling events uploaded by the interface gateway; the service event comprises execution result information fed back by a corresponding service system when an operation event is triggered, and the interface calling event comprises corresponding interface calling information when a buried point event is collected;
a code value acquisition module, configured to acquire a buried point code value corresponding to each buried point event, a key event code value corresponding to each key event, a service code value corresponding to each service event, and an interface call code value corresponding to each interface call event;
a loading module, configured to load a subscription application configuration written in advance in a memory, and determine target code values corresponding to respective subscribers based on the subscription application configuration, where the target code values include at least one of the buried point code value, the key event code value, the service code value, and the interface call code value;
the pushing module is used for acquiring a target event corresponding to the target code value and pushing the target event to a corresponding subscriber; the target event comprises at least one of a buried point event, a key event, a business event and an interface calling event.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202110158160.9A 2021-02-05 2021-02-05 Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium Active CN113014623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110158160.9A CN113014623B (en) 2021-02-05 2021-02-05 Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110158160.9A CN113014623B (en) 2021-02-05 2021-02-05 Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113014623A true CN113014623A (en) 2021-06-22
CN113014623B CN113014623B (en) 2022-05-10

Family

ID=76383801

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110158160.9A Active CN113014623B (en) 2021-02-05 2021-02-05 Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113014623B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660277A (en) * 2021-08-18 2021-11-16 广州优视云集科技有限公司 Crawler-resisting method based on multiplexing embedded point information and processing terminal
CN113672497A (en) * 2021-07-14 2021-11-19 深圳市明源云科技有限公司 Method, device and equipment for generating non-buried point event and storage medium
CN114445088A (en) * 2022-01-13 2022-05-06 内蒙古蒙商消费金融股份有限公司 Method and device for judging fraudulent conduct, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110727572A (en) * 2019-10-23 2020-01-24 江苏满运软件科技有限公司 Buried point data processing method, device, equipment and storage medium
CN110851339A (en) * 2019-10-12 2020-02-28 平安普惠企业管理有限公司 Method and device for reporting buried point data, storage medium and terminal equipment
CN112000541A (en) * 2020-07-23 2020-11-27 招联消费金融有限公司 Buried point data reporting method and device, computer equipment and storage medium
CN112069384A (en) * 2020-09-04 2020-12-11 中国平安人寿保险股份有限公司 Buried point data processing method, server and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110851339A (en) * 2019-10-12 2020-02-28 平安普惠企业管理有限公司 Method and device for reporting buried point data, storage medium and terminal equipment
CN110727572A (en) * 2019-10-23 2020-01-24 江苏满运软件科技有限公司 Buried point data processing method, device, equipment and storage medium
CN112000541A (en) * 2020-07-23 2020-11-27 招联消费金融有限公司 Buried point data reporting method and device, computer equipment and storage medium
CN112069384A (en) * 2020-09-04 2020-12-11 中国平安人寿保险股份有限公司 Buried point data processing method, server and readable storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
廖爱红等: "埋点管理系统分析与设计", 《办公自动化》 *
王瀛等: "用户行为数据分析平台的设计与实现", 《信息与电脑(理论版)》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672497A (en) * 2021-07-14 2021-11-19 深圳市明源云科技有限公司 Method, device and equipment for generating non-buried point event and storage medium
CN113660277A (en) * 2021-08-18 2021-11-16 广州优视云集科技有限公司 Crawler-resisting method based on multiplexing embedded point information and processing terminal
CN113660277B (en) * 2021-08-18 2023-01-06 广州优视云集科技有限公司 Crawler-resisting method based on multiplexing embedded point information and processing terminal
CN114445088A (en) * 2022-01-13 2022-05-06 内蒙古蒙商消费金融股份有限公司 Method and device for judging fraudulent conduct, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN113014623B (en) 2022-05-10

Similar Documents

Publication Publication Date Title
CN113014623B (en) Method and device for processing real-time streaming data of embedded point, computer equipment and storage medium
CN112118565B (en) Multi-tenant service gray level publishing method, device, computer equipment and storage medium
CN110209652B (en) Data table migration method, device, computer equipment and storage medium
CN109618176B (en) Processing method, equipment and storage medium for live broadcast service
CN108390933B (en) Message distribution method, device, server and storage medium
CN112000541A (en) Buried point data reporting method and device, computer equipment and storage medium
CN109325010B (en) Log checking method, device, computer equipment and storage medium
CN112506870B (en) Data warehouse increment updating method and device and computer equipment
CN110704095A (en) Workflow-based configuration processing method and device, computer equipment and storage medium
CN107526623B (en) Data processing method and device
CN110659373A (en) Image retrieval method, image retrieval device, computer device and storage medium
CN117389655A (en) Task execution method, device, equipment and storage medium in cloud native environment
CN112182295B (en) Service processing method and device based on behavior prediction and electronic equipment
CN111290751A (en) Special effect generation method, device, system, equipment and storage medium
US9852031B2 (en) Computer system and method of identifying a failure
CN116028696A (en) Resource information acquisition method and device, electronic equipment and storage medium
CN114745146B (en) Jump interception method, apparatus, readable storage medium and device
CN111144077B (en) View information deleting method, device, equipment and computer readable storage medium
CN107704557B (en) Processing method and device for operating mutually exclusive data, computer equipment and storage medium
CN111966506A (en) Content sharing method based on different application programs and computer equipment
CN111191082A (en) Data management method and device, computer equipment and storage medium
CN113824763B (en) Message pushing method, device, computer equipment and storage medium
CN113055243B (en) DPI interface data processing method and device
CN110166505B (en) Session record storage method, device, equipment and storage medium
CN109284429B (en) News data pushing method, device, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address
CP03 Change of name, title or address

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee after: Zhaolian Consumer Finance Co.,Ltd.

Country or region after: China

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Patentee before: MERCHANTS UNION CONSUMER FINANCE Co.,Ltd.

Country or region before: China