CN113094248B - User behavior data analysis method and device, electronic equipment and medium - Google Patents

User behavior data analysis method and device, electronic equipment and medium Download PDF

Info

Publication number
CN113094248B
CN113094248B CN202110470827.9A CN202110470827A CN113094248B CN 113094248 B CN113094248 B CN 113094248B CN 202110470827 A CN202110470827 A CN 202110470827A CN 113094248 B CN113094248 B CN 113094248B
Authority
CN
China
Prior art keywords
page
target application
application program
information
user behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110470827.9A
Other languages
Chinese (zh)
Other versions
CN113094248A (en
Inventor
占宇
史俊明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Wangxu Technology Co ltd
Original Assignee
Shenzhen Wangxu Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Wangxu Technology Co ltd filed Critical Shenzhen Wangxu Technology Co ltd
Priority to CN202110470827.9A priority Critical patent/CN113094248B/en
Publication of CN113094248A publication Critical patent/CN113094248A/en
Application granted granted Critical
Publication of CN113094248B publication Critical patent/CN113094248B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3089Monitoring arrangements determined by the means or processing involved in sensing the monitored data, e.g. interfaces, connectors, sensors, probes, agents
    • G06F11/3093Configuration details thereof, e.g. installation, enabling, spatial arrangement of the probes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to data processing, and discloses a user behavior data analysis method, which comprises the following steps: when the target application program is monitored to be started, a first acquisition task and a second acquisition task are started, the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user; establishing an association relationship between page information and triggered control information, and storing the association relationship into a first hash array in a key value opposite mode; and analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result. The invention also provides a user behavior data analysis device, electronic equipment and a medium. The invention simplifies the acquisition process and improves the analysis efficiency.

Description

User behavior data analysis method and device, electronic equipment and medium
Technical Field
The present invention relates to the field of data processing, and in particular, to a method and apparatus for analyzing user behavior data, an electronic device, and a medium.
Background
With the massive influx of application programs, the behavior data of users on the application programs become the focus of attention, and the functional modules of figures, analysis of market preference and optimization of the application programs can be constructed through the behavior data of the users.
At present, behavior data of a user is collected by burying points in codes corresponding to all pages of an application program, however, the mode is complex to operate, the collected data is messy, and rapid analysis of the data is not facilitated. Therefore, a method for analyzing user behavior data is needed to simplify the collection process and improve the analysis efficiency.
Disclosure of Invention
In view of the foregoing, it is necessary to provide a method for analyzing user behavior data, which aims to simplify the acquisition process and improve the analysis efficiency.
The user behavior data analysis method provided by the invention comprises the following steps:
when a user behavior data acquisition request is received, analyzing the request to determine a target application program;
when the target application program is monitored to be started, a first acquisition task and a second acquisition task are started, the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user;
analyzing the page information and the triggered control information, establishing an association relation between the page information and the triggered control information, and storing the association relation into a first hash array in a key value opposite mode;
And analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result.
Optionally, the page information includes a page identifier and an acquisition timestamp, the triggered control information includes a trigger timestamp, analyzing the page information and the triggered control information, establishing an association relationship between the page information and the triggered control information, and storing the association relationship to a first hash array in a key value opposite mode includes:
generating a key value pair for a plurality of page identifiers which are continuously the same in the page information to obtain a plurality of key value pairs, wherein key in each key value pair is the page identifier, and value is the continuous number of the page identifiers;
adding the triggered control information into the value of the corresponding key value pair based on the trigger time stamp and the acquisition time stamp to obtain an updated key value pair;
and storing the updated key value pairs into a first hash array.
Optionally, after the first acquisition task and the second acquisition task are started, the method further includes:
if the target application program is monitored to be suspended, a third acquisition task is started, and the third acquisition task acquires system information of the suspended target application program;
Storing the system information into a second hash array;
and analyzing the performance of the target application program based on the second hash array.
Optionally, after the first acquisition task and the second acquisition task are started, the method further includes:
when the running of the target application program is monitored to be abnormal, positioning an abnormal page and/or an abnormal control of the target application program based on the collected page information and the triggered control information;
and sending the abnormal page and/or the abnormal control to a control end so as to process the abnormality.
Optionally, after the target application program is monitored to be started, the method further includes:
when the key control of the target application program is triggered, acquiring index values corresponding to each index item in a plurality of index items of the key control, and optimizing the function of the key control based on the index values.
Optionally, the system information includes a time of the target application program running in the background, device information, operating system information, version information of the target application program, and a page identifier of a page displayed by the target application program when the target application program is suspended.
Optionally, the updated key value pair includes a key and two values, where the key is a page identifier, and the values are the continuous number of page identifiers and the triggered control identifier in the page identifier respectively.
In order to solve the above problems, the present invention also provides a user behavior data analysis apparatus, the apparatus comprising:
the monitoring module is used for analyzing the request to determine a target application program when receiving a user behavior data acquisition request;
the acquisition module is used for starting a first acquisition task and a second acquisition task when the target application program is monitored to be started, the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires the triggered control information when any control of the target application program is triggered by a user;
the association module is used for analyzing the page information and the triggered control information, establishing an association relation between the page information and the triggered control information, and storing the association relation to a first hash array in a key value opposite mode;
and the analysis module is used for analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a user behavior data analysis program executable by the at least one processor, the user behavior data analysis program being executable by the at least one processor to enable the at least one processor to perform the user behavior data analysis method described above.
In order to solve the above-mentioned problems, the present invention also provides a computer-readable storage medium having stored thereon a user behavior data analysis program executable by one or more processors to implement the above-mentioned user behavior data analysis method.
Compared with the prior art, when the starting of the target application program is monitored, the first acquisition task and the second acquisition task are started to acquire page information and triggered control information, and the acquisition process is simple and convenient; then, establishing an association relation between the page information and the triggered control information, and storing the association relation to a first hash array in a key value opposite mode, wherein the step realizes data standardization and can improve the subsequent analysis efficiency; and finally, analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result. Therefore, the invention simplifies the acquisition process and improves the analysis efficiency.
Drawings
FIG. 1 is a flowchart illustrating a method for analyzing user behavior data according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of a device for analyzing user behavior data according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of an electronic device for implementing a method for analyzing user behavior data according to an embodiment of the present invention;
the achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
It should be noted that the description of "first", "second", etc. in this disclosure is for descriptive purposes only and is not to be construed as indicating or implying a relative importance or implying an indication of the number of technical features being indicated. Thus, a feature defining "a first" or "a second" may explicitly or implicitly include at least one such feature. In addition, the technical solutions of the embodiments may be combined with each other, but it is necessary to base that the technical solutions can be realized by those skilled in the art, and when the technical solutions are contradictory or cannot be realized, the combination of the technical solutions should be considered to be absent and not within the scope of protection claimed in the present invention.
The invention provides a user behavior data analysis method. Referring to fig. 1, a flow chart of a method for analyzing user behavior data according to an embodiment of the invention is shown. The method is performed by an electronic device.
In this embodiment, the user behavior data analysis method includes:
s1, when a user behavior data acquisition request is received, the request is analyzed to determine a target application program.
In this embodiment, the user behavior data acquisition request carries the identifier of the target application program, where the user behavior data acquisition request may be sent by the developer of the target application program to the electronic device through a mobile phone, a computer or other intelligent devices of the developer, so as to optimize the functional module of the target application program according to the acquired user behavior data.
In this embodiment, the user behavior data acquisition request may be sent by a GET method (i.e. a link mode), and the sending of the request is in the prior art, which is not described herein in detail.
When the user downloads and uses the target application program, the user information (including the user identifier and the device identifier for logging in to the target application program) is uploaded, the developer may select all devices for installing the target application program as a request receiver, and send the user behavior data acquisition request to the devices, and in other embodiments, the developer may also select a device in which the target application program is installed in a certain area (for example, the eastern China area) as a receiver of the user behavior data acquisition request.
S2, when the target application program is monitored to be started, a first acquisition task and a second acquisition task are started, the first acquisition task acquires page information displayed by the target application program every other preset time, and the second acquisition task acquires the triggered control information when any control of the target application program is triggered by a user.
In this embodiment, the preset time may be 1 second, and the first acquisition task acquires page information displayed by the target application program once every 1 second, where the page information includes a page identifier and an acquisition timestamp.
When any control of the target application program is triggered, the second acquisition task acquires the triggered control information, wherein the triggered control information comprises a triggered control identifier, a page identifier to which the triggered control belongs and a trigger time stamp.
In this embodiment, the control includes a button and an input box, and when the input box is triggered, the triggered control information includes an input box identifier, a field input in the input box, a page identifier to which the input box belongs, and an input timestamp.
In this embodiment, the first acquisition task and the second acquisition task acquire page information and triggered control information through a pre-written method, and taking the first acquisition task as an example, the pre-written method is getTopView, getTopView, and the page information displayed by the target application program is acquired by calling an API corresponding to the target application program.
In the traditional manner of collecting user behaviors through buried points, new buried points are required to be manually added every time an application program adds a page. In the case of upgrading and updating the application program, the method of pre-writing is not required to be modified, and the acquisition process is simplified.
S3, analyzing the page information and the triggered control information, establishing an association relation between the page information and the triggered control information, and storing the association relation to a first hash array in a key value opposite mode.
Analyzing the collected page information and the triggered control information, associating the triggered control information with page identifications corresponding to the triggered controls in the page information, and performing format standardization processing on association relations obtained by association (for example, arranging the information into a hash array form or arranging the information into a message queue form), wherein the sequence and the stay time of each page of a target application program browsed by a user and what controls are clicked on each page can be rapidly known through data obtained after the format standardization processing, and therefore track data of the operation of the user on the target application program is obtained.
The analyzing the page information and the triggered control information, establishing an association relationship between the page information and the triggered control information, and storing the association relationship to a first hash array in a key value pair mode includes:
a11, generating a key value pair for a plurality of continuous same page identifications in the page information to obtain a plurality of key value pairs, wherein keys in each key value pair are page identifications, and value is the continuous number of the page identifications;
in this embodiment, a key value pair is generated for a plurality of page identifiers that are continuously the same in the collected page information, each key value pair uses the page identifier as a key, and the number of continuous occurrences of the page identifier (when the collection time interval is 1 second, the number of continuous occurrences of the page identifier is the page residence time) is the value.
For example, if the first acquisition task acquires that the page identifiers in the page information corresponding to the user 1 are aaaaabaaccddddaaaeeeebbbbaaaa respectively, 9 key value pairs may be generated, and the first key value pair is generated by the first 5 page identifiers, where the key in the key value pair is a and the value is 5.
A12, adding the triggered control information into the value of the corresponding key value pair based on the trigger time stamp and the acquisition time stamp to obtain an updated key value pair;
The page information comprises page identifications and acquisition time stamps, the triggered control information comprises the triggered control identifications, the page identifications to which the triggered control belongs and the trigger time stamps, and according to the trigger time stamps and the acquisition time stamps, the page identifications of the page information corresponding to the triggered control information can be found, so that key value pairs corresponding to the triggered control information can be determined.
When the trigger time stamp is exactly consistent with a certain designated acquisition time stamp, the key value pair corresponding to the page identifier acquired by the designated acquisition time stamp is used as the key value pair corresponding to the triggered control information.
When the time corresponding to the trigger time stamp is between the first acquisition time stamp and the second acquisition time stamp and the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp are consistent, the key value pair corresponding to the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp is used as the key value pair corresponding to the triggered control information; if the time corresponding to the trigger time stamp is between the first acquisition time stamp and the second acquisition time stamp and the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp are different, determining that the page identification of the page to which the triggered control belongs is successfully matched with the page identifications acquired by the time stamp in the first acquisition time stamp and the second acquisition time stamp, and taking the key value pair corresponding to the page identification acquired by the successfully matched acquisition time stamp as the key value pair corresponding to the triggered control information.
For example, the first acquisition time stamp acquires the 5 th A in the page information, the second acquisition time stamp acquires the 1 st B in the page information, the time corresponding to the trigger time stamp is located between the first acquisition time stamp and the second acquisition time stamp, the page identifier of the triggered control belongs to A, and the key value pair corresponding to the 5 th A is the key value pair corresponding to the triggered control information.
In this embodiment, the updated key value pair includes a key and two values, where the key is a page identifier, and the values are the continuous number of page identifiers and the triggered control identifier in the page identifier respectively. For example, the first key value pair updated is { "A":5, button 1}.
A13, storing the updated key value pairs into the first hash array.
For example, the first hash array obtained after the page information and the triggered control information are processed is:
[ { "A":5, button 1}, { "B":2, button 3}, { "A":2, button 2}, { "C":3, button 5}, { "D":4, button 5}, { "A":3, button 1}, { "E":4, button 4}, { "B":4, button 3}, { "A":4, button 1} ].
S4, analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result.
The whole behavior track of the user in the target application program can be determined based on the first hash array, for example, after the user 1 stays on the page A for 5 seconds, the user enters the page B to stay for 2 seconds, then returns to the page A to stay for 2 seconds, and enters the page C to stay for 3 seconds … …, and based on the behavior track, the preference page of the user 1 for the target application program can be analyzed.
The first hash array can also obtain that the user 1 clicks the button 1 of the page a, the button 3 of the page b and the button 2 of the page a … …, based on which the preference function of the user 1 for the target application program can be analyzed (the control represents a function, and the preference function can be determined according to the preference control).
And taking the preference page and the preference function of the user 1 for the target application program as the behavior analysis result of the user 1.
In this embodiment, after the first acquisition task and the second acquisition task are started, the method further includes:
b11, if the target application program is monitored to be suspended, starting a third acquisition task, wherein the third acquisition task acquires system information of the suspended target application program;
the target application is suspended, and the user stops operating on the target application to exit to the background, and at the moment, the third acquisition task is started, and when the target application is monitored to be closed by the system, the third acquisition task is ended.
In this embodiment, the system information includes a time of the target application running in the background, device information, operating system information, version information of the target application, and a page identifier of a page displayed by the target application when the target application is suspended.
B12, storing the system information into a second hash array;
for example, the second hash array is obtained as follows:
{“backgroundTime”:200,“deviceType”:“iPhone 12”,“Operation system version”:“iOS 14.2”,“APP version”:“version 2.0”,“currentPage”:“A”}。
b13, analyzing the performance of the target application program based on the second hash array.
The longer the target application runs in the background, the better the performance of the target application is explained.
Through the second hash array, the running time of each page of each version of the target application program in various devices and various operating systems can be analyzed, and further the performance of the target application program is analyzed.
After the first acquisition task and the second acquisition task are started, the method further comprises:
c11, when abnormal running of the target application program is monitored, positioning an abnormal page and/or an abnormal control of the target application program based on the collected page information and the triggered control information;
according to the collected page information and the triggered control information, what operation is performed on what page by a user, what control is clicked, and after which page or control is clicked, a jam or breakdown condition occurs, so that an abnormal page and/or an abnormal control are determined.
And C12, sending the abnormal page and/or the abnormal control to a control end so as to process the abnormality.
After receiving the abnormal page and/or the abnormal control, the user of the control end can browse the codes corresponding to the target application program and solve the abnormality.
After the detecting that the target application program is opened, the method further comprises:
when the key control of the target application program is triggered, acquiring index values corresponding to each index item in a plurality of index items of the key control, and optimizing the function of the key control based on the index values.
The step is used for carrying out fine analysis and optimization on the functions of the key controls, for example, if the key controls are payment buttons, index items of the key controls comprise payment response time, product information to be paid, reasons of payment failure and the like, and the index items are used for analyzing the preference of a user on payment or problems of payment.
If the function corresponding to the key control has a network request, the index item corresponding to the key control further comprises a request address, a request parameter, response time and response data.
The index values corresponding to the index items are acquired by a pre-written index value acquisition method (each index item corresponds to a parameter to be acquired in the method), and the method is similar to the page information acquisition, except that specific logic in the method is different.
According to the user behavior data analysis method provided by the embodiment of the invention, when the starting of the target application program is monitored, the first acquisition task and the second acquisition task are started to acquire page information and triggered control information, and the acquisition process is simple and convenient; then, establishing an association relation between the page information and the triggered control information, and storing the association relation to a first hash array in a key value opposite mode, wherein the step realizes data standardization and can improve the subsequent analysis efficiency; and finally, analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result. Therefore, the invention simplifies the acquisition process and improves the analysis efficiency.
Fig. 2 is a schematic block diagram of a user behavior data analysis device according to an embodiment of the invention.
The user behavior data analysis apparatus 100 of the present invention may be installed in an electronic device. Depending on the functions implemented, the user behavior data analysis device 100 may include a monitoring module 110, an acquisition module 120, an association module 130, and an analysis module 140. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
and the monitoring module is used for analyzing the request to determine a target application program when receiving the user behavior data acquisition request.
In this embodiment, the user behavior data acquisition request carries the identifier of the target application program, where the user behavior data acquisition request may be sent by the developer of the target application program to the electronic device through a mobile phone, a computer or other intelligent devices of the developer, so as to optimize the functional module of the target application program according to the acquired user behavior data.
In this embodiment, the user behavior data acquisition request may be sent by a GET method (i.e. a link mode), and the sending of the request is in the prior art, which is not described herein in detail.
When the user downloads and uses the target application program, the user information (including the user identifier and the device identifier for logging in to the target application program) is uploaded, the developer may select all devices for installing the target application program as a request receiver, and send the user behavior data acquisition request to the devices, and in other embodiments, the developer may also select a device in which the target application program is installed in a certain area (for example, the eastern China area) as a receiver of the user behavior data acquisition request.
The acquisition module 120 is configured to, when it is monitored that the target application program is started, start a first acquisition task and a second acquisition task, where the first acquisition task acquires page information displayed by the target application program every other preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user.
In this embodiment, the preset time may be 1 second, and the first acquisition task acquires page information displayed by the target application program once every 1 second, where the page information includes a page identifier and an acquisition timestamp.
When any control of the target application program is triggered, the second acquisition task acquires the triggered control information, wherein the triggered control information comprises a triggered control identifier, a page identifier to which the triggered control belongs and a trigger time stamp.
In this embodiment, the control includes a button and an input box, and when the input box is triggered, the triggered control information includes an input box identifier, a field input in the input box, a page identifier to which the input box belongs, and an input timestamp.
In this embodiment, the first acquisition task and the second acquisition task acquire page information and triggered control information through a pre-written method, and taking the first acquisition task as an example, the pre-written method is getTopView, getTopView, and the page information displayed by the target application program is acquired by calling an API corresponding to the target application program.
In the traditional manner of collecting user behaviors through buried points, new buried points are required to be manually added every time an application program adds a page. In the case of upgrading and updating the application program, the method of pre-writing is not required to be modified, and the acquisition process is simplified.
And the association module 130 is configured to analyze the page information and the triggered control information, establish an association relationship between the page information and the triggered control information, and store the association relationship to the first hash array in a key value opposite mode.
Analyzing the collected page information and the triggered control information, associating the triggered control information with page identifications corresponding to the triggered controls in the page information, and performing format standardization processing on association relations obtained by association (for example, arranging the information into a hash array form or arranging the information into a message queue form), wherein the sequence and the stay time of each page of a target application program browsed by a user and what controls are clicked on each page can be rapidly known through data obtained after the format standardization processing, and therefore track data of the operation of the user on the target application program is obtained.
The analyzing the page information and the triggered control information, establishing an association relationship between the page information and the triggered control information, and storing the association relationship to a first hash array in a key value pair mode includes:
a21, generating a key value pair for a plurality of continuous same page identifications in the page information to obtain a plurality of key value pairs, wherein keys in each key value pair are page identifications, and value is the continuous number of the page identifications;
in this embodiment, a key value pair is generated for a plurality of page identifiers that are continuously the same in the collected page information, each key value pair uses the page identifier as a key, and the number of continuous occurrences of the page identifier (when the collection time interval is 1 second, the number of continuous occurrences of the page identifier is the page residence time) is the value.
For example, if the first acquisition task acquires that the page identifiers in the page information corresponding to the user 1 are aaaaabaaccddddaaaeeeebbbbaaaa respectively, 9 key value pairs may be generated, and the first key value pair is generated by the first 5 page identifiers, where the key in the key value pair is a and the value is 5.
A22, adding the triggered control information into the value of the corresponding key value pair based on the trigger time stamp and the acquisition time stamp to obtain an updated key value pair;
The page information comprises page identifications and acquisition time stamps, the triggered control information comprises the triggered control identifications, the page identifications to which the triggered control belongs and the trigger time stamps, and according to the trigger time stamps and the acquisition time stamps, the page identifications of the page information corresponding to the triggered control information can be found, so that key value pairs corresponding to the triggered control information can be determined.
When the trigger time stamp is exactly consistent with a certain designated acquisition time stamp, the key value pair corresponding to the page identifier acquired by the designated acquisition time stamp is used as the key value pair corresponding to the triggered control information.
When the time corresponding to the trigger time stamp is between the first acquisition time stamp and the second acquisition time stamp and the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp are consistent, the key value pair corresponding to the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp is used as the key value pair corresponding to the triggered control information; if the time corresponding to the trigger time stamp is between the first acquisition time stamp and the second acquisition time stamp and the page identifications acquired by the first acquisition time stamp and the second acquisition time stamp are different, determining that the page identification of the page to which the triggered control belongs is successfully matched with the page identifications acquired by the time stamp in the first acquisition time stamp and the second acquisition time stamp, and taking the key value pair corresponding to the page identification acquired by the successfully matched acquisition time stamp as the key value pair corresponding to the triggered control information.
For example, the first acquisition time stamp acquires the 5 th A in the page information, the second acquisition time stamp acquires the 1 st B in the page information, the time corresponding to the trigger time stamp is located between the first acquisition time stamp and the second acquisition time stamp, the page identifier of the triggered control belongs to A, and the key value pair corresponding to the 5 th A is the key value pair corresponding to the triggered control information.
In this embodiment, the updated key value pair includes a key and two values, where the key is a page identifier, and the values are the continuous number of page identifiers and the triggered control identifier in the page identifier respectively. For example, the first key value pair updated is { "A":5, button 1}.
A23, storing the updated key value pairs into the first hash array.
For example, the first hash array obtained after the page information and the triggered control information are processed is:
[ { "A":5, button 1}, { "B":2, button 3}, { "A":2, button 2}, { "C":3, button 5}, { "D":4, button 5}, { "A":3, button 1}, { "E":4, button 4}, { "B":4, button 3}, { "A":4, button 1} ].
And the analysis module 140 is configured to analyze the user behavior data based on the first hash array, and obtain a user behavior analysis result.
The whole behavior track of the user in the target application program can be determined based on the first hash array, for example, after the user 1 stays on the page A for 5 seconds, the user enters the page B to stay for 2 seconds, then returns to the page A to stay for 2 seconds, and enters the page C to stay for 3 seconds … …, and based on the behavior track, the preference page of the user 1 for the target application program can be analyzed.
The first hash array can also obtain that the user 1 clicks the button 1 of the page a, the button 3 of the page b and the button 2 of the page a … …, based on which the preference function of the user 1 for the target application program can be analyzed (the control represents a function, and the preference function can be determined according to the preference control).
And taking the preference page and the preference function of the user 1 for the target application program as the behavior analysis result of the user 1.
In this embodiment, after the first acquisition task and the second acquisition task are started, the acquisition module 120 is further configured to:
b21, if the target application program is monitored to be suspended, starting a third acquisition task, wherein the third acquisition task acquires system information of the suspended target application program;
the target application is suspended, and the user stops operating on the target application to exit to the background, and at the moment, the third acquisition task is started, and when the target application is monitored to be closed by the system, the third acquisition task is ended.
In this embodiment, the system information includes a time of the target application running in the background, device information, operating system information, version information of the target application, and a page identifier of a page displayed by the target application when the target application is suspended.
B22, storing the system information into a second hash array;
for example, the second hash array is obtained as follows:
{“backgroundTime”:200,“deviceType”:“iPhone 12”,“Operation system version”:“iOS 14.2”,“APP version”:“version 2.0”,“currentPage”:“A”}。
b23, analyzing the performance of the target application program based on the second hash array.
The longer the target application runs in the background, the better the performance of the target application is explained.
Through the second hash array, the running time of each page of each version of the target application program in various devices and various operating systems can be analyzed, and further the performance of the target application program is analyzed.
After the first acquisition task and the second acquisition task are started, the acquisition module 120 is further configured to:
c21, when abnormal running of the target application program is monitored, positioning an abnormal page and/or an abnormal control of the target application program based on the collected page information and the triggered control information;
according to the collected page information and the triggered control information, what operation is performed on what page by a user, what control is clicked, and after which page or control is clicked, a jam or breakdown condition occurs, so that an abnormal page and/or an abnormal control are determined.
And C22, sending the abnormal page and/or the abnormal control to a control end so as to process the abnormality.
After receiving the abnormal page and/or the abnormal control, the user of the control end can browse the codes corresponding to the target application program and solve the abnormality.
After the target application is monitored to be started, the acquisition module 120 is further configured to:
when the key control of the target application program is triggered, acquiring index values corresponding to each index item in a plurality of index items of the key control, and optimizing the function of the key control based on the index values.
The step is used for carrying out fine analysis and optimization on the functions of the key controls, for example, if the key controls are payment buttons, index items of the key controls comprise payment response time, product information to be paid, reasons of payment failure and the like, and the index items are used for analyzing the preference of a user on payment or problems of payment.
If the function corresponding to the key control has a network request, the index item corresponding to the key control further comprises a request address, a request parameter, response time and response data.
The index values corresponding to the index items are acquired by a pre-written index value acquisition method (each index item corresponds to a parameter to be acquired in the method), and the method is similar to the page information acquisition, except that specific logic in the method is different.
Fig. 3 is a schematic structural diagram of an electronic device for implementing a method for analyzing user behavior data according to an embodiment of the present invention.
In the present embodiment, the electronic device 1 includes, but is not limited to, a memory 11, a processor 12, and a network interface 13, which are communicably connected to each other via a system bus, and the memory 11 stores therein a user behavior data analysis program 10, the user behavior data analysis program 10 being executable by the processor 12. Fig. 3 shows only the electronic device 1 with the components 11-13 and the user behavior data analysis program 10, it will be understood by those skilled in the art that the structure shown in fig. 3 does not constitute a limitation of the electronic device 1, and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
Wherein the storage 11 comprises a memory and at least one type of readable storage medium. The memory provides a buffer for the operation of the electronic device 1; the readable storage medium may be a non-volatile storage medium such as flash memory, hard disk, multimedia card, card memory (e.g., SD or DX memory, etc.), random Access Memory (RAM), static Random Access Memory (SRAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), programmable Read Only Memory (PROM), magnetic memory, magnetic disk, optical disk, etc. In some embodiments, the readable storage medium may be an internal storage unit of the electronic device 1; in other embodiments, the nonvolatile storage medium may also be an external storage device of the electronic device 1, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device 1. In this embodiment, the readable storage medium of the memory 11 is generally used to store an operating system and various application software installed in the electronic device 1, for example, to store codes of the user behavior data analysis program 10 in one embodiment of the present invention. Further, the memory 11 may be used to temporarily store various types of data that have been output or are to be output.
Processor 12 may be a central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor, or other data processing chip in some embodiments. The processor 12 is typically used to control the overall operation of the electronic device 1, such as performing control and processing related to data interaction or communication with other devices, etc. In this embodiment, the processor 12 is configured to execute the program code or process data stored in the memory 11, for example, execute the user behavior data analysis program 10.
The network interface 13 may comprise a wireless network interface or a wired network interface, the network interface 13 being used for establishing a communication connection between the electronic device 1 and a terminal (not shown).
Optionally, the electronic device 1 may further comprise a user interface, which may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device 1 and for displaying a visual user interface.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The user behavior data analysis program 10 stored in the memory 11 of the electronic device 1 is a combination of instructions which, when run in the processor 12, can implement:
when a user behavior data acquisition request is received, analyzing the request to determine a target application program;
when the target application program is monitored to be started, a first acquisition task and a second acquisition task are started, the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user;
analyzing the page information and the triggered control information, establishing an association relation between the page information and the triggered control information, and storing the association relation into a first hash array in a key value opposite mode;
and analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result.
In particular, the specific implementation method of the processor 12 to the above-mentioned user behavior data analysis program 10 may refer to the description of the relevant steps in the corresponding embodiment of fig. 1, which is not repeated herein.
Further, the modules/units integrated in the electronic device 1 may be stored in a computer readable storage medium if implemented in the form of software functional units and sold or used as separate products. The computer readable medium may be nonvolatile or nonvolatile. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The computer readable storage medium stores the user behavior data analysis program 10, where the user behavior data analysis program 10 may be executed by one or more processors, and the specific implementation of the computer readable storage medium is substantially the same as that of the above embodiments of the user behavior data analysis method, and will not be described herein.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the system claims can also be implemented by means of software or hardware by means of one unit or means. The terms second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (9)

1. A method of user behavior data analysis, the method comprising:
when a user behavior data acquisition request is received, analyzing the request to determine a target application program;
when the target application program is monitored to be started, calling an API of the target application program according to a pre-written method, starting a first acquisition task and a second acquisition task, wherein the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user;
Analyzing the page information and the triggered control information, establishing an association relationship between a page identifier corresponding to the triggered control in the page information and the triggered control information, carrying out format standardization processing on the association relationship, and storing the association relationship into a first hash array in a key value opposite mode;
analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result;
and if the condition that the target application program is suspended is monitored, starting a third acquisition task, acquiring system information of the suspended target application program by the third acquisition task, storing the system information into a second hash array, and analyzing the performance of the target application program based on the second hash array.
2. The method of claim 1, wherein the page information includes a page identifier and an acquisition timestamp, the triggered control information includes a trigger timestamp, the analyzing the page information and the triggered control information, establishing an association between the page information and the triggered control information, and storing the association in a key value manner in a first hash array includes:
Generating a key value pair for a plurality of page identifiers which are continuously the same in the page information to obtain a plurality of key value pairs, wherein key in each key value pair is the page identifier, and value is the continuous number of the page identifiers;
adding the triggered control information into the value of the corresponding key value pair based on the trigger time stamp and the acquisition time stamp to obtain an updated key value pair;
and storing the updated key value pairs into a first hash array.
3. The method of claim 1, wherein after the first acquisition task and the second acquisition task are initiated, the method further comprises:
when the running of the target application program is monitored to be abnormal, positioning an abnormal page and/or an abnormal control of the target application program based on the collected page information and the triggered control information;
and sending the abnormal page and/or the abnormal control to a control end to process the abnormality.
4. The user behavior data analysis method of claim 1, wherein after the detecting that the target application is opened, the method further comprises:
when the key control of the target application program is triggered, acquiring index values corresponding to each index item in a plurality of index items of the key control, and optimizing the function of the key control based on the index values.
5. The method of claim 1, wherein the system information includes a time when the target application is running in the background, device information, operating system information, version information of the target application, and page identification of a page presented by the target application when suspended.
6. The method of claim 2, wherein the updated key-value pair includes a key and two values, the key being page identifiers, the values being a consecutive number of page identifiers and a triggered control identifier in the page identifiers, respectively.
7. A user behavior data analysis apparatus, the apparatus comprising:
the monitoring module is used for analyzing the request to determine a target application program when receiving a user behavior data acquisition request;
the acquisition module is used for calling an API of the target application program according to a pre-written method when the target application program is monitored to be started, starting a first acquisition task and a second acquisition task, wherein the first acquisition task acquires page information displayed by the target application program at intervals of preset time, and the second acquisition task acquires triggered control information when any control of the target application program is triggered by a user;
The association module is used for analyzing the page information and the triggered control information, establishing an association relationship between a page identifier corresponding to the triggered control in the page information and the triggered control information, carrying out format standardization processing on the association relationship, and storing the association relationship into a first hash array in a key value mode;
the analysis module is used for analyzing the user behavior data based on the first hash array to obtain a user behavior analysis result;
and if the condition that the target application program is suspended is monitored, starting a third acquisition task, acquiring system information of the suspended target application program by the third acquisition task, storing the system information into a second hash array, and analyzing the performance of the target application program based on the second hash array.
8. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein, the liquid crystal display device comprises a liquid crystal display device,
the memory stores a user behavior data analysis program executable by the at least one processor to enable the at least one processor to perform the user behavior data analysis method of any one of claims 1 to 6.
9. A computer readable storage medium having stored thereon a user behavior data analysis program executable by one or more processors to implement the user behavior data analysis method of any one of claims 1 to 6.
CN202110470827.9A 2021-04-28 2021-04-28 User behavior data analysis method and device, electronic equipment and medium Active CN113094248B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110470827.9A CN113094248B (en) 2021-04-28 2021-04-28 User behavior data analysis method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110470827.9A CN113094248B (en) 2021-04-28 2021-04-28 User behavior data analysis method and device, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN113094248A CN113094248A (en) 2021-07-09
CN113094248B true CN113094248B (en) 2023-04-25

Family

ID=76681001

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110470827.9A Active CN113094248B (en) 2021-04-28 2021-04-28 User behavior data analysis method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN113094248B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113395360A (en) * 2021-08-17 2021-09-14 苏州浪潮智能科技有限公司 Windows system user operation simulation method, system, terminal and storage medium
CN114116096A (en) * 2021-11-12 2022-03-01 深圳前海微众银行股份有限公司 Information processing method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016062203A1 (en) * 2014-10-24 2016-04-28 阿里巴巴集团控股有限公司 Discrete data centralized processing method, client, server, and system
CN110489312A (en) * 2019-06-27 2019-11-22 苏宁云计算有限公司 Data correlation method and device for control trigger data acquisition
CN112613067A (en) * 2020-12-16 2021-04-06 平安普惠企业管理有限公司 User behavior data acquisition method and device, computer equipment and storage medium

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391538B (en) * 2017-04-26 2020-08-14 阿里巴巴集团控股有限公司 Click data acquisition, processing and display method, device, equipment and storage medium
CN107169796A (en) * 2017-05-12 2017-09-15 深圳市浩天投资有限公司 A kind of analysis method of user behavior data, system and computer-readable recording medium
CN110688598B (en) * 2019-08-22 2023-01-06 苏宁云计算有限公司 Service parameter acquisition method and device, computer equipment and storage medium
CN111309550A (en) * 2020-02-05 2020-06-19 江苏满运软件科技有限公司 Data acquisition method, system, equipment and storage medium of application program
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016062203A1 (en) * 2014-10-24 2016-04-28 阿里巴巴集团控股有限公司 Discrete data centralized processing method, client, server, and system
CN110489312A (en) * 2019-06-27 2019-11-22 苏宁云计算有限公司 Data correlation method and device for control trigger data acquisition
CN112613067A (en) * 2020-12-16 2021-04-06 平安普惠企业管理有限公司 User behavior data acquisition method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113094248A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN108804299B (en) Application program exception handling method and device
CN108874289B (en) Application history record viewing method and device and electronic equipment
CN113094248B (en) User behavior data analysis method and device, electronic equipment and medium
CN112491602B (en) Behavior data monitoring method and device, computer equipment and medium
CN105553769A (en) Data collecting-analyzing system and method
CN111552633A (en) Interface abnormal call testing method and device, computer equipment and storage medium
CN112394908A (en) Method and device for automatically generating embedded point page, computer equipment and storage medium
CN112860737B (en) Data query method and device, electronic equipment and readable storage medium
WO2017107679A1 (en) Historical information display method and apparatus
CN110807050B (en) Performance analysis method, device, computer equipment and storage medium
CN111680104B (en) Data synchronization method, device, computer equipment and readable storage medium
CN112631924A (en) Automatic testing method and device, computer equipment and storage medium
CN111258819A (en) Data acquisition method, device and system for MySQL database backup file
CN114201615A (en) Scientific research data change review method based on data snapshot and server
WO2019071899A1 (en) Electronic device, vehicle data import method and storage medium
CN111221711A (en) User behavior data processing method, server and storage medium
CN112612866B (en) Knowledge base text synchronization method and device, electronic equipment and storage medium
CN114238024A (en) Timing diagram generation method and system
CN114428706A (en) Interface monitoring method and device, storage medium and electronic equipment
CN112100226A (en) Data query method and computer-readable storage medium
CN112416699A (en) Index data collection method and system
CN115242638B (en) Feasible touch screening method and device, electronic equipment and storage medium
KR102322919B1 (en) Intelligent crawling system and intelligent crawling method
US11272022B2 (en) Server for generating integrated usage log data and operating method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant