CN113419936A - Dynamic point burying method, device, equipment and storage medium - Google Patents

Dynamic point burying method, device, equipment and storage medium Download PDF

Info

Publication number
CN113419936A
CN113419936A CN202110691846.4A CN202110691846A CN113419936A CN 113419936 A CN113419936 A CN 113419936A CN 202110691846 A CN202110691846 A CN 202110691846A CN 113419936 A CN113419936 A CN 113419936A
Authority
CN
China
Prior art keywords
configuration information
buried
new event
point configuration
points
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110691846.4A
Other languages
Chinese (zh)
Other versions
CN113419936B (en
Inventor
刘思佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kangjian Information Technology Shenzhen Co Ltd
Original Assignee
Kangjian Information Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kangjian Information Technology Shenzhen Co Ltd filed Critical Kangjian Information Technology Shenzhen Co Ltd
Priority to CN202110691846.4A priority Critical patent/CN113419936B/en
Publication of CN113419936A publication Critical patent/CN113419936A/en
Application granted granted Critical
Publication of CN113419936B publication Critical patent/CN113419936B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3495Performance evaluation by tracing or monitoring for systems
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention relates to the field of big data, and discloses a dynamic point burying method, a device, equipment and a storage medium, which are used for dynamically burying points in real time and improving the network utilization rate when uploading data to bury points. The dynamic point burying method comprises the following steps: reading local buried point configuration information and service buried point configuration information; acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information; acquiring a plurality of new event instructions, determining a new event function corresponding to the target new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered, and performing data buried point on the new event function corresponding to the target new event instruction to generate a plurality of target data buried points; and uploading the plurality of target data buried points to a server based on the number of the target data buried points and the state of the client. In addition, the invention also relates to a block chain technology, and the service buried point configuration information can be stored in the block chain.

Description

Dynamic point burying method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of data acquisition, in particular to a dynamic point burying method, a dynamic point burying device, dynamic point burying equipment and a storage medium.
Background
User behavior statistics, commonly called buried points, is an essential link in a project. In the mobile internet era, statistical data of user behaviors occupy a very important position, and business achievements of many enterprises are secondary conversion after recommendation based on user operation behaviors. On the other hand, user behavior statistics also becomes an aid for developers to analyze online problems.
The traditional point burying method is that a point burying interface is called at all positions needing point burying in a project, and the point burying data is uploaded, and the traditional point burying method cannot be dynamically updated and is low in network utilization rate during uploading.
Disclosure of Invention
The invention provides a dynamic point burying method, a dynamic point burying device and a storage medium, which are used for dynamically burying points in real time and improving the network utilization rate when the points are buried by uploading data.
The invention provides a dynamic point burying method in a first aspect, which comprises the following steps: reading local buried point configuration information, and reading service buried point configuration information from a server; acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information; acquiring a plurality of new event instructions, determining a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered, and performing data embedding on the new event function corresponding to the target new event instruction to generate a plurality of target data buried points; the method comprises the steps of reading the number of target data buried points and the state of a client in real time, and uploading a plurality of target data buried points to a server based on the number of the target data buried points and the state of the client.
Optionally, in a first implementation manner of the first aspect of the present invention, the obtaining target buried point configuration information based on the local buried point configuration information and the service buried point configuration information includes: judging whether the service buried point configuration information is a null value; if the service buried point configuration information is a null value, determining the local buried point configuration information as target buried point configuration information; and if the service buried point configuration information is not a null value, generating a comparison result based on the service buried point configuration information and the local buried point configuration information, and determining target buried point configuration information based on the comparison result.
Optionally, in a second implementation manner of the first aspect of the present invention, if the service buried point configuration information is not a null value, generating a comparison result based on the service buried point configuration information and the local buried point configuration information, and determining target buried point configuration information based on the comparison result includes: if the service buried point configuration information is not a null value, comparing the service buried point configuration information with the local buried point configuration information to generate a comparison result; judging whether the comparison results are the same; if the comparison result is the same result, determining the local buried point configuration information as target buried point configuration information; and if the comparison result is different, updating the local buried point configuration information based on the service buried point configuration information to generate target buried point configuration information.
Optionally, in a third implementation manner of the first aspect of the present invention, the obtaining multiple new event instructions, when each new event instruction is responded based on the target buried point configuration information and a corresponding interface duty cycle is entered, determining a new event function corresponding to the target new event instruction, and performing data buried point on the new event function corresponding to the target new event instruction, and generating multiple target data buried points includes: acquiring a plurality of new event instructions, and creating corresponding new event functions according to each new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered; and performing data embedding on the basis of the new event function corresponding to each new event instruction, and generating a target data embedding point corresponding to each new event instruction to obtain a plurality of target data embedding points.
Optionally, in a fourth implementation manner of the first aspect of the present invention, the performing data embedding on the basis of the new event function corresponding to each new event instruction to generate a target data embedding point corresponding to each new event instruction, and obtaining a plurality of target data embedding points includes: determining a corresponding preset event function based on each new event instruction and a preset hook function; and replacing the corresponding preset event function by adopting the new event function corresponding to each new event instruction to generate a plurality of target data buried points.
Optionally, in a fifth implementation manner of the first aspect of the present invention, the reading the number of target data burial points and the state of the client in real time, and uploading the plurality of target data burial points to the server based on the number of target data burial points and the state of the client includes: reading the number of target data buried points in real time, and judging whether the number of the target data buried points reaches a buried point number threshold value or not; if the number of the target data buried points reaches a buried point number threshold value, uploading the target data buried points to a server; and if the number of the target data buried points does not reach the buried point number threshold value, reading the state of the client, and uploading the target data buried points to a server based on the state of the client.
Optionally, in a sixth implementation manner of the first aspect of the present invention, if the number of target data nodes does not reach the node number threshold, reading a state of a client, and uploading the plurality of target data nodes to a server based on the state of the client includes: if the number of the target data buried points does not reach the buried point number threshold value, reading the state of a client, and judging whether the state of the client is an operating state or not; and if the state of the client is the running stop state, the target data buried points are subjected to persistent storage to generate a plurality of persistent stored target data buried points, and when the state of the client is the running state, the persistent stored target data buried points are uploaded to a server and the persistent stored target data buried points are deleted.
The second aspect of the present invention provides a dynamic point burying device, including: the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for reading local buried point configuration information and reading service buried point configuration information from a server; a second obtaining module, configured to obtain target buried point configuration information based on the local buried point configuration information and the service buried point configuration information; the data embedding module is used for acquiring a plurality of new event instructions, determining a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target embedding point configuration information and a corresponding interface working period is entered, and embedding data into the new event function corresponding to the target new event instruction to generate a plurality of target data embedding points; and the uploading module is used for reading the number of the target data buried points and the state of the client in real time and uploading the target data buried points to a server based on the number of the target data buried points and the state of the client.
Optionally, in a first implementation manner of the second aspect of the present invention, the second obtaining module includes: the first judgment unit is used for judging whether the service buried point configuration information is a null value; the first determining unit is used for determining the local buried point configuration information as target buried point configuration information if the service buried point configuration information is a null value; and a second determining unit, configured to generate a comparison result based on the service buried point configuration information and the local buried point configuration information, and determine target buried point configuration information based on the comparison result, if the service buried point configuration information is not a null value.
Optionally, in a second implementation manner of the second aspect of the present invention, the second determining unit may be further specifically configured to: if the service buried point configuration information is not a null value, comparing the service buried point configuration information with the local buried point configuration information to generate a comparison result; judging whether the comparison results are the same; if the comparison result is the same result, determining the local buried point configuration information as target buried point configuration information; and if the comparison result is different, updating the local buried point configuration information based on the service buried point configuration information to generate target buried point configuration information.
Optionally, in a third implementation manner of the second aspect of the present invention, the data burying module includes: the creating unit is used for acquiring a plurality of new event instructions, and creating corresponding new event functions according to each new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered; and the point burying unit is used for performing data point burying based on the new event function corresponding to each new event instruction, generating a target data point corresponding to each new event instruction and obtaining a plurality of target data points.
Optionally, in a fourth implementation manner of the second aspect of the present invention, the buried point unit may be further specifically configured to: determining a corresponding preset event function based on each new event instruction and a preset hook function; and replacing the corresponding preset event function by adopting the new event function corresponding to each new event instruction to generate a plurality of target data buried points.
Optionally, in a fifth implementation manner of the second aspect of the present invention, the uploading module includes: the second judgment unit is used for reading the number of target data buried points in real time and judging whether the number of the target data buried points reaches a buried point number threshold value or not; the first uploading unit is used for uploading the target data buried points to a server if the number of the target data buried points reaches a buried point number threshold; and the second uploading unit is used for reading the state of the client if the number of the target data embedded points does not reach the embedded point number threshold value, and uploading the target data embedded points to the server based on the state of the client.
Optionally, in a sixth implementation manner of the second aspect of the present invention, the second uploading unit may further be specifically configured to: if the number of the target data buried points does not reach the buried point number threshold value, reading the state of a client, and judging whether the state of the client is an operating state or not; and if the state of the client is the running stop state, the target data buried points are subjected to persistent storage to generate a plurality of persistent stored target data buried points, and when the state of the client is the running state, the persistent stored target data buried points are uploaded to a server and the persistent stored target data buried points are deleted.
The third aspect of the present invention provides a dynamic point burying device, including: a memory and at least one processor, the memory having instructions stored therein; the at least one processor invokes the instructions in the memory to cause the dynamic point burying device to perform the dynamic point burying method described above.
A fourth aspect of the present invention provides a computer-readable storage medium having stored therein instructions, which, when run on a computer, cause the computer to perform the above-described dynamic earth point method.
In the technical scheme provided by the invention, the local buried point configuration information is read, and the service buried point configuration information is read from a server; acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information; acquiring a plurality of new event instructions, determining a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered, and performing data embedding on the new event function corresponding to the target new event instruction to generate a plurality of target data buried points; the method comprises the steps of reading the number of target data buried points and the state of a client in real time, and uploading a plurality of target data buried points to a server based on the number of the target data buried points and the state of the client. In the embodiment of the invention, target buried point configuration information is determined according to local buried point configuration information and service buried point configuration information, when an interface working period is entered based on the target buried point configuration information, a new event function is determined and data buried points are performed, and finally the target data buried points are uploaded according to the number of the target data buried points and the state of a client; the data embedding is carried out by using the target embedding point configuration information and the new event function, real-time and dynamic data embedding can be carried out on the client, and the network utilization rate during uploading can be improved by uploading the target data embedding points in combination with the number of the target data embedding points and the working state of the client.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a dynamic point burying method according to an embodiment of the present invention;
FIG. 2 is a schematic diagram of another embodiment of a dynamic point burying method according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of an embodiment of a dynamic fixed point device according to an embodiment of the present invention;
FIG. 4 is a schematic diagram of another embodiment of a dynamic fixed point device according to an embodiment of the present invention;
fig. 5 is a schematic diagram of an embodiment of a dynamic spot burying device in an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides a dynamic point burying method, a dynamic point burying device and a storage medium, which are used for dynamically burying points in real time and improving the network utilization rate when the points are buried by uploading data.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," or "having," and any variations thereof, are intended to cover non-exclusive inclusions, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For ease of understanding, a detailed flow of an embodiment of the present invention is described below, and referring to fig. 1, an embodiment of a dynamic point burying method in an embodiment of the present invention includes:
101. reading local buried point configuration information, and reading service buried point configuration information from a server;
the server reads the buried point configuration information and the service buried point configuration information, wherein the local buried point configuration information is the configuration information read from the client, and the service buried point configuration information is the buried point configuration information read from the server. It should be emphasized that, in order to further ensure the privacy and security of the service burial point configuration information, the service burial point configuration information can also be stored in a node of a block chain.
The method comprises the steps that embedded point configuration information exists at a server side, after a client side is started, the client side firstly reads the local embedded point configuration information, then the client side sends a request for acquiring the embedded point configuration information to the server, at the moment, the server side sends the embedded point configuration information to the client side, and the client side obtains the service embedded point configuration information. In this embodiment, the client may obtain the buried point configuration information from the local, or may read the service buried point configuration information from the server. And when the buried point configuration information is acquired from the local, the client searches the local buried point configuration information in the local cache. The service buried point configuration information and the local buried point configuration information may include buried point event information and/or buried point reporting related information, and may also be other information set according to user needs. The buried point event information may include information related to a trigger event of the buried point, such as a buried point event identifier, a buried point event type, and the like. The relevant information reported by the buried point may include user behavior relevant information acquired by the buried point, for example, platform information reported by the buried point, which may be used to indicate what platform the user behavior relevant information is reported to, an address of the platform, and the like.
It is to be understood that the execution subject of the present invention may be a dynamic fixed point device, and may also be a terminal, a server, or a client, which is not limited herein. The embodiment of the present invention is described by taking a client as an execution subject.
102. Acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
and the client acquires the target buried point configuration information based on the local buried point configuration information and the service buried point configuration information.
The local buried point configuration information is a piece of default data read from a local cache, the service buried point configuration information is information pulled from a server, and the client acquires the user behavior in the subsequent process based on the target buried point configuration information acquired based on the local buried point configuration information and the service buried point configuration information. Since the service burial point configuration information pulled by the client may be null and does not include specific data, the client acquires the target burial point configuration information based on the local burial point configuration information and the service burial point configuration information. In this embodiment, when the service embedded point configuration information pulled by the client is a null value, the client can defer using the local embedded point configuration information as the target embedded point configuration information, and if the service embedded point configuration information pulled by the client includes specific data and is not a null value, the local embedded point configuration information is updated by using the service embedded point configuration information to generate the target embedded point configuration information, so that the target embedded point configuration information can be dynamically updated, and the flexibility of embedded points is improved.
103. Acquiring a plurality of new event instructions, determining a new event function corresponding to the target new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered, and performing data buried point on the new event function corresponding to the target new event instruction to generate a plurality of target data buried points;
the client side obtains a plurality of new event instructions, when each new event instruction is responded based on the target embedded point configuration information and a corresponding interface working period is entered, the client side respectively captures corresponding new event functions based on the target embedded point configuration information, and data embedding is carried out on the new event functions corresponding to the new event instructions, so that a plurality of target data embedding points are generated.
After determining the target point burying configuration information, data point burying can be performed, a new event instruction is a new event instruction sent by a user clicking a mouse or a screen, after obtaining the new event instruction, the client enters a relevant interface working period based on the target point burying configuration information, for example, the new event instruction is 'press a 2s setting button', the client responds to the new event instruction based on the target point burying configuration information so as to enter a corresponding interface working period, at the moment, the client captures a new event function of 'press the 2s setting button', performs data point burying on the new event function of 'press the 2s setting button', performs data point burying according to the mode for a plurality of new event instructions, and accordingly generates a plurality of target data point burying.
104. And reading the number of the target data buried points and the state of the client in real time, and uploading the plurality of target data buried points to the server based on the number of the target data buried points and the state of the client.
The client reads the number of the target data buried points and the state of the client in real time, and uploads the target data buried points to the server based on the number of the target data buried points and the state of the client, wherein the state of the client is an operating state or a stop operating state.
During the operation of the client, a large amount of target data nodes are generated, and if a large amount of target data nodes are uploaded in real time, the utilization rate of the network is lowered. Therefore, in this embodiment, a plurality of target data buried points are stored locally, the number of the target data buried points is counted, when the number reaches a certain value, the target data buried points are uploaded uniformly, and if the number does not reach the certain value, the target data buried points are uploaded according to the working state of the client.
In the embodiment of the invention, target buried point configuration information is determined according to local buried point configuration information and service buried point configuration information, when an interface working period is entered based on the target buried point configuration information, a new event function is determined and data buried points are performed, and finally the target data buried points are uploaded according to the number of the target data buried points and the state of a client; the data embedding is carried out by using the target embedding point configuration information and the new event function, real-time and dynamic data embedding can be carried out on the client, and the network utilization rate during uploading can be improved by uploading the target data embedding points in combination with the number of the target data embedding points and the working state of the client.
Referring to fig. 2, another embodiment of the dynamic point burying method in the embodiment of the present invention includes:
201. reading local buried point configuration information, and reading service buried point configuration information from a server;
the server reads the buried point configuration information and the service buried point configuration information, wherein the local buried point configuration information is the configuration information read from the client, and the service buried point configuration information is the buried point configuration information read from the server. It should be emphasized that, in order to further ensure the privacy and security of the service burial point configuration information, the service burial point configuration information can also be stored in a node of a block chain.
The method comprises the steps that embedded point configuration information exists at a server side, after a client side is started, the client side firstly reads the local embedded point configuration information, then the client side sends a request for acquiring the embedded point configuration information to the server, at the moment, the server side sends the embedded point configuration information to the client side, and the client side obtains the service embedded point configuration information. In this embodiment, the client may obtain the buried point configuration information from the local, or may read the service buried point configuration information from the server. And when the buried point configuration information is acquired from the local, the client searches the local buried point configuration information in the local cache. The service buried point configuration information and the local buried point configuration information may include buried point event information and/or buried point reporting related information, and may also be other information set according to user needs. The buried point event information may include information related to a trigger event of the buried point, such as a buried point event identifier, a buried point event type, and the like. The relevant information reported by the buried point may include user behavior relevant information acquired by the buried point, for example, platform information reported by the buried point, which may be used to indicate what platform the user behavior relevant information is reported to, an address of the platform, and the like.
It is to be understood that the execution subject of the present invention may be a dynamic fixed point device, and may also be a terminal, a server, or a client, which is not limited herein. The embodiment of the present invention is described by taking a client as an execution subject.
202. Acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
and the client acquires the target buried point configuration information based on the local buried point configuration information and the service buried point configuration information.
The local buried point configuration information is a piece of default data read from a local cache, the service buried point configuration information is information pulled from a server, and the client acquires the user behavior in the subsequent process based on the target buried point configuration information acquired based on the local buried point configuration information and the service buried point configuration information. Since the service burial point configuration information pulled by the client may be null and does not include specific data, the client acquires the target burial point configuration information based on the local burial point configuration information and the service burial point configuration information. In this embodiment, when the service embedded point configuration information pulled by the client is a null value, the client can defer using the local embedded point configuration information as the target embedded point configuration information, and if the service embedded point configuration information pulled by the client includes specific data and is not a null value, the local embedded point configuration information is updated by using the service embedded point configuration information to generate the target embedded point configuration information, so that the target embedded point configuration information can be dynamically updated, and the flexibility of embedded points is improved.
Specifically, after the client obtains the service buried point configuration information and the local buried point configuration information, firstly, whether the service buried point configuration information is a null value is judged, namely whether the client draws the service buried point configuration information is judged, if the service buried point configuration information is the null value, the client does not draw the service buried point configuration information from the server, and at the moment, the local buried point configuration information is determined as target buried point configuration information; if the service buried point configuration information is not a null value, the client side is indicated to pull the service buried point configuration information, and the client side determines the target buried point configuration information based on the service buried point configuration information.
For example, assuming that the local buried point configuration information is "double-click tag 1", that is, when the tag 1 is double-clicked, the client acquires a corresponding user operation behavior, in an embodiment, the service buried point configuration information pulled by the client is a null value, and then the "double-click tag 1" is determined as the target buried point configuration information; in another embodiment, the service buried point configuration information pulled by the client is "click tag 1", that is, when the tag 1 is clicked, the client acquires a corresponding user operation behavior, and at this time, the server determines the target buried point configuration information based on the "click tag 1".
If the service buried point configuration information is not a null value, it indicates that the client has pulled the service buried point configuration information, and at this time, the client determines the target buried point configuration information based on the service buried point configuration information, including:
if the service buried point configuration information is not a null value, the client side is indicated to pull the service buried point configuration information from the server, and at the moment, the client side compares the service buried point configuration information with the local buried point configuration information to generate a comparison result. Then the server judges whether the comparison result is the same result, if the comparison result is the same result, the local buried point configuration information is kept as the target buried point configuration information; and if the comparison result is a different result, updating the local buried point configuration information by referring to the service buried point configuration information, thereby generating target buried point configuration information.
For example, assuming that the local buried point configuration information is "double click tag 1", in an embodiment, the service buried point configuration information is "double click tag 1", the client compares the local buried point configuration information "double click tag 1" with the service buried point configuration information "double click tag 1", and generates a comparison result with the same result, and at this time, the client still maintains the local buried point configuration information "double click tag 1" as the target buried point configuration information; in another embodiment, the service buried point configuration information is "click tag 1", the client compares the local buried point configuration information "double click tag 1" with the service buried point configuration information "click tag 1" to generate a comparison result of different results, and at this time, the client calls the service buried point configuration information "click tag 1" to update the local buried point configuration information "double click tag 1", thereby generating the target buried point configuration information "click tag 1".
203. Acquiring a plurality of new event instructions, and creating corresponding new event functions according to each new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered;
the client side obtains a plurality of new event instructions, and when the client side responds to each new event instruction based on the target buried point configuration information and enters a corresponding interface working period, the client side creates a corresponding new event function according to each new event instruction.
Assuming that a new event instruction obtained by the client is "press 2s setup button", and enters a "setup" interface duty cycle based on the new event instruction of "press 2s setup button", the client performs creation of a new event function based on the new event instruction of "press 2s setup button", and in this embodiment, the new event function corresponding to the new event instruction of "press 2s setup button" is SEL swizzledsele @selector (swizzlewdedapper:).
204. Data embedding is carried out on the basis of a new event function corresponding to each new event instruction, and a plurality of target data embedding points are generated;
after the client obtains the new event function corresponding to each new event instruction, data embedding is carried out on the basis of the corresponding new event function, and a target data embedding point corresponding to each new event instruction is generated, so that a plurality of target data embedding points are obtained.
For example, the new event function corresponding to the new event command "press 2s setup button" is SEL swizzledselect @ selector (swizzledviwdidappper:), and the client performs data embedding based on SEL swizzledselect @ selector (swizzledviwdidappper:), and generates a target data embedding corresponding to "press 2s setup button".
Specifically, the client determines a corresponding preset event function based on each new event instruction and a preset hook function; and the client replaces the corresponding preset event function by adopting the new event function corresponding to each new event instruction to generate a plurality of target data buried points.
In this embodiment, a client calls a preset hook function hook to capture a preset event function, where the preset event function is a function in a preset function database, different new event instructions correspond to different preset event functions, and is described by one of the new event instructions, the client searches in the preset function database through the preset hook function based on a target new event instruction, determines the preset event function corresponding to the target new event instruction, and captures the preset event function corresponding to the target new event instruction; and then the client calls a new event function corresponding to the target new event instruction to replace the preset event function corresponding to the target new event instruction, and a target data buried point corresponding to the target new event instruction is generated.
The client first fetches the corresponding preset event function based on a new event instruction of "set button 2 s" and a preset hook function, for example, the preset event function corresponding to the new event instruction of "set button 2 s" is SEL originalSelector (viewdapper:), the client uses a runtime method to call a new event function SEL swizzledSelector (swizzledviddapper:) corresponding to the new event instruction of "set button 2 s" to replace the preset event function SEL originalselection selector (viewdapper:), and generates a target data embedding point corresponding to "set button 2 s".
205. And reading the number of the target data buried points and the state of the client in real time, and uploading the plurality of target data buried points to the server based on the number of the target data buried points and the state of the client.
The client reads the number of the target data buried points and the state of the client in real time, and uploads the target data buried points to the server based on the number of the target data buried points and the state of the client, wherein the state of the client is an operating state or a stop operating state.
During the operation of the client, a large amount of target data nodes are generated, and if a large amount of target data nodes are uploaded in real time, the utilization rate of the network is lowered. Therefore, in this embodiment, a plurality of target data buried points are stored locally, the number of the target data buried points is counted, when the number reaches a certain value, the target data buried points are uploaded uniformly, and if the number does not reach the certain value, the target data buried points are uploaded according to the working state of the client.
Specifically, the client reads the number of the target data buried points and the state of the client in real time, and then judges whether the number of the target data buried points reaches a buried point number threshold value. If the number of the target data buried points reaches the buried point number threshold value, the client uploads the target data buried points to the server; if the number of the target data buried points does not reach the buried point number threshold value, the client reads the state of the client, then the uploading work of the target data buried points is carried out based on the state of the client, and the utilization rate of the network can be improved when the data buried points are uploaded by taking the buried point number threshold value as one of the standards for measuring whether the target data buried points are uploaded or not. In this embodiment, the buried point number threshold is 50, and in other embodiments, the buried point number threshold may be other.
If the number of the target data buried points does not reach the buried point number threshold value, the client reads the state of the client, and then the uploading work of the target data buried points based on the state of the client comprises the following steps:
if the number of the target data embedded points does not reach the embedded point number threshold value, the client reads the state of the client and judges whether the state of the client is an operating state or not; and if the state of the client is the running stop state, the client performs persistent storage on the target data buried points to generate a plurality of persistent stored target data buried points, and uploads the persistent stored target data buried points to the server and deletes the persistent stored target data buried points when the state of the client is the running state.
And if the number of the target data buried points does not reach the buried point number threshold value, the client reads the state of the client in real time and then judges whether the state of the client is the running state or not. If the state of the client is the running state, continuously reading the number of the target data buried points, and uploading the target data buried points until the number of the target data buried points reaches a buried point number threshold; if the state of the client is the operation stop state, the client firstly carries out persistent storage on the target data buried points to obtain a plurality of target data buried points after persistent storage, then uploads the target data buried points after persistent storage to the server when the state of the client is changed into the operation state, and deletes the target data buried points after persistent storage.
For example, the threshold of the number of buried points is 50, in an embodiment, the client is in an operating state, and then the client continues to count the number of target data buried points, assuming that the number of target data buried points counted by the client is 40, the client continues to monitor the number of target data buried points, and when the number reaches 50, the 50 target data buried points are uploaded to the server. In another embodiment, the client is in a stop operation state, and generates 40 target data buried points before the client stops operating, and the client performs persistent storage on the 40 target data buried points at this time to generate 40 persistent-stored target data buried points. When the client replies to the running state and generates 10 target data buried points, the client uploads the 10 target data buried points and 40 persistent stored target data buried points to the server in a unified manner, and after the uploading to the server, the 40 persistent stored target data buried points in the client are deleted.
In the embodiment of the invention, target buried point configuration information is determined according to local buried point configuration information and service buried point configuration information, when an interface working period is entered based on the target buried point configuration information, a new event function is determined and data buried points are performed, and finally the target data buried points are uploaded according to the number of the target data buried points and the state of a client; the data embedding is carried out by using the target embedding point configuration information and the new event function, real-time and dynamic data embedding can be carried out on the client, and the network utilization rate during uploading can be improved by uploading the target data embedding points in combination with the number of the target data embedding points and the working state of the client.
In the above description of the dynamic point burying method in the embodiment of the present invention, the dynamic point burying device in the embodiment of the present invention is described below with reference to fig. 3, and an embodiment of the dynamic point burying device in the embodiment of the present invention includes:
a first obtaining module 301, configured to read local embedded point configuration information, and read service embedded point configuration information from a server;
a second obtaining module 302, configured to obtain target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
the data embedding module 303 is configured to obtain a plurality of new event instructions, determine a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target embedding point configuration information and a corresponding interface working period is entered, and embed data into the new event function corresponding to the target new event instruction to generate a plurality of target data embedding points;
the uploading module 304 is configured to read the number of target data burial points and the state of the client in real time, and upload the plurality of target data burial points to the server based on the number of target data burial points and the state of the client.
In the embodiment of the invention, target buried point configuration information is determined according to local buried point configuration information and service buried point configuration information, when an interface working period is entered based on the target buried point configuration information, a new event function is determined and data buried points are performed, and finally the target data buried points are uploaded according to the number of the target data buried points and the state of a client; the data embedding is carried out by using the target embedding point configuration information and the new event function, real-time and dynamic data embedding can be carried out on the client, and the network utilization rate during uploading can be improved by uploading the target data embedding points in combination with the number of the target data embedding points and the working state of the client.
Referring to fig. 4, another embodiment of the dynamic buried node device in the embodiment of the present invention includes:
a first obtaining module 301, configured to read local embedded point configuration information, and read service embedded point configuration information from a server;
a second obtaining module 302, configured to obtain target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
the data embedding module 303 is configured to obtain a plurality of new event instructions, determine a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target embedding point configuration information and a corresponding interface working period is entered, and embed data into the new event function corresponding to the target new event instruction to generate a plurality of target data embedding points;
the uploading module 304 is configured to read the number of target data burial points and the state of the client in real time, and upload the plurality of target data burial points to the server based on the number of target data burial points and the state of the client.
Optionally, the second obtaining module 302 includes:
a first judging unit 3021, configured to judge whether the service site configuration information is null;
a first determining unit 3022, configured to determine the local buried point configuration information as target buried point configuration information if the service buried point configuration information is a null value;
a second determining unit 3023, if the service site deployment information is not null, configured to generate a comparison result based on the service site deployment information and the local site deployment information, and determine target site deployment information based on the comparison result.
Optionally, the second determining unit 3023 may be further specifically configured to:
if the service buried point configuration information is not a null value, comparing the service buried point configuration information with the local buried point configuration information to generate a comparison result;
judging whether the comparison results are the same;
if the comparison result is the same result, determining the local buried point configuration information as target buried point configuration information;
and if the comparison result is different, updating the local buried point configuration information based on the service buried point configuration information to generate target buried point configuration information.
Optionally, the data burying module 303 includes:
a creating unit 3031, configured to obtain a plurality of new event instructions, and when each new event instruction is responded based on the target buried point configuration information and a corresponding interface duty cycle is entered, create a corresponding new event function according to each new event instruction;
and a buried point unit 3032, configured to perform data buried point based on the new event function corresponding to each new event instruction, generate a target data buried point corresponding to each new event instruction, and obtain multiple target data buried points.
Optionally, the buried point unit 3032 may be further specifically configured to:
determining a corresponding preset event function based on each new event instruction and a preset hook function;
and replacing the corresponding preset event function by adopting the new event function corresponding to each new event instruction to generate a plurality of target data buried points.
Optionally, the uploading module 304 includes:
a second determining unit 3041, configured to read the number of target data buried points in real time, and determine whether the number of the target data buried points reaches a buried point number threshold;
a first uploading unit 3042, configured to upload the target data embedding points to a server if the number of the target data embedding points reaches an embedding point number threshold;
the second uploading unit 3043 is configured to, if the number of the target data embedded points does not reach the embedded point number threshold, read a state of the client, and upload the plurality of target data embedded points to the server based on the state of the client.
Optionally, the second uploading unit 3043 may be further specifically configured to:
if the number of the target data buried points does not reach the buried point number threshold value, reading the state of a client, and judging whether the state of the client is an operating state or not;
and if the state of the client is the running stop state, the target data buried points are subjected to persistent storage to generate a plurality of persistent stored target data buried points, and when the state of the client is the running state, the persistent stored target data buried points are uploaded to a server and the persistent stored target data buried points are deleted.
In the embodiment of the invention, target buried point configuration information is determined according to local buried point configuration information and service buried point configuration information, when an interface working period is entered based on the target buried point configuration information, a new event function is determined and data buried points are performed, and finally the target data buried points are uploaded according to the number of the target data buried points and the state of a client; the data embedding is carried out by using the target embedding point configuration information and the new event function, real-time and dynamic data embedding can be carried out on the client, and the network utilization rate during uploading can be improved by uploading the target data embedding points in combination with the number of the target data embedding points and the working state of the client.
Fig. 3 and fig. 4 describe the dynamic point burying apparatus in the embodiment of the present invention in detail from the perspective of the modular functional entity, and the dynamic point burying device in the embodiment of the present invention is described in detail from the perspective of hardware processing.
Fig. 5 is a schematic structural diagram of a dynamic point burying device according to an embodiment of the present invention, where the dynamic point burying device 500 may have a relatively large difference due to different configurations or performances, and may include one or more processors (CPUs) 510 (e.g., one or more processors) and a memory 520, one or more storage media 530 (e.g., one or more mass storage devices) storing applications 533 or data 532. Memory 520 and storage media 530 may be, among other things, transient or persistent storage. The program stored on the storage medium 530 may include one or more modules (not shown), each of which may include a sequence of instructions operating on the dynamic pointing device 500. Further, processor 510 may be configured to communicate with storage medium 530 to execute a series of instruction operations in storage medium 530 on dynamic pointing device 500.
The dynamic bump apparatus 500 may also include one or more power supplies 540, one or more wired or wireless network interfaces 550, one or more input-output interfaces 560, and/or one or more operating systems 531, such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc. Those skilled in the art will appreciate that the dynamic pointing device configuration shown in fig. 5 does not constitute a limitation of the dynamic pointing device and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The invention also provides a dynamic point burying device, which comprises a memory and a processor, wherein computer readable instructions are stored in the memory, and when the computer readable instructions are executed by the processor, the processor is enabled to execute the steps of the dynamic point burying method in the embodiments.
The present invention also provides a computer-readable storage medium, which may be a non-volatile computer-readable storage medium, and which may also be a volatile computer-readable storage medium, having stored therein instructions, which, when executed on a computer, cause the computer to perform the steps of the dynamic point burying method.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a read-only memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A dynamic point burying method is characterized by comprising the following steps:
reading local buried point configuration information, and reading service buried point configuration information from a server;
acquiring target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
acquiring a plurality of new event instructions, determining a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered, and performing data embedding on the new event function corresponding to the target new event instruction to generate a plurality of target data buried points;
the method comprises the steps of reading the number of target data buried points and the state of a client in real time, and uploading a plurality of target data buried points to a server based on the number of the target data buried points and the state of the client.
2. The dynamic point burying method as claimed in claim 1, wherein said obtaining target point burying configuration information based on said local point burying configuration information and said service point burying configuration information comprises:
judging whether the service buried point configuration information is a null value;
if the service buried point configuration information is a null value, determining the local buried point configuration information as target buried point configuration information;
and if the service buried point configuration information is not a null value, generating a comparison result based on the service buried point configuration information and the local buried point configuration information, and determining target buried point configuration information based on the comparison result.
3. The dynamic point burying method of claim 2, wherein if the service buried point configuration information is not null, generating a comparison result based on the service buried point configuration information and the local buried point configuration information, and determining the target buried point configuration information based on the comparison result comprises:
if the service buried point configuration information is not a null value, comparing the service buried point configuration information with the local buried point configuration information to generate a comparison result;
judging whether the comparison results are the same;
if the comparison result is the same result, determining the local buried point configuration information as target buried point configuration information;
and if the comparison result is different, updating the local buried point configuration information based on the service buried point configuration information to generate target buried point configuration information.
4. The dynamic point burying method according to claim 1, wherein the acquiring a plurality of new event commands, determining a new event function corresponding to a target new event command when each new event command is responded based on the target point burying configuration information and a corresponding interface duty cycle is entered, and performing data point burying on the new event function corresponding to the target new event command to generate a plurality of target data point burying methods comprises:
acquiring a plurality of new event instructions, and creating corresponding new event functions according to each new event instruction when each new event instruction is responded based on the target buried point configuration information and a corresponding interface working period is entered;
and performing data embedding on the basis of the new event function corresponding to each new event instruction, and generating a target data embedding point corresponding to each new event instruction to obtain a plurality of target data embedding points.
5. The dynamic point burying method according to claim 4, wherein the data point burying is performed based on the new event function corresponding to each new event instruction, and the generating of the target data point burying corresponding to each new event instruction to obtain a plurality of target data points includes:
determining a corresponding preset event function based on each new event instruction and a preset hook function;
and replacing the corresponding preset event function by adopting the new event function corresponding to each new event instruction to generate a plurality of target data buried points.
6. The dynamic point burying method as claimed in claim 1, wherein said reading in real time the number of target data buried points and the state of a client, and uploading said plurality of target data buried points to a server based on the number of target data buried points and the state of the client comprises:
reading the number of target data buried points in real time, and judging whether the number of the target data buried points reaches a buried point number threshold value or not;
if the number of the target data buried points reaches a buried point number threshold value, uploading the target data buried points to a server;
and if the number of the target data buried points does not reach the buried point number threshold value, reading the state of the client, and uploading the target data buried points to a server based on the state of the client.
7. The dynamic point burying method of claim 6, wherein reading a state of a client if the number of target data points does not reach a threshold number of points buried, and uploading the plurality of target data points buried to a server based on the state of the client comprises:
if the number of the target data buried points does not reach the buried point number threshold value, reading the state of a client, and judging whether the state of the client is an operating state or not;
and if the state of the client is the running stop state, the target data buried points are subjected to persistent storage to generate a plurality of persistent stored target data buried points, and when the state of the client is the running state, the persistent stored target data buried points are uploaded to a server and the persistent stored target data buried points are deleted.
8. A dynamic point burying device, comprising:
the system comprises a first acquisition module, a second acquisition module and a third acquisition module, wherein the first acquisition module is used for reading local buried point configuration information and reading service buried point configuration information from a server;
a second obtaining module, configured to obtain target buried point configuration information based on the local buried point configuration information and the service buried point configuration information;
the data embedding module is used for acquiring a plurality of new event instructions, determining a new event function corresponding to a target new event instruction when each new event instruction is responded based on the target embedding point configuration information and a corresponding interface working period is entered, and embedding data into the new event function corresponding to the target new event instruction to generate a plurality of target data embedding points;
and the uploading module is used for reading the number of the target data buried points and the state of the client in real time and uploading the target data buried points to a server based on the number of the target data buried points and the state of the client.
9. A dynamic point burying device, comprising: a memory and at least one processor, the memory having instructions stored therein;
the at least one processor invokes the instructions in the memory to cause the dynamic point burying device to perform the dynamic point burying method of any one of claims 1-7.
10. A computer-readable storage medium having instructions stored thereon, wherein the instructions, when executed by a processor, implement the dynamic point burying method of any one of claims 1-7.
CN202110691846.4A 2021-06-22 2021-06-22 Dynamic point burying method, device, equipment and storage medium Active CN113419936B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110691846.4A CN113419936B (en) 2021-06-22 2021-06-22 Dynamic point burying method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110691846.4A CN113419936B (en) 2021-06-22 2021-06-22 Dynamic point burying method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113419936A true CN113419936A (en) 2021-09-21
CN113419936B CN113419936B (en) 2023-10-31

Family

ID=77789899

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110691846.4A Active CN113419936B (en) 2021-06-22 2021-06-22 Dynamic point burying method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113419936B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110674022A (en) * 2019-09-27 2020-01-10 北京三快在线科技有限公司 Behavior data acquisition method and device and storage medium
CN111737100A (en) * 2020-06-09 2020-10-02 北京三快在线科技有限公司 Data acquisition method, device, equipment and storage medium
CN112433920A (en) * 2019-08-26 2021-03-02 北京京东尚科信息技术有限公司 Buried point data reporting method, device, equipment and medium
CN112433921A (en) * 2020-06-03 2021-03-02 上海哔哩哔哩科技有限公司 Method and apparatus for dynamic point burying

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112433920A (en) * 2019-08-26 2021-03-02 北京京东尚科信息技术有限公司 Buried point data reporting method, device, equipment and medium
CN110674022A (en) * 2019-09-27 2020-01-10 北京三快在线科技有限公司 Behavior data acquisition method and device and storage medium
CN112433921A (en) * 2020-06-03 2021-03-02 上海哔哩哔哩科技有限公司 Method and apparatus for dynamic point burying
CN111737100A (en) * 2020-06-09 2020-10-02 北京三快在线科技有限公司 Data acquisition method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN113419936B (en) 2023-10-31

Similar Documents

Publication Publication Date Title
US11659020B2 (en) Method and system for real-time modeling of communication, virtualization and transaction execution related topological aspects of monitored software applications and hardware entities
CA2468644C (en) Method and apparatus for managing components in an it system
CN107451040B (en) Method and device for positioning fault reason and computer readable storage medium
CN109002295B (en) Static code scanning method, system, server and storage medium
CN101933003A (en) Automated application dependency mapping
JP2004362596A (en) Automatic task creation method and system
WO2014120192A1 (en) Error developer association
JP2003091432A (en) Software evaluation system and software evaluation tool
CN109657431B (en) Method for identifying user identity
CN110865840B (en) Application management method, device, server and storage medium
CN112579399B (en) Cloud service testing method and device, electronic equipment and computer storage medium
CN111026647A (en) Code coverage rate obtaining method and device, computer equipment and storage medium
US20210157711A1 (en) System and method for controlled data extraction in computer networks
CN111782534A (en) Business process monitoring method, device and system
CN102541674B (en) Control system and method of autonomic element model and server invasion protection and detection system
CN104021343A (en) Rogue program monitoring method and system based on pile access modes
CN113419936A (en) Dynamic point burying method, device, equipment and storage medium
CN112698919A (en) Method for rapidly building shared unified web development environment by using docker based on linux
Gu et al. Kerep: Experience in extracting knowledge on distributed system behavior through request execution path
CN114443294B (en) Big data service component deployment method, system, terminal and storage medium
US20230237366A1 (en) Scalable and adaptive self-healing based architecture for automated observability of machine learning models
CN106936643B (en) Equipment linkage method and terminal equipment
US20220405157A1 (en) System, device, method and datastack for managing applications that manage operation of assets
CN114490073A (en) Electronic map operation and maintenance method, electronic map data using method and service system
CN112817816A (en) Embedded point processing method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant