CN113590996A - Buried point data generation method, device, equipment and storage medium - Google Patents

Buried point data generation method, device, equipment and storage medium Download PDF

Info

Publication number
CN113590996A
CN113590996A CN202110924857.2A CN202110924857A CN113590996A CN 113590996 A CN113590996 A CN 113590996A CN 202110924857 A CN202110924857 A CN 202110924857A CN 113590996 A CN113590996 A CN 113590996A
Authority
CN
China
Prior art keywords
page
identifier
point data
buried point
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110924857.2A
Other languages
Chinese (zh)
Inventor
王孝道
段琼
张刘刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fanxiangjia Technology Co ltd
Original Assignee
Hangzhou Fanxiangjia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fanxiangjia Technology Co ltd filed Critical Hangzhou Fanxiangjia Technology Co ltd
Priority to CN202110924857.2A priority Critical patent/CN113590996A/en
Publication of CN113590996A publication Critical patent/CN113590996A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces

Abstract

The invention discloses a buried point data generating method, a buried point data generating device, buried point data generating equipment and a storage medium; in the scheme, if it is monitored that a user triggers a click event on a first page, generating an identifier of the first page before responding To the click event, wherein the identifier is a To value of the first page; and after the click event is responded To jump To a second page, binding the identifier with the second page, taking the identifier as the From value of the second page, and generating buried point data according To the From value and the To value of each page. Therefore, in the scheme, after the data of the buried points is generated by each page according To the From value and the To value, the previous page of the current page can be known through the From value, and the next page of the current page can be known through the To value, so that the defect of blood relationship is avoided, the generated user link is complete, and the user behavior analysis effect is improved.

Description

Buried point data generation method, device, equipment and storage medium
Technical Field
The invention relates to the technical field of data acquisition, in particular to a buried point data generating method, a buried point data generating device, buried point data generating equipment and a storage medium.
Background
A buried point may also be referred to as event tracking and refers to the related art and its implementation that captures, processes, and transmits for a particular user behavior or event. By adding the embedded points into the product, the embedded point data generated in the process of using the product by a user can be obtained, the generated embedded point data is transmitted into the unified database, and the embedded point data in the database is analyzed so as to optimize the product.
When burying the point at present, mainly adopt manual bury a little mode, also promptly: and adding buried points to the positions of the data required to be acquired during data analysis so as to acquire related data for subsequent data analysis. However, the embedded point mode needs manual addition and only needs to be added at a needed position, so that the incomplete user link is caused, the user behavior cannot be analyzed, and data reference support is lacked during product optimization.
Disclosure of Invention
The invention aims to provide a method, a device, equipment and a storage medium for generating buried point data, so as to avoid incomplete user links caused by incomplete blood relation in the generated buried point data.
In order to achieve the above object, the present invention provides a buried point data generating method, including:
if it is monitored that a user triggers a click event on a first page, generating an identifier of the first page before responding To the click event, wherein the identifier is a To value of the first page;
jumping to a second page in response to the click event, acquiring the identifier, taking the identifier as a From value of the second page, and binding the identifier with the second page;
and generating buried point data according To the From value and the To value of each page.
Wherein the generating the identifier of the first page comprises:
generating a 32-bit random number, and using the 32-bit random number as the identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other.
If the current operating system is an iOS operating system, the buried point data generating method further includes:
when an application program is started, exchanging an original code and a target code in a service code so as to generate an identifier of the first page before responding to the click event through the target code;
the original code is a native system function which needs to be executed after the click event is triggered; the target code comprises the native system function and a buried point identification generation method.
Wherein the function in the source code is: UICollectionView, UITableView, UIControl, UIViewController function.
To achieve the above object, the present invention further provides a buried point data generating device, including:
the identification generation module is used for generating an identification of a first page before responding To a click event when the situation that the user triggers the click event on the first page is monitored, wherein the identification is a To value of the first page;
the response module is used for responding the click event and jumping to a second page;
the binding module is used for acquiring the identifier, taking the identifier as a From value of the second page and binding the identifier with the second page;
and the data generation module is used for generating buried point data according To the From value and the To value of each page.
Wherein the identifier generation module is specifically configured to: generating a 32-bit random number, and using the 32-bit random number as the identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other.
The buried point data generating device also comprises an exchange module;
the exchange module is used for exchanging an original code and a target code in a service code when the current operating system is an iOS operating system and an application program is started so as to generate the identifier of the first page before responding to the click event through the target code; the original code is a native system function which needs to be executed after the click event is triggered; the target code comprises the native system function and a buried point identification generation method.
Wherein the function in the source code is: UICollectionView, UITableView, UIControl, UIViewController function.
To achieve the above object, the present invention further provides an electronic device comprising:
a memory for storing a computer program;
and the processor is used for realizing the steps of the buried point data generation method when executing the computer program.
To achieve the above object, the present invention further provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the above-described buried point data generating method.
According to the scheme, the embedded point data generation method, the embedded point data generation device, the embedded point data generation equipment and the storage medium are provided by the embodiment of the invention; in the scheme, if it is monitored that a user triggers a click event on a first page, generating an identifier of the first page before responding To the click event, wherein the identifier is a To value of the first page; and after the click event is responded To jump To a second page, binding the identifier with the second page, taking the identifier as the From value of the second page, and generating buried point data according To the From value and the To value of each page. Therefore, in the scheme, after the data of the buried points is generated by each page according To the From value and the To value, the previous page of the current page can be known through the From value, and the next page of the current page can be known through the To value, so that the defect of blood relationship is avoided, the generated user link is complete, the user behavior analysis effect is improved, and the data reference support is provided for product optimization.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic flow chart of a buried point data generating method according to an embodiment of the present invention;
FIG. 2 is a schematic overall flow chart disclosed in the embodiment of the present invention;
FIG. 3 is a schematic structural diagram of a buried point data generating apparatus according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
At present, because the existing buried points need to be added manually, the user behavior link in the existing buried point data is incomplete and can be tracked to a limited upper level only in a specific scene, so that the user behavior is difficult to track, for example: the webpage A can jump to a target webpage, the webpage B can also jump to the target webpage, only two webpages jumping to the target webpage are recorded in the embedded point data collected by the embedded point in the target webpage, but specific webpage jumping to the target webpage is not recorded, and thus the embedded point data can not reflect the complete behavior link of a user. Therefore, in order to solve the above technical problem, an embodiment of the present invention discloses a method, an apparatus, a device and a storage medium for generating buried point data, so as to avoid incomplete user links caused by incomplete blood-related relationships in the generated buried point data.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flow diagram of a method for generating buried point data according to an embodiment of the present invention includes:
s101, if it is monitored that a user triggers a click event on a first page, generating an identifier of the first page before responding To the click event, wherein the identifier is a To value of the first page;
in this embodiment, if a user triggers a click event on a first page, before responding to the click event, a 32-bit random number needs to be generated first, and the 32-bit random number is used as an identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other. In this embodiment, the identifier is used as a To value of the first page, and after the jump To the second page, the To value is used as a From value of the second page, so as To know that the second page is generated by the jump From the first page according To the From value.
S102, responding to the click event, jumping to a second page, acquiring an identifier, taking the identifier as a From value of the second page, and binding the identifier with the second page;
and S103, generating buried point data according To the From value and the To value of each page.
In this embodiment, after responding To the click event, the interface jumps From the first page To the second page, and then takes the To value of the first page as the From value of the second page. It should be noted that the first page and the second page described in this embodiment represent two pages before and after the jump, and if the second page needs To jump To the next page, the second page may be continuously used as the first page, and the next page after the jump is used as the second page To continue executing S101 To S102, so that each page has a corresponding From value and a To value after the jump, and after the buried point data is generated by the From value and the To value of each page, the behavior link of the user can be known.
For example: in the obtained buried point data, the To value of a webpage A is M, the From value of a webpage B is M, the To value of the webpage B is N, and the From value of the webpage C is N; it can be seen that, if the To value of the web page a is the same as the From value of the web page B, it represents that the user triggers the click event To jump To the web page B after accessing the web page a, and similarly, if the To value of the web page B is the same as the From value of the web page C, it represents that the user triggers the click event To jump To the web page C after accessing the web page B, then the user behavior link is: web page a-web page B-web page C.
In conclusion, according To the scheme, after the data of the buried points is generated by each page according To the From value and the To value, the previous page of the current page can be known through the From value, and the next page of the current page can be known through the To value, so that the defect of blood relation is avoided, the generated user link is complete, the user behavior analysis effect is improved, and data reference support is provided for product optimization.
In this embodiment, in order to implement non-intrusive service code interception system event, the present solution dynamically inserts corresponding target codes before and after function call of the original code through an aop (aspect programming) facet-Oriented programming idea.
Specifically, AOP is a facet-oriented programming, which is a technology for implementing unified maintenance of program functions through a pre-compilation mode and a runtime dynamic proxy. The AOP is the continuation of OOP (Object Oriented Programming), which is a hotspot in software development and a derivative paradigm of functional Programming, and can be used for isolating each part of business logic, thereby reducing the coupling degree between each part of the business logic, improving the reusability of the program, and simultaneously improving the development efficiency. The development efficiency can be improved, the function can be rapidly put on line and put into use, and a foundation is laid for subsequent personalized recommendation service. The optimal implementation of the requirements is achieved with minimal modifications.
In the embodiment, the development of the client is mainly divided into two parts, namely Android (Linux-based mobile device operating system) and iOS (mobile operating system). The following describes the present solution specifically for different operating systems:
implementation of an iOS solution
In this embodiment, if the current operating system is an iOS operating system, when the application program is started, the original code and the target code in the service code are exchanged, so that the identifier of the first page is generated before the click event is responded through the target code; the original code is a native system function which needs to be executed after a click event is triggered; the object code comprises a native system function and a buried point identification generation method.
That is, in order to avoid a great change to the service code, the scheme needs to exchange an original code and a target code in the service code in a hook (exchange) manner, wherein the original code is a native system function that needs to be executed after triggering a click event, the native system function is used for generating information, and the information is used for informing a system user that the click event is triggered so that the system continues to execute subsequent operations such as a corresponding click event; the target code in the scheme also comprises a native system function, so that after the target code is exchanged with the original code, the original function provided by the service code can also be realized, and the target code also has a buried point identifier generation method, so that the scheme can also generate the identifier of the first page before responding to the click event. In particular, in Objective-C (object oriented programming language in C language), the corresponding function can be hook with Method Swizzling (exchange of methods for modifying the implementation of two methods in Objective-C) using the Runtime property. If the development language used by the project is a swift programming language, which is slightly different from the realization of Objective-C, the exchange in the + load () method cannot be directly rewritten, a static method needs to be written in the extension by the user, and the method is called when an APP (Application) is started, so that the exchange is realized. This protocol allows for convenient hook for all classes, and exchange can be handled by switzedkit.
It should be noted that, when the data is collected in full, it is assumed that a hook appdelete (application lifecycle management) proxy method, a UIViewController (user interface view controller) lifecycle method, a button click event, a gesture event, click-back methods of various system controls, application state switching, and the like are all processed.
Referring to table 1, a relationship table of actions and events disclosed for the embodiment of the present invention:
TABLE 1
Figure BDA0003208795960000061
Referring to table 1, in the action column of table 1, each function or function in each class is a function that needs to be exchanged, and in the event column, a class is added to each class to add a target code, so that when a corresponding event occurs, an identifier of a page is generated through the exchanged target code. In this embodiment, the function in the original code may be set as: UICollectionView (user interface Collection View), UITableView (user interface form View control), UIControl (user interface controller), UIViewController (user interface view controller). That is, this embodiment may hook the function in UICollectionView, UITableView, UIControl, and UIViewController. Of course, other functions may be hook, and are not limited in particular.
Note that, in this embodiment, the following contents need to be noted in hook:
1. in this embodiment, a from field needs to be added to the UIViewController to record the source of the current page. And a management class AutoTraceKit is used for managing the from and to at the current moment, and the processing of the blood relationship can be realized only by adding the from and to parameters in the unified method of the previous code embedding point.
2. The exchange method of the parent class is required to be placed at a position before the exchange method of the child class when being called, and the sequence of the child before the parent is avoided as far as possible, so that the situation that the method of the parent class is not executed is avoided. If the child exchange method is before and the parent exchange method is after, special processing is needed, and the following two processing methods are available: the other method is to call a super exchange method to realize an exchange method of a child class and exchange a parent class and a child class method in the rewrite method, and call a position of a father before a son.
3. There are two steps in hook for UICollectionView, UITableView, requiring a hook delete attribute before exchanging the click event method.
4. The page structure has UIViewController nested with UIViewController, where the from of the child VC is the from of the parent VC. So as to pass through
Navigationcontroller? In view controllers, last ═ self, it is judged whether the interface is the main interface.
5. If the old buried point is in ViewDidLoad (called after view loading), then to needs to be set to null every time the page is entered, so the ViewDidLoad and ViewWillApper (called when view is ready to see) need to be swapped for the swap method to UIViewController.
After the treatment, the record of the blood relationship can be realized, the subsequent expansion and maintenance are facilitated, and the optimal treatment is made by combining the minimum change with the actual condition. For convenience of use, it can be seen that files realizing the exchange function are packaged into a POD (icoapods, iOS package manager), and can be added in any project to quickly realize the processing of the relationship of the blood margin of the buried point. And perfecting the behavior link of the user. The method comprises the following specific using steps: the use of pod 'AKTrace' and '0.1.1' can be introduced in the engineering. Calling the exchange method in AppDelegate, AutoTraceKit. initSwizzedmethod (), adding the parameters from and to where the buried point needs, if some UITapGestureRecognizer (user interface gesture recognizer) clicks, calling before clicking
Createchilld () implements the to value that generates the click event.
Second, implementation of Android solution
In the embodiment, a scheme of implementing AOP cut-plane-oriented programming is mainly implemented based on the trace of the Gradle (project automation building open source tool). Tranform is a standard set of APIs that Android officially provides to developers during the project build phase (. class- >. dex conversion) to modify class files, i.e., to convert the input class files into target bytecode files. According to the scheme, various events (page click events, search or determined click events on a soft keyboard and the like) from hook to the lowest layer of the Android can be monitored by utilizing the characteristic of the transform. Therefore, related codes can be inserted in the compiling period, and the operations of generating page tags, binding the pages and the tags and the like are executed after the events are triggered through the related codes.
Referring to fig. 2, an overall flow diagram provided for the embodiment of the present invention specifically includes the following steps:
1. the user clicks on the first page trigger btn, which generates a click event;
2. a hook onClick event, before the click event responds, a 32-bit random number is generated, and the click event is continuously executed; before each click event is triggered, a 32-bit random number is required to be generated, the random number has uniqueness, and different 32-bit random numbers exist in different click events; the 32-bit random number is the To value of the first page; namely: the To value is a 32-bit random number generated before a user clicks a certain button in an interface and clicks an event through a code hook To trigger real clicking;
3. after the click event is executed, opening a new interface Activity, wherein the new interface is a second page; wherein, the To value of the first page is the From value of the second page; namely: the From value is that after a user clicks a button To open a new page, the To value generated by the user clicking the button is the From value corresponding To the opened new Activity interface;
4. after jumping to the second page, hook to the tosting () corresponding to Activity, taking the unique mark of the second page, binding the unique mark of the second page with the From value of the second page, and maintaining the unique mark of the second page in a queue; and binding the From value of the second page with the unique mark of the second page, namely, binding the From value of the second page with the second page. And when a new page is generated, acquiring the unique mark of the interface generated by the system by calling toString ().
It should be noted that in the started Activity, all the embedded points can find the corresponding Activity in the queue and obtain a 32-bit random number through the class name of the top-level Activity; when the Activity is destroyed, finding out the corresponding Activity in the queue through toString (), and acquiring a 32-bit random number for removal; the unique mark generated by toString () of Activity contains the class name, so that the corresponding unique mark in the queue can be found through for loop traversal.
In conclusion, in the scheme, optimization can be performed based on the existing manual embedding scheme, and corresponding codes are dynamically inserted before and after function call through the AOP section-oriented programming idea. The system event is blocked without invading the service code, and the effect of fully perfecting the user behavior link is realized with the least change.
The following describes an embedded point data generating device, an embedded point data generating apparatus, and a storage medium according to embodiments of the present invention, and the embedded point data generating device, the embedded point data generating apparatus, and the storage medium described below and the embedded point data generating method described above may be referred to each other.
Referring to fig. 3, a schematic structural diagram of a buried point data generating device provided in an embodiment of the present invention includes:
the identifier generating module 11 is configured To generate an identifier of a first page before responding To a click event when it is monitored that the user triggers the click event on the first page, where the identifier is a To value of the first page;
the response module 12 is configured to jump to a second page in response to the click event;
a binding module 13, configured to obtain the identifier, use the identifier as a From value of the second page, and bind the identifier with the second page;
and the data generating module 14 is configured To generate buried point data according To the From value and the To value of each page.
Wherein the identifier generation module is specifically configured to: generating a 32-bit random number, and using the 32-bit random number as the identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other.
The buried point data generating device also comprises an exchange module;
the exchange module is used for exchanging an original code and a target code in a service code when the current operating system is an iOS operating system and an application program is started so as to generate the identifier of the first page before responding to the click event through the target code; the original code is a native system function which needs to be executed after the click event is triggered; the target code comprises the native system function and a buried point identification generation method.
Wherein the function in the source code is: UICollectionView, UITableView, UIControl, UIViewController function.
Referring to fig. 4, an embodiment of the present invention further provides a structural schematic diagram of an electronic device, including:
a memory 21 for storing a computer program;
a processor 22, configured to implement the steps of the buried point data generating method according to any of the above method embodiments when executing the computer program.
In this embodiment, the device may be a PC (Personal Computer), or may be a terminal device such as a smart phone, a tablet Computer, a palmtop Computer, or a portable Computer.
The device may include a memory 21, a processor 22, and a bus 23.
The memory 21 includes at least one type of readable storage medium, which includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, and the like. The memory 21 may in some embodiments be an internal storage unit of the device, for example a hard disk of the device. The memory 21 may also be an external storage device of the device in other embodiments, such as a plug-in hard disk, Smart Media Card (SMC), Secure Digital Card (SD), Flash memory Card (Flash Card), etc. provided on the device. Further, the memory 21 may also include both an internal storage unit of the device and an external storage device. The memory 21 may be used not only to store application software installed in the device and various types of data such as program codes for executing a data generation method, etc., but also to temporarily store data that has been output or is to be output.
The processor 22 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor or other data Processing chip in some embodiments, and is used for executing program codes stored in the memory 21 or Processing data, such as program codes for executing data generation methods.
The bus 23 may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown in FIG. 4, but this does not indicate only one bus or one type of bus.
Further, the device may further include a network interface 24, and the network interface 24 may optionally include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), which are generally used to establish a communication connection between the device and other electronic devices.
Optionally, the device may further comprise a user interface 25, the user interface 25 may comprise a Display (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 25 may also comprise a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying information processed in the device and for displaying a visualized user interface.
Fig. 4 shows only the device with the components 21-25, and it will be understood by those skilled in the art that the structure shown in fig. 4 does not constitute a limitation of the device, and may comprise fewer or more components than those shown, or some components may be combined, or a different arrangement of components.
The embodiment of the present invention further provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the steps of the buried point data generating method according to any of the above-mentioned method embodiments.
Wherein the storage medium may include: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A buried point data generating method is characterized by comprising the following steps:
if it is monitored that a user triggers a click event on a first page, generating an identifier of the first page before responding To the click event, wherein the identifier is a To value of the first page;
jumping to a second page in response to the click event, acquiring the identifier, taking the identifier as a From value of the second page, and binding the identifier with the second page;
and generating buried point data according To the From value and the To value of each page.
2. The buried point data generating method of claim 1, wherein generating the identification of the first page comprises:
generating a 32-bit random number, and using the 32-bit random number as the identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other.
3. The buried point data generating method according to claim 1, wherein if the current operating system is an iOS operating system, the buried point data generating method further comprises:
when an application program is started, exchanging an original code and a target code in a service code so as to generate an identifier of the first page before responding to the click event through the target code;
the original code is a native system function which needs to be executed after the click event is triggered; the target code comprises the native system function and a buried point identification generation method.
4. The buried point data generating method according to claim 3, wherein the function in the source code is: UICollectionView, UITableView, UIControl, UIViewController function.
5. A buried point data generating apparatus, comprising:
the identification generation module is used for generating an identification of a first page before responding To a click event when the situation that the user triggers the click event on the first page is monitored, wherein the identification is a To value of the first page;
the response module is used for responding the click event and jumping to a second page;
the binding module is used for acquiring the identifier, taking the identifier as a From value of the second page and binding the identifier with the second page;
and the data generation module is used for generating buried point data according To the From value and the To value of each page.
6. The buried point data generating device of claim 5, wherein the identifier generating module is specifically configured to: generating a 32-bit random number, and using the 32-bit random number as the identifier of the first page; wherein, the marks generated by different click events of different pages are different from each other.
7. The buried point data generating device according to claim 6, further comprising an exchange module;
the exchange module is used for exchanging an original code and a target code in a service code when the current operating system is an iOS operating system and an application program is started so as to generate the identifier of the first page before responding to the click event through the target code; the original code is a native system function which needs to be executed after the click event is triggered; the target code comprises the native system function and a buried point identification generation method.
8. The buried point data generating apparatus according to claim 7, wherein the function in the source code is: UICollectionView, UITableView, UIControl, UIViewController function.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the buried point data generating method as claimed in any one of claims 1 to 4 when executing said computer program.
10. A computer-readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of the buried point data generating method according to any one of claims 1 to 4.
CN202110924857.2A 2021-08-12 2021-08-12 Buried point data generation method, device, equipment and storage medium Pending CN113590996A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110924857.2A CN113590996A (en) 2021-08-12 2021-08-12 Buried point data generation method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110924857.2A CN113590996A (en) 2021-08-12 2021-08-12 Buried point data generation method, device, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113590996A true CN113590996A (en) 2021-11-02

Family

ID=78257670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110924857.2A Pending CN113590996A (en) 2021-08-12 2021-08-12 Buried point data generation method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113590996A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119619A1 (en) * 2007-11-02 2009-05-07 Bailey Thomas J Method, apparatus and software for providing path usage data for links between data pages in a computer system
CN108270629A (en) * 2016-12-29 2018-07-10 北京国双科技有限公司 Site visitor's behavior monitoring method and device
CN109508186A (en) * 2018-09-18 2019-03-22 众安信息技术服务有限公司 It is a kind of to visualize data acquisition analysis method and the system buried a little based on iOS
CN110083459A (en) * 2019-03-16 2019-08-02 平安城市建设科技(深圳)有限公司 The data in cross-page face bury point methods, device, equipment and storage medium
CN111400627A (en) * 2020-03-09 2020-07-10 政采云有限公司 Information acquisition method and device, electronic equipment and readable storage medium
CN112115328A (en) * 2020-08-24 2020-12-22 苏宁金融科技(南京)有限公司 Page flow map construction method and device and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090119619A1 (en) * 2007-11-02 2009-05-07 Bailey Thomas J Method, apparatus and software for providing path usage data for links between data pages in a computer system
CN108270629A (en) * 2016-12-29 2018-07-10 北京国双科技有限公司 Site visitor's behavior monitoring method and device
CN109508186A (en) * 2018-09-18 2019-03-22 众安信息技术服务有限公司 It is a kind of to visualize data acquisition analysis method and the system buried a little based on iOS
CN110083459A (en) * 2019-03-16 2019-08-02 平安城市建设科技(深圳)有限公司 The data in cross-page face bury point methods, device, equipment and storage medium
CN111400627A (en) * 2020-03-09 2020-07-10 政采云有限公司 Information acquisition method and device, electronic equipment and readable storage medium
CN112115328A (en) * 2020-08-24 2020-12-22 苏宁金融科技(南京)有限公司 Page flow map construction method and device and computer readable storage medium

Similar Documents

Publication Publication Date Title
CN106843869B (en) Front-end development engineering system and method
CN111124906B (en) Tracking method, compiling method and device based on dynamic embedded points and electronic equipment
EP3667520A1 (en) Webpage content extraction method and terminal device
CN102567516B (en) Script loading method and device
US20170017528A1 (en) Enhanced code callback
CN104049986A (en) Plugin loading method and device
JP2007213490A (en) Application server system and virtual machine program
CN111090431B (en) Data processing method and device
CN103049320A (en) Method and device for starting external application program in browser
JP6493130B2 (en) Information processing apparatus, method, and program
CN112099800B (en) Code data processing method, device and server
CN110750315B (en) Class loading method, device, equipment and storage medium in Android system
CN110365724B (en) Task processing method and device and electronic equipment
WO2020000747A1 (en) Anti-crawler method and terminal and computer readable storage medium
CN112835809A (en) Test data setting method, device, equipment and medium based on browser
CN108255509A (en) Using dispositions method, device, equipment and readable storage medium storing program for executing
CN111158777B (en) Component calling method, device and computer readable storage medium
CN113448650A (en) Live broadcast function plug-in loading method, device, equipment and storage medium
CN103488508A (en) Browser working method, browser and terminal equipment
JP2005228183A (en) Program execution method and computer system for executing the program
CN112764836A (en) Method and device for running fast application and electronic equipment
CN112416612A (en) Service calling method and device, computer equipment and readable storage medium
CN111488144A (en) Data processing method and equipment
CN110908644A (en) Configuration method and device of state node, computer equipment and storage medium
CN113590996A (en) Buried point data generation method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination