CN113608987A - Method, equipment and storage medium for collecting information and backtracking to construct user behavior - Google Patents

Method, equipment and storage medium for collecting information and backtracking to construct user behavior Download PDF

Info

Publication number
CN113608987A
CN113608987A CN202110912551.5A CN202110912551A CN113608987A CN 113608987 A CN113608987 A CN 113608987A CN 202110912551 A CN202110912551 A CN 202110912551A CN 113608987 A CN113608987 A CN 113608987A
Authority
CN
China
Prior art keywords
log
information
user
user behavior
application program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110912551.5A
Other languages
Chinese (zh)
Inventor
林翔鹏
王文龙
王海君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ruiting Network Technology Shanghai Co ltd
Original Assignee
Ruiting Network Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ruiting Network Technology Shanghai Co ltd filed Critical Ruiting Network Technology Shanghai Co ltd
Priority to CN202110912551.5A priority Critical patent/CN113608987A/en
Publication of CN113608987A publication Critical patent/CN113608987A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging

Abstract

Methods, devices, and storage media for collecting information and backtracking to construct user behavior are provided. The method for backtracking and constructing the user behavior comprises the following steps: receiving a first log and a second log associated with a user behavior; and building user behavior based on backtracking of the first log and the second log, wherein the first log is used for recording user operation information of the user using the application program, and the second log is used for recording hardware related information collected by a terminal executing the application program.

Description

Method, equipment and storage medium for collecting information and backtracking to construct user behavior
Technical Field
The present disclosure relates generally to data collection and analysis, and more particularly, to a method and apparatus for collecting user behavior information and backtracking to construct user behavior, and a storage medium.
Background
With the rapid development of the mobile internet, terminals and various terminal applications have been integrated into people's daily work and life. Meanwhile, the terminal application program (APP) of the B terminal is also paid more and more attention by related fields and industries, becomes a category which cannot be ignored in the development of software systems, and the quality and reliability of the terminal application program of the B terminal are ensured to become an important task of software testing. The terminal application program of the B terminal has the problems of complex page and function, unexpected events caused by users and the like, which bring difficulty to software developers to solve software defects. Therefore, how to determine the user behavior when the software is abnormal in operation so as to provide more references for software developers to locate and view the abnormal operation or software defects of the software becomes a problem to be solved urgently.
Disclosure of Invention
Aspects and advantages of embodiments of the present disclosure will be set forth in part in the description which follows or may be learned by practice of the embodiments.
At least one embodiment of the present disclosure provides a method for backtracking and constructing user behavior, including: receiving a first log and a second log associated with a user behavior; and building user behavior based on backtracking of the first log and the second log, wherein the first log is used for recording user operation information of the user using the application program, and the second log is used for recording hardware related information collected by a terminal executing the application program.
For example, in a method provided by an embodiment of the present disclosure, building a user behavior based on backtracking of the first log and the second log further includes: determining the time corresponding to each log record in the first log and the second log; combining the log records in the first log and the second log in chronological order based on time; and backtracking and constructing the user behavior based on log records in the combined first log and the second log.
For example, in a method provided by one embodiment of the present disclosure, chronologically combining log records in a first log and a second log based on time further includes: extracting log records for recording the interactive operation of the user and the application program from the first log; for each log record for recording the interactive operation between the user and the application program, determining the time of the recorded interactive operation; extracting a log record corresponding to the determined time when the interactive operation occurs from the second log; and pairing and combining the log records extracted from the first log and the log records extracted from the second log based on time.
For example, in a method provided by one embodiment of the present disclosure, based on log records in the combined first log and second log, the backtracking construction of the user behavior further includes: for any log record extracted from the first log, determining candidate user behaviors based on the recorded interaction operation between the user and the application program; and determining whether the hardware-related information recorded by the log record in the second log combined with any log record pair extracted from the first log is matched with the determined candidate user behavior, if so, determining the user behavior as the determined candidate user behavior, and otherwise, determining that the user behavior is abnormal.
For example, in the method provided by an embodiment of the present disclosure, the user operation information is collected through a buried point inside the application program, and the hardware-related information is collected by the terminal after the application program is started.
For example, in a method provided in one embodiment of the present disclosure, the user operation information includes: page browsing information, button use information, network request information, video shooting information and text input information; the hardware-related information includes: GPS information, sensor information, battery information, and memory information.
At least one embodiment of the present disclosure provides an apparatus for backtracking and constructing user behavior, the apparatus including: a processor; a memory having computer readable instructions stored thereon which, when executed by the processor, perform a method of backtracking build user behavior as described in any embodiment of the disclosure.
At least one embodiment of the present disclosure provides an apparatus for backtracking and constructing user behavior, including: a communication module configured to receive a first log and a second log associated with a user behavior; and the backtracking construction module is configured to construct user behaviors based on backtracking of a first log and a second log, wherein the first log is used for recording user operation information of the user using the application program, and the second log is used for recording hardware related information collected by a terminal executing the application program.
Optionally, the backtracking building module further comprises: the time determining module is configured to determine time corresponding to each log record in the first log and the second log; a combination module configured to combine each log record in the first log and the second log in chronological order based on the determined time; and the behavior backtracking module is configured to backtrack and construct the user behavior based on the log records in the combined first log and the second log.
Optionally, the combination module further comprises: the first extraction module is configured to extract log records for recording the interactive operation of the user and the application program from the first log; the operation time determining module is configured to determine the time of the recorded interactive operation for each log record for recording the interactive operation between the user and the application program; a second extraction module configured to extract log records from the second log corresponding to the determined times at which the interactive operations occurred; and a pairing combination module configured to pair-combine the respective log records extracted from the first log with the respective log records extracted from the second log based on the determined time.
Optionally, the behavior backtracking module further comprises: the candidate behavior determining module is configured to determine candidate user behaviors for any log record extracted from the first log based on the recorded interaction operation between the user and the application program; and the verification module is configured to determine whether hardware-related information recorded by the log records in the second log combined with any log record pair extracted from the first log is matched with the determined candidate user behavior, wherein if the hardware-related information is matched with the determined candidate user behavior, the user behavior is determined to be the determined candidate user behavior, and otherwise, the user behavior is determined to be abnormal.
At least one embodiment of the present disclosure provides a storage medium for storing computer-readable instructions, which when executed by a computer, perform a method for building user behavior by backtracking as described in any embodiment of the present disclosure.
At least one embodiment of the present disclosure provides a method for collecting user behavior information, including: collecting user operation information of a user using an application program to form a first log; acquiring hardware related information recorded by a terminal executing an application program to form a second log; and uploading the first log and the second log for backtracking construction of the user behavior.
For example, in the method provided by an embodiment of the present disclosure, the user operation information is collected through a buried point inside the application program, and the hardware-related information is collected by the terminal after the application program is started.
For example, in a method provided in one embodiment of the present disclosure, the user operation information includes: page browsing information, button use information, network request information, video shooting information and text input information; the hardware-related information includes: GPS information, sensor information, battery information, and memory information.
For example, in a method provided by an embodiment of the present disclosure, collecting user operation information of a user using an application further includes: calling a predefined base class to collect operation data of the application program used by the user; and determining user operation information based on the operation data, wherein a predefined base class is packaged with an agent for collecting the operation data, and the agent for collecting the operation data comprises: the method comprises the steps of obtaining a click action agent, obtaining a long press action agent, obtaining a touch action agent, obtaining a text input action agent and obtaining a service information agent.
At least one embodiment of the present disclosure provides an apparatus for collecting user behavior information, including: the first log collection module is configured to collect user operation information of the application program used by a user to form a first log; the second log acquisition module is configured to acquire hardware related information recorded by a terminal executing the application program to form a second log; and the communication module is used for uploading the first log and the second log so as to be used for backtracking construction of user behaviors.
Optionally, the first log collection module further comprises: the operation data acquisition module is configured to call a predefined base class to acquire operation data of the application program used by the user; and an operation information determination module configured to determine user operation information based on the operation data, wherein a predefined base class encapsulates an agent that collects the operation data, and wherein the agent that collects the operation data comprises: the method comprises the steps of obtaining a click action agent, obtaining a long press action agent, obtaining a touch action agent, obtaining a text input action agent and obtaining a service information agent.
At least one embodiment of the present disclosure provides an apparatus for collecting user behavior information, including: a processor; a memory having computer readable instructions stored thereon that, when executed by the processor, perform a method of gathering user behavior information as described in any embodiment of the disclosure.
At least one embodiment of the present disclosure provides a storage medium for storing computer-readable instructions, which, when executed by a computer, perform a method for collecting user behavior information as described in any one of the embodiments of the present disclosure.
Drawings
To more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings of the embodiments will be briefly introduced below, and it is apparent that the drawings in the following description relate only to some embodiments of the present disclosure and are not limiting to the present disclosure.
Fig. 1 is a flow diagram illustrating a method of building user behavior retrospectively according to an embodiment of the disclosure.
Fig. 2 is a diagram illustrating a process of building user behavior based on backtracking of a first log and a second log according to an embodiment of the present disclosure.
Fig. 3 is a diagram illustrating a process of combining log records in the first log and the second log in chronological order based on the determined time according to an embodiment of the present disclosure.
Fig. 4 is a diagram illustrating a process of building back user behavior based on log records in the combined first and second logs, according to an embodiment of the present disclosure.
FIG. 5 illustrates an example scenario in which a method of building user behavior using backtracking according to an embodiment of the present disclosure is applied.
FIG. 6 illustrates another example scenario in which a method of building user behavior by backtracking according to an embodiment of the present disclosure is applied.
Fig. 7 is a flowchart illustrating a method of collecting user behavior information according to an embodiment of the present disclosure.
Fig. 8 illustrates a schematic diagram of a first log information storage structure according to an embodiment of the present disclosure.
Fig. 9 shows a schematic block diagram of an apparatus for backtracking build user behavior according to an embodiment of the present disclosure.
Fig. 10 shows a schematic block diagram of an apparatus for collecting user behavior information according to an embodiment of the present disclosure.
Fig. 11 shows a schematic diagram of an apparatus for backtracking build user behavior according to an embodiment of the present disclosure.
Fig. 12 shows a schematic diagram of an apparatus for collecting user behavior information according to an embodiment of the present disclosure.
Fig. 13 is a schematic diagram illustrating a storage medium according to an embodiment of the present disclosure.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present disclosure more apparent, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings of the embodiments of the present disclosure. It is to be understood that the embodiments described are only some of the disclosed embodiments, and not all of them. In fact, it will be apparent to those skilled in the art that various modifications and variations can be made in the embodiments without departing from the scope or spirit of the disclosure. For instance, features illustrated or described as part of one embodiment, can be used with another embodiment to yield a still further embodiment. Accordingly, aspects of the present disclosure are intended to cover such modifications and variations.
As mentioned above, both the usage scenario and the usage population of the terminal application facing the B-side are complex, and often, operation abnormality or software defect occurs, which is not reproduced well, and causes complaints of users or operators cannot give technical support and feedback to users in time. For example, taking a property broker application used by a property broker as an example, since an operation record and the like when the property broker uses the application to cause a problem are not reported to the server, it is difficult for an operator or a software developer of the server to obtain detailed user behavior data, thereby bringing difficulty to solving a software defect.
The present disclosure provides a method for backtracking and constructing user behavior during the use of a terminal application, based on log information related to the user behavior recorded during the use of the terminal application by a user. As an example, the user behavior may be described by hardware information collected by the terminal during use of the terminal application by the user and user operation information of the user operating the application. All ring nodes in the whole process from the opening of the application program to the closing of the application program by the user are recorded from the inside and the outside of hardware information and operation information, and the behavior track of the user is backtracked and constructed, so that operation and maintenance personnel can quickly know the environment and the operation of the user at that time, the problem is quickly positioned, and the problem is solved. Hereinafter, a method according to the present disclosure will be described in detail with reference to the accompanying drawings.
Fig. 1 is a flow diagram illustrating a method 1000 of building user behavior retrospectively, in accordance with an embodiment of the disclosure.
The method may be applied to a server, for example, and the server may include any electronic device with a computing function, such as a mobile phone, a notebook computer, a tablet computer, a desktop computer, a server, and the like, which is not limited by the present disclosure. The server has, for example, a Central Processing Unit (CPU) or a Graphics Processing Unit (GPU), and a memory on which codes or instructions are stored, wherein by executing the codes or instructions, the method for backtracking and constructing user behaviors provided by the embodiments of the present disclosure can be implemented.
As shown in FIG. 1, in at least one embodiment, the method includes the steps of:
at step 1200, a server receives a first log and a second log associated with a user behavior. In an example embodiment, the first log may be a software information log for recording user operation information of a user using the application; the second log may be a hardware information log for recording hardware-related information collected by a terminal executing the application program. The application program can be a house brokerage application program such as "live visitor", "58 city", and the like, and can also be a B-end application program of other industries and fields such as logistics, vehicle renting, and the like. For convenience of explanation, the application is described as a property brokerage application, but the disclosure is not limited thereto.
According to one example of the present disclosure, the user operation information may be user page browsing information, button use information, network request information, video photographing information, text input information, and the like. When a user starts an application program and performs operations such as those described above, operation information corresponding to these operations can be recorded by a buried point inside the application program.
According to yet another example of the present disclosure, the hardware related information is collected by the terminal after the application is started. The terminal may automatically collect the hardware related information at regular time, for example, automatically collect the hardware related information at a predetermined time interval after the application program is started, or collect the hardware related information at a time point set or selected by a user. The hardware related information may be: GPS information, sensor information, battery information, memory information, etc., wherein the sensor information is information collected by various sensors within the terminal, which may be various sensors such as an altitude sensor, a magnetic sensor, a gyroscope, an acceleration sensor, etc. The GPS information and the sensor information may reflect spatial information of the user when operating the application, such as longitude and latitude, altitude, orientation of the user up and down, rotation direction, movement direction, and the like.
At step 1400, a user behavior is constructed based on the received first log and second log backtracks.
Hereinafter, a process of building a user behavior based on backtracking of the first log and the second log according to an embodiment of the present disclosure will be described with reference to fig. 2.
As shown in FIG. 2, at step 1420, a time corresponding to each log record in the first log and the second log is determined. Each log record in the first log and the second log comprises time information so as to record the time of the user for operating and the time of the terminal for acquiring the hardware information respectively. In this step, the time corresponding to each log record may be determined based on the time information included in the log record.
Subsequently, at step 1440, the log records in the first log and the second log are combined in chronological order based on the determined time.
Specifically, as shown in fig. 3, according to one example of the present disclosure, this step may include the following sub-steps:
at sub-step 1442, a log record is extracted from the first log that records user interactions with the application. Although the above description has been given taking as an example the user operation information of the first log user using the application program, the information of the first log is not limited to this. For example, optionally, the first log may also record house address, house type, and other service information. Thus, in this sub-step, log records of user interactions with the application may be extracted from the various records in the first log.
At sub-step 1444, for each log record that records user interactions with the application, a time at which its recorded interaction occurred is determined.
At sub-step 1446, a log record corresponding to the determined time at which the interaction occurred is extracted from the second log. Specifically, in sub-step 1446, for each log record determined in sub-step 1444, a time-corresponding hardware-related information log record is extracted from the second log, wherein the time of the extracted hardware-related information log record is the same as the determined time of the interactive operation or differs within a predetermined threshold.
At sub-step 1448, the log records extracted from the first log are pair-wise combined with the log records extracted from the second log based on time.
For example, as a non-limiting example, assume that at sub-step 1442, a log of a user clicking a button and a log of a captured video are extracted; at sub-step 1444, the time of the click button operation is determined to be T according to the time information contained in the log record1The time of the video shooting operation is T2(ii) a Extracted at time T in sub-step 14461Collected GPS informationInformation is recorded, and respectively at time T2T and T2-a captured gyroscope information record and an acceleration information record, wherein Δ t is smaller than a predetermined threshold, then in this sub-step 1448 the click button operation is combined with the GPS information record pair, the captured video operation is combined with the gyroscope information record and the acceleration information record pair.
Returning to FIG. 2, at step 1460, backtracking builds user behavior based on log records in the combined first and second logs. In this step, optionally, user behavior can be constructed retrospectively according to whether the combined first log record and second log record match. Hereinafter, the processing in this step will be described with reference to fig. 4.
Specifically, at sub-step 1462, for any log record extracted from the first log (e.g., log record A), candidate user behavior is determined based on the user's interaction with the application for which it was recorded. For example, as an example, log record a records a video capture operation, then it is determined in this sub-step that the candidate user behavior is to capture a house video.
At sub-step 1464, the hardware-related information recorded by the log record in the second log combined with the log record A pair is determined, and it is determined whether the hardware-related information matches the determined candidate user behavior. If so, determining the user behavior as the candidate user behavior determined at sub-step 1462; if not, determining that the user behavior is abnormal. In this sub-step 1464, it may be determined whether the hardware-related information matches the determined candidate user behavior based on various pre-set rules. For example, for a video shooting operation, rotation and movement of the terminal device are usually accompanied, so if, for example, gyroscope information and acceleration information in the second log combined with the video shooting operation pair are extracted and normally change during the video shooting operation, it can be determined that the application is normal, and the user behavior is shooting house video; conversely, if there is no change or an abnormal change in the gyroscope information, the acceleration information, or the like, it may be determined that there is an abnormality in the application or the user behavior. For another example, for a user reporting a geographical location through text input in an application program or through location clicking on a map interface in the application program, for example, GPS information in a second log combined with the reported geographical location operation pair may be extracted, and if a difference between the geographical location information reported by the user and the GPS information is within a threshold (for example, 1km), it may be determined that the application program is normal and the user is at the reported geographical location; conversely, if the user reported the geographic location information and the GPS information differ by a distance outside a threshold (e.g., 1km), it may be determined that there is an application anomaly or that there may be an anomaly in the user behavior.
While the process of building a user behavior based on backtracking of log records in the combined first and second logs in step 1460 according to embodiments of the present disclosure is described above with reference to fig. 4, it should be understood that this is merely an example and that there may be many other situations for building a user behavior backtracking in step 1460. For example, assuming that log record B extracted from the first log in step 1460 records a user network request failure, and GPS location information combined with the log record B pair indicates that the altitude of the user has changed, it can be determined that the user may have made a network request while riding an elevator, and thus the network request failure is not an application defect, but may be due to poor elevator signaling.
An exemplary case where the method of building user behavior by backtracking according to the embodiments of the present disclosure is applied will be described below with reference to the accompanying drawings.
In one example scenario, a user performs a series of operations related to a studio through an application program, for example, the user clicks the studio on a studio page of the application program, the clicking of the studio page is finished after a period of studio operations, then the user switches to a studio publishing page of the application program for video uploading, and finally the user cancels uploading of the studio video due to various reasons such as network environment or video quality. Correspondingly, the server extracts four interactive operation log records shown in fig. 5 from the received first log, namely, the log record ID is "1333301039", and the user operates as "take house page-click take house"; the log record ID is "1333301040", and the user operation is "clap house page-finish clap house"; the log record ID is "1333301043", and the user operation is "clap house issue page-click upload"; and the log record ID is "1333301044" and the user operates as "clap house issue page-cancel upload". For the four interactive operation log records, the server determines the time of the interactive operation recorded by the server, extracts the log record corresponding to the determined interactive operation time from the hardware-related information log, and performs matching combination with the four interactive operation log records. In this example, the hardware-related information may be, for example, southeast, northwest orientation information collected by the magnetic sensor, rotational direction information during shooting video collected by the gyroscope, acceleration information of the start of displacement and the end of displacement collected by the accelerometer, and/or network connection information collected by the network connection hardware, etc. Assuming that the log records extracted from the hardware-related information log are matched with the user operations recorded in the four interactive operation log records, as shown in fig. 5, the server determines that the user behaviors corresponding to the four interactive operation log records are "start of shooting by the user", "end of shooting by the user", "upload of shooting data by the user" and "upload of shooting data by the user" respectively.
FIG. 6 illustrates another example scenario in which a method of building user behavior by backtracking according to an embodiment of the present disclosure is applied. As shown, in one example, the interactive log record extracted by the server from the received first log indicates that the GIS information reported by the user in the application, for example, by text input or by clicking on a location in the application, is "121.48273, 31.209131", and the corresponding hardware-related information (in this example, GPS information) extracted from the second log indicates that the cell where the user is located is "tom-tom", the cell GIS information is "121.501529, 31.23301", and the positioning gap between the two GIS information is "over 3 km". Assuming that the preset matching rule is that the GIS matching threshold is "no more than 1 km", it can be determined that the application program is abnormal or the user behavior is abnormal. In another example shown in fig. 6, the interactive log record extracted by the server from the received first log indicates that the GIS information reported by the user in the application, for example, by text input or by clicking on the location in the application is "113.228057, 23.067233", and the corresponding hardware-related information extracted from the second log indicates that the cell where the user is located is "flower river bay", the cell GIS information is "113.227472, 23.058571", and the location gap between the two GIS information is "not more than 1 km" because it satisfies the preset matching threshold "not more than 1 km", so that the user can be retrospectively determined to be "flower river bay".
According to the method, all ring nodes in the whole process from the opening of the application program to the closing of the application program by the user are recorded from two aspects of hardware related information and user operation information, and the behavior track of the user is constructed by backtracking, so that an operator or a software developer can quickly know the environment and the operation of the user at the moment, thereby quickly positioning the problem and solving the problem.
Next, a method of collecting user behavior information according to another embodiment of the present disclosure will be described. In the above-described method for building user behavior retrospectively, the server may obtain the first log and the second log associated with the user behavior in various ways, for example, the server directly collects user behavior data via a network, or receives the user behavior data collected by the terminal from the terminal, and so on. In consideration of the fact that the server side directly collects user behavior data which is difficult to obtain in detail, in this embodiment, the user behavior data is collected at the terminal, and the collected user behavior log is uploaded to the server side.
Fig. 7 is a flowchart illustrating a method 7000 of collecting user behavior information according to an embodiment of the present disclosure.
The method may be applied to a terminal, for example, where the terminal may be any electronic device installed with an application program, for example, a portable terminal such as a mobile phone, a notebook computer, a tablet computer, and the like, and the embodiment of the present disclosure is not limited thereto. For example, the terminal has, for example, a Central Processing Unit (CPU) or a Graphics Processing Unit (GPU), and a memory having code or instructions stored thereon, wherein by executing the code or instructions, the method for collecting user behavior information provided by the embodiments of the present disclosure can be implemented.
As shown in FIG. 7, in at least one embodiment, the method includes the steps of:
at step 7200, user operation information of the user using the application is collected to form a first log. In an example embodiment, the first log may be a software information log for recording user operation information of the user using the application program. As mentioned above, the application may be, for example, a B-side application in various industries and fields such as house brokerage, logistics, vehicle rental, etc., and for convenience of description, the application is taken as a house brokerage application as an example, but the disclosure is not limited thereto.
According to one example of the present disclosure, the user operation information may be user page browsing information, button use information, network request information, video photographing information, text input information, and the like. When a user starts an application program and performs operations such as those described above, operation logs corresponding to these operations may be recorded through a buried point inside the application program.
Optionally, in order to improve the efficiency of log collection, simplify the complexity of log collection to the greatest extent, and not cause too much intrusion to the service, a predefined base class may be called in this step to collect operation data of the application program used by the user, and the user operation information may be determined based on the operation data. The predefined base class may encapsulate one or more agents that collect operational data. In one example implementation, the one or more agents that collect operational data include: the method comprises the steps of obtaining a click action agent, obtaining a long press action agent, obtaining a touch action agent, obtaining a text input action agent and obtaining a service information agent.
At step 7400, hardware related information recorded by the terminal executing the application program is collected to form a second log. In an example embodiment, the second log may be a hardware information log for recording hardware-related information collected by a terminal executing the application program.
According to one example of the present disclosure, hardware-related information is collected by a terminal after an application is started. The terminal may automatically collect the hardware related information at regular time, for example, automatically collect the hardware related information at a predetermined time interval after the application program is started, or collect the hardware related information at a time point set or selected by a user. The hardware related information may be: GPS information, sensor information, battery information, memory information, etc., wherein the sensor information is information collected by various sensors within the terminal, which may be various sensors such as an altitude sensor, a magnetic sensor, a gyroscope, an acceleration sensor, etc. The GPS information and the sensor information may reflect spatial information of the user when operating the application, such as longitude and latitude, altitude, orientation of the user up and down, rotation direction, movement direction, and the like.
At step 7600, the first log and the second log are uploaded for backtracking construction of user behavior.
In this step, the terminal may upload the collected first and second logs to the server in real time, so as to be used for backtracking construction of user behavior.
Optionally, when the user operates the application program, the terminal may not be guaranteed to be in a networking state in real time due to a network reason, so the user behavior logs collected in steps 7200 and 7400 may be cached in a database (such as Sqlite) of the application program, and further in step 7600, the user behavior logs cached in the database may be uploaded to the server after the terminal device is connected to the network. By way of example, data transmission may be accomplished by way of a wired network and/or a wireless network. The wired network may perform data transmission by using twisted pair, coaxial cable, or optical fiber transmission, for example, and the wireless network may perform data transmission by using 3G/4G/5G mobile communication network, bluetooth, Zigbee, or WiFi, for example.
The terminal may employ various suitable storage structures to cache the collected user behavior logs in the database of the application. Fig. 8 illustrates a schematic diagram of a first log information storage structure according to an embodiment of the present disclosure. As shown in fig. 8, the first log information storage structure may include: the user operates the information data table, the long press action detail table, the click action detail table, the text input action detail table, the click action detail table, the Activity/Fragment switching action detail table and the Activity/Fragment and service module mapping table. The user operation information data table is used for recording user operation information of the application program used by a user, and comprises fields of action serial numbers, user Identifications (IDs), occurrence time, action types, action descriptions and the like. The long press action detail table, the click action detail table, the text input action detail table, the touch action detail table and the Activity/Fragment switching action detail table are respectively used for recording long press action, click action, text input action, touch action and page switching action. These action detail tables each contain a respective action sequence number field that is associated with the action sequence number field contained in the user operation information data table. The long-press action list and the click action list further include a long-press control identifier, for example, when the long-press control identifier is 1, the indication action is taken as the long-press action, and when the long-press control identifier is 0, the indication action is taken as the click action; the text input action list also comprises text specific contents; the touch action list also contains action types such as press, lift, move, and the like and screen coordinates corresponding to the actions; the Activity/Fragment switching action list further includes an Activity/Fragment identifier for indicating a page to be switched, where the Activity/Fragment identifier is associated with the Activity/Fragment identifier in the Activity/Fragment and service module mapping table, and the Activity/Fragment identifier in the Activity/Fragment and service module mapping table has a mapping relationship with the service module identifier, that is, by indicating the mapping relationship between the Activity/Fragment identifier of the page and the service module identifier in the Activity/Fragment and service module mapping table, the service module corresponding to the page in the application program can be known.
The method of collecting user behavior information according to the embodiments of the present disclosure has been described above with reference to the accompanying drawings. In the method, the terminal can collect the first log and the second log, and upload the collected user behavior logs to the server side in a networking state, so that the server side can perform backtracking construction of user behaviors.
The following describes an apparatus for backtracking and constructing user behavior and an apparatus for collecting user behavior information according to an embodiment of the present disclosure. Fig. 9 is a schematic block diagram illustrating an apparatus 9000 of backtracking build user behavior in accordance with an embodiment of the present disclosure.
As shown in fig. 9, device 9000 comprises a communication module 9200 and a backtracking build module 9400. The communication module 9200 is configured to receive a first log and a second log associated with a user behavior. For example, the communication module 9200 may perform step 1200 of the method 1000 of backtracking build user behavior as shown in fig. 1. The backtracking construction module 9400 is configured to backtrack construct user behavior based on the first log and the second log received by the communication module 9200. For example, the backtracking build module 9400 can perform step 1400 of the method 1000 of backtracking build user behavior as shown in FIG. 1.
Optionally, the backtracking construction module 9400 further comprises: the time determining module is configured to determine time corresponding to each log record in the first log and the second log; a combination module configured to combine each log record in the first log and the second log in chronological order based on the determined time; and the behavior backtracking module is configured to backtrack and construct the user behavior based on the log records in the combined first log and the second log.
Optionally, the combination module further comprises: the first extraction module is configured to extract log records for recording the interactive operation of the user and the application program from the first log; the operation time determining module is configured to determine the time of the recorded interactive operation for each log record for recording the interactive operation between the user and the application program; a second extraction module configured to extract log records from the second log corresponding to the determined times at which the interactive operations occurred; and a pairing combination module configured to pair-combine the respective log records extracted from the first log with the respective log records extracted from the second log based on the determined time.
Optionally, the behavior backtracking module further comprises: the candidate behavior determining module is configured to determine candidate user behaviors for any log record extracted from the first log based on the recorded interaction operation between the user and the application program; and the verification module is configured to determine whether hardware-related information recorded by the log records in the second log combined with any log record pair extracted from the first log is matched with the determined candidate user behavior, wherein if the hardware-related information is matched with the determined candidate user behavior, the user behavior is determined to be the determined candidate user behavior, and otherwise, the user behavior is determined to be abnormal.
It should be noted that, in the embodiment of the present disclosure, each module of the device 9000 corresponds to each step of the foregoing method for building a user behavior by backtracking, and for specific functions and technical effects of the device 9000, reference may be made to related descriptions of the method for building a user behavior by backtracking, which are not described herein again. The components and configuration of the device 9000 shown in fig. 9 are exemplary only, and not limiting, as the device 9000 may comprise other components and configurations as desired.
Fig. 10 is a schematic block diagram illustrating an apparatus 10000 that collects user behavior information according to an embodiment of the present disclosure.
As shown in fig. 10, the apparatus 10000 includes a first log collection module 10200, a second log collection module 10400, and a communication module 10600.
The first log collection module 10200 is configured to collect user operation information of the user using the application program to form a first log. For example, the first log collection module 10200 can perform step 7200 of method 7000 of collecting user behavior information as shown in fig. 7. The second log collection module 10400 is configured to collect hardware related information recorded by the terminal executing the application program, and form a second log. For example, second log collection module 10400 can perform step 7400 of method 7000 of collecting user behavior information as shown in fig. 7. The communication module 10600 is configured to upload the first log and the second log collected by the first log collection module 10200 and the second log collection module 10400, respectively, for backtracking construction of user behavior. For example, communication module 10600 may perform step 7600 of method 7000 of collecting user behavior information as shown in FIG. 7.
Optionally, the first log collection module 10200 further comprises: the operation data acquisition module is configured to call a predefined base class to acquire operation data of the application program used by the user; and an operation information determination module configured to determine user operation information based on the operation data, wherein a predefined base class encapsulates an agent that collects the operation data, and wherein the agent that collects the operation data comprises: the method comprises the steps of obtaining a click action agent, obtaining a long press action agent, obtaining a touch action agent, obtaining a text input action agent and obtaining a service information agent.
It should be noted that, in the embodiment of the present disclosure, each module of the device 10000 corresponds to each step of the foregoing method for acquiring user behavior information, and for specific functions and technical effects of the device 10000, reference may be made to related description of a method for building user behaviors by backtracking, which is not described herein again. The components and configuration of device 10000 shown in fig. 10 are exemplary only, and not limiting, and device 10000 can include other components and configurations as desired.
According to another aspect of the present disclosure, there is also provided an apparatus for backtracking and constructing user behavior. Fig. 11 shows a schematic diagram of an apparatus 11000 for backtracking build user behavior in accordance with an embodiment of the present disclosure.
As shown in fig. 11, the device 11000 may include one or more processors 11200, and one or more memories 11400. Stored in memory 11400 is computer readable code which, when executed by the one or more processors 11200, may perform the method for backtracking build user behavior as described above.
According to another aspect of the disclosure, an apparatus for collecting user behavior information is also provided. Fig. 12 shows a schematic diagram of a device 12000 for collecting user behavior information according to an embodiment of the disclosure.
As shown in fig. 12, the device 12000 may include one or more processors 12200, and one or more memories 12400. Stored in memory 12400 is computer readable code which, when executed by the one or more processors 12200, may perform the methods for gathering user behavior information as described above.
According to yet another aspect of the present disclosure, there is also provided a computer-readable storage medium. Fig. 13 shows a schematic diagram of a storage medium 13000 according to an embodiment of the disclosure.
As shown in FIG. 13, computer-readable instructions 13200 are stored on computer-readable storage medium 13400. The computer readable instructions 13200, when executed by a processor, may perform the method for collecting user behavior information or building backtracks of user behavior according to embodiments of the present disclosure described with reference to the above figures. Computer-readable storage media include, but are not limited to, volatile memory and/or nonvolatile memory, for example. Volatile memory can include, for example, Random Access Memory (RAM), cache memory (or the like). The non-volatile memory may include, for example, Read Only Memory (ROM), a hard disk, flash memory, and the like.
Those skilled in the art will appreciate that the disclosure of the present disclosure is susceptible to numerous variations and modifications. For example, the various devices or components described above may be implemented in hardware, or may be implemented in software, firmware, or a combination of some or all of the three.
In addition, while the present disclosure makes various references to certain elements of a system according to embodiments of the present disclosure, any number of different elements may be used and run on a terminal and/or server. These units are merely illustrative and different aspects of the systems and methods may use different units.
It will be understood by those skilled in the art that all or part of the steps of the above methods may be implemented by instructing the relevant hardware through a program, and the program may be stored in a computer readable storage medium, such as a read-only memory, a magnetic or optical disk, and the like. Alternatively, all or part of the steps of the above embodiments may be implemented using one or more integrated circuits. Accordingly, each module/unit in the above embodiments may be implemented in the form of hardware, and may also be implemented in the form of a software functional module. The present disclosure is not limited to any specific form of combination of hardware and software.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this disclosure belongs. It will be further understood that terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with their meaning in the context of the relevant art and will not be interpreted in an idealized or overly formal sense unless expressly so defined herein.
The foregoing is illustrative of the present disclosure and is not to be construed as limiting thereof. Although a few exemplary embodiments of this disclosure have been described, those skilled in the art will readily appreciate that many modifications are possible in the exemplary embodiments without materially departing from the novel teachings and advantages of this disclosure. Accordingly, all such modifications are intended to be included within the scope of this disclosure as defined in the claims. It is to be understood that the foregoing is illustrative of the present disclosure and is not to be construed as limited to the specific embodiments disclosed, and that modifications to the disclosed embodiments, as well as other embodiments, are intended to be included within the scope of the appended claims. The present disclosure is defined by the claims and their equivalents.

Claims (14)

1. A method of building user behavior retrospectively, the method comprising:
receiving a first log and a second log associated with a user behavior; and
building the user behavior based on the first log and second log backtracks,
the first log is used for recording user operation information of a user using an application program, and the second log is used for recording hardware related information collected by a terminal executing the application program.
2. The method of claim 1, wherein the building the user behavior based on the first log and the second log backtracks further comprises:
determining the time corresponding to each log record in the first log and the second log;
combining, based on the time, the log records in the first log and the second log in chronological order; and
backtracking the user behavior based on log records in the combined first log and second log.
3. The method of claim 2, wherein said combining the log records of the first and second logs chronologically based on the time further comprises:
extracting log records for recording the interactive operation of the user and the application program from the first log;
for each log record of the interactive operation of the recording user and the application program, determining the time of the recorded interactive operation;
extracting a log record corresponding to the determined time of the interactive operation from the second log; and
and pairing and combining each log record extracted from the first log and each log record extracted from the second log based on the time.
4. The method of claim 3, wherein the retrospectively constructing the user behavior based on log records in the combined first log and second log further comprises:
for any log record extracted from the first log, determining candidate user behaviors based on the recorded interaction operation of the user and an application program; and
determining whether hardware-related information recorded by log records in a second log combined with any log record pair extracted from the first log matches the determined candidate user behavior,
if so, determining the user behavior as the determined candidate user behavior, otherwise, determining the user behavior is abnormal.
5. The method of claim 1, wherein the user operation information is collected through a buried point inside the application program, and the hardware-related information is collected by the terminal after the application program is started.
6. The method of any of claims 3-4, wherein the user operation information comprises: page browsing information, button use information, network request information, video shooting information and text input information; the hardware-related information includes: GPS information, sensor information, battery information, and memory information.
7. An apparatus for backtracking build user behavior, the apparatus comprising:
a processor;
a memory having computer readable instructions stored thereon which, when executed by the processor, perform a method of backtracking build user behavior as claimed in any of claims 1-6.
8. A storage medium storing computer readable instructions which, when executed by a computer, perform a method of backtracking build user behavior as claimed in any of claims 1 to 6.
9. A method of collecting user behavior information, comprising:
collecting user operation information of a user using an application program to form a first log;
acquiring hardware related information recorded by a terminal executing the application program to form a second log;
and uploading the first log and the second log for backtracking construction of user behaviors.
10. The method of claim 9, wherein the user operation information is collected through a buried point inside the application program, and the hardware-related information is collected by the terminal after the application program is started.
11. The method of any of claims 9-10, wherein the user operation information comprises: page browsing information, button use information, network request information, video shooting information and text input information; the hardware-related information includes: GPS information, sensor information, battery information, and memory information.
12. The method of any one of claims 9-10, wherein the collecting user operational information of a user using an application further comprises:
calling a predefined base class to collect operation data of the application program used by the user; and
determining the user operation information based on the operation data,
wherein the predefined base class encapsulates an agent that collects the operational data, and wherein the agent that collects the operational data comprises: the method comprises the steps of obtaining a click action agent, obtaining a long press action agent, obtaining a touch action agent, obtaining a text input action agent and obtaining a service information agent.
13. An apparatus for collecting user behavior information, the apparatus comprising:
a processor;
a memory having computer-readable instructions stored thereon which, when executed by the processor, perform the method of collecting user behavior information of any of claims 9-12.
14. A storage medium storing computer readable instructions which, when executed by a computer, perform a method of collecting user behavior information as claimed in any one of claims 9-12.
CN202110912551.5A 2021-08-10 2021-08-10 Method, equipment and storage medium for collecting information and backtracking to construct user behavior Pending CN113608987A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110912551.5A CN113608987A (en) 2021-08-10 2021-08-10 Method, equipment and storage medium for collecting information and backtracking to construct user behavior

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110912551.5A CN113608987A (en) 2021-08-10 2021-08-10 Method, equipment and storage medium for collecting information and backtracking to construct user behavior

Publications (1)

Publication Number Publication Date
CN113608987A true CN113608987A (en) 2021-11-05

Family

ID=78307883

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110912551.5A Pending CN113608987A (en) 2021-08-10 2021-08-10 Method, equipment and storage medium for collecting information and backtracking to construct user behavior

Country Status (1)

Country Link
CN (1) CN113608987A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104956715A (en) * 2013-01-25 2015-09-30 高通股份有限公司 Adaptive observation of behavioral features on a mobile device
CN106605218A (en) * 2014-07-03 2017-04-26 真实眼私人有限公司 Method of collecting and processing computer user data during interaction with web-based content
CN107402875A (en) * 2017-07-31 2017-11-28 深圳市金立通信设备有限公司 A kind of log recording method, terminal and computer-readable recording medium
CN110119345A (en) * 2019-04-16 2019-08-13 深圳市国鑫恒宇科技有限公司 A kind of method of instant recording USB port operation log
CN110362446A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Mobile application abnormal operation monitoring method, device, storage medium and electronic equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104956715A (en) * 2013-01-25 2015-09-30 高通股份有限公司 Adaptive observation of behavioral features on a mobile device
CN106605218A (en) * 2014-07-03 2017-04-26 真实眼私人有限公司 Method of collecting and processing computer user data during interaction with web-based content
CN107402875A (en) * 2017-07-31 2017-11-28 深圳市金立通信设备有限公司 A kind of log recording method, terminal and computer-readable recording medium
CN110119345A (en) * 2019-04-16 2019-08-13 深圳市国鑫恒宇科技有限公司 A kind of method of instant recording USB port operation log
CN110362446A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Mobile application abnormal operation monitoring method, device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN104899952B (en) Work attendance method and device based on instant messaging application
JP2019512807A (en) Computer system and method for providing asset event and signal data visualization
CN106164945A (en) Sight modeling and visualization
CN104063305A (en) Pressure testing method, device and system for intelligent terminal software
CN107800757B (en) User behavior recording method and device
CN105376335A (en) Method and device for collection data uploading
WO2022142685A1 (en) Infection probability prediction method and apparatus for infectious disease, storage medium and electronic device
CN105808399A (en) Method and device for remote debugging
US20200092019A1 (en) Method and system for determining signal strength for a mobile device
CN102184311A (en) Mobile personal digital assistant (PDA) field emergency command system
CN111817921B (en) Mobile test equipment, test method, device, system and networking method
CN114077525A (en) Abnormal log processing method and device, terminal equipment, cloud server and system
US9915929B1 (en) Monitoring availability of facility equipment
CN105574150A (en) Data processing method and device
CN113259152A (en) Network diagnosis method, network diagnosis device, electronic equipment and storage medium
CN105577472A (en) Data acquisition test method and device
CN111597065A (en) Method and device for collecting equipment information
CN110888731B (en) Method, device, equipment and storage medium for acquiring route data
EP2546815B1 (en) System and method of alarm installation and configuration
CN110472162A (en) Appraisal procedure, system, terminal and readable storage medium storing program for executing
CN104506526A (en) Hunting camera, and method, system and background system for monitoring hunting camera
JP6373217B2 (en) Information processing apparatus, program, and information providing method
CN104657902A (en) Integrated support intelligent terminal system for equipment and implementation method of intelligent terminal system
CN113608987A (en) Method, equipment and storage medium for collecting information and backtracking to construct user behavior
US20210195380A1 (en) Guardian service provision system, program, and guardian service provision method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination