CN114661569A - Dynamic embedded point acquisition method for user behavior data - Google Patents

Dynamic embedded point acquisition method for user behavior data Download PDF

Info

Publication number
CN114661569A
CN114661569A CN202210306271.4A CN202210306271A CN114661569A CN 114661569 A CN114661569 A CN 114661569A CN 202210306271 A CN202210306271 A CN 202210306271A CN 114661569 A CN114661569 A CN 114661569A
Authority
CN
China
Prior art keywords
point
data
buried point
buried
user behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210306271.4A
Other languages
Chinese (zh)
Other versions
CN114661569B (en
Inventor
董罡
王伟平
段敏勤
张琳琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongqi Scc Beijing Finance Information Service Co ltd
Original Assignee
Zhongqi Scc Beijing Finance Information Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongqi Scc Beijing Finance Information Service Co ltd filed Critical Zhongqi Scc Beijing Finance Information Service Co ltd
Priority to CN202210306271.4A priority Critical patent/CN114661569B/en
Publication of CN114661569A publication Critical patent/CN114661569A/en
Application granted granted Critical
Publication of CN114661569B publication Critical patent/CN114661569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural

Abstract

The invention discloses a dynamic embedded point acquisition method for user behavior data, which comprises the steps of determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior embedded point by the weight value; adding data of buried points to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, and storing the mapping relation data; starting a program, acquiring a buried point configuration file, and reporting a control event; the embedded point processor carries out embedded point processing according to the calling information and the embedded point configuration information; judging whether the buried point data is updated or not, storing an updated buried point configuration file, and generating an updated buried point data object; and acquiring actual buried point data corresponding to the target program buried point, updating the effective buried point, and uploading the user behavior dynamic buried point data to the server. According to the invention, different weighted values can be set according to the user behavior type, so that data characteristics which can reflect the user behavior better are obtained; the real-time performance, the accuracy and the convenience of user behavior data acquisition are improved.

Description

Dynamic embedded point acquisition method for user behavior data
Technical Field
The invention relates to the technical field of computer communication, in particular to a dynamic embedded point acquisition method for user behavior data.
Background
The data burying point enables related personnel such as products or operation and the like to perform customized statistics on more complex user data according to specific requirements. For example, when a user wants to track the behavior of the user, observe click data related to a page, or analyze the effect of an event activity, data embedding needs to be performed in advance, and then corresponding data is collected through the preset data embedding points when the user uses an application program to perform analysis and research.
When the intelligent recommendation algorithm based on the user behaviors is implemented, relevant data of the user behaviors needs to be collected firstly, and the accuracy and the efficiency of information recommendation are affected by the data of the user behaviors.
In the traditional technology, user behavior data acquisition mainly depends on a static point burying technology, although the technology can achieve the purpose of user behavior data acquisition, the technology has great inflexibility, coding needs to be carried out again every time a service is added or modified, and a program needs to be released again, so that the conditions of large user behavior acquisition difficulty, long period, even point missing or point burying errors caused by the quality problem of coding point burying exist, the repairing difficulty is great, the safety is uncontrollable, and the risk is higher.
Therefore, it is desirable to provide a dynamic embedded point collecting method for user behavior data, so as to add and modify embedded point operations of a client at any time without reissuing a program, thereby solving the above-mentioned problems.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide a dynamic embedded point collecting method for user behavior data, aiming at the defects involved in the background art, so as to solve the problems of low program publishing efficiency and frequent program re-publishing requirement caused by the quality problem of the encoded embedded points in the prior art.
The technical problems of the invention are realized by adopting the following technical scheme:
a dynamic embedded point acquisition method for user behavior data comprises the following steps:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
adding buried point data to be set, generating a buried point configuration file, extracting buried point codes of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
starting a program, acquiring a buried point configuration file, associating a method to be buried with a buried point processor, generating a control event when monitoring that a buried point code is triggered, and reporting the control event;
when the method of the embedded point to be detected is called, the embedded point processor carries out embedded point processing according to the calling information and the embedded point configuration information;
judging whether buried point data is updated or not, if so, configuring the data of the file to be buried point into a buried point table to update a buried point configuration file, saving the updated buried point configuration file, and generating an updated buried point data object;
and acquiring actual buried point data corresponding to the target program buried point, updating the effective buried point, and uploading the user behavior dynamic buried point data to the server.
Preferably, the processing of the embedded point by the embedded point processor according to the calling information and the embedded point configuration information includes:
acquiring a calling instruction of the specific to-be-buried point method according to the calling message;
acquiring the configuration information of the burial point corresponding to the specific to-be-buried point method according to the calling instruction;
and embedding the specific point to be embedded method according to the configuration information of the embedded point.
Preferably, the determining whether there is an update of the buried point data further includes reading the updated buried point configuration file, and performing a revocation association between the deleted buried point data and the buried point processor.
Preferably, the dynamic buried point data includes a unique identifier allocated to each service data, and the unique identifier is provided with corresponding configuration and description at the server side.
Preferably, the mapping relationship data is established by generating a fixed value and the unique identifier through a preset algorithm, and the mapping relationship data is also uploaded to a server.
Preferably, each piece of data to be buried in the point-to-be-buried method includes at least one of an operating system type, occurrence time, identification information, function description, application version, and data generation time.
Preferably, the site configuration file includes each to-be-site embedding method and configuration information thereof, and the configuration information includes content of a site code and an event name.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the above-mentioned method.
The dynamic embedded point acquisition method for the user behavior data can set different weighted values according to the user behavior types, and set the embedded points of the user behavior for the data acquisition recommended by the commodity according to the user behavior types and the weighted values, so that data characteristics capable of reflecting the user behavior are obtained;
the method can be used for adding and modifying the embedded point operation in real time without re-issuing a new program, greatly improves the real-time property, accuracy and convenience of user behavior data acquisition, and solves the problems of high difficulty, long period and low accuracy of user behavior data acquisition in the traditional static embedded point technology.
Detailed Description
The technical solution of the present invention will be described in further detail below. It is understood that the embodiments described are only a few embodiments, not all embodiments, and that all other embodiments obtained by those skilled in the art without the use of inventive faculty are within the scope of the invention.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components and/or sections, these elements, components and/or sections should not be limited by these terms.
In one embodiment, a method for collecting user behavior data by dynamic point burying comprises the following steps:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
adding buried point data to be set, generating a buried point configuration file, extracting buried point codes of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
starting a program, acquiring a buried point configuration file, associating a method to be buried with a buried point processor, generating a control event when monitoring that a buried point code is triggered, and reporting the control event;
when the method of the to-be-buried point is called, the buried point processor carries out buried point processing according to calling information and the buried point configuration information;
judging whether buried point data is updated or not, if so, configuring the data of the file to be buried point into a buried point table to update a buried point configuration file, saving the updated buried point configuration file, and generating an updated buried point data object;
and acquiring actual buried point data corresponding to the target program buried point, updating the effective buried point, and uploading the user behavior dynamic buried point data to the server.
In one embodiment, a buried point configuration file containing buried point codes is generated, wherein the buried point codes correspond to operation control events input by a user and other control events in a platform; the operation control event of the user includes: pull up, pull down, pull left, pull right, click, double click, etc.; each operation control event of the user corresponds to a control function code; some of the more common operational control events, such as: pull-up and pull-down, wherein the corresponding embedded point codes are generated together when a software interface is developed; the present embodiment is applicable to some non-standardized, specific logic events, such as: and if the control event for saving the image in a double-click mode needs to be temporarily added in the interface, generating a buried point configuration file of the buried point code corresponding to the double-click behavior of the user.
In one embodiment, the runtime development platform sends the buried point configuration file to the software platform over a network.
When the platform monitors the embedded point codes, corresponding codes are also generated, and the software platform monitors the generated codes all the time.
The software platform monitors the operation control event input by the user, and the user often performs the following operations on the interface: and (4) performing operations such as pull-up and pull-down, generating corresponding codes by secondary operations, and monitoring the generated codes by the software platform at any time.
In one embodiment, the processing of the embedded point according to the calling information and the embedded point configuration information by the embedded point processor includes:
acquiring a calling instruction of the specific to-be-buried point method according to the calling message;
acquiring the configuration information of the burial point corresponding to the specific to-be-buried point method according to the calling instruction;
and burying points of the specific to-be-buried point method according to the configuration information of the buried points.
In one embodiment, the step of judging whether the buried point data is updated further comprises the step of reading the updated buried point configuration file and performing the canceling association of the deleted buried point data and the buried point processor.
In one embodiment, the dynamic buried point data includes a unique identifier allocated to each service data, and the unique identifier is provided with corresponding configuration and description at a server side.
In one embodiment, the mapping relationship data is established by generating a fixed value and the unique identifier through a preset algorithm, and the mapping relationship data is further uploaded to a server.
In one embodiment, each piece of data to be buried in the point-to-be-buried method comprises at least one of an operating system type, occurrence time, identification information, function description, application version and data generation time.
In one embodiment, the burial point configuration file comprises each to-be-buried point method and configuration information thereof, and the configuration information comprises the content of a burial point code and an event name.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the above-mentioned method.
The method of the invention also comprises the following steps:
the monitoring module is used for dynamically adding monitoring codes of user operation behaviors, and when a user operates an interface, the monitoring module can enter a self-defined monitoring event response, so that a buried point event configuration item issued by the server can be matched according to the unique identifier of the current operation interface, matched buried point configuration service related data is collected and finally uploaded to the server according to a preset strategy, and the purpose of collecting user behavior data is achieved.
And the matching module defines a user operation behavior and acquires the mapping relation data of the buried point configuration information and the user operation behavior.
And the storage module is used for storing the mapping relation data, issuing the mapping relation data and uploading the dynamic buried point data of the user behavior to the server.
And the detection module is used for judging whether the buried point data is updated or not when the client is started, and if the buried point data is updated, the updated buried point configuration file is stored to the client and the latest version number information is stored.
And the analysis module is used for decompressing the client and analyzing the new buried point configuration file through the analysis unit, loading the analyzed configuration into the memory of the client, and finally uploading the user operation behavior data to the server through the storage module.
The dynamic embedded point acquisition method for the user behavior data can set different weighted values according to the behavior types of the users, and set the embedded points of the user behaviors for the data acquisition recommended by commodities according to the behavior types of the users and the weighted values, so that data characteristics which can reflect the behaviors of the users better are obtained;
the method can be used for adding and modifying the embedded point operation in real time without re-issuing a new program, greatly improves the real-time property, accuracy and convenience of user behavior data acquisition, and solves the problems of high difficulty, long period and low accuracy of user behavior data acquisition in the traditional static embedded point technology.
Those skilled in the art will appreciate that the functionality described in the present invention may be implemented in a combination of hardware and software in one or more of the examples described above. When software is applied, the corresponding functionality may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The preferred embodiments of the present specification disclosed above are intended only to aid in the description of the specification. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the specification and its practical application, to thereby enable others skilled in the art to best understand the specification and its practical application. The specification is limited only by the claims and their full scope and equivalents.

Claims (9)

1. A dynamic embedded point acquisition method for user behavior data is characterized by comprising the following steps:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
adding buried point data to be set, generating a buried point configuration file, extracting buried point codes of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
starting a program, acquiring a buried point configuration file, associating a method to be buried with a buried point processor, generating a control event when monitoring that a buried point code is triggered, and reporting the control event;
when the method of the embedded point to be detected is called, the embedded point processor carries out embedded point processing according to the calling information and the embedded point configuration information;
judging whether buried point data is updated or not, if so, configuring the data of the file to be buried point into a buried point table to update a buried point configuration file, saving the updated buried point configuration file, and generating an updated buried point data object;
and acquiring actual buried point data corresponding to the target program buried point, updating the effective buried point, and uploading the user behavior dynamic buried point data to the server.
2. The dynamic embedded point collection method for user behavior data according to claim 1, wherein the embedded point processor performing embedded point processing according to invocation information and the embedded point configuration information comprises:
acquiring a calling instruction of the specific to-be-buried point method according to the calling message;
acquiring the configuration information of the burial point corresponding to the specific to-be-buried point method according to the calling instruction;
and embedding the specific point to be embedded method according to the configuration information of the embedded point.
3. The method as claimed in claim 1, wherein determining whether there is an update of the buried point data further comprises reading the updated buried point configuration file and performing a disassociation between the deleted buried point data and the buried point processor.
4. The dynamic user behavior data embedded point acquisition method according to claim 1, wherein the dynamic embedded point data comprises a unique identifier allocated to each service data, and the unique identifier is provided with corresponding configuration and description at a server side.
5. The dynamic user behavior data embedded point acquisition method according to claim 1, wherein the mapping relationship data is established by generating a fixed value and the unique identifier through a preset algorithm, and the mapping relationship data is further uploaded to a server.
6. The dynamic user behavior data embedding point collection method according to claim 1, wherein each piece of embedding point data to be detected in the point embedding method comprises at least one of an operating system type, occurrence time, identification information, function description, application version, and data generation time.
7. The dynamic point-burying collecting method for user behavior data as claimed in claim 1, wherein said point-burying configuration file includes each point-to-be-buried method and its configuration information, said configuration information includes the content of the point-burying code, the event name.
8. The present invention also provides a computer device, which is characterized by comprising a memory, a processor and a computer program stored in the memory and capable of running on the processor, wherein the processor executes the computer program to realize the steps of the method.
9. The invention also provides a readable storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the above-mentioned method.
CN202210306271.4A 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data Active CN114661569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210306271.4A CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210306271.4A CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Publications (2)

Publication Number Publication Date
CN114661569A true CN114661569A (en) 2022-06-24
CN114661569B CN114661569B (en) 2024-04-26

Family

ID=82031240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210306271.4A Active CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Country Status (1)

Country Link
CN (1) CN114661569B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277409A (en) * 2022-07-20 2022-11-01 杭州米络星科技(集团)有限公司 Method and device for collecting and reporting buried point data in real time, acquisition system and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN110099101A (en) * 2019-04-01 2019-08-06 厦门美柚信息科技有限公司 It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting
CN110647438A (en) * 2019-08-13 2020-01-03 平安科技(深圳)有限公司 Event monitoring method and device, computer equipment and storage medium
CN110781064A (en) * 2019-10-28 2020-02-11 深圳市思迪信息技术股份有限公司 Method and device for dynamically embedding point to acquire client user behavior data
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN110099101A (en) * 2019-04-01 2019-08-06 厦门美柚信息科技有限公司 It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting
CN110647438A (en) * 2019-08-13 2020-01-03 平安科技(深圳)有限公司 Event monitoring method and device, computer equipment and storage medium
CN110781064A (en) * 2019-10-28 2020-02-11 深圳市思迪信息技术股份有限公司 Method and device for dynamically embedding point to acquire client user behavior data
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277409A (en) * 2022-07-20 2022-11-01 杭州米络星科技(集团)有限公司 Method and device for collecting and reporting buried point data in real time, acquisition system and terminal

Also Published As

Publication number Publication date
CN114661569B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
US20070226715A1 (en) Application server system and computer product
US20100250730A1 (en) Automated license reconciliation for deployed applications
US11086618B2 (en) Populating a software catalogue with related product information
CN103632219A (en) Method and system for reallocating jobs for checking data quality
JP2007334580A (en) Support device, program, information processing system and support method
CN112182359A (en) Feature management method and system of recommendation model
CN113051503A (en) Browser page rendering method and device, electronic equipment and storage medium
CN114661569B (en) Dynamic buried point acquisition method for user behavior data
CN111459629A (en) Azkaban-based project operation method and device and terminal equipment
US20080172669A1 (en) System capable of executing workflows on target applications and method thereof
US10678864B2 (en) Analysis model preparing system, programming apparatus, and analysis model preparing method
CN108829391B (en) Method and system for identifying control in Fragment
CN112312335A (en) Reminding short message sending method and device and electronic equipment
CN109901822B (en) Object conversion method and device, storage medium and server
US20080178182A1 (en) Work state returning apparatus, work state returning method, and computer product
EP1710698A2 (en) Generic software requirements analyser
CN113934595A (en) Data analysis method and system, storage medium and electronic terminal
CN112069031B (en) Abnormality query method, device, equipment and computer readable storage medium
CN114386853A (en) Data auditing processing method, device and equipment based on universal auditing model
CN113672497A (en) Method, device and equipment for generating non-buried point event and storage medium
CN109344249B (en) Information processing method, information processing device, electronic equipment and computer readable storage medium
CN112765188A (en) Configuration information processing method, configuration management system, electronic device, and storage medium
CN113763094A (en) Service information processing method, device, server, medium and system
CN113419936B (en) Dynamic point burying method, device, equipment and storage medium
CN113282625B (en) SQL-based API data query and processing system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing

Applicant after: China Enterprise Cloud Chain Co.,Ltd.

Address before: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing

Applicant before: ZHONGQI SCC (BEIJING) FINANCE INFORMATION SERVICE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant