CN114661569B - Dynamic buried point acquisition method for user behavior data - Google Patents
Dynamic buried point acquisition method for user behavior data Download PDFInfo
- Publication number
- CN114661569B CN114661569B CN202210306271.4A CN202210306271A CN114661569B CN 114661569 B CN114661569 B CN 114661569B CN 202210306271 A CN202210306271 A CN 202210306271A CN 114661569 B CN114661569 B CN 114661569B
- Authority
- CN
- China
- Prior art keywords
- point
- data
- buried
- user behavior
- embedded
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 45
- 238000013507 mapping Methods 0.000 claims abstract description 15
- 238000012545 processing Methods 0.000 claims abstract description 6
- 230000006399 behavior Effects 0.000 claims description 62
- 238000004590 computer program Methods 0.000 claims description 10
- 238000012544 monitoring process Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 claims description 6
- 230000001960 triggered effect Effects 0.000 claims description 3
- 238000005516 engineering process Methods 0.000 description 6
- 230000003068 static effect Effects 0.000 description 3
- 238000004891 communication Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000009933 burial Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000008439 repair process Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/34—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
- G06F11/3438—Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/448—Execution paradigms, e.g. implementations of programming paradigms
- G06F9/4482—Procedural
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- General Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Stored Programmes (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention discloses a method for collecting user behavior data by embedding points dynamically, which comprises the steps of determining a user behavior type, presetting a weight value of the user behavior type, and constructing the user behavior embedded points by the weight value; adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, and storing the mapping relation data; starting a program, acquiring a buried point configuration file, and reporting a control event; the buried point processor performs buried point processing according to the calling information and the buried point configuration information; judging whether the embedded point data is updated or not, storing an updated embedded point configuration file, and generating an updated embedded point data object; and acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server. According to the invention, different weight values can be set according to the user behavior type, so that the data characteristics which can reflect the user behavior are obtained; the real-time performance, accuracy and convenience of the user behavior data acquisition are improved.
Description
Technical Field
The invention relates to the technical field of computer communication, in particular to a method for collecting user behavior data by using a dynamic buried point.
Background
The data burial points enable related personnel such as products or operation to custom count more complex user data according to specific requirements. For example, when it is desired to track the behavior of a user, observe click data related to a page, or analyze the effect of an event, it is necessary to perform data embedding in advance, and then collect corresponding data through the preset data embedding when the user uses an application program, so as to perform analysis research.
When implementing the intelligent recommendation algorithm based on user behaviors, related data of the user behaviors are required to be collected first, and the user behavior data can influence the accuracy and efficiency of information recommendation, however, when a large amount of user behavior data is used for commodity recommendation, all user behavior data are often collected or single user behavior data are used, so that commodity recommendation accuracy and efficiency are low.
In the traditional technology, the user behavior data acquisition mainly depends on a static embedded point technology, and the technology can achieve the purpose of user behavior data acquisition, but has great inflexibility, needs to re-encode every time a service is added or modified, needs to reissue a program, has the conditions of great user behavior acquisition difficulty, long period and even missing embedded points or embedded point errors caused by the quality problem of the encoded embedded points, has great repair difficulty and uncontrollable safety, and therefore has higher risk.
Therefore, it is currently needed to provide a method for dynamically embedding point acquisition of user behavior data, so as to add and modify embedded point operation of a client at any time without re-issuing a program, thereby solving the above problems.
Disclosure of Invention
Aiming at the defects related to the background technology, the invention provides a dynamic embedded point acquisition method for user behavior data, which aims to solve the problems of low program release efficiency and frequent program re-release caused by the quality problem of the embedded points in the prior art.
The aim and the technical problems to be solved in the invention are realized by adopting the following technical scheme:
a method for collecting user behavior data dynamic buried points comprises the following steps:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
Preferably, the embedded point processing by the embedded point processor according to the call information and the embedded point configuration information includes:
Acquiring a calling instruction of the specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
and burying the specific point to be buried method according to the configuration information of the buried point.
Preferably, the method further comprises the step of judging whether the embedded point data is updated or not, and further comprises the step of reading the updated embedded point configuration file and performing revocation association with the embedded point processor on the deleted embedded point data.
Preferably, the dynamic buried data includes a unique identifier allocated to each service data, where the unique identifier is provided with a corresponding configuration and description at a server side.
Preferably, the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is also uploaded to a server.
Preferably, each piece of buried data to be detected in the method to be buried includes at least one of an operating system type, an occurrence time, identification information, a function description, an application version and a data generation time.
Preferably, the embedded point configuration file includes each method of the embedded point to be embedded and configuration information thereof, and the configuration information includes content of embedded point codes and event names.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above method.
According to the method for acquiring the user behavior data dynamic buried points, different weight values can be set according to the user behavior types, and the user behavior buried points are set for data acquisition recommended by commodities according to the user behavior types and the weight values, so that data characteristics which can reflect the user behaviors are obtained;
The embedded point operation can be newly added and modified in real time, a new program does not need to be reissued, the instantaneity, the accuracy and the convenience of the user behavior data acquisition are greatly improved, and the problems of high user behavior data acquisition difficulty, long period and low accuracy in the traditional static embedded point technology are solved.
Detailed Description
The technical scheme of the invention is further described in detail below. It is apparent that the described embodiments are only a part of the embodiments of the present disclosure, and not all the embodiments, and all other embodiments obtained by those skilled in the art without inventive effort are within the scope of the present disclosure.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components and/or sections, these elements, components and/or sections should not be limited by these terms.
In one embodiment, a method for dynamic embedded point acquisition of user behavior data includes:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
In one embodiment, when generating a buried point configuration file containing a buried point code, wherein the buried point code corresponds to an operation control event input by a user and other control events in a platform; the operation control event of the user includes: pull-up, pull-down, pull-left, pull-right, single click, double click, etc.; each operation control event of the user corresponds to a control function code; some of the more common operational control events, such as: the corresponding embedded point codes are generated together when the software interface is developed; this embodiment is applicable to some non-standardized, unique logic events, such as: and a control event for saving the image by a double-click mode is needed to be temporarily added in the interface, and then a buried point configuration file of a buried point code corresponding to the double-click action of the user is generated.
In one embodiment, the runtime development platform sends the embedded point configuration file to the software platform over a network.
When the platform monitors the embedded point codes, corresponding codes are generated, and the software platform monitors the generated codes at any time.
The software platform monitors operation control events input by a user, and the user can often perform the following steps on an interface: and (3) pulling up, pulling down and the like, generating corresponding codes by secondary operations, and monitoring the generated codes by the software platform at any time.
In one embodiment, the embedded point processor performs embedded point processing according to call information and the embedded point configuration information, including:
Acquiring a calling instruction of the specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
and burying the specific point to be buried method according to the configuration information of the buried point.
In one embodiment, determining whether there is an update of the embedded point data further includes reading the updated embedded point configuration file, and performing revocation association with the embedded point processor on the deleted embedded point data.
In one embodiment, the dynamic buried data includes a unique identifier allocated to each service data, where the unique identifier is configured and described at the server side.
In one embodiment, the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is also uploaded to a server.
In one embodiment, each piece of data to be embedded in the method to be embedded includes at least one of an operating system type, an occurrence time, identification information, a function description, an application version, and a data generation time.
In one embodiment, the embedded point configuration file includes each method to be embedded point and configuration information thereof, wherein the configuration information includes content of embedded point codes and event names.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above method.
The method of the invention further comprises the following steps:
the monitoring module is used for dynamically adding monitoring codes of user operation behaviors, and the user operation interface enters a self-defined monitoring event response, so that the monitoring module can be matched with a buried point event configuration item issued by a server according to the unique identification of the current operation interface, gathers the matched buried point configuration service related data, and finally uploads the data to the server according to a preset strategy, thereby achieving the purpose of gathering user behavior data.
And the matching module is used for defining the operation behaviors of the user and acquiring the mapping relation data of the embedded point configuration information and the operation behaviors of the user.
And the storage module is used for storing and issuing the mapping relation data and uploading the dynamic embedded point data of the user behavior to the server.
And the detection module is used for judging whether the embedded point data is updated when the client is started, if so, storing the updated embedded point configuration file to the client, and storing the latest version number information.
And the analysis module is used for decompressing the client, analyzing the new embedded point configuration file through the analysis unit, loading the analyzed configuration into the memory of the client, and finally uploading the operation behavior data of the user to the server through the storage module.
According to the method for acquiring the user behavior data dynamic buried points, different weight values can be set according to the user behavior types, and the user behavior buried points are set for data acquisition recommended by commodities according to the user behavior types and the weight values, so that data characteristics which can reflect the user behaviors are obtained;
The embedded point operation can be newly added and modified in real time, a new program does not need to be reissued, the instantaneity, the accuracy and the convenience of the user behavior data acquisition are greatly improved, and the problems of high user behavior data acquisition difficulty, long period and low accuracy in the traditional static embedded point technology are solved.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in a combination of hardware and software. When the software is applied, the corresponding functions may be stored in a computer-readable medium or transmitted as one or more instructions or code on the computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The preferred embodiments of the present specification disclosed above are merely used to help clarify the present specification. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, to thereby enable others skilled in the art to best understand and utilize the disclosure. This specification is to be limited only by the claims and the full scope and equivalents thereof.
Claims (7)
1. The method for collecting the dynamic buried points of the user behavior data is characterized by comprising the following steps of:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data comprises unique identifiers distributed for each service data, the unique identifiers are provided with corresponding configuration and description at a server side, the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and the mapping relation data is stored;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information, and the method comprises the following steps:
acquiring a calling instruction of a specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
burying points according to the specific point to be buried method according to the configuration information of the buried points;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
2. The method for dynamic embedded point collection of user behavior data according to claim 1, wherein determining whether there is an update of embedded point data further comprises reading an updated embedded point configuration file, and performing revocation association of deleted embedded point data with the embedded point processor.
3. The method for collecting the dynamic embedded points of the user behavior data according to claim 1, wherein the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is further uploaded to a server.
4. The method for dynamic embedded point collection of user behavior data according to claim 1, wherein each piece of embedded point data to be tested in the method for embedded point comprises at least one of an operating system type, an occurrence time, identification information, a function description, an application version, and a data generation time.
5. The method for collecting user behavior data according to claim 1, wherein the embedded point configuration file comprises each method to be embedded point and configuration information thereof, and the configuration information comprises content of embedded point codes and event names.
6. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of claim 1 when the computer program is executed.
7. A readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of the method of claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210306271.4A CN114661569B (en) | 2022-03-25 | 2022-03-25 | Dynamic buried point acquisition method for user behavior data |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210306271.4A CN114661569B (en) | 2022-03-25 | 2022-03-25 | Dynamic buried point acquisition method for user behavior data |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114661569A CN114661569A (en) | 2022-06-24 |
CN114661569B true CN114661569B (en) | 2024-04-26 |
Family
ID=82031240
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210306271.4A Active CN114661569B (en) | 2022-03-25 | 2022-03-25 | Dynamic buried point acquisition method for user behavior data |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114661569B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277409A (en) * | 2022-07-20 | 2022-11-01 | 杭州米络星科技(集团)有限公司 | Method and device for collecting and reporting buried point data in real time, acquisition system and terminal |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113385A1 (en) * | 2016-12-24 | 2018-06-28 | 上海壹账通金融科技有限公司 | Method and system for dynamically tracking application of client, client, and server |
CN110099101A (en) * | 2019-04-01 | 2019-08-06 | 厦门美柚信息科技有限公司 | It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting |
CN110647438A (en) * | 2019-08-13 | 2020-01-03 | 平安科技(深圳)有限公司 | Event monitoring method and device, computer equipment and storage medium |
CN110781064A (en) * | 2019-10-28 | 2020-02-11 | 深圳市思迪信息技术股份有限公司 | Method and device for dynamically embedding point to acquire client user behavior data |
CN112416728A (en) * | 2020-11-23 | 2021-02-26 | 平安普惠企业管理有限公司 | Buried point data acquisition method and device, client device and readable storage medium |
-
2022
- 2022-03-25 CN CN202210306271.4A patent/CN114661569B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018113385A1 (en) * | 2016-12-24 | 2018-06-28 | 上海壹账通金融科技有限公司 | Method and system for dynamically tracking application of client, client, and server |
CN110099101A (en) * | 2019-04-01 | 2019-08-06 | 厦门美柚信息科技有限公司 | It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting |
CN110647438A (en) * | 2019-08-13 | 2020-01-03 | 平安科技(深圳)有限公司 | Event monitoring method and device, computer equipment and storage medium |
CN110781064A (en) * | 2019-10-28 | 2020-02-11 | 深圳市思迪信息技术股份有限公司 | Method and device for dynamically embedding point to acquire client user behavior data |
CN112416728A (en) * | 2020-11-23 | 2021-02-26 | 平安普惠企业管理有限公司 | Buried point data acquisition method and device, client device and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN114661569A (en) | 2022-06-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN102298365B (en) | Method for automatically identifying and managing spaceflight measurement and control earth station device change | |
US8612372B2 (en) | Detection rule-generating facility | |
CN111782635B (en) | Data processing method and device, storage medium and electronic device | |
US20140143625A1 (en) | Computer-readable recording medium, failure prediction device and applicability determination method | |
CN111813655B (en) | Buried point test method and device, buried point management system and storage medium | |
CN105404581A (en) | Database evaluation method and device | |
CN114661569B (en) | Dynamic buried point acquisition method for user behavior data | |
CN111782534A (en) | Business process monitoring method, device and system | |
JP3916232B2 (en) | Knowledge-type operation management system, method and program | |
CN114490272A (en) | Data processing method and device, electronic equipment and computer readable storage medium | |
US10678864B2 (en) | Analysis model preparing system, programming apparatus, and analysis model preparing method | |
CN111242595B (en) | Method and device for exchanging information between ERP platform and payment platform | |
CN112541011A (en) | Power grid terminal fault processing method and device based on RPA and AI | |
CN115757107A (en) | Embedded point detection method, device, server and storage medium | |
CN111694724A (en) | Testing method and device of distributed table system, electronic equipment and storage medium | |
US8209359B2 (en) | Generating BPEL control flows | |
EP3591481B1 (en) | Device configuration management apparatus, system, and program | |
CN111159988A (en) | Model processing method and device, computer equipment and storage medium | |
CN110837454A (en) | Interface monitoring processing method and server | |
CN117234949B (en) | Test data noise reduction method and device, storage medium and computer equipment | |
CN109800168A (en) | The test method and device of the action event data of software | |
JP7475086B1 (en) | Editing method, editing device, and program | |
CN109445964B (en) | Method and device for data transmission with SAP system in external system | |
CN117615010A (en) | Conversion method and device of API (application program interface) request data, electronic equipment and storage medium | |
CN116881077A (en) | Server information management system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Country or region after: China Address after: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing Applicant after: China Enterprise Cloud Chain Co.,Ltd. Address before: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing Applicant before: ZHONGQI SCC (BEIJING) FINANCE INFORMATION SERVICE Co.,Ltd. Country or region before: China |
|
CB02 | Change of applicant information | ||
GR01 | Patent grant | ||
GR01 | Patent grant |