CN114661569B - Dynamic buried point acquisition method for user behavior data - Google Patents

Dynamic buried point acquisition method for user behavior data Download PDF

Info

Publication number
CN114661569B
CN114661569B CN202210306271.4A CN202210306271A CN114661569B CN 114661569 B CN114661569 B CN 114661569B CN 202210306271 A CN202210306271 A CN 202210306271A CN 114661569 B CN114661569 B CN 114661569B
Authority
CN
China
Prior art keywords
point
data
buried
user behavior
embedded
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210306271.4A
Other languages
Chinese (zh)
Other versions
CN114661569A (en
Inventor
董罡
王伟平
段敏勤
张琳琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Enterprise Cloud Chain Co ltd
Original Assignee
China Enterprise Cloud Chain Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Enterprise Cloud Chain Co ltd filed Critical China Enterprise Cloud Chain Co ltd
Priority to CN202210306271.4A priority Critical patent/CN114661569B/en
Publication of CN114661569A publication Critical patent/CN114661569A/en
Application granted granted Critical
Publication of CN114661569B publication Critical patent/CN114661569B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3438Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment monitoring of user actions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a method for collecting user behavior data by embedding points dynamically, which comprises the steps of determining a user behavior type, presetting a weight value of the user behavior type, and constructing the user behavior embedded points by the weight value; adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, and storing the mapping relation data; starting a program, acquiring a buried point configuration file, and reporting a control event; the buried point processor performs buried point processing according to the calling information and the buried point configuration information; judging whether the embedded point data is updated or not, storing an updated embedded point configuration file, and generating an updated embedded point data object; and acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server. According to the invention, different weight values can be set according to the user behavior type, so that the data characteristics which can reflect the user behavior are obtained; the real-time performance, accuracy and convenience of the user behavior data acquisition are improved.

Description

Dynamic buried point acquisition method for user behavior data
Technical Field
The invention relates to the technical field of computer communication, in particular to a method for collecting user behavior data by using a dynamic buried point.
Background
The data burial points enable related personnel such as products or operation to custom count more complex user data according to specific requirements. For example, when it is desired to track the behavior of a user, observe click data related to a page, or analyze the effect of an event, it is necessary to perform data embedding in advance, and then collect corresponding data through the preset data embedding when the user uses an application program, so as to perform analysis research.
When implementing the intelligent recommendation algorithm based on user behaviors, related data of the user behaviors are required to be collected first, and the user behavior data can influence the accuracy and efficiency of information recommendation, however, when a large amount of user behavior data is used for commodity recommendation, all user behavior data are often collected or single user behavior data are used, so that commodity recommendation accuracy and efficiency are low.
In the traditional technology, the user behavior data acquisition mainly depends on a static embedded point technology, and the technology can achieve the purpose of user behavior data acquisition, but has great inflexibility, needs to re-encode every time a service is added or modified, needs to reissue a program, has the conditions of great user behavior acquisition difficulty, long period and even missing embedded points or embedded point errors caused by the quality problem of the encoded embedded points, has great repair difficulty and uncontrollable safety, and therefore has higher risk.
Therefore, it is currently needed to provide a method for dynamically embedding point acquisition of user behavior data, so as to add and modify embedded point operation of a client at any time without re-issuing a program, thereby solving the above problems.
Disclosure of Invention
Aiming at the defects related to the background technology, the invention provides a dynamic embedded point acquisition method for user behavior data, which aims to solve the problems of low program release efficiency and frequent program re-release caused by the quality problem of the embedded points in the prior art.
The aim and the technical problems to be solved in the invention are realized by adopting the following technical scheme:
a method for collecting user behavior data dynamic buried points comprises the following steps:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
Preferably, the embedded point processing by the embedded point processor according to the call information and the embedded point configuration information includes:
Acquiring a calling instruction of the specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
and burying the specific point to be buried method according to the configuration information of the buried point.
Preferably, the method further comprises the step of judging whether the embedded point data is updated or not, and further comprises the step of reading the updated embedded point configuration file and performing revocation association with the embedded point processor on the deleted embedded point data.
Preferably, the dynamic buried data includes a unique identifier allocated to each service data, where the unique identifier is provided with a corresponding configuration and description at a server side.
Preferably, the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is also uploaded to a server.
Preferably, each piece of buried data to be detected in the method to be buried includes at least one of an operating system type, an occurrence time, identification information, a function description, an application version and a data generation time.
Preferably, the embedded point configuration file includes each method of the embedded point to be embedded and configuration information thereof, and the configuration information includes content of embedded point codes and event names.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above method.
According to the method for acquiring the user behavior data dynamic buried points, different weight values can be set according to the user behavior types, and the user behavior buried points are set for data acquisition recommended by commodities according to the user behavior types and the weight values, so that data characteristics which can reflect the user behaviors are obtained;
The embedded point operation can be newly added and modified in real time, a new program does not need to be reissued, the instantaneity, the accuracy and the convenience of the user behavior data acquisition are greatly improved, and the problems of high user behavior data acquisition difficulty, long period and low accuracy in the traditional static embedded point technology are solved.
Detailed Description
The technical scheme of the invention is further described in detail below. It is apparent that the described embodiments are only a part of the embodiments of the present disclosure, and not all the embodiments, and all other embodiments obtained by those skilled in the art without inventive effort are within the scope of the present disclosure.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various elements, components and/or sections, these elements, components and/or sections should not be limited by these terms.
In one embodiment, a method for dynamic embedded point acquisition of user behavior data includes:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and storing the mapping relation data;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
In one embodiment, when generating a buried point configuration file containing a buried point code, wherein the buried point code corresponds to an operation control event input by a user and other control events in a platform; the operation control event of the user includes: pull-up, pull-down, pull-left, pull-right, single click, double click, etc.; each operation control event of the user corresponds to a control function code; some of the more common operational control events, such as: the corresponding embedded point codes are generated together when the software interface is developed; this embodiment is applicable to some non-standardized, unique logic events, such as: and a control event for saving the image by a double-click mode is needed to be temporarily added in the interface, and then a buried point configuration file of a buried point code corresponding to the double-click action of the user is generated.
In one embodiment, the runtime development platform sends the embedded point configuration file to the software platform over a network.
When the platform monitors the embedded point codes, corresponding codes are generated, and the software platform monitors the generated codes at any time.
The software platform monitors operation control events input by a user, and the user can often perform the following steps on an interface: and (3) pulling up, pulling down and the like, generating corresponding codes by secondary operations, and monitoring the generated codes by the software platform at any time.
In one embodiment, the embedded point processor performs embedded point processing according to call information and the embedded point configuration information, including:
Acquiring a calling instruction of the specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
and burying the specific point to be buried method according to the configuration information of the buried point.
In one embodiment, determining whether there is an update of the embedded point data further includes reading the updated embedded point configuration file, and performing revocation association with the embedded point processor on the deleted embedded point data.
In one embodiment, the dynamic buried data includes a unique identifier allocated to each service data, where the unique identifier is configured and described at the server side.
In one embodiment, the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is also uploaded to a server.
In one embodiment, each piece of data to be embedded in the method to be embedded includes at least one of an operating system type, an occurrence time, identification information, a function description, an application version, and a data generation time.
In one embodiment, the embedded point configuration file includes each method to be embedded point and configuration information thereof, wherein the configuration information includes content of embedded point codes and event names.
The invention also provides a computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the above method when executing the computer program.
The invention also provides a readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the above method.
The method of the invention further comprises the following steps:
the monitoring module is used for dynamically adding monitoring codes of user operation behaviors, and the user operation interface enters a self-defined monitoring event response, so that the monitoring module can be matched with a buried point event configuration item issued by a server according to the unique identification of the current operation interface, gathers the matched buried point configuration service related data, and finally uploads the data to the server according to a preset strategy, thereby achieving the purpose of gathering user behavior data.
And the matching module is used for defining the operation behaviors of the user and acquiring the mapping relation data of the embedded point configuration information and the operation behaviors of the user.
And the storage module is used for storing and issuing the mapping relation data and uploading the dynamic embedded point data of the user behavior to the server.
And the detection module is used for judging whether the embedded point data is updated when the client is started, if so, storing the updated embedded point configuration file to the client, and storing the latest version number information.
And the analysis module is used for decompressing the client, analyzing the new embedded point configuration file through the analysis unit, loading the analyzed configuration into the memory of the client, and finally uploading the operation behavior data of the user to the server through the storage module.
According to the method for acquiring the user behavior data dynamic buried points, different weight values can be set according to the user behavior types, and the user behavior buried points are set for data acquisition recommended by commodities according to the user behavior types and the weight values, so that data characteristics which can reflect the user behaviors are obtained;
The embedded point operation can be newly added and modified in real time, a new program does not need to be reissued, the instantaneity, the accuracy and the convenience of the user behavior data acquisition are greatly improved, and the problems of high user behavior data acquisition difficulty, long period and low accuracy in the traditional static embedded point technology are solved.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the present invention may be implemented in a combination of hardware and software. When the software is applied, the corresponding functions may be stored in a computer-readable medium or transmitted as one or more instructions or code on the computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The preferred embodiments of the present specification disclosed above are merely used to help clarify the present specification. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, to thereby enable others skilled in the art to best understand and utilize the disclosure. This specification is to be limited only by the claims and the full scope and equivalents thereof.

Claims (7)

1. The method for collecting the dynamic buried points of the user behavior data is characterized by comprising the following steps of:
determining a user behavior type, presetting a weight value of the user behavior type, and constructing a user behavior buried point according to the user behavior type and the weight value of the user behavior type;
Adding buried point data to be set, generating a buried point configuration file, extracting a buried point code of the buried point configuration file, receiving dynamic buried point data, wherein the dynamic buried point data comprises unique identifiers distributed for each service data, the unique identifiers are provided with corresponding configuration and description at a server side, the dynamic buried point data carries mapping relation data of buried point configuration information and user operation behaviors, and the mapping relation data is stored;
Starting a program, acquiring a buried point configuration file, associating a method to be buried point with a buried point processor, generating a control event when monitoring that the buried point code is triggered, and reporting the control event;
when the method to be buried is called, the buried point processor performs buried point processing according to calling information and the buried point configuration information, and the method comprises the following steps:
acquiring a calling instruction of a specific point to be buried method according to the calling message;
Acquiring configuration information of the buried point corresponding to the specific point to be buried method according to the calling instruction;
burying points according to the specific point to be buried method according to the configuration information of the buried points;
Judging whether the embedded point data is updated, if so, configuring the to-be-embedded point file data into an embedded point table to update the embedded point configuration file, storing the updated embedded point configuration file, and generating an updated embedded point data object;
And acquiring actual embedded point data corresponding to the embedded point of the target program, updating the effective embedded point, and uploading the dynamic embedded point data of the user behavior to a server.
2. The method for dynamic embedded point collection of user behavior data according to claim 1, wherein determining whether there is an update of embedded point data further comprises reading an updated embedded point configuration file, and performing revocation association of deleted embedded point data with the embedded point processor.
3. The method for collecting the dynamic embedded points of the user behavior data according to claim 1, wherein the mapping relation data is established with the unique identifier by generating a fixed value through a preset algorithm, and the mapping relation data is further uploaded to a server.
4. The method for dynamic embedded point collection of user behavior data according to claim 1, wherein each piece of embedded point data to be tested in the method for embedded point comprises at least one of an operating system type, an occurrence time, identification information, a function description, an application version, and a data generation time.
5. The method for collecting user behavior data according to claim 1, wherein the embedded point configuration file comprises each method to be embedded point and configuration information thereof, and the configuration information comprises content of embedded point codes and event names.
6. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method of claim 1 when the computer program is executed.
7. A readable storage medium, having stored thereon a computer program which, when executed by a processor, implements the steps of the method of claim 1.
CN202210306271.4A 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data Active CN114661569B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210306271.4A CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210306271.4A CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Publications (2)

Publication Number Publication Date
CN114661569A CN114661569A (en) 2022-06-24
CN114661569B true CN114661569B (en) 2024-04-26

Family

ID=82031240

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210306271.4A Active CN114661569B (en) 2022-03-25 2022-03-25 Dynamic buried point acquisition method for user behavior data

Country Status (1)

Country Link
CN (1) CN114661569B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277409A (en) * 2022-07-20 2022-11-01 杭州米络星科技(集团)有限公司 Method and device for collecting and reporting buried point data in real time, acquisition system and terminal

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN110099101A (en) * 2019-04-01 2019-08-06 厦门美柚信息科技有限公司 It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting
CN110647438A (en) * 2019-08-13 2020-01-03 平安科技(深圳)有限公司 Event monitoring method and device, computer equipment and storage medium
CN110781064A (en) * 2019-10-28 2020-02-11 深圳市思迪信息技术股份有限公司 Method and device for dynamically embedding point to acquire client user behavior data
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018113385A1 (en) * 2016-12-24 2018-06-28 上海壹账通金融科技有限公司 Method and system for dynamically tracking application of client, client, and server
CN110099101A (en) * 2019-04-01 2019-08-06 厦门美柚信息科技有限公司 It is a kind of to bury method, system, equipment and its a storage medium for dynamic setting
CN110647438A (en) * 2019-08-13 2020-01-03 平安科技(深圳)有限公司 Event monitoring method and device, computer equipment and storage medium
CN110781064A (en) * 2019-10-28 2020-02-11 深圳市思迪信息技术股份有限公司 Method and device for dynamically embedding point to acquire client user behavior data
CN112416728A (en) * 2020-11-23 2021-02-26 平安普惠企业管理有限公司 Buried point data acquisition method and device, client device and readable storage medium

Also Published As

Publication number Publication date
CN114661569A (en) 2022-06-24

Similar Documents

Publication Publication Date Title
CN102298365B (en) Method for automatically identifying and managing spaceflight measurement and control earth station device change
US8612372B2 (en) Detection rule-generating facility
CN111782635B (en) Data processing method and device, storage medium and electronic device
US20140143625A1 (en) Computer-readable recording medium, failure prediction device and applicability determination method
CN111813655B (en) Buried point test method and device, buried point management system and storage medium
CN105404581A (en) Database evaluation method and device
CN114661569B (en) Dynamic buried point acquisition method for user behavior data
CN111782534A (en) Business process monitoring method, device and system
JP3916232B2 (en) Knowledge-type operation management system, method and program
CN114490272A (en) Data processing method and device, electronic equipment and computer readable storage medium
US10678864B2 (en) Analysis model preparing system, programming apparatus, and analysis model preparing method
CN111242595B (en) Method and device for exchanging information between ERP platform and payment platform
CN112541011A (en) Power grid terminal fault processing method and device based on RPA and AI
CN115757107A (en) Embedded point detection method, device, server and storage medium
CN111694724A (en) Testing method and device of distributed table system, electronic equipment and storage medium
US8209359B2 (en) Generating BPEL control flows
EP3591481B1 (en) Device configuration management apparatus, system, and program
CN111159988A (en) Model processing method and device, computer equipment and storage medium
CN110837454A (en) Interface monitoring processing method and server
CN117234949B (en) Test data noise reduction method and device, storage medium and computer equipment
CN109800168A (en) The test method and device of the action event data of software
JP7475086B1 (en) Editing method, editing device, and program
CN109445964B (en) Method and device for data transmission with SAP system in external system
CN117615010A (en) Conversion method and device of API (application program interface) request data, electronic equipment and storage medium
CN116881077A (en) Server information management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Country or region after: China

Address after: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing

Applicant after: China Enterprise Cloud Chain Co.,Ltd.

Address before: 100078 4th floor, CRRC building, building 15, fangchengyuan 1st District, Fengtai District, Beijing

Applicant before: ZHONGQI SCC (BEIJING) FINANCE INFORMATION SERVICE Co.,Ltd.

Country or region before: China

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant