CN114944942B - Data reporting method and device based on effective buried points, computer equipment and medium - Google Patents

Data reporting method and device based on effective buried points, computer equipment and medium Download PDF

Info

Publication number
CN114944942B
CN114944942B CN202210461007.8A CN202210461007A CN114944942B CN 114944942 B CN114944942 B CN 114944942B CN 202210461007 A CN202210461007 A CN 202210461007A CN 114944942 B CN114944942 B CN 114944942B
Authority
CN
China
Prior art keywords
buried point
point
buried
effective
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210461007.8A
Other languages
Chinese (zh)
Other versions
CN114944942A (en
Inventor
朱尧
傅群慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An E Wallet Electronic Commerce Co Ltd
Original Assignee
Ping An E Wallet Electronic Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An E Wallet Electronic Commerce Co Ltd filed Critical Ping An E Wallet Electronic Commerce Co Ltd
Priority to CN202210461007.8A priority Critical patent/CN114944942B/en
Publication of CN114944942A publication Critical patent/CN114944942A/en
Application granted granted Critical
Publication of CN114944942B publication Critical patent/CN114944942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/10Flow control; Congestion control
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/70Admission control; Resource allocation
    • H04L47/80Actions related to the user profile or the type of traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1416Event detection, e.g. attack signature detection

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Geophysics And Detection Of Objects (AREA)

Abstract

The invention discloses a data reporting method, a device, computer equipment and a medium based on effective buried points, wherein the method comprises the following steps: when a buried point reporting function triggering instruction is monitored, generating data reporting request information; analyzing and extracting buried points to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data; judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result; and when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.

Description

Data reporting method and device based on effective buried points, computer equipment and medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and apparatus for reporting data based on effective buried points, a computer device, and a medium.
Background
In order to understand various states of the client in the running process and various behavior characteristics of the user in the using process, a developer writes code records in specific logic, and finally reports the code records to the server. The act of a developer writing these codes is called a buried point.
At present, all internet companies need to collect some traffic data representing user behaviors, such as information of page access, contact clicking, stay time, advertisement exposure and the like, by burying points in an APP, the traffic data is mainly used for adjusting the page layout of the APP, optimizing a user access link, analyzing user attention to hot spot products and the like, so that the use experience of client products is improved, page conversion rate and product yield are improved, since burying point reporting configurations are continuously accumulated along with business development, APP versions are changed, burying point configurations are more and more, which are invalid due to business change and other reasons, which are still valid states, the traffic data are difficult to distinguish by limited information, and meanwhile, too much redundant information reported by the invalid burying points consumes more and more user traffic, and reported data cleaning logic is more and more complex, so that resource consumption is more and more serious.
Disclosure of Invention
Based on this, it is necessary to provide a method, a device, a computer device and a medium for reporting data based on effective embedded points, aiming at the problem of serious resource consumption.
A data reporting method based on effective buried points includes: when a buried point reporting function triggering instruction is monitored, generating data reporting request information; analyzing and extracting buried points to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data; judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result; and when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database.
In one embodiment, when the trigger instruction of the embedded point reporting function is monitored, before generating the data reporting request information, the method further includes: verifying each buried point in the buried point set in the current system according to a preset period, and determining each target buried point passing verification; constructing a buried point configuration file according to each target buried point passing verification; and when the APP version of the current system is updated, obtaining a pre-generated effective buried point list according to the buried point configuration file.
In one embodiment, the set of buried points includes time-limited buried points and buried points in a long-term valid white list; verifying each buried point in the buried point set in the current system according to a preset period, and determining each target buried point passing verification, wherein the method comprises the following steps: determining each buried point in the long-term effective white list as each first buried point passing verification; acquiring the buried point validity period of each time limit buried point; when the operation time length of each time limit buried point is more than or equal to the effective time length of the buried point, marking an invalid tag for each time limit buried point, and executing the offline operation of each time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point reaches a preset time length, acquiring a management terminal of each time limit buried point, generating early warning information of each time limit buried point and transmitting the early warning information to a management terminal corresponding to the time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point does not reach the preset time length, determining each time limit buried point as each second buried point passing verification; each first buried point and each second buried point are determined as each target buried point passing verification.
In one embodiment, when a trigger instruction of a buried point reporting function is monitored, generating data reporting request information includes: when a trigger instruction aiming at a preset contact in a front-end page is received, positioning a target embedded point code segment according to the trigger instruction; executing the target embedded point code segment to generate an embedded point reporting function triggering instruction; when the flow probe monitors the embedded point reporting function triggering instruction, acquiring parameter information in the embedded point reporting function triggering instruction; and determining a plurality of variable values of the parameter information, and carrying out data encapsulation on the plurality of variable values and the pre-constructed request script to obtain the data reporting request information.
In one embodiment, analyzing and extracting the buried point to be verified in the data report request information includes: analyzing the data reporting request information according to a decision tree analysis algorithm to obtain the target node number of the data reporting request information; traversing each node content in the target node number by adopting a depth-first traversal algorithm, and performing binary conversion on each node content to obtain binary data of each node content; acquiring a universal identifier of a buried point parameter in a current system; calculating target distances between binary data of each node content and binary data of the universal identifier to obtain a plurality of target distances; and determining the node content corresponding to the maximum value in the plurality of target distances as the buried point to be verified.
In one embodiment, determining whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a determination result includes: acquiring a first key value of a current buried point of a buried point to be verified; acquiring a plurality of second key values of different types of buried points in a pre-generated effective buried point list; when the key value identical to the first key value exists in the plurality of second key values, determining that the buried point to be verified is an effective buried point; or when the key value which is the same as the first key value does not exist in the plurality of second key values, determining that the buried point to be verified is an invalid buried point; and determining whether the buried point to be verified is an effective buried point or an ineffective buried point as a judging result.
In one embodiment, the method further comprises: and when the judging result is invalid buried points, stopping reporting the data and performing offline operation on the buried points to be verified.
Data reporting device based on effective buried point, the device includes: the data reporting request information generation module is used for generating data reporting request information when the buried point reporting function triggering instruction is monitored; the embedded point to be verified extraction module is used for analyzing and extracting the embedded point to be verified in the data report request information; the embedded point is a preset code script for recording flow data; the judging result generating module is used for judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list and generating a judging result; and the flow data reporting module is used for executing the code segment of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to the database.
A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the effective buried point based data reporting method described above.
A medium storing computer readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of the above-described effective buried point based data reporting method.
According to the data reporting method, device, equipment and medium based on the effective embedded point, when the embedded point reporting function triggering instruction is monitored, the data reporting device based on the effective embedded point generates data reporting request information, and then analyzes and extracts the embedded point to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data; and judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, generating a judging result, executing code fragments of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the invention and together with the description, serve to explain the principles of the invention.
FIG. 1 is a diagram of an implementation environment of a method for reporting data based on effective buried points according to an embodiment of the present application;
FIG. 2 is a schematic diagram of the internal architecture of a computing device in one embodiment of the present application;
fig. 3 is a schematic diagram of a method for reporting data based on effective buried points according to an embodiment of the present application;
FIG. 4 is a flow diagram of a validation process for a system embedded point provided in one embodiment of the present application;
FIG. 5 is a schematic block diagram of a process for verifying validity of a buried point in an application scenario according to an embodiment of the present application;
fig. 6 is a schematic diagram of a device for reporting data based on effective embedded points according to an embodiment of the present application.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It will be understood that the terms "first," "second," and the like, as used herein, may be used to describe various elements, but these elements are not limited by these terms. These terms are only used to distinguish one element from another element.
Fig. 1 is a diagram of an implementation environment of a data reporting method based on effective buried points according to an embodiment, as shown in fig. 1, in the implementation environment, a server 110 and a client 120 are included.
The server 110 may be a server, which may specifically be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms, for example, a server device that stores a pre-generated valid buried point list. When the server 110 monitors the embedded point reporting function trigger instruction generated by the client 120, data reporting request information is generated, then the server 110 analyzes and extracts the embedded point to be verified in the data reporting request information, then the server 110 judges whether the embedded point to be verified is an effective embedded point according to a pre-generated effective embedded point list, a judging result is generated, finally the server 110 executes code fragments of the embedded point to be verified when the judging result is the effective embedded point, generates flow data of the embedded point to be verified, and reports the flow data to a database corresponding to the client 120.
It should be noted that, the client 120 may be a smart phone, a tablet computer, a notebook computer, a desktop computer, etc., but is not limited thereto. The server 110 and the client 120 may be connected by bluetooth, USB (Universal Serial Bus ) or other communication connection, which is not limited herein.
FIG. 2 is a schematic diagram of the internal structure of a computer device in one embodiment. As shown in fig. 2, the computer device includes a processor, a medium, a memory, and a network interface connected by a system bus. The medium of the computer equipment stores an operating system, a database and a computer readable instruction, the database can store a control information sequence, and when the computer readable instruction is executed by a processor, the processor can realize a data reporting method based on effective embedded points. The processor of the computer device is used to provide computing and control capabilities, supporting the operation of the entire device. The memory of the computer device may store computer readable instructions that, when executed by the processor, cause the processor to perform a method of reporting data based on the effective embedded point. The network interface of the computer device is for communicating with a terminal connection. It will be appreciated by those skilled in the art that the structure shown in fig. 2 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components. Wherein the medium is a readable storage medium.
The method for reporting data based on effective buried points according to the embodiment of the present application will be described in detail with reference to fig. 3 to 5. The method can be realized by a computer program and can be operated on a data reporting device based on an effective buried point of a von neumann system. The computer program may be integrated in the application or may run as a stand-alone tool class application.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Artificial intelligence infrastructure technologies generally include technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and other directions.
Referring to fig. 3, a flow chart of a data reporting method based on effective buried points is provided for an embodiment of the present application. As shown in fig. 3, the method of the embodiment of the present application may include the following steps:
s101, when a buried point reporting function triggering instruction is monitored, generating data reporting request information;
the embedded point reporting function triggering instruction is an instruction generated after the embedded point is preset in the front-end page, for example, the user accesses the page, clicks the contact point, and automatically triggers the contact point when the stay time of the page is longer than the preset time.
In the embodiment of the application, before practical application, an effective buried point list is required to be generated, when the effective buried point list is generated, each buried point in a buried point set in a current system is verified according to a preset period, each target buried point passing verification is determined, then a buried point configuration file is built according to each target buried point passing verification, and finally, when an APP version of the current system is updated, the pre-generated effective buried point list is obtained according to the buried point configuration file.
Specifically, the buried point set includes time-limited buried points and buried points in a white list that are effective for a long period of time.
Specifically, when verifying each buried point in a buried point set in a current system according to a preset period and determining each target buried point passing verification, firstly determining each buried point in a long-term effective white list as each first buried point passing verification, then obtaining the buried point effective period of each time limit buried point, and secondly marking a failure label for each time limit buried point and executing offline operation on each time limit buried point when the operation duration of each time limit buried point is greater than or equal to the buried point effective period; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point reaches a preset time length, acquiring a management terminal of each time limit buried point, generating early warning information of each time limit buried point and transmitting the early warning information to a management terminal corresponding to the time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point does not reach the preset time length, determining each time limit buried point as each second buried point passing verification, and finally determining each first buried point and each second buried point as each target buried point passing verification.
Further, when verifying each buried point in the buried point set in the current system according to the preset period, the verification can be realized by a timer mode or a mode of judging whether the current time reaches the preset time. When the timer is adopted for implementation, firstly, the timer is started to count down a preset period, and each buried point in the buried point set in the current system is verified after the count down is finished; or when the current moment reaches the preset moment, verifying each buried point in the buried point set in the current system.
It should be noted that, in the embedding point management platform, the embedding point validity period configuration items are newly added, and the configuration items share a plurality of options, for example, 3 months, 6 months and 12 months respectively, and default for 6 months, when the embedding point is newly added, the user can select the required validity period in 3 months, 6 months and 12 months, and if the embedding point is a core page/contact/exposure, the white list can be additionally reported, and the embedding point in the white list will be valid for a long time. Compared with the prior art, once the buried points are configured and on-line, the buried point configuration is always effective, the life cycle planning is carried out on all the buried point configurations, the important core buried points can be effective for a long time, other common buried points can be off-line after the historical service is completed, a closed loop is formed, and the integrity of data management is perfected.
For example, as shown in fig. 4, fig. 4 is a schematic flow chart of a validity verification process of a system buried point, where a buried point management platform life cycle management module may be configured to verify the validity period of all other non-whitelist buried points in the early morning, if the system is whitelist, the system is directly passed, if the system is not whitelist buried points need validity judgment, the validity state of each buried point in the system buried point management platform is updated, the buried point with the valid period is set to be in a "invalid" state, then a downloading operation is performed on the system buried point, a responsible person in the temporary buried point is reminded (reminded once a month in advance), the responsible person who receives the reminder may select to apply for the temporary buried point or perform immediate downloading operation, if any operation is not performed, the system buried point is automatically downloaded according to the original valid period, 3) if the system buried point is required to be whitelisted, the responsible person is submitted, the system buried point is applied in the system buried point management system, the validity state is updated, the system is skipped, finally, after the system buried point is completed, the key is completely in the valid state, and the system is configured with different types of the current key map files are updated, and the current system key map is configured, and the current key map type map is different from the system buried point map key map.
In one possible implementation manner, when a trigger instruction of a buried point reporting function is monitored, data reporting request information is generated, when a trigger instruction for a preset contact in a front-end page is received, a target buried point code segment is positioned according to the trigger instruction, then the target buried point code segment is executed, the buried point reporting function trigger instruction is generated, then when the trigger instruction of the buried point reporting function is monitored by a flow probe, parameter information in the buried point reporting function trigger instruction is obtained, a plurality of variable values of the parameter information are finally determined, and the plurality of variable values and a pre-built request script are subjected to data encapsulation, so that the data reporting request information is obtained.
S102, analyzing and extracting buried points to be verified in data reporting request information;
the embedded point is a preset code script for recording flow data;
in one possible implementation manner, when the buried point to be verified in the data reporting request information is analyzed and extracted, the data reporting request information is analyzed according to a decision tree analysis algorithm to obtain a target node number of the data reporting request information, then each node content in the target node number is traversed by a depth-first traversal algorithm, binary conversion is performed on each node content to obtain binary data of each node content, then a universal identifier of a buried point parameter in a current system is obtained, then target distances between the binary data of each node content and the binary data of the universal identifier are calculated to obtain a plurality of target distances, and finally the node content corresponding to the maximum value in the plurality of target distances is determined to be the buried point to be verified.
S103, judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result;
in one possible implementation manner, when a judging result is generated, first acquiring a first key value of a current buried point of a buried point to be verified, acquiring a plurality of second key values of different types of buried points in a pre-generated effective buried point list, and then determining the buried point to be verified as an effective buried point when the same key value as the first key value exists in the plurality of second key values; or when the key value which is the same as the first key value does not exist in the plurality of second key values, determining that the embedded point to be verified is an invalid embedded point, and finally determining that the embedded point to be verified is an effective embedded point or that the embedded point to be verified is an invalid embedded point as a judging result.
And S104, when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database.
In one possible implementation manner, when the judging result is an effective buried point, executing a code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database; or when the judging result is invalid buried point, stopping reporting the data and performing the offline operation on the buried point to be verified.
For example, as shown in fig. 5, when the current system APP is in actual use and the page or contact triggers the embedded point reporting function, embedded point effective verification is performed, that is, whether the current embedded point code segment is effective is determined according to whether the key value key of the embedded point to be verified is in an effective embedded point key list, if yes, the current embedded point code segment is effective, if not, the current embedded point code segment is not effective, if yes, the effective verification result is effective, reporting is continuously completed, and if yes, reporting links are skipped, so that the offline operation of the embedded point is realized.
It should be noted that, in order to be compatible with some point embedding schemes with relatively long histories in the prior art, a plurality of old cleaning rules must be reserved when cleaning data, and in the application, the historic cleaning rules can be synchronously off line, and only the latest cleaning rules need to be reserved, so that the process is simplified, the robustness of codes is improved, and the consumption of computing resources and storage resources is reduced. In the prior art, different historical versions of the embedded point rule in the same service domain can exist, so that the condition of disordered service caliber is caused. In the prior art, the data statistics result is more and more complicated, the time for searching the analysis data is more and more consuming, and the method eliminates a large number of low-importance or obsolete statistics items, so that the data application and the data analysis are more efficient and smooth.
In the embodiment of the application, when the effective embedded point-based data reporting device monitors an embedded point reporting function trigger instruction, data reporting request information is generated, and then the embedded point to be verified in the data reporting request information is analyzed and extracted; the embedded point is a preset code script for recording flow data; and judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, generating a judging result, executing code fragments of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.
The following are examples of the apparatus of the present invention that may be used to perform the method embodiments of the present invention. For details not disclosed in the embodiments of the apparatus of the present invention, please refer to the embodiments of the method of the present invention.
Fig. 6 is a schematic structural diagram of a data reporting device based on effective buried points according to an exemplary embodiment of the present invention. The data reporting device based on the effective embedded point can be realized into all or part of the equipment through software, hardware or the combination of the software and the hardware. The device 1 comprises a data reporting request information generating module 10, a buried point extracting module 20 to be verified, a judging result generating module 30 and a flow data reporting module 40.
The data report request information generating module 10 is configured to generate data report request information when a trigger instruction of the embedded point report function is monitored;
the to-be-verified buried point extraction module 20 is used for analyzing and extracting to-be-verified buried points in the data reporting request information; the embedded point is a preset code script for recording flow data;
the judging result generating module 30 is configured to judge whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generate a judging result;
and the flow data reporting module 40 is configured to execute the code segment of the buried point to be verified when the judgment result is an effective buried point, generate flow data of the buried point to be verified, and report the flow data to the database.
It should be noted that, when the high-voltage rear recognition device provided in the above embodiment performs the high-voltage rear recognition method, only the division of the above functional modules is used as an example, in practical application, the above functional allocation may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules, so as to complete all or part of the functions described above. In addition, the high-voltage rear recognition device provided in the above embodiment and the high-voltage rear recognition method embodiment belong to the same concept, which embody the detailed implementation process and are not described herein again.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
In the embodiment of the application, when the effective embedded point-based data reporting device monitors an embedded point reporting function trigger instruction, data reporting request information is generated, and then the embedded point to be verified in the data reporting request information is analyzed and extracted; the embedded point is a preset code script for recording flow data; and judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, generating a judging result, executing code fragments of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.
In one embodiment, a computer device is provided, the device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of: when a buried point reporting function triggering instruction is monitored, generating data reporting request information; analyzing and extracting buried points to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data; judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result; and when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database.
In one embodiment, when the processor executes the trigger instruction of the embedded point reporting function, before generating the data reporting request information, the processor further executes the following operations: verifying each buried point in the buried point set in the current system according to a preset period, and determining each target buried point passing verification; constructing a buried point configuration file according to each target buried point passing verification; and when the APP version of the current system is updated, obtaining a pre-generated effective buried point list according to the buried point configuration file.
In one embodiment, when the processor performs verification of each buried point in the set of buried points in the current system according to a preset period and determines each target buried point passing the verification, the processor specifically performs the following operations: determining each buried point in the long-term effective white list as each first buried point passing verification; acquiring the buried point validity period of each time limit buried point; when the operation time length of each time limit buried point is more than or equal to the effective time length of the buried point, marking an invalid tag for each time limit buried point, and executing the offline operation of each time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point reaches a preset time length, acquiring a management terminal of each time limit buried point, generating early warning information of each time limit buried point and transmitting the early warning information to a management terminal corresponding to the time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point does not reach the preset time length, determining each time limit buried point as each second buried point passing verification; each first buried point and each second buried point are determined as each target buried point passing verification.
In one embodiment, when the processor executes the trigger instruction of the embedded point reporting function and generates the data reporting request information, the processor specifically executes the following operations: when a trigger instruction aiming at a preset contact in a front-end page is received, positioning a target embedded point code segment according to the trigger instruction; executing the target embedded point code segment to generate an embedded point reporting function triggering instruction; when the flow probe monitors the embedded point reporting function triggering instruction, acquiring parameter information in the embedded point reporting function triggering instruction; and determining a plurality of variable values of the parameter information, and carrying out data encapsulation on the plurality of variable values and the pre-constructed request script to obtain the data reporting request information.
In one embodiment, when the processor performs parsing and extracting the buried point to be verified in the data reporting request information, the following operations are specifically performed: analyzing the data reporting request information according to a decision tree analysis algorithm to obtain the target node number of the data reporting request information; traversing each node content in the target node number by adopting a depth-first traversal algorithm, and performing binary conversion on each node content to obtain binary data of each node content; acquiring a universal identifier of a buried point parameter in a current system; calculating target distances between binary data of each node content and binary data of the universal identifier to obtain a plurality of target distances; and determining the node content corresponding to the maximum value in the plurality of target distances as the buried point to be verified.
In one embodiment, the processor determines whether the buried point to be verified is a valid buried point according to a pre-generated valid buried point list, and when generating a determination result, specifically performs the following operations: acquiring a first key value of a current buried point of a buried point to be verified; acquiring a plurality of second key values of different types of buried points in a pre-generated effective buried point list; when the key value identical to the first key value exists in the plurality of second key values, determining that the buried point to be verified is an effective buried point; or when the key value which is the same as the first key value does not exist in the plurality of second key values, determining that the buried point to be verified is an invalid buried point; and determining whether the buried point to be verified is an effective buried point or an ineffective buried point as a judging result.
In one embodiment, the processor performs the following operations: and when the judging result is invalid buried points, stopping reporting the data and performing offline operation on the buried points to be verified.
In the embodiment of the application, when the effective embedded point-based data reporting device monitors an embedded point reporting function trigger instruction, data reporting request information is generated, and then the embedded point to be verified in the data reporting request information is analyzed and extracted; the embedded point is a preset code script for recording flow data; and judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, generating a judging result, executing code fragments of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.
In one embodiment, a medium storing computer-readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps of: when a buried point reporting function triggering instruction is monitored, generating data reporting request information; analyzing and extracting buried points to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data; judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result; and when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database.
In one embodiment, when the processor executes the trigger instruction of the embedded point reporting function, before generating the data reporting request information, the processor further executes the following operations: verifying each buried point in the buried point set in the current system according to a preset period, and determining each target buried point passing verification; constructing a buried point configuration file according to each target buried point passing verification; and when the APP version of the current system is updated, obtaining a pre-generated effective buried point list according to the buried point configuration file.
In one embodiment, when the processor performs verification of each buried point in the set of buried points in the current system according to a preset period and determines each target buried point passing the verification, the processor specifically performs the following operations: determining each buried point in the long-term effective white list as each first buried point passing verification; acquiring the buried point validity period of each time limit buried point; when the operation time length of each time limit buried point is more than or equal to the effective time length of the buried point, marking an invalid tag for each time limit buried point, and executing the offline operation of each time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point reaches a preset time length, acquiring a management terminal of each time limit buried point, generating early warning information of each time limit buried point and transmitting the early warning information to a management terminal corresponding to the time limit buried point; or when the interval between the operation time length of each time limit buried point and the effective time length of the buried point does not reach the preset time length, determining each time limit buried point as each second buried point passing verification; each first buried point and each second buried point are determined as each target buried point passing verification.
In one embodiment, when the processor executes the trigger instruction of the embedded point reporting function and generates the data reporting request information, the processor specifically executes the following operations: when a trigger instruction aiming at a preset contact in a front-end page is received, positioning a target embedded point code segment according to the trigger instruction; executing the target embedded point code segment to generate an embedded point reporting function triggering instruction; when the flow probe monitors the embedded point reporting function triggering instruction, acquiring parameter information in the embedded point reporting function triggering instruction; and determining a plurality of variable values of the parameter information, and carrying out data encapsulation on the plurality of variable values and the pre-constructed request script to obtain the data reporting request information.
In one embodiment, when the processor performs parsing and extracting the buried point to be verified in the data reporting request information, the following operations are specifically performed: analyzing the data reporting request information according to a decision tree analysis algorithm to obtain the target node number of the data reporting request information; traversing each node content in the target node number by adopting a depth-first traversal algorithm, and performing binary conversion on each node content to obtain binary data of each node content; acquiring a universal identifier of a buried point parameter in a current system; calculating target distances between binary data of each node content and binary data of the universal identifier to obtain a plurality of target distances; and determining the node content corresponding to the maximum value in the plurality of target distances as the buried point to be verified.
In one embodiment, the processor determines whether the buried point to be verified is a valid buried point according to a pre-generated valid buried point list, and when generating a determination result, specifically performs the following operations: acquiring a first key value of a current buried point of a buried point to be verified; acquiring a plurality of second key values of different types of buried points in a pre-generated effective buried point list; when the key value identical to the first key value exists in the plurality of second key values, determining that the buried point to be verified is an effective buried point; or when the key value which is the same as the first key value does not exist in the plurality of second key values, determining that the buried point to be verified is an invalid buried point; and determining whether the buried point to be verified is an effective buried point or an ineffective buried point as a judging result.
In one embodiment, the processor performs the following operations: and when the judging result is invalid buried points, stopping reporting the data and performing offline operation on the buried points to be verified.
In the embodiment of the application, when the effective embedded point-based data reporting device monitors an embedded point reporting function trigger instruction, data reporting request information is generated, and then the embedded point to be verified in the data reporting request information is analyzed and extracted; the embedded point is a preset code script for recording flow data; and judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, generating a judging result, executing code fragments of the buried point to be verified when the judging result is the effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database. According to the method and the device, whether the data is reported is determined by judging the validity of the buried point, so that the data reporting amount is reduced from the source by controlling whether the code segment of the buried point is effective, the user flow is saved, and the consumption of subsequent data processing resources is reduced.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a computer readable medium, which when executed may comprise the steps of the embodiments of the methods described above. The medium may be a nonvolatile medium such as a magnetic disk, an optical disk, a Read-Only Memory (ROM), or a random access Memory (Random Access Memory, RAM).
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the invention, which are described in detail and are not to be construed as limiting the scope of the invention. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the invention, which are all within the scope of the invention. Accordingly, the scope of protection of the present invention is to be determined by the appended claims.

Claims (9)

1. The data reporting method based on the effective buried points is characterized by comprising the following steps:
when a buried point reporting function triggering instruction is monitored, generating data reporting request information; wherein,
when the triggering instruction of the embedded point reporting function is monitored, before generating the data reporting request information, the method further comprises the following steps:
verifying each buried point in a buried point set in the current system according to a preset period, and determining each target buried point passing verification;
Constructing a buried point configuration file according to each target buried point passing verification;
when the APP version of the current system is updated, a pre-generated effective buried point list is obtained according to the buried point configuration file;
analyzing and extracting buried points to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data;
judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list, and generating a judging result;
and when the judging result is an effective buried point, executing the code segment of the buried point to be verified, generating flow data of the buried point to be verified, and reporting the flow data to a database.
2. The method of claim 1, wherein the set of buried points includes time-limited buried points and buried points in a long-term active whitelist;
verifying each buried point in the buried point set in the current system according to a preset period, and determining each target buried point passing verification, wherein the method comprises the following steps:
determining each buried point in the long-term effective white list as each first buried point passing verification;
acquiring the buried point validity period of each time limit buried point;
when the operation time length of each time limit embedded point is greater than or equal to the embedded point effective period, marking an invalid tag for each time limit embedded point, and executing the offline operation of each time limit embedded point;
Or,
when the interval between the operation time length of each time limit embedded point and the effective time length of the embedded point reaches a preset time length, acquiring a management terminal of each time limit embedded point, generating early warning information of each time limit embedded point and sending the early warning information to the corresponding management terminal;
or,
when the interval between the operation time length of each time limit buried point and the effective time length of the buried point does not reach the preset time length, determining each time limit buried point as each second buried point passing verification;
and determining each first buried point and each second buried point as each target buried point passing verification.
3. The method of claim 1, wherein generating data reporting request information when the buried point reporting function trigger instruction is monitored comprises:
when a trigger instruction aiming at a preset contact in a front-end page is received, positioning a target embedded point code segment according to the trigger instruction;
executing the target embedded point code segment to generate an embedded point reporting function triggering instruction;
when the flow probe monitors the embedded point reporting function triggering instruction, acquiring parameter information in the embedded point reporting function triggering instruction;
and determining a plurality of variable values of the parameter information, and carrying out data encapsulation on the plurality of variable values and a pre-constructed request script to obtain data reporting request information.
4. The method of claim 1, wherein the parsing and extracting the buried point to be verified in the data reporting request message comprises:
analyzing the data reporting request information according to a decision tree analysis algorithm to obtain the target node number of the data reporting request information;
traversing each node content in the target node number by adopting a depth-first traversal algorithm, and performing binary conversion on each node content to obtain binary data of each node content;
acquiring a universal identifier of a buried point parameter in a current system;
calculating target distances between binary data of each node content and binary data of the universal identifier to obtain a plurality of target distances;
and determining the node content corresponding to the maximum value in the target distances as the buried point to be verified.
5. The method according to claim 1, wherein the determining whether the buried point to be verified is a valid buried point according to a pre-generated valid buried point list, and generating a determination result, includes:
acquiring a first key value of a current buried point of the buried point to be verified;
acquiring a plurality of second key values of different types of buried points in a pre-generated effective buried point list;
When the key values which are the same as the first key values exist in the plurality of second key values, determining that the buried point to be verified is an effective buried point; or,
when the key value which is the same as the first key value does not exist in the plurality of second key values, determining that the buried point to be verified is an invalid buried point;
and determining that the buried point to be verified is an effective buried point or the buried point to be verified is an ineffective buried point as a judging result.
6. The method according to claim 1, wherein the method further comprises:
and when the judging result is an invalid buried point, stopping reporting data and performing offline operation on the buried point to be verified.
7. Data reporting device based on effective buried point, characterized by that, said device includes:
the data reporting request information generation module is used for generating data reporting request information when the buried point reporting function triggering instruction is monitored; wherein,
when the triggering instruction of the embedded point reporting function is monitored, before generating the data reporting request information, the method further comprises the following steps:
verifying each buried point in a buried point set in the current system according to a preset period, and determining each target buried point passing verification;
constructing a buried point configuration file according to each target buried point passing verification;
When the APP version of the current system is updated, a pre-generated effective buried point list is obtained according to the buried point configuration file;
the buried point extraction module to be verified is used for analyzing and extracting the buried point to be verified in the data reporting request information; the embedded point is a preset code script for recording flow data;
the judging result generating module is used for judging whether the buried point to be verified is an effective buried point according to a pre-generated effective buried point list and generating a judging result;
and the flow data reporting module is used for executing the code segment of the buried point to be verified when the judging result is an effective buried point, generating flow data of the buried point to be verified, and reporting the flow data to a database.
8. A computer device comprising a memory and a processor, the memory having stored therein computer readable instructions which, when executed by the processor, cause the processor to perform the steps of the effective buried point based data reporting method according to any of claims 1 to 6.
9. A medium storing computer readable instructions which, when executed by one or more processors, cause the one or more processors to perform the steps of effective buried point based data reporting of any of claims 1 to 6.
CN202210461007.8A 2022-04-28 2022-04-28 Data reporting method and device based on effective buried points, computer equipment and medium Active CN114944942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210461007.8A CN114944942B (en) 2022-04-28 2022-04-28 Data reporting method and device based on effective buried points, computer equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210461007.8A CN114944942B (en) 2022-04-28 2022-04-28 Data reporting method and device based on effective buried points, computer equipment and medium

Publications (2)

Publication Number Publication Date
CN114944942A CN114944942A (en) 2022-08-26
CN114944942B true CN114944942B (en) 2024-04-05

Family

ID=82907771

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210461007.8A Active CN114944942B (en) 2022-04-28 2022-04-28 Data reporting method and device based on effective buried points, computer equipment and medium

Country Status (1)

Country Link
CN (1) CN114944942B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115510352B (en) * 2022-11-15 2023-05-05 中国外运股份有限公司 User behavior acquisition method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763062A (en) * 2018-05-09 2018-11-06 平安普惠企业管理有限公司 Bury the filter method and terminal device of a title
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium
CN111338933A (en) * 2020-02-07 2020-06-26 北京每日优鲜电子商务有限公司 Buried point verification method, device, equipment and storage medium
CN111984896A (en) * 2019-05-24 2020-11-24 上海哔哩哔哩科技有限公司 Buried point data acquisition method and device, computer equipment and readable storage medium
CN114185805A (en) * 2021-12-17 2022-03-15 北京有竹居网络技术有限公司 Embedded point verification method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108763062A (en) * 2018-05-09 2018-11-06 平安普惠企业管理有限公司 Bury the filter method and terminal device of a title
CN111984896A (en) * 2019-05-24 2020-11-24 上海哔哩哔哩科技有限公司 Buried point data acquisition method and device, computer equipment and readable storage medium
CN110362480A (en) * 2019-06-19 2019-10-22 平安普惠企业管理有限公司 Client buries a test method, device, equipment and storage medium
WO2020253034A1 (en) * 2019-06-19 2020-12-24 平安普惠企业管理有限公司 Client buried point test method, apparatus and device, and storage medium
CN111338933A (en) * 2020-02-07 2020-06-26 北京每日优鲜电子商务有限公司 Buried point verification method, device, equipment and storage medium
CN114185805A (en) * 2021-12-17 2022-03-15 北京有竹居网络技术有限公司 Embedded point verification method, device, equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
埋点管理系统分析与设计;廖爱红;罗铭涛;;办公自动化;20200815(第16期);35-37 *

Also Published As

Publication number Publication date
CN114944942A (en) 2022-08-26

Similar Documents

Publication Publication Date Title
CN108334781B (en) Virus detection method, device, computer readable storage medium and computer equipment
CN106557695B (en) A kind of malicious application detection method and system
CN107766580A (en) The method for pushing and device of message
CN108229170B (en) Software analysis method and apparatus using big data and neural network
US20210141779A1 (en) System and method for facilitating an objective-oriented data structure and an objective via the data structure
JP6324534B2 (en) Promotion status data monitoring method, apparatus, device, and non-executable computer storage medium
CN114844792B (en) Dynamic monitoring method, device, equipment and storage medium based on LUA language
CN112017007A (en) User behavior data processing method and device, computer equipment and storage medium
CN114944942B (en) Data reporting method and device based on effective buried points, computer equipment and medium
CN113157315A (en) Method, device, equipment and medium for identifying difference information of different versions of software
CN111666393A (en) Verification method and device of intelligent question-answering system, computer equipment and storage medium
CN114048024A (en) Task deployment method, device, equipment, storage medium and product
CN115454420A (en) Artificial intelligence algorithm model deployment system, method, equipment and storage medium
CN111240772A (en) Data processing method and device based on block chain and storage medium
CN116088846A (en) Processing method, related device and equipment for continuous integrated code format
KR20220089533A (en) Method and apparatus for receiving data of artificial intelligence system
CN115563069B (en) Data sharing processing method and system based on artificial intelligence and cloud platform
CN112437022A (en) Network flow identification method, equipment and computer storage medium
CN116756021A (en) Fault positioning method and device based on event analysis, electronic equipment and medium
CN113726610B (en) Routing protocol-based UI (user interface) automatic test method, device, equipment and medium
CN114282940A (en) Method and apparatus for intention recognition, storage medium, and electronic device
CN107808097A (en) JavaScript path enumerations
CN115220714A (en) Development method and device of application programming interface
CN113591279A (en) Method, device, equipment and storage medium for on-line modeling simulation
CN112559343A (en) Test path generation method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant