CN115658178A - Method and device for acquiring user behavior dynamic buried point data and storage medium - Google Patents

Method and device for acquiring user behavior dynamic buried point data and storage medium Download PDF

Info

Publication number
CN115658178A
CN115658178A CN202211409473.8A CN202211409473A CN115658178A CN 115658178 A CN115658178 A CN 115658178A CN 202211409473 A CN202211409473 A CN 202211409473A CN 115658178 A CN115658178 A CN 115658178A
Authority
CN
China
Prior art keywords
buried point
acquisition
client
point data
data acquisition
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211409473.8A
Other languages
Chinese (zh)
Inventor
王超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Original Assignee
Qingdao Haier Technology Co Ltd
Haier Smart Home Co Ltd
Haier Uplus Intelligent Technology Beijing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qingdao Haier Technology Co Ltd, Haier Smart Home Co Ltd, Haier Uplus Intelligent Technology Beijing Co Ltd filed Critical Qingdao Haier Technology Co Ltd
Priority to CN202211409473.8A priority Critical patent/CN115658178A/en
Publication of CN115658178A publication Critical patent/CN115658178A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method and a device for acquiring user behavior dynamic buried point data and a storage medium, and relates to the technical field of smart homes/smart families, wherein the method for acquiring the user behavior dynamic buried point data comprises the following steps: responding to a client starting instruction, and acquiring a buried point configuration file, wherein the buried point configuration file comprises a buried point data acquisition item and a first acquisition authorization identifier; presenting a buried point data acquisition item with a first acquisition authorization identifier in an effective state in response to the acquired buried point configuration file; responding to a second acquisition authorization identifier giving instruction of the user to the buried point data acquisition item with the first acquisition authorization identifier in the valid state, and generating a client first buried point data acquisition item with the second acquisition authorization identifier in the valid state; and responding to the service request, and acquiring data according to the first buried point data acquisition item of the client. The invention can realize the real-time addition and modification of the buried point data without re-releasing a new client, thereby greatly improving the real-time property and the convenience of data acquisition.

Description

Method and device for acquiring user behavior dynamic buried point data and storage medium
Technical Field
The application relates to the technical field of computer communication, in particular to a method and a device for acquiring data of user behavior dynamic buried points, a storage medium and an electronic device.
Background
With the rapid development of the mobile internet technology, more and more services are online in a mobile manner, so that in order to realize accurate marketing to users, users need to be represented by a technology of big data and artificial intelligence, and data support is provided for analyzing the behavior habits of the users subsequently to push specific advertisements to the specific users, so that how to collect user behavior data becomes an important subject of current research.
In the traditional technology, the client behavior data acquisition mainly depends on a static point burying technology (namely client coding), although the technology can achieve the purpose of user behavior data acquisition, the technology has great inflexibility, coding needs to be carried out again every time a service is added or modified, and a client needs to be released again to download for a user, so that the problems that the user behavior acquisition difficulty is large, the period is long, and real-time operation cannot be carried out exist, even the situation of point missing or point burying error is caused due to the quality problem of the coding point burying, the repairing difficulty is great, and the situations of inaccurate acquired data and data loss can be caused.
Accordingly, there is a need in the art for a new scheme for collecting user behavior data to solve the above-mentioned problems.
Disclosure of Invention
The application aims to solve the technical problems, namely, the problems that the conventional client static point burying technology is large in acquisition difficulty, long in period, incapable of acquiring in real time, large in repair difficulty and inaccurate in data acquisition are solved, and the application provides a method and a device for acquiring user behavior dynamic point burying data, a storage medium and an electronic device.
In a first aspect, the present application provides a method for collecting data of a user behavior dynamic buried point, where the method includes:
responding to a client starting instruction, and acquiring a buried point configuration file, wherein the buried point configuration file comprises a buried point data acquisition item and a corresponding first acquisition authorization identifier;
responding to the acquired buried point configuration file, and presenting a buried point data acquisition item corresponding to the first acquisition authorization identifier in an effective state;
responding to a second acquisition authorization identifier giving instruction of a user to a buried point data acquisition item corresponding to the first acquisition authorization identifier in an effective state, and generating a client side first buried point data acquisition item corresponding to the second acquisition authorization identifier in the effective state;
and responding to a service request, and acquiring data according to the first buried point data acquisition item of the client.
In a technical solution of the above method for collecting data of a user behavior dynamic buried point, the method further includes:
responding to a restart instruction of the client, and judging whether the buried point configuration file is updated;
if yes, generating a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the second buried point data acquisition item of the client;
if not, acquiring data according to the second buried point data acquisition item of the client.
In one technical solution of the above method for acquiring dynamic buried point data of user behavior, the generating a second buried point data acquisition item at the client based on the updated buried point configuration file includes:
responding to a restart instruction of a client, and acquiring an updated buried point configuration file, wherein the updated buried point configuration file comprises an updated buried point data acquisition item and a corresponding first acquisition authorization identifier;
responding to the obtained updated buried point configuration file, and presenting the updated buried point data acquisition item of the server corresponding to the first acquisition authorization identifier corresponding to the updated buried point data acquisition item in the effective state;
and responding to a second acquisition authorization identifier giving instruction of the updated buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier by the user, and generating a second acquisition authorization identifier of the updated buried point data acquisition item as a second buried point data acquisition item of the client corresponding to the effective state.
In a second aspect, the present application provides a method for collecting data of a user behavior dynamic buried point, including:
responding to a server configuration instruction, and generating a buried point configuration file, wherein the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
responding to a sending instruction, and sending a buried point data collection item corresponding to the first collection authorization identifier of the buried point configuration file in an effective state to a client;
in response to the instruction for obtaining the second acquisition authorization identifier, obtaining a second acquisition authorization identifier of a buried point data acquisition item corresponding to the effective state of the first acquisition authorization identifier given by the user on the client, and obtaining a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the effective state of the second acquisition authorization identifier;
and responding to an acquisition request instruction of a client, and acquiring data according to the acquired first buried point data acquisition item of the client.
In a technical solution of the above method for collecting user behavior dynamic buried point data, the method further includes:
responding to an updating instruction, updating the buried point data acquisition items and the corresponding first acquisition authorization identifiers in the buried point configuration file to obtain an updated buried point configuration file, acquiring a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the acquired second buried point data acquisition item of the client.
In one technical solution of the above method for acquiring data of dynamic buried point of user behavior, acquiring data according to an acquired first buried point data acquisition item of a client in response to an acquisition request instruction of the client includes:
responding to a service request sent to a client by a user, and sending the service request and a data acquisition request of a first buried point data acquisition item of the client to a server by the client;
a first thread of the server processes the service request through main logic processing and returns the processed data to the client;
and a second thread of the server acquires the data of the first buried point data acquisition item of the client through asynchronous acquisition and transmits the acquired data of the first buried point data acquisition item of the client to the database.
In a third aspect, the present application provides an apparatus for collecting data of a user behavior dynamic buried point, the apparatus comprising:
the system comprises a starting module, a first acquisition authorization identifier and a second acquisition authorization identifier, wherein the starting module is configured to respond to a client starting instruction and acquire a buried point configuration file, and the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
the presentation module is configured to present the buried point data acquisition items corresponding to the first acquisition authorization identifier in an effective state in response to the acquired buried point configuration file;
the generating module is configured to respond to a second acquisition authorization identifier giving instruction of the displayed first acquisition authorization identifier to the buried point data acquisition item corresponding to the valid state, and generate a client first buried point data acquisition item corresponding to the valid state of the second acquisition authorization identifier;
and the acquisition module is configured to respond to a service request and acquire data according to the first buried point data acquisition item of the client.
In a fourth aspect, the present application provides an apparatus for collecting data of a user behavior dynamic buried point, the apparatus comprising:
the system comprises a configuration module, a first acquisition authorization identifier and a second acquisition authorization identifier, wherein the configuration module is configured to respond to a configuration instruction and generate a buried point configuration file, and the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
the sending module is configured to respond to a sending instruction and send a buried point data acquisition item corresponding to the first acquisition authorization identifier of the buried point configuration file as an effective state to a client;
the acquisition module is configured to respond to an instruction for acquiring a second acquisition authorization identifier, acquire a second acquisition authorization identifier of a buried point data acquisition item corresponding to a valid state of a first acquisition authorization identifier given by a user on a client, and acquire a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the valid state of the second acquisition authorization identifier;
and the acquisition request module is configured to respond to an acquisition request instruction and acquire data according to the acquired first buried point data acquisition item of the client.
In a fifth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium includes a stored program, where the program executes the method for collecting user behavior dynamic embedded data according to the first aspect or the second aspect of the present application when running.
In a sixth aspect, the present application provides an electronic device, including a memory and a processor, where the memory stores a computer program, and the processor is configured to execute the method for collecting user behavior dynamic buried point data according to the first aspect or the second aspect of the present application through the computer program.
One or more technical solutions described above in the present application have at least one or more of the following beneficial effects:
in the technical scheme of implementing the application, the acquisition method of the user behavior dynamic buried point data is provided, and the acquisition method aims at responding to a client starting instruction to obtain a buried point configuration file, wherein the buried point configuration file comprises a buried point data acquisition item and a corresponding first acquisition authorization identifier; responding to the acquired buried point configuration file, and presenting a buried point data acquisition item corresponding to the first acquisition authorization identifier in an effective state; responding to a second acquisition authorization identifier giving instruction of the user to the buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier, and generating a client first buried point data acquisition item corresponding to the effective state of the second acquisition authorization identifier; and responding to a service request, and acquiring data according to the first buried point data acquisition item of the client. According to the acquisition method, the embedded point operation of the client can be updated by newly adding and modifying the embedded point configuration file of the server in real time, and a new client does not need to be released again for upgrading and installing for a client, so that the real-time performance, the accuracy and the convenience of user behavior data acquisition are greatly improved, and the problems of high difficulty, long period and low accuracy of user behavior data acquisition in the traditional static embedded point technology are solved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
FIG. 1 is a flow chart illustrating the main steps of a method for collecting data of a user behavior dynamic buried point according to an embodiment of the present application;
FIG. 2 is a schematic flow chart illustrating major steps of a method for collecting data of a user behavior dynamic buried point according to another embodiment of the present application;
FIG. 3 is a schematic diagram of a client interacting with a server according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a main structure of an apparatus for collecting data of a user behavior dynamic buried point according to an embodiment of the present application;
fig. 5 is a schematic main structural diagram of a device for acquiring user behavior dynamic buried point data according to another embodiment of the present application;
fig. 6 is a main structural schematic diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the accompanying drawings are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The data burying point enables related personnel such as products or operation and the like to perform customized statistics on more complex user data according to specific requirements. For example, when a user wants to track the behavior of the user, observe click data related to a page, or analyze the effect of an event activity, data embedding needs to be performed in advance, and then corresponding data is collected through the preset data embedding points when the user uses an application program to perform analysis and research.
However, most of the data embedding technologies in the prior art are static data embedding technologies, and when data is acquired, a data embedding code segment corresponding to a certain service code segment needs to be written in a service code, and the service data generated when the service code segment runs is acquired by using the data embedding code segment. However, with the continuous update of the service codes, coding needs to be performed again every time a service is added or modified, and a client needs to be reissued to download the service to a user, so that the problems that the user behavior acquisition difficulty is high, the period is long, and the user cannot perform in real time exist, and some service code segments or embedded point code segments may be deleted by mistake, so that embedded points fail, and therefore, the data embedded point mode in the prior art can cause the situations of inaccurate acquired data and data loss; in addition, for some APP applications on a client, for example, a mobile phone, if some user information is to be acquired, some user information that is to be acquired is identified as sensitive information or information that is not authorized to be acquired by the APP, and the acquisition mode of the currently acquired information is that when the APP has a problem of flash back or other faults, the user submits a report of an abnormal log to display the acquired data of the buried point data, that is, the acquisition of the data cannot be normalized. Therefore, the invention provides a method and a device for acquiring user behavior dynamic buried point data and a storage medium.
Referring to fig. 1, fig. 1 is a flowchart illustrating main steps of a method for collecting data of a user behavior dynamic buried point according to an embodiment of the present invention. As shown in fig. 1, the method for collecting user behavior dynamic buried point data in the embodiment of the present invention mainly includes the following steps S101 to S104.
Step S101: responding to a client starting instruction, and acquiring a buried point configuration file, wherein the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers.
In this embodiment, the client refers to a program that corresponds to the server and provides local services to the client. When a user opens the client, the embedded point configuration file is obtained from the server at the moment of starting the client. The buried point configuration file is generated by a file containing buried point codes, and the buried point codes correspond to operation control events input by a user at a client, wherein the operation control events of the user comprise: pull up, pull down, pull left, pull right, single or double click, etc.
The embedded point code comprises an embedded point data acquisition item and a corresponding first acquisition authorization identifier. In a specific example, the buried point data acquisition items include one or more of a terminal type, a client version number, event occurrence time, an event occurrence scene, a user ID number, a user mobile phone number, service description, and the like, wherein each buried point data acquisition item in the buried point code correspondingly includes two authorization switches that are authorized to be turned on and off, and the buried point configuration file acquired by the client from the server includes the buried point data acquisition item and a corresponding first acquisition authorization identifier.
For example, there are five buried point data acquisition items in the buried point configuration file acquired by the client from the server, which are respectively a terminal type, a client version number, an event occurrence time, an event occurrence scene, and a user ID number, and the first acquisition authorization identifiers corresponding to the five buried point data acquisition items are respectively: the method comprises the steps of closing terminal type authorization, opening client version number authorization, opening event occurrence event authorization, opening event occurrence scene authorization and opening user ID authorization.
Step S102: and responding to the acquired buried point configuration file, and presenting a buried point data acquisition item corresponding to the first acquisition authorization identifier in an effective state.
Continuing with the above embodiment, the valid state is an authorized open state, and the client responds to the acquired embedded point configuration file to present, on the client interface, the server embedded point data acquisition item corresponding to the first acquisition authorization identifier in the valid state, that is, the client interface presents four server embedded point data acquisition items, i.e., the client version number, the event occurrence time, the event occurrence scene and the user ID number.
Step S103: and responding to a second acquisition authorization identifier giving instruction of the user to the buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier, and generating the client-side first buried point data acquisition item corresponding to the effective state of the second acquisition authorization identifier.
In this embodiment, the user needs to give a second acquisition authorization identifier to the four server buried point data acquisition items presented on the client interface, that is, whether the four server buried point data acquisition items are authorized on the client interface is selected on the client interface, if so, it indicates that the user agrees to acquire the buried point data acquisition item, and if not, it indicates that the user does not agree to acquire the buried point data acquisition item. For example, a user selects a second acquisition authorization identifier of a client version number as authorized open on a client, the user selects a second acquisition authorization identifier of event occurrence time as authorized close on the client, the user selects a second acquisition authorization identifier of an event occurrence scene as authorized open on the client, the user selects a second acquisition authorization identifier of a user ID number as authorized open on the client, the user only agrees to acquire three buried point data acquisition items of the event occurrence time, the event occurrence scene and the user ID number, and after the user gives the second acquisition authorization identifier of the server buried point data acquisition item presented on the client, the generated first buried point data acquisition item of the client is the event occurrence time, and the event occurrence scene and the user ID number are three first buried point data acquisition items.
Step S104: and responding to a service request, and acquiring data according to the first buried point data acquisition item of the client.
In a specific example, when a user initiates a service request at a client, the client sends the service request and an acquisition request of a first buried point data acquisition item to a server together, and the server performs service operation according to the service request and acquires data according to the acquisition request of the first buried point data acquisition item.
In one embodiment of the present invention, the acquisition method further comprises:
step S105: responding to a restart instruction of the client, and judging whether the buried point configuration file is updated;
if yes, generating a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the second buried point data acquisition item of the client;
and if not, acquiring data according to the second buried point data acquisition item of the client.
In a specific example, each time a user opens a client, a server actively sends a buried point configuration file of a latest version to the client, or the client obtains the buried point configuration file by actively querying the latest version of the server, when a buried point data acquisition item and a corresponding first acquisition authorization identifier in the obtained buried point configuration file are the same as a buried point data acquisition item and a corresponding first acquisition authorization identifier in the buried point configuration file obtained by opening the client last time, the method of the step S102-step S104 is still repeated, a first buried point data acquisition item of the client is generated, for example, three buried point data acquisition items of an event occurrence time, an event occurrence scene and a user ID number in the above example, and data is acquired according to the three buried point data acquisition items of the event occurrence scene and the user ID number according to the event occurrence time, the event occurrence scene and the user ID number, and the acquired data is transmitted to a database.
When the user opens the client again, and the obtained buried point data acquisition item and the corresponding first acquisition authorization identifier in the buried point configuration file are different from the buried point data acquisition item and the corresponding first acquisition authorization identifier in the buried point configuration file obtained by opening the client last time, if the data required to be acquired at this time is different from the data required to be acquired at the last time, a second buried point data acquisition item of the client needs to be generated based on the updated buried point configuration file, and the data is acquired according to the second buried point data acquisition item of the client.
In an embodiment of the present invention, the generating a second buried point data collection item of the client based on the updated buried point configuration file includes:
responding to a restart instruction of a client, and acquiring an updated buried point configuration file, wherein the updated buried point configuration file comprises an updated buried point data acquisition item and a corresponding first acquisition authorization identifier;
responding to the obtained updated buried point configuration file, and presenting the updated buried point data acquisition item of the server corresponding to the first acquisition authorization identifier corresponding to the updated buried point data acquisition item in the effective state;
and responding to a second acquisition authorization identifier giving instruction of the updated buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier by the user, and generating a second acquisition authorization identifier of the updated buried point data acquisition item as a second buried point data acquisition item of the client corresponding to the effective state.
In a specific example, if the buried point data acquisition item in the buried point configuration file is updated to be unchanged, the buried point data acquisition item is still in a terminal type, a client version number, an event occurrence time, an event occurrence scene and a user ID number, while a corresponding first acquisition authorization identifier is changed to be a terminal type authorization closing, a client version number authorization closing, an event occurrence event authorization closing, an event occurrence scene authorization opening and a user ID authorization opening.
It should be noted that, if the user does not want to acquire the buried point data acquisition item of the scene where the event occurs, and the buried point data acquisition item is granted to be in the valid state before, the user may set the buried point data acquisition item in the system of the client, and the buried point data acquisition item is set to be in the invalid state, that is, the user is authorized to turn off the system.
If the buried point data acquisition items in the updated buried point configuration file comprise new buried point data acquisition items, configuring on the server, sending the data to the database after the configuration is finished, responding to a restart instruction of the client, and acquiring the updated buried point configuration file, wherein the updated buried point configuration file comprises the updated buried point data acquisition items and corresponding first acquisition authorization identifiers; and responding to the obtained updated buried point configuration file, presenting a first acquisition authorization identifier corresponding to the updated buried point data acquisition item as an effective state, giving a new buried point data acquisition item with a second acquisition authorization identifier to the client never by the user when the client is opened last time, responding to a second acquisition authorization identifier giving instruction of the user to the new buried point data acquisition item, and generating a client second buried point data acquisition item with the second acquisition authorization identifier of the updated buried point data acquisition item as the effective state.
Referring to fig. 2, fig. 2 is a flow chart illustrating the main steps of a method for collecting data of dynamic burial point of user behavior according to another embodiment of the invention. As shown in fig. 2, the method for collecting user behavior dynamic buried point data in the embodiment of the present invention mainly includes the following steps S201 to S204.
Step S201: responding to a configuration instruction, and generating a buried point configuration file, wherein the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
step S202, responding to a sending instruction, sending a buried point data acquisition item corresponding to the first acquisition authorization identifier of the buried point configuration file as an effective state to a client;
step S203: in response to the instruction for obtaining the second acquisition authorization identifier, obtaining a second acquisition authorization identifier of a buried point data acquisition item corresponding to the effective state of the first acquisition authorization identifier given by the user on the client, and obtaining a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the effective state of the second acquisition authorization identifier;
step S204: and responding to an acquisition request instruction, and acquiring data according to the acquired first buried point data acquisition item of the client.
In a specific example, the present embodiment describes a method for acquiring user behavior dynamic buried point data, which is provided by the present invention, from a server side. The method comprises the steps that firstly, a server configures a buried point configuration file on the server according to market requirements and requirements of developers, generates the buried point configuration file, then sends a buried point data acquisition item with a first acquisition authorization identifier of the buried point configuration file as a valid state to a client, generates a corresponding client first buried point data acquisition item when acquiring a buried point data acquisition item with a second acquisition authorization identifier of the buried point data acquisition item corresponding to the first acquisition authorization identifier of the buried point configuration file given by a user at the client as a valid state, and acquires data according to the acquired client first buried point data acquisition item.
In one embodiment of the present invention, the acquisition method further comprises:
step S205: responding to an updating instruction, updating the buried point data acquisition items and the corresponding first acquisition authorization identifiers in the buried point configuration file to obtain an updated buried point configuration file, acquiring a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the acquired second buried point data acquisition item of the client.
In one specific example, the server receives an instruction to update the configuration file, including a first collection authorization identifier of the update buried point data collection item or a newly added buried point data collection item.
In an embodiment of the present invention, the acquiring data according to the acquired first buried point data acquisition item of the client in response to an acquisition request instruction of the client includes:
responding to a service request sent to a client by a user, and sending the service request and a data acquisition request of a first buried point data acquisition item of the client to a server by the client;
a first thread of the server processes the service request through main logic processing and returns the processed data to the client;
and a second thread of the server acquires the data of the first buried point data acquisition item of the client through asynchronous acquisition and transmits the acquired data of the first buried point data acquisition item of the client to the database.
In a specific example, fig. 3 shows a permanent way schematic diagram of interaction between a client and a server according to an embodiment of the present application, and as shown in fig. 3, the interaction between the client and the server is used to explain the method for collecting data of a user behavior dynamic embedded point according to the present invention.
Firstly, a developer configures a buried point configuration file in a server, wherein the buried point configuration file comprises buried point data acquisition items, each buried point data acquisition item correspondingly comprises two authorized switches of authorized opening and authorized closing, and the server sends the buried point configuration file to a database for storage after configuration is completed;
when a user opens a client each time, the client acquires a buried point data acquisition item configured to be in an effective state from a server by inquiring a dynamic buried point data acquisition item or receiving a buried point configuration file sent by the server and the like, and returns the buried point data acquisition item configured to be in the effective state in the server to the client;
when a user initiates a service request at a client, for example, a request for browsing a publicity page is initiated, the server carries a data acquisition request of a dynamic buried data acquisition item and the service request of the user and sends the data acquisition request and the service request of the user to the server;
the server processes the data acquisition request of the dynamic buried point data acquisition item and the service request of the user in a multithreading mode, one thread processes the service request through main logic processing, and the processed data is returned to the client; the other thread acquires the data of the dynamic buried point data acquisition item through asynchronous acquisition and transmits the acquired data of the dynamic buried point data acquisition item to the database;
the database transmits the collected data of the dynamic buried point data collection items to the log file system so as to facilitate data cleaning, data analysis and other processing on the data stored in the log file system, the collected data is used for user analysis, a large amount of data used for user analysis is obtained, user portrayal is conducted according to the data, and specific products are pushed to specific users according to the user portrayal.
It should be noted that the key point of the present invention is to collect data of user behavior dynamic embedded points, and the data is not located in the log file system and the user analysis part, the log file system is to make the data easier to store, and the user analysis part is easier to perform user analysis, and the present invention is not described herein too much.
Furthermore, the application also provides a device for acquiring the data of the user behavior dynamic buried point.
Referring to fig. 4, fig. 4 is a main structural block diagram of an apparatus for acquiring data of dynamic burial point of user behavior according to an embodiment of the present application. As shown in fig. 4, the device for acquiring user behavior dynamic buried point data in the embodiment of the present application mainly includes a starting module 11, a presenting module 12, a generating module 13, and an acquiring module 14. In some embodiments, the starting module 11 is configured to, in response to a client starting instruction, obtain a buried point configuration file, where the buried point configuration file includes a buried point data collection item and a corresponding first collection authorization identifier; the presentation module 12 is configured to present, in response to the acquired buried point configuration file, a buried point data collection item corresponding to the first collection authorization identifier in an effective state; the generating module 13 is configured to respond to a second acquisition authorization identifier giving instruction of the user to the buried point data acquisition item corresponding to the presented first acquisition authorization identifier in the valid state, and generate a client-side first buried point data acquisition item corresponding to the second acquisition authorization identifier in the valid state; and the acquisition module 14 is configured to respond to a service request and acquire data according to the client first buried point data acquisition item.
In one embodiment, the description of the specific implementation function may be referred to in steps S101 to S104.
Furthermore, the application also provides another acquisition device for the data of the user behavior dynamic buried points.
Referring to fig. 5, fig. 5 is a main structural block diagram of an acquisition apparatus for dynamic buried point data of user behavior according to still another embodiment of the present application. As shown in fig. 5, the device for acquiring user behavior dynamic buried point data in the embodiment of the present application mainly includes a configuration module 21, a sending module 22, an obtaining module 23, and an obtaining request module 24. In some embodiments, the configuration module 21 is configured to generate a buried point configuration file in response to a configuration instruction, where the buried point configuration file includes a buried point data acquisition item and a corresponding first acquisition authorization identifier; the sending module 22 is configured to respond to a sending instruction, and send a buried point data collection item corresponding to the first collection authorization identifier of the buried point configuration file as a valid state to a client; the acquisition module 23 is configured to, in response to the instruction for acquiring the second acquisition authorization identifier, acquire a second acquisition authorization identifier of the buried point data acquisition item corresponding to the first acquisition authorization identifier given by the user on the client in the valid state, and acquire a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the valid state of the second acquisition authorization identifier; and the obtaining request module 24 is configured to respond to the obtaining request instruction and collect data according to the obtained first buried point data collection item of the client.
In one embodiment, the description of the specific implementation function may be described with reference to steps S201 to S204.
It will be understood by those skilled in the art that all or part of the flow of the method implemented by the present application may also be implemented by a computer program, which can be stored in a computer-readable storage medium and can implement the steps of the above-mentioned method embodiments when the computer program is executed by a processor. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable storage medium may include: any entity or device capable of carrying said computer program code, media, usb disk, removable hard disk, magnetic diskette, optical disk, computer memory, read-only memory, random access memory, electrical carrier wave signals, telecommunication signals, software distribution media, etc. It should be noted that the computer readable storage medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable storage media that does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
Further, the present application also provides a computer-readable storage medium. In one computer-readable storage medium embodiment according to the present application, the computer-readable storage medium may be configured to store a program for executing the method for acquiring user behavior dynamic buried point data of the above method embodiment, and the program may be loaded and executed by a processor to implement the method for acquiring user behavior dynamic buried point data. For convenience of explanation, only the parts related to the embodiments of the present application are shown, and details of the specific technology are not disclosed. The computer readable storage medium may be a memory device formed by various electronic apparatuses, and optionally, the computer readable storage medium in the embodiments of the present application is a non-transitory computer readable storage medium.
Further, the application also provides an electronic device. In an embodiment of the electronic device according to the present application, as shown in fig. 6, the electronic device includes a processor and a memory, the memory may be configured to store a program for executing the method for acquiring the user behavior dynamic buried point data of the above method embodiment, and the processor may be configured to execute a program in the memory, the program including but not limited to a program for executing the method for acquiring the user behavior dynamic buried point data of the above method embodiment. For convenience of explanation, only the portions related to the embodiments of the present application are shown, and specific technical details are not disclosed, please refer to the method portion of the embodiments of the present application. The electronic device may be a control device apparatus formed including various electronic apparatuses.
The method is widely applied to full-House intelligent digital control application scenes such as intelligent homes (Smart Home), intelligent homes, intelligent Home equipment ecology, intelligent House (Intelligence House) ecology and the like. The network may include, but is not limited to, at least one of: wired networks, wireless networks. The wired network may include, but is not limited to, at least one of: wide area networks, metropolitan area networks, local area networks, which may include, but are not limited to, at least one of the following: WIFI (Wireless Fidelity), bluetooth. The terminal is established and can not be limited to PC, the cell-phone, the panel computer, intelligent air conditioner, intelligent cigarette machine, intelligent refrigerator, intelligent oven, intelligent kitchen range, intelligent washing machine, intelligent water heater, intelligent washing equipment, intelligent dish washer, intelligent projection equipment, intelligent TV, intelligent clothes hanger, intelligent curtain, intelligence is audio-visual, smart jack, intelligent stereo set, intelligent audio amplifier, intelligent new trend equipment, intelligent kitchen guarding equipment, intelligent bathroom equipment, intelligence robot of sweeping the floor, intelligence robot of wiping the window, intelligence robot of mopping the ground, intelligent air purification equipment, intelligent steam ager, intelligent microwave oven, intelligence kitchen is precious, intelligent clarifier, intelligent water dispenser, intelligent lock etc..
Further, it should be understood that, since the setting of each module is only for explaining the functional units of the apparatus of the present application, the corresponding physical devices of the modules may be the processor itself, or a part of software, a part of hardware, or a part of a combination of software and hardware in the processor. Thus, the number of individual modules in the figures is merely illustrative.
Those skilled in the art will appreciate that the various modules in the apparatus may be adaptively split or combined. Such splitting or merging of specific modules does not cause the technical solutions to deviate from the principle of the present application, and therefore, the technical solutions after splitting or merging will fall within the protection scope of the present application.
The foregoing is only a preferred embodiment of the present application and it should be noted that those skilled in the art can make several improvements and modifications without departing from the principle of the present application, and these improvements and modifications should also be considered as the protection scope of the present application.

Claims (10)

1. A method for collecting data of a user behavior dynamic buried point is characterized by comprising the following steps:
responding to a client starting instruction, and acquiring a buried point configuration file, wherein the buried point configuration file comprises a buried point data acquisition item and a corresponding first acquisition authorization identifier;
responding to the acquired buried point configuration file, and presenting a buried point data acquisition item corresponding to the first acquisition authorization identifier in an effective state;
responding to a second acquisition authorization identifier giving instruction of the user to the buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier, and generating a client first buried point data acquisition item corresponding to the effective state of the second acquisition authorization identifier;
and responding to a service request, and acquiring data according to the first buried point data acquisition item of the client.
2. The method for collecting data of dynamic user behavior buried points as claimed in claim 1, further comprising:
responding to a restart instruction of the client, and judging whether the buried point configuration file is updated;
if yes, generating a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the second buried point data acquisition item of the client;
and if not, acquiring data according to the second buried point data acquisition item of the client.
3. The method for collecting data of dynamic embedded points of user behavior according to claim 2, wherein the generating a second embedded point data collection item of the client based on the updated embedded point configuration file comprises:
responding to a restart instruction of a client, and acquiring an updated buried point configuration file, wherein the updated buried point configuration file comprises an updated buried point data acquisition item and a corresponding first acquisition authorization identifier;
responding to the obtained updated buried point configuration file, and presenting the updated buried point data acquisition item of the server corresponding to the first acquisition authorization identifier corresponding to the updated buried point data acquisition item in the effective state;
and responding to a second acquisition authorization identifier giving instruction of the updated buried point data acquisition item corresponding to the effective state of the presented first acquisition authorization identifier by the user, and generating a second acquisition authorization identifier of the updated buried point data acquisition item as a second buried point data acquisition item of the client corresponding to the effective state.
4. A method for collecting data of a user behavior dynamic buried point is characterized by comprising the following steps:
responding to a configuration instruction, and generating a buried point configuration file, wherein the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
responding to a sending instruction, and sending a buried point data acquisition item corresponding to the first acquisition authorization identifier of the buried point configuration file as a valid state to a client;
in response to the instruction for obtaining the second acquisition authorization identifier, obtaining a second acquisition authorization identifier of a buried point data acquisition item corresponding to the effective state of the first acquisition authorization identifier given by the user on the client, and obtaining a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the effective state of the second acquisition authorization identifier;
and responding to an acquisition request instruction, and acquiring data according to the acquired first buried point data acquisition item of the client.
5. The method for collecting data of dynamic user behavior buried points as claimed in claim 4, further comprising:
responding to an updating instruction, updating the buried point data acquisition items and the corresponding first acquisition authorization identifiers in the buried point configuration file to obtain an updated buried point configuration file, acquiring a second buried point data acquisition item of the client based on the updated buried point configuration file, and acquiring data according to the acquired second buried point data acquisition item of the client.
6. The method for collecting data of dynamic embedded point of user behavior according to claim 4, wherein the collecting data according to the obtained first embedded point data collection item of the client in response to a request instruction of the client comprises:
responding to a service request sent to a client by a user, and sending the service request and a data acquisition request of a first buried point data acquisition item of the client to a server by the client;
a first thread of the server processes the service request through main logic processing and returns the processed data to the client;
and a second thread of the server acquires the data of the first buried point data acquisition item of the client through asynchronous acquisition and transmits the acquired data of the first buried point data acquisition item of the client to the database.
7. The utility model provides a collection system of user's action developments buried point data which characterized in that includes:
the system comprises a starting module, a first acquisition authorization identifier and a second acquisition authorization identifier, wherein the starting module is configured to respond to a client starting instruction and acquire a buried point configuration file, and the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
the presentation module is configured to present the buried point data acquisition items corresponding to the first acquisition authorization identifier in an effective state in response to the acquired buried point configuration file;
the generating module is configured to respond to a second acquisition authorization identifier giving instruction of the displayed first acquisition authorization identifier to the buried point data acquisition item corresponding to the valid state, and generate a client first buried point data acquisition item corresponding to the valid state of the second acquisition authorization identifier;
and the acquisition module is configured to respond to a service request and acquire data according to the first buried point data acquisition item of the client.
8. The utility model provides a collection system of user's action developments buried point data which characterized in that includes:
the system comprises a configuration module, a first acquisition authorization identifier and a second acquisition authorization identifier, wherein the configuration module is configured to respond to a configuration instruction and generate a buried point configuration file, and the buried point configuration file comprises buried point data acquisition items and corresponding first acquisition authorization identifiers;
the sending module is configured to respond to a sending instruction and send a buried point data acquisition item corresponding to the first acquisition authorization identifier of the buried point configuration file as an effective state to a client;
the acquisition module is configured to respond to an instruction for acquiring a second acquisition authorization identifier, acquire a second acquisition authorization identifier of a buried point data acquisition item corresponding to a valid state of a first acquisition authorization identifier given by a user on a client, and acquire a corresponding client first buried point data acquisition item generated according to the buried point data acquisition item in the valid state of the second acquisition authorization identifier;
and the acquisition request module is configured to respond to an acquisition request instruction and acquire data according to the acquired first buried point data acquisition item of the client.
9. A computer-readable storage medium, comprising a stored program, wherein the program when executed performs the method of any of claims 1-3 or 4-6.
10. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1-3 or 4-6 by means of the computer program.
CN202211409473.8A 2022-11-11 2022-11-11 Method and device for acquiring user behavior dynamic buried point data and storage medium Pending CN115658178A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211409473.8A CN115658178A (en) 2022-11-11 2022-11-11 Method and device for acquiring user behavior dynamic buried point data and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211409473.8A CN115658178A (en) 2022-11-11 2022-11-11 Method and device for acquiring user behavior dynamic buried point data and storage medium

Publications (1)

Publication Number Publication Date
CN115658178A true CN115658178A (en) 2023-01-31

Family

ID=85021786

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211409473.8A Pending CN115658178A (en) 2022-11-11 2022-11-11 Method and device for acquiring user behavior dynamic buried point data and storage medium

Country Status (1)

Country Link
CN (1) CN115658178A (en)

Similar Documents

Publication Publication Date Title
CN115167164A (en) Method and device for determining equipment scene, storage medium and electronic device
CN115174512A (en) Message pushing method and device, storage medium and electronic device
CN115658178A (en) Method and device for acquiring user behavior dynamic buried point data and storage medium
CN114697150A (en) Command issuing method and device, storage medium and electronic device
CN114417107A (en) Behavior data acquisition method and system
CN114861678A (en) Method and apparatus for determining time information, storage medium, and electronic apparatus
CN112286167B (en) Internet of things scene conflict detection method and device, storage medium and electronic equipment
CN115484119A (en) Device control method and apparatus, storage medium, and electronic apparatus
CN115268962A (en) Program updating method, program updating device, storage medium and electronic device
CN115167163A (en) Scene execution method and device, storage medium and electronic device
CN114860592A (en) Application function testing method and device, storage medium and electronic device
CN115145615A (en) Memory data refreshing method and device, storage medium and electronic device
CN115297128A (en) Edge execution information processing method and device, storage medium and electronic device
CN115827102A (en) Interface calling method and device, storage medium and electronic device
CN115695534A (en) Target application running method and device, storage medium and electronic device
CN115314332A (en) Method and device for setting equipment theme, storage medium and electronic device
CN114697345A (en) Information updating method, information updating device, storage medium and electronic device
CN115766448A (en) Application updating method and device, storage medium and electronic device
CN115168699A (en) Behavior data processing method, storage medium and electronic device
CN114999494A (en) Voice interaction function testing method and device, storage medium and electronic device
CN114880195A (en) Data document processing method and device, storage medium and electronic device
CN115866032A (en) Data transmission method and device, storage medium and electronic device
CN116301511A (en) Equipment interaction method and device, storage medium and electronic device
CN116938699A (en) zookeeper cluster automatic deployment method and device, storage medium and electronic device
CN115629961A (en) Method and device for determining debugging result, storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination