Movatterモバイル変換


[0]ホーム

URL:


CN109740089A - Collecting method, device, system, readable storage medium storing program for executing and electronic equipment - Google Patents

Collecting method, device, system, readable storage medium storing program for executing and electronic equipment
Download PDF

Info

Publication number
CN109740089A
CN109740089ACN201811457334.6ACN201811457334ACN109740089ACN 109740089 ACN109740089 ACN 109740089ACN 201811457334 ACN201811457334 ACN 201811457334ACN 109740089 ACN109740089 ACN 109740089A
Authority
CN
China
Prior art keywords
target pages
vertex type
server
buries
user behavior
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811457334.6A
Other languages
Chinese (zh)
Inventor
宋凡非
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft CorpfiledCriticalNeusoft Corp
Priority to CN201811457334.6ApriorityCriticalpatent/CN109740089A/en
Publication of CN109740089ApublicationCriticalpatent/CN109740089A/en
Pendinglegal-statusCriticalCurrent

Links

Landscapes

Abstract

This disclosure relates to a kind of collecting method, device, system, readable storage medium storing program for executing and electronic equipment.This method is applied to client, comprising: accesses behavioural characteristic according to the history page of user, determines the access temperature of target pages;According to the access temperature of the target pages, the vertex type that buries of the target pages is determined, the vertex type that buries includes: that code buries vertex type and without burying vertex type;Vertex type is buried according to the target pages, acquires the user behavior data on the target pages;The user behavior data is sent to server.Access temperature based on target pages determines that the difference of target pages buries vertex type, and then buries vertex type acquisition user behavior characteristics according to different.In this way, comprehensive code buries vertex type and without the acquisition for burying vertex type progress user behavior data, therefore, may be implemented to reduce the purpose for burying a maintenance cost while accurate acquisition, reduction network transmission volume using this method.

Description

Collecting method, device, system, readable storage medium storing program for executing and electronic equipment
Technical field
This disclosure relates to data collecting field, and in particular, to a kind of collecting method, device, system, computer canRead storage medium and electronic equipment.
Background technique
With the continuous development of Internet, various websites are doubled and redoubled like the mushrooms after rain, each business networkCompetition between standing is more and more fierce.It follows that inevitably there are many problems in the construction of website.From nearestIt is primary external for statistical analysis to 15 large-scale websites when showing user's information required for finding oneself, only 42%Probability can find, and user can not find information required for oneself in most of the time.
In order to solve the above-mentioned technical problem, some dependence area of computer aided are proposed both at home and abroad at present to collect and divide automaticallyThe method for analysing user behavior data.But these methods are unable to satisfy in precisely acquisition data, reduce network transmission pressureThe demand of artificial participation is reduced simultaneously.
Summary of the invention
In order to solve the problems, such as present in the relevant technologies, the disclosure provide a kind of collecting method, device, system, canRead storage medium and electronic equipment.
To achieve the goals above, disclosure first aspect provides a kind of collecting method, is applied to client, describedMethod includes:
Behavioural characteristic is accessed according to the history page of user, determines the access temperature of target pages;
According to the access temperature of the target pages, the vertex type that buries of the target pages is determined, it is described to bury vertex type packetInclude: code buries vertex type and nothing buries vertex type;
Vertex type is buried according to the target pages, acquires the user behavior data on the target pages;
The user behavior data is sent to server.
Optionally, the target pages are multiple;The access temperature according to the target pages, determines the targetThe page buries vertex type, comprising:
According to the sequence of the access temperature of the target pages from high to low, determine preceding K target pages buries vertex typeVertex type is buried for code, the vertex type that buries of remaining target pages buries vertex type for nothing, wherein K is the integer greater than zero, and K is smallIn the sum of the target pages.
Optionally, described that behavioural characteristic is accessed according to the history page of user, it determines the access temperature of target pages, wrapsIt includes:
Behavioural characteristic is accessed according to the history page of the user, each page elements on the target pages is obtained and is presettingAccess frequency in period;
Average access frequency of the page elements each on the target pages in the preset time period is determined as describedThe access temperature of target pages.
Optionally, before the described the step of user behavior data is sent to server, the method also includes:
The collected user behavior data is buffered in the client.
It is optionally, described that the user behavior data is sent to server, comprising:
Load occupancy request is sent to the server, to obtain the load occupancy of the server;
The load occupancy rate information that the server is sent is received, the load occupancy rate information includes that the load occupiesRate;
When the load occupancy is less than or equal to preset threshold, the user behavior that will be cached in the clientData are sent to the server, delete the user behavior for being sent to the server from the caching of the client laterData.
It is optionally, described that the user behavior data cached in the client is sent to the server, comprising:
The user behavior data cached in the client is packed compressed according to preset data item number, it obtains at leastOne group of compressed data;
At least one set of compressed data is sent to the server.
Disclosure second aspect provides a kind of data acquisition device, is applied to client, and described device includes:
First determining module determines the access heat of target pages for accessing behavioural characteristic according to the history page of userDegree;
Second determining module, for the access temperature according to the target pages, determine the target pages buries a classType, the vertex type that buries includes: that code buries vertex type and without burying vertex type;
Acquisition module acquires the user behavior on the target pages for burying vertex type according to the target pagesData;
Sending module, for the user behavior data to be sent to server.
Optionally, the target pages are multiple;Second determining module includes:
First determines submodule, for the sequence according to the access temperature of the target pages from high to low, K before determiningThe vertex type that buries of target pages is that code buries vertex type, remaining target pages buries vertex type as without burying vertex type, wherein K isInteger greater than zero, and K is less than the sum of the target pages.
Optionally, first determining module includes:
First acquisition submodule obtains on the target pages for the page access behavioural characteristic according to the userThe access frequency of each page elements within a preset period of time;
Second determines submodule, for by page elements being averaged in the preset time period each on the target pagesAccess frequency is determined as the access temperature of the target pages.
Optionally, described device further include:
Cache module, for the collected user behavior data to be buffered in the client.
Optionally, the sending module includes:
First sending submodule, for sending load occupancy request to the server, to obtain the serverLoad occupancy;
Receiving submodule, the load occupancy rate information sent for receiving the server, the load occupancy rate informationIncluding the load occupancy;
Second sending submodule is used for when the load occupancy is less than or equal to preset threshold, by the caching mouldThe user behavior data cached in block is sent to the server;
Delete submodule, the user behavior data for will cache in the cache module in the second sending submoduleIt is sent to after the server, the user behavior data for being sent to the server is deleted from the cache module.
Optionally, second sending submodule includes:
Second acquisition submodule, the user behavior data for will cache in the cache module is according to preset dataItem number is packed compressed, obtains at least one set of compressed data;
Third sending submodule, at least one set of compressed data to be sent to the server.
The disclosure third aspect provides a kind of computer readable storage medium, is stored thereon with the computer program program quiltThe step of the method provided by disclosure first aspect is realized when processor executes.
Disclosure fourth aspect provides a kind of electronic equipment, comprising:
Memory is stored thereon with computer program;
Processor, for executing the computer program in the memory, to realize that disclosure first aspect is mentionedThe step of the method for confession.
The 5th aspect of the disclosure provides a kind of data collection system, comprising:
Client, for the step of executing the method for disclosure first aspect offer;
Server, the user behavior data sent for receiving the client.
Through the above technical solutions, the access temperature based on target pages, determines that the difference of target pages buries vertex type, intoAnd vertex type acquisition user behavior characteristics are buried according to different.In this way, comprehensive code buries vertex type and is used without vertex type is buriedThe acquisition of family behavioral data can have the advantages that code buries a little precisely acquisition and reduces network transmission volume simultaneously, and, nothing is buriedThe advantages of maintenance cost, is buried in point full dose automatic data collection and reduction, therefore, using this method may be implemented accurate acquisition,The purpose for burying a maintenance cost is reduced while reducing network transmission volume.
Other feature and advantage of the disclosure will the following detailed description will be given in the detailed implementation section.
Detailed description of the invention
Attached drawing is and to constitute part of specification for providing further understanding of the disclosure, with following toolBody embodiment is used to explain the disclosure together, but does not constitute the limitation to the disclosure.In the accompanying drawings:
Fig. 1 is a kind of flow chart of collecting method shown according to an exemplary embodiment.
Fig. 2 is a kind of flow chart of the collecting method shown according to another exemplary embodiment.
Fig. 3 is a kind of flow chart of the collecting method shown according to another exemplary embodiment.
Fig. 4 is a kind of block diagram of data acquisition device shown according to an exemplary embodiment.
Fig. 5 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.
Specific embodiment
It is described in detail below in conjunction with specific embodiment of the attached drawing to the disclosure.It should be understood that this place is retouchedThe specific embodiment stated is only used for describing and explaining the disclosure, is not limited to the disclosure.
From data collection station, typical data acquisition technology is specifically included that at present is received based on server logThe method of collection and analysis user behavior data, the method that user behavior data is collected and analyzed from client.Skill is acquired from dataFrom the point of view of in art means, data acquisition technology means specifically include that code buries point, nothing is buried point (a little also referred to as burying entirely a little without burying) etc. and realizedMode.
Code bury a little refer to website, application program or small routine front or rear end somewhere be embedded in one section of js, java,The codes such as scala, c++, for monitoring, collecting the basic behavioral data of user and report to server.Its advantage are as follows: Ke YifeiOften accurately select when to acquire data, random Custom Attributes, customized event.The disadvantage is that: it is excessive to bury a place, becauseIt is not easy to manage for different version validation problem differences.And burying for each control a little requires to add corresponding manual generationCode, not only heavy workload, but also define it must is that technical staff could complete, the cost of version updating is big, easily causes and buries a littleIt is chaotic.
It is a little the regular (example by installing SDK (Software Development Kit, Software Development Kit) without buryingAs per second) do a screenshot, and SDK is while for application program screenshot, can obtain all UIView under active view,The hierarchical relationship of UIResponder object.For any one UIView object on screen, such as Button, TextfieldIt has one uniquely from keyWindow to its path, and server-side re-starts page according to screenshotss and visual informationFace rendering, and screenshot and relevant information are regularly transmitted to server end, thus data acquisition.Therefore, nothing is buried a littleIt is that data acquisition cost can be simplified, but technical bottleneck is higher, on a large scale by full dose, the automatic behavioral data for collecting userUnder concurrent access environment, the performance of system can be impacted, and this mode can not carry out fine-grained data acquisition,It is only applicable in most of, general scene, has small part that the scene buried a little is needed not cover.Further, since acquisition is full doseData phenomena such as leakage is buried, accidentally buried will not occur so not needing concern in product iterative process buries a logic.In addition,Without point mode is buried because what is collected is full dose data, the trial and error cost of operation and product can be greatly reduced, a possibility that trial and errorGao Liao can bring the information of more enlightenments.
To sum up, it is buried a little if only carrying out code to target pages, causes to bury a heavy workload, to cause to bury chaotic askTopic, and a little will lead to the problem that volume of transmitted data is big, server load pressure is big if only carrying out nothing to target pages and burying.Therefore, in view of the above technical problems, the disclosure provides a kind of collecting method, device, system, readable storage medium storing program for executing and electronicsEquipment.
Referring to FIG. 1, Fig. 1 is a kind of flow chart of collecting method shown according to an exemplary embodiment.The partyMethod is applied to client, may comprise steps of.
In a step 11, behavioural characteristic is accessed according to the history page of user, determines the access temperature of target pages.
In the disclosure, the history page access behavioural characteristic of user may include: each page elements of access (for example,Button control, table sum number control) the essential informations such as user identity information, access time point, residence time.Specifically,User can be recorded to form log by client for all operations of the page, and can add in each page events programEnter the sentence of print log.In this way, the corresponding behavioural characteristic of the event can be saved in by client in user's trigger eventIn journal file.In turn, target pages can be determined according to the user's history page access behavioural characteristic recorded in the journal fileAccess temperature.Wherein, which can reflect the case where target pages are accessed by the user, the access heat of target pagesSpending higher characterization target pages is the page being most often accessed by the user.
In step 12, according to the access temperature of target pages, determine target pages buries vertex type.
Wherein, burying vertex type includes: that code buries vertex type and without burying vertex type.According to the access of identified target pagesTemperature, what client can determine target pages buries vertex type, that is, the vertex type that buries for determining the target pages is that code buries a littleType or nothing bury vertex type.
In step 13, vertex type is buried according to target pages, acquires the user behavior data on the target pages.
Determine target pages bury vertex type after, client according to this bury vertex type acquisition user in the page objectUser behavior data on face.Wherein, operation of the user behavior data characterization user on the target pages, may include userIdentification information, temporal information and user behavior data attribute information etc..Wherein, which can be useFamily accesses the number information of each Website server, is also possible to access duration information etc..
Illustratively, if the vertex type that buries of target pages is that code buries vertex type, client buries side a little using codeFormula acquires the user behavior data on the target pages.If the vertex type that buries of target pages buries vertex type, client for nothingUsing without the user behavior data acquired by the way of burying a little on the target pages.
At step 14, user behavior data is sent to server.
After collecting user behavior data, the collected user behavior data of institute can be sent to by client in real timeThe collected user behavior data of institute periodically can also be sent to server according to predeterminated frequency, in the disclosure by serverIn this is not especially limited.
By adopting the above technical scheme, the access temperature based on target pages determines that the difference of target pages buries vertex type, intoAnd vertex type acquisition user behavior characteristics are buried according to different.In this way, comprehensive code buries vertex type and is used without vertex type is buriedThe acquisition of family behavioral data can have the advantages that code buries a little precisely acquisition and reduces network transmission volume simultaneously, and, nothing is buriedThe advantages of maintenance cost, is buried in point full dose automatic data collection and reduction, therefore, using this method may be implemented accurate acquisition,The purpose for burying a maintenance cost is reduced while reducing network transmission volume.
In a kind of embodiment of step 11, determine that the access temperature of target pages can be with are as follows: according to the history of userPage access behavioural characteristic, the statistics access times of user for the target page within a preset period of time, and by the target pagesAccess times be determined as access temperature.Specifically, behavioural characteristic is accessed according to the history page of user, counted in preset timeIn section on target pages each page elements access times, later, by the access times of each page elements on target pages itWith the access temperature as the target pages.Illustratively, bigger, the table of the sum of access times of each page elements on target pagesThe access temperature for levying the target pages is higher.Wherein, preset time period can be the numerical value of client default, be also possible to userThe numerical value of self-setting, the numerical value for example can be with are as follows: 3 months, 6 months, 1 year etc..
In another embodiment, as shown in Fig. 2, determining that the access temperature of target pages may comprise steps of.
In step 111, behavioural characteristic is accessed according to the history page of user, obtains each page elements on target pages and existsAccess frequency in preset time period.
Specifically, each page elements e in preset time period on target pages is countediAccessed number c (ei), later,According to equationDetermine the access frequency v of each page elements within a preset period of time on target pages(ei), wherein eiIndicate that i-th of page elements on target pages, Δ T indicate the duration of the preset time period.
In step 112, the average access frequency of page elements each on target pages within a preset period of time is determined asThe access temperature of target pages.
Determining each page elements in the access frequency v (e of preset time periodi) after, according to each page elements pre-If the access frequency v (e of periodi) and equationDetermine that each page elements are default on the target pagesAverage access frequency v (p) in period, and v (p) is determined as to the access temperature of the target pages.Wherein, m indicates the meshMark the sum of the page elements on the page.Similarly, the average access frequency of target pages is bigger, characterizes the visit of the target pagesAsk that temperature is higher.
By the above-mentioned means, comprehensively considering each page elements on target pages, the visit of the target pages is effectively determinedIt asks temperature, and ensures the accuracy of the access temperature of identified target pages, so that it is guaranteed that according to the access of the target pagesThe accuracy of vertex type is buried determined by temperature.
In view of the higher characterization target pages of the access temperature of target pages can be more frequently visited by the user, for the meshIn the mark page user behavior data that acquires in data analysis will quality with higher, therefore, it is necessary to accurately acquireUser behavior data on the target pages.In addition, it is also contemplated that burying an acquisition data using code has accuracy, is directed toProperty and acquisition the lesser feature of data volume, and for frequently accessing in the case where can effectively control foreground and background data transmissionScale, reduce to network transmission and server load pressure the advantages of.It therefore, can for the access higher target pages of temperatureUser behavior data is acquired in a manner of burying a little using code.Illustratively, due to inquiry button in general can by withFamily repeatedly accesses, so that including that the access temperatures of the target pages of the inquiry button would generally be relatively high, and the push button functionIt is more stable, a wide range of modification will not be made in each iteration, therefore, can by include the inquiry button target pagesIt buries vertex type and is determined as code and bury vertex type.
And for accessing the lower target pages of temperature, since the target pages are seldom accessed in business, or onlyThere are some users having permission that could access the target pages, the page elements on the target pages are buried without frequent maintenancePoint, and since access frequency is lower, so to network transmission or service when acquiring user behavior data without the concern for full doseThe stress problems of device load.Therefore, use can be acquired in such a way that nothing is buried a little for the access lower target pages of temperatureFamily behavioral data.
In a kind of embodiment of step 12, firstly, presetting an access heat degree threshold.Then, compare page objectThe access temperature in face and the access heat degree threshold will access target pages of the temperature greater than the access heat degree threshold and be determined as userThe target pages frequently accessed, and the vertex type that buries of the target pages is determined as code and buries vertex type.Access temperature is less thanOr it is determined as the target pages that user seldom accesses, and burying the target pages equal to the target pages of the access heat degree thresholdVertex type is determined as nothing and buries vertex type.
In the another embodiment of step 12, as shown in Fig. 2, step 12 can specifically include following steps.
In step 121, according to the sequence of the access temperature of target pages from high to low, preceding K target pages are determinedBurying vertex type is that code buries vertex type, and the vertex type that buries of remaining target pages buries vertex type for nothing.Wherein, K is whole greater than zeroNumber, and K is less than the sum of target pages.Illustratively, K can beOrN is the sum of target pages.
In the disclosure, target pages can have multiple, illustratively, as described above really to multiple target pagesThe mode of access temperature of the page of setting the goal determines the access temperatures of each target pages respectively, and according to each target pagesAccess temperature be ranked up from high to low, generate a list.
Then, in the list, K target pages are the target pages being frequently visited by the user before determining, and by the preceding KThe vertex type that buries of target pages is determined as code and buries vertex type, and, determine that other target pages are the mesh that user seldom accessesThe page is marked, and the vertex type that buries of these target pages seldom accessed is determined as without burying vertex type.
Using aforesaid way, user behavior is acquired in such a way that code buries a little for the access higher target pages of temperatureData can reach accurate selection acquisition data and the small advantage of data collection capacity, simultaneously for the access lower target of temperatureThe page realizes full dose, collects user behavior data automatically, can simplify number using without user behavior data is acquired by the way of burying a littleAccording to acquisition cost, reduction buries a confusion, avoids the occurrence of and accidentally bury, leak the problems such as burying.In this way, can solve large-scale concurrent access fieldUser behavior data collecting efficiency, reduction network transport load under scape, promote user experience.
Vertex type is being buried according to target pages, after collecting the user behavior data on the target pages, Ke YizhiIt connects and the collected user behavior data of institute is sent to server.Using which, there may be some problems.For example, realWhen to server send data, will lead to send data it is more frequent, increase the workload of network transmission, alternatively, periodically toServer sends data, may send data when server load pressure is larger, increase the load pressure of server.In order toThe above problem is avoided, it, can be by collected data buffer storage in the client in the preferred embodiment of the disclosure.
Specifically, as indicated at 3, following steps can also be performed before executing the step 14 in Fig. 1 and Fig. 2 in client.
In step 15, collected user behavior data is buffered in client.
In this way, after collecting user behavior data, can first by the user behavior data for example in the form of a fileIt is buffered in client, to be sent to server on suitable opportunity, then by the user behavior data of caching, to avoid number is sentAccording to more frequently, increase the workload of network transmission.
In addition, being still sent to it data in order to avoid when server load is larger, increases server and receive and handle numberAccording to pressure, in one embodiment, can be determined whether according to the load utilization rate situation of server server sendUser behavior data.
Specifically, as shown in figure 3, step 14 can specifically include following steps.
In step 141, load occupancy request is sent to server, to obtain the load occupancy of server.
Client is before sending user behavior data to server, in order to whether determine the current load pressure of serverIt can receive and handle user behavior data, the load occupancy of server need to be obtained.Therefore, in the disclosure, client is firstFirst load occupancy request is sent to server.In this way, server receive the load occupancy request when, can be according to currentCenter Processing Unit Utilization, memory occupation rate and network broadband occupancy etc., determine the load occupancy of server, and willThe load occupancy is sent to client.Illustratively, server can be by Center Processing Unit Utilization, memory occupation rate and networkThe sum of broadband occupancy is determined as loading occupancy.
In step 142, the load occupancy rate information that server is sent is received, which includes described negativeCarry occupancy.
In step 143, when loading occupancy and being less than or equal to preset threshold, the user behavior that will be cached in clientData are sent to the server, delete the user behavior data for being sent to server from the caching of client later.
When receiving the load occupancy rate information of server transmission, the load that can get server occupies clientRate.Judge whether the load occupancy of the server is greater than preset threshold, when the load occupancy is greater than the preset threshold, tableBright current server load pressure is larger, at this point, in order to avoid increasing the load pressure of server, client can postpone to serviceDevice sends user behavior data.When the load occupancy is less than or equal to the preset threshold, client can be by user behavior numberAccording to server is sent to, so that server is stored and is analyzed to the user behavior data.Wherein, which is normalNumber, and may range from of constant [0.5,1).
When by adopting the above technical scheme, to server transport data, the load utilization rate situation of server is comprehensively considered,When the load utilization rate of server is lower, user behavior data is sent to server, can effectively lower user behavior dataThe load pressure caused by server.
In addition, being cached with a plurality of data in client, if client sends a data to server every time, need to sendRepeatedly, correspondingly, server needs to receive and repeatedly could receive completely the data cached in client, in this way, causing to serviceThe number that device receives data is more.In addition, data are sent using which, it is also that the time that will lead to data transmission is longer.
In order to be further reduced the number that server receives user behavior data, and quickly by a plurality of user behavior numberAccording to being sent to server, in the disclosure, the specific embodiment of step 143 can be with are as follows: firstly, the user that will be cached in clientBehavioral data is packed compressed according to preset data item number, obtains at least one set of compressed data.It illustratively, can be according to every x item numberAccording to being grouped, a plurality of data of caching in the client are divided at least one set, and compress at least one set dataProcessing is to obtain at least one set of compressed data.Then, then by at least one set compressed data it is sent to server.Wherein, x is bigIn 1 and the integer of the total number no more than the data cached in client, and x can be empirical value constant.
It should be noted that server is after receiving at least one set compressed data, according to client to this at leastThe corresponding decompression mode of the compress mode of one group of data compression decompresses at least one set compressed data, to obtain user's rowFor data, and then the user behavior data is analyzed.
Using aforesaid way, the number that server receives user behavior data can be reduced, further decreases and server is madeAt load pressure, further, since compressed data can be transmitted comparatively fast, therefore, client can be quickly by a plurality of useFamily behavioral data is sent to server, reduces data transmission period.
Based on the same inventive concept, the disclosure also provides a kind of data acquisition device.Referring to FIG. 4, Fig. 4 is shown according to oneExample property implements a kind of block diagram of the data acquisition device exemplified.The device is applied to client, may include:
First determining module 41 determines the access of target pages for accessing behavioural characteristic according to the history page of userTemperature;
Second determining module 42 determines burying a little for the target pages for the access temperature according to the target pagesType, the vertex type that buries includes: that code buries vertex type and without burying vertex type;
Acquisition module 43 acquires user's row on the target pages for burying vertex type according to the target pagesFor data;
Sending module 44, for the user behavior data to be sent to server.
Optionally, the target pages are multiple;Second determining module includes:
First determines submodule, for the sequence according to the access temperature of the target pages from high to low, K before determiningThe vertex type that buries of target pages is that code buries vertex type, remaining target pages buries vertex type as without burying vertex type, wherein K isInteger greater than zero, and K is less than the sum of the target pages.
Optionally, first determining module includes:
First acquisition submodule obtains on the target pages for the page access behavioural characteristic according to the userThe access frequency of each page elements within a preset period of time;
Second determines submodule, for by page elements being averaged in the preset time period each on the target pagesAccess frequency is determined as the access temperature of the target pages.
Optionally, described device further include:
Cache module, for the collected user behavior data to be buffered in the client.
Optionally, the sending module includes:
First sending submodule, for sending load occupancy request to the server, to obtain the serverLoad occupancy;
Receiving submodule, the load occupancy rate information sent for receiving the server, the load occupancy rate informationIncluding the load occupancy;
Second sending submodule is used for when the load occupancy is less than or equal to preset threshold, by the caching mouldThe user behavior data cached in block is sent to the server;
Delete submodule, the user behavior data for will cache in the cache module in the second sending submoduleIt is sent to after the server, the user behavior data for being sent to the server is deleted from the cache module.
Optionally, second sending submodule includes:
Second acquisition submodule, the user behavior data for will cache in the cache module is according to preset dataItem number is packed compressed, obtains at least one set of compressed data;
Third sending submodule, at least one set of compressed data to be sent to the server.
About the device in above-described embodiment, wherein modules execute the concrete mode of operation in related this methodEmbodiment in be described in detail, no detailed explanation will be given here.
Based on the same inventive concept, the disclosure also provides a kind of data collection system, comprising:
Client, for the step of executing collecting method provided by the disclosure;
Server, the user behavior data sent for receiving the client.
Fig. 5 is the block diagram of a kind of electronic equipment shown according to an exemplary embodiment.As shown in figure 5, the electronic equipment500 may include: processor 501, memory 502.The electronic equipment 500 can also include multimedia component 503, input/defeatedOne or more of (I/O) interface 504 and communication component 505 out.
Wherein, processor 501 is used to control the integrated operation of the electronic equipment 500, to complete above-mentioned data acquisition sideAll or part of the steps in method.Memory 502 is for storing various types of data to support the behaviour in the electronic equipment 500To make, these data for example may include the instruction of any application or method for operating on the electronic equipment 500, withAnd the relevant data of application program, such as contact data, the message of transmitting-receiving, picture, audio, video etc..The memory 502It can be realized by any kind of volatibility or non-volatile memory device or their combination, such as static random-access is depositedReservoir (Static Random Access Memory, abbreviation SRAM), electrically erasable programmable read-only memory(Electrically Erasable Programmable Read-Only Memory, abbreviation EEPROM), erasable programmableRead-only memory (Erasable Programmable Read-Only Memory, abbreviation EPROM), programmable read only memory(Programmable Read-Only Memory, abbreviation PROM), and read-only memory (Read-Only Memory, referred to asROM), magnetic memory, flash memory, disk or CD.Multimedia component 503 may include screen and audio component.WhereinScreen for example can be touch screen, and audio component is used for output and/or input audio signal.For example, audio component may includeOne microphone, microphone is for receiving external audio signal.The received audio signal can be further stored in storageDevice 502 is sent by communication component 505.Audio component further includes at least one loudspeaker, is used for output audio signal.I/OInterface 504 provides interface between processor 501 and other interface modules, other above-mentioned interface modules can be keyboard, mouse,Button etc..These buttons can be virtual push button or entity button.Communication component 505 is for the electronic equipment 500 and otherWired or wireless communication is carried out between equipment.Wireless communication, such as Wi-Fi, bluetooth, near-field communication (Near FieldCommunication, abbreviation NFC), 2G, 3G or 4G or they one or more of combination, therefore corresponding communicationComponent 505 may include: Wi-Fi module, bluetooth module, NFC module.
In one exemplary embodiment, electronic equipment 500 can be by one or more application specific integrated circuit(Application Specific Integrated Circuit, abbreviation ASIC), digital signal processor (DigitalSignal Processor, abbreviation DSP), digital signal processing appts (Digital Signal Processing Device,Abbreviation DSPD), programmable logic device (Programmable Logic Device, abbreviation PLD), field programmable gate array(Field Programmable Gate Array, abbreviation FPGA), controller, microcontroller, microprocessor or other electronics memberPart is realized, for executing above-mentioned collecting method.
In a further exemplary embodiment, a kind of computer readable storage medium including program instruction is additionally provided, it shouldThe step of above-mentioned collecting method is realized when program instruction is executed by processor.For example, the computer readable storage mediumIt can be the above-mentioned memory 502 including program instruction, above procedure instruction can be executed by the processor 501 of electronic equipment 500To complete above-mentioned collecting method.
The preferred embodiment of the disclosure is described in detail in conjunction with attached drawing above, still, the disclosure is not limited to above-mentioned realityThe detail in mode is applied, in the range of the technology design of the disclosure, a variety of letters can be carried out to the technical solution of the disclosureMonotropic type, these simple variants belong to the protection scope of the disclosure.
It is further to note that specific technical features described in the above specific embodiments, in not lanceIn the case where shield, it can be combined in any appropriate way.In order to avoid unnecessary repetition, the disclosure to it is various canNo further explanation will be given for the combination of energy.
In addition, any combination can also be carried out between a variety of different embodiments of the disclosure, as long as it is without prejudice to originallyDisclosed thought equally should be considered as disclosure disclosure of that.

Claims (10)

CN201811457334.6A2018-11-302018-11-30Collecting method, device, system, readable storage medium storing program for executing and electronic equipmentPendingCN109740089A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN201811457334.6ACN109740089A (en)2018-11-302018-11-30Collecting method, device, system, readable storage medium storing program for executing and electronic equipment

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN201811457334.6ACN109740089A (en)2018-11-302018-11-30Collecting method, device, system, readable storage medium storing program for executing and electronic equipment

Publications (1)

Publication NumberPublication Date
CN109740089Atrue CN109740089A (en)2019-05-10

Family

ID=66359111

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN201811457334.6APendingCN109740089A (en)2018-11-302018-11-30Collecting method, device, system, readable storage medium storing program for executing and electronic equipment

Country Status (1)

CountryLink
CN (1)CN109740089A (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110322250A (en)*2019-05-222019-10-11深圳壹账通智能科技有限公司The recognition methods of inactive users courses of action, device, equipment and storage medium
CN110543509A (en)*2019-09-042019-12-06北京奇艺世纪科技有限公司Monitoring system, method and device for user access data and electronic equipment
CN111190899A (en)*2019-11-262020-05-22泰康保险集团股份有限公司Buried point data processing method and device, server and storage medium
CN111310044A (en)*2020-02-142020-06-19北京百度网讯科技有限公司 Method, device, device and storage medium for extracting page element information
CN111352969A (en)*2020-02-282020-06-30广州市千钧网络科技有限公司Buried point data analysis method and device and electronic equipment
CN112163167A (en)*2020-11-102021-01-01平安普惠企业管理有限公司Intelligent decision-making method, system, equipment and medium based on big data platform
CN112199265A (en)*2020-10-152021-01-08苏州龙盈软件开发有限公司Fast application statistical method and system
CN112506582A (en)*2020-12-182021-03-16北京百度网讯科技有限公司Applet data packet processing method, apparatus, device and medium
CN113190411A (en)*2021-05-122021-07-30北京奇艺世纪科技有限公司Data processing method and device, electronic equipment and storage medium
CN113486123A (en)*2021-09-082021-10-08深圳高灯计算机科技有限公司Behavior data synchronization method and device, computer equipment and storage medium
CN114238061A (en)*2021-12-222022-03-25广州品唯软件有限公司 Buried point data acquisition method, device, storage medium and computer equipment
CN114827281A (en)*2022-03-102022-07-29北京百度网讯科技有限公司Method, system and device for sending and receiving network request
CN116628375A (en)*2022-02-102023-08-22北京有竹居网络技术有限公司Point burying method and device

Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090055467A1 (en)*2007-05-292009-02-26Concert Technology CorporationSystem and method for increasing data availability on a mobile device based on operating mode
CN102111453A (en)*2011-03-042011-06-29创博亚太科技(山东)有限公司Method and system for extracting Internet user network behaviors
CN104699424A (en)*2015-03-262015-06-10华中科技大学Page hot degree based heterogeneous memory management method
CN107609004A (en)*2017-07-212018-01-19深圳市小牛在线互联网信息咨询有限公司Application program buries point methods and device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20090055467A1 (en)*2007-05-292009-02-26Concert Technology CorporationSystem and method for increasing data availability on a mobile device based on operating mode
CN102111453A (en)*2011-03-042011-06-29创博亚太科技(山东)有限公司Method and system for extracting Internet user network behaviors
CN104699424A (en)*2015-03-262015-06-10华中科技大学Page hot degree based heterogeneous memory management method
CN107609004A (en)*2017-07-212018-01-19深圳市小牛在线互联网信息咨询有限公司Application program buries point methods and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
MORKETING: "《数据分析效果不佳?选择埋点方式很重要》", 9 May 2017, HTTPS://MY.MBD.BAIDU.COM/3ZUY4EQ9PU?F=CP&U=23B39D3C3D983675*

Cited By (20)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN110322250A (en)*2019-05-222019-10-11深圳壹账通智能科技有限公司The recognition methods of inactive users courses of action, device, equipment and storage medium
CN110543509A (en)*2019-09-042019-12-06北京奇艺世纪科技有限公司Monitoring system, method and device for user access data and electronic equipment
CN110543509B (en)*2019-09-042022-06-03北京奇艺世纪科技有限公司Monitoring system, method and device for user access data and electronic equipment
CN111190899A (en)*2019-11-262020-05-22泰康保险集团股份有限公司Buried point data processing method and device, server and storage medium
CN111190899B (en)*2019-11-262023-08-15泰康保险集团股份有限公司Buried data processing method, buried data processing device, server and storage medium
CN111310044A (en)*2020-02-142020-06-19北京百度网讯科技有限公司 Method, device, device and storage medium for extracting page element information
CN111310044B (en)*2020-02-142023-09-26北京百度网讯科技有限公司 Method, device, equipment and storage medium for extracting page element information
CN111352969A (en)*2020-02-282020-06-30广州市千钧网络科技有限公司Buried point data analysis method and device and electronic equipment
CN111352969B (en)*2020-02-282023-12-05广州市千钧网络科技有限公司Buried point data analysis method and device and electronic equipment
CN112199265A (en)*2020-10-152021-01-08苏州龙盈软件开发有限公司Fast application statistical method and system
CN112163167A (en)*2020-11-102021-01-01平安普惠企业管理有限公司Intelligent decision-making method, system, equipment and medium based on big data platform
CN112506582B (en)*2020-12-182024-04-09北京百度网讯科技有限公司 Mini-program data packet processing method, device, equipment and medium
CN112506582A (en)*2020-12-182021-03-16北京百度网讯科技有限公司Applet data packet processing method, apparatus, device and medium
CN113190411A (en)*2021-05-122021-07-30北京奇艺世纪科技有限公司Data processing method and device, electronic equipment and storage medium
CN113486123B (en)*2021-09-082022-02-25深圳高灯计算机科技有限公司Behavior data synchronization method and device, computer equipment and storage medium
CN113486123A (en)*2021-09-082021-10-08深圳高灯计算机科技有限公司Behavior data synchronization method and device, computer equipment and storage medium
CN114238061A (en)*2021-12-222022-03-25广州品唯软件有限公司 Buried point data acquisition method, device, storage medium and computer equipment
CN116628375A (en)*2022-02-102023-08-22北京有竹居网络技术有限公司Point burying method and device
CN114827281A (en)*2022-03-102022-07-29北京百度网讯科技有限公司Method, system and device for sending and receiving network request
CN114827281B (en)*2022-03-102023-09-29北京百度网讯科技有限公司Method, system and device for sending and receiving network request

Similar Documents

PublicationPublication DateTitle
CN109740089A (en)Collecting method, device, system, readable storage medium storing program for executing and electronic equipment
US10489476B2 (en)Methods and devices for preloading webpages
KR101782810B1 (en)Method, apparatus, and system for determining a location of a terminal
WO2019120037A1 (en)Model construction method, network resource preloading method and apparatus, medium, and terminal
CN108495195A (en)A kind of network direct broadcasting ranking list generation method, device, equipment and storage medium
CN108055302B (en)Picture caching processing method and system and server
CN108156265A (en)A kind of application control method and mobile equipment
CN106357789B (en)Information access control method, server and computer readable storage medium
CN109359263B (en) A kind of user behavior feature extraction method and system
CN107450903A (en)A kind of information processing method and device
JP6100900B2 (en) Method, device and system for online processing of data
CN111966887B (en)Dynamic caching method and device, electronic equipment and storage medium
CN113821721A (en)User portrait based multi-channel message method and device and computer equipment
CN113114734B (en)Information processing method, device, equipment and storage medium
CN110019372B (en)Data monitoring method, device, server and storage medium
CN105893471A (en)Data processing method and electronic equipment
CN114840565B (en) Sampling query method, device, electronic device and computer-readable storage medium
CN113703993A (en)Service message processing method, device and equipment
CN114238729B (en) Method, device, equipment, medium and program product for determining geographic location information
CN114722078B (en) Data statistics method, device, equipment, storage medium and program product
Ravindra et al.Latency aware elastic switching-based stream processing over compressed data streams
CN113761287A (en) A data processing method, system, device and medium based on advertising service
CN116841978A (en)Path analysis method, device and storage medium based on distributed file system
US9380413B1 (en)Dynamically forming the content of a message to a user based on a perceived emotion
CN113535780A (en)User request processing method and device, computer equipment and storage medium

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
RJ01Rejection of invention patent application after publication

Application publication date:20190510

RJ01Rejection of invention patent application after publication

[8]ページ先頭

©2009-2025 Movatter.jp