Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Buried point code injection method, event reporting method and related equipment thereof

A technology of event reporting and point code, which is applied in hardware monitoring, instrumentation, electrical digital data processing, etc., can solve the problems of increasing code reading time, reducing development efficiency, and complex point embedding.

Pending Publication Date: 2020-03-24
KINGSOFT
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, due to the fact that in the actual development process, there will be a large number of burying points, dozens to hundreds, and the burying points are more complex and detailed, such as lottery statistics, not only to count the number of lottery Statistics of which page the user clicked from before clicking the lottery, the total amount of money spent in the lottery, and if the lottery failed, the reason for the failure, etc.
Therefore, in related technologies, different buried points are defined in each functional module of the application program to perform statistics of various data. However, defining buried points in different modules makes it inconvenient to find buried point codes and increases the time for reading codes. , especially when the requirements change, the current buried point is not suitable for definition in the current module, and the position of the buried point needs to be redefined, which reduces the development efficiency

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Buried point code injection method, event reporting method and related equipment thereof
  • Buried point code injection method, event reporting method and related equipment thereof
  • Buried point code injection method, event reporting method and related equipment thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Embodiments of the present application are described in detail below, examples of which are shown in the drawings, wherein the same or similar reference numerals denote the same or similar elements or elements having the same or similar functions throughout. The embodiments described below by referring to the figures are exemplary, and are intended to explain the present application, and should not be construed as limiting the present application.

[0052] The buried point code injection method, event reporting method, device, electronic device, and computer-readable storage medium of the embodiments of the present application are described below with reference to the accompanying drawings.

[0053] figure 1 It is a flow chart of a buried point code injection method according to an embodiment of the present application.

[0054] Such as figure 1 As shown, the embedded code injection method includes the following steps:

[0055] Step 101 , according to the tracking re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a buried point code injection method, an event reporting method and related equipment, and the buried point code injection method comprises: obtaining a buried point code corresponding to a buried point according to a buried point demand, wherein the buried point code is generated through a predefined agent class and a predefined buried point class, and the buried point class is defined in the agent class; according to the burying point demand, determining a target position capable of obtaining the burying point demand in the target project; and injecting the burying point code corresponding to the burying point into the target position of the target project. According to the method, buried point requirements are analyzed; the implementation structure is redesignedto form an independent function module, each buried point is defined into a class in advance, the buried point classes are defined into an agent class in a unified mode, the buried point classes are called in the agent class, the uniformity of interfaces is kept, and the efficiency of adding, modifying and understanding the buried points is improved.

Description

technical field [0001] The present application relates to the field of computer application technology, and in particular to a buried point code injection method, an event reporting method and related equipment. Background technique [0002] With the rapid development of Internet technology, various Internet-based applications (Application, referred to as App) have emerged. In order to verify whether the business logic of the application is smooth and the use of functions, etc., it is necessary to pass in the application Add buried points to obtain application data indicators for verification. For example, when developing a game program, it is necessary to add buried points in the stage before the game program goes online to count user behavior. For example, there are 10 kinds of products in the game store page, and the statistics are added by adding buried points The purchase quantity of these 10 products can be used to understand which product sells better through the sta...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/34
CPCG06F11/3476
Inventor 王欢
Owner KINGSOFT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products