CN112929836A - Method for pulling abnormal buried point information in network-free environment of telephone watch - Google Patents

Method for pulling abnormal buried point information in network-free environment of telephone watch Download PDF

Info

Publication number
CN112929836A
CN112929836A CN202110171345.3A CN202110171345A CN112929836A CN 112929836 A CN112929836 A CN 112929836A CN 202110171345 A CN202110171345 A CN 202110171345A CN 112929836 A CN112929836 A CN 112929836A
Authority
CN
China
Prior art keywords
server
buried point
watch
instruction information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110171345.3A
Other languages
Chinese (zh)
Inventor
秦曙光
陈家峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Readboy Education Technology Co Ltd
Original Assignee
Readboy Education Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Readboy Education Technology Co Ltd filed Critical Readboy Education Technology Co Ltd
Priority to CN202110171345.3A priority Critical patent/CN112929836A/en
Publication of CN112929836A publication Critical patent/CN112929836A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/12Messaging; Mailboxes; Announcements
    • H04W4/14Short messaging services, e.g. short message services [SMS] or unstructured supplementary service data [USSD]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W8/00Network data management
    • H04W8/18Processing of user or subscriber data, e.g. subscribed services, user preferences or user profiles; Transfer of user or subscriber data
    • H04W8/20Transfer of user or subscriber data
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention discloses a method for pulling abnormal buried point information under a network-free environment of a telephone watch, wherein if a server finds that instruction information cannot be issued to a target watch telephone through a network, the server indicates that the telephone watch is in the network-free environment, and the server issues the instruction information to the target telephone watch in a form of encrypted short messages through a short message center; and after receiving the instruction information, the target telephone watch decrypts the instruction information to obtain the content of the instruction information, and reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages. The method can ensure that the buried point data can be pulled, is beneficial to effectively analyzing the problems, and can effectively reduce the cost compared with a mode of sending back the machine for analysis.

Description

Method for pulling abnormal buried point information in network-free environment of telephone watch
Technical Field
The invention relates to the technical field of telephone watches, in particular to a method for pulling abnormal buried point information in a network-free environment of a telephone watch.
Background
At present, in order to provide services for users more accurately, Applications (APPs), websites and the like collect a large amount of data of embedded points in a manner of embedded points, such as performance index data (page loading time, page loading duration and the like), user operation data (user browsing, skipping, commenting, sharing and the like), report the collected data of embedded points to corresponding service terminals, and improve the performance of applications, websites and the like through various data obtained by analyzing the data of embedded points.
At present, when a watch is abnormal, an operation log and data burying points are the key points for analyzing and solving the abnormal problem, but a lot of network abnormalities cannot be analyzed and solved, and the reason for the problem is mainly that the information of the data burying points or logs cannot be effectively pulled under the network-free environment, and the watch can only be sent back to a manufacturer to be connected with a data line and then the log or the data burying point information is pulled, but the cost for doing the method is very high.
Disclosure of Invention
Aiming at the defects of the prior art, the invention aims to provide a method for pulling abnormal buried point information in a network-free environment of a telephone watch.
In order to achieve the purpose, the invention adopts the following technical scheme:
a method for pulling abnormal buried point information in a telephone watch network-free environment comprises the following specific processes:
the method comprises the steps that a server firstly issues instruction information to a target telephone watch through a network, wherein the instruction information comprises a unique identifier of the target telephone watch and information of abnormal application buried point data needing to be pulled, and the information of the abnormal application buried point data comprises an application name, an application package name and an abnormal time period; after receiving the instruction information through the network, the target telephone watch reports corresponding abnormal application buried point data to the server through the network;
if the server finds that the instruction information cannot be issued to the target watch telephone through the network, namely the target watch telephone is in a network-free environment, the server issues the instruction information to the target watch telephone in an encrypted short message mode through the short message center; and after receiving the instruction information, the target telephone watch decrypts the instruction information to obtain the content of the instruction information, and reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages.
Further, the specific process that the target telephone watch reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages is as follows:
detecting the text length of the abnormal application buried point data, and if the text length of the abnormal application buried point data after encryption is less than or equal to the maximum text length of 3 short messages, the target telephone watch reports the abnormal application buried point data to a server through a short message center in an encrypted short message form; and if the text length of the encrypted abnormal application buried point data is greater than the maximum text length of 3 short messages, the target telephone watch converts the abnormal application buried point data into an excel table format, then performs screen capture to generate a screen capture picture, and reports the screen capture picture to the server in a multimedia message mode.
Furthermore, before the multimedia message is sent, the screen capture picture is subjected to binarization gray scale processing, the screen capture picture is compressed, and then the processed screen capture picture is reported to the server in a multimedia message mode.
The invention has the beneficial effects that: by using the invention, the telephone watch can report the data of the buried point to the server under the network-free environment, can ensure that the data of the buried point can be pulled, is beneficial to effectively analyzing the problem, and can effectively reduce the cost compared with a mode of sending back the machine for analysis.
Detailed Description
The present invention will be further described below, and it should be noted that the present embodiment is based on the technical solution, and a detailed implementation manner and a specific operation process are provided, but the protection scope of the present invention is not limited to the present embodiment.
The embodiment provides a method for pulling abnormal buried point information in a network-free environment of a telephone watch, which comprises the following specific processes:
the method comprises the steps that a server firstly issues instruction information to a target telephone watch through a network, wherein the instruction information comprises a unique identifier of the target telephone watch and information of abnormal application buried point data needing to be pulled, and the information of the abnormal application buried point data comprises an application name, an application package name and an abnormal time period; after receiving the instruction information through the network, the target telephone watch reports corresponding abnormal application buried point data to the server through the network;
if the server finds that the instruction information cannot be issued to the target watch telephone through the network, namely the target watch telephone is in a network-free environment, the server issues the instruction information to the target watch telephone in an encrypted short message mode through the short message center; and after receiving the instruction information, the target telephone watch decrypts the instruction information to obtain the content of the instruction information, and reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages.
Further, the specific process that the target telephone watch reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages is as follows:
detecting the text length of the abnormal application buried point data, and if the text length of the abnormal application buried point data after encryption is less than or equal to the maximum text length of 3 short messages, the target telephone watch reports the abnormal application buried point data to a server through a short message center in an encrypted short message form; and if the text length of the encrypted abnormal application buried point data is greater than the maximum text length of 3 short messages, the target telephone watch converts the abnormal application buried point data into an excel table format, then performs screen capture to generate a screen capture picture, and reports the screen capture picture to the server in a multimedia message mode.
Further, before the multimedia message is sent, the screen capture picture is subjected to binarization gray level processing, the screen capture picture is compressed, and then the processed screen capture picture is reported to the server in a multimedia message mode.
It should be noted that the short message sending has a maximum length limit, and if the text exceeds the limit, the short message sending is divided into multiple short messages, and the more the number of short messages sent, the higher the cost. Through the processing, the cost of data reporting can be limited within a reasonable range.
The abnormal application buried point data is stored in the big data platform after the server obtains the abnormal application buried point data, and then the abnormal application buried point data is forwarded to the abnormal processing center, so that developers can analyze and solve problems according to the abnormal data.
Various corresponding changes and modifications can be made by those skilled in the art based on the above technical solutions and concepts, and all such changes and modifications should be included in the protection scope of the present invention.

Claims (3)

1. A method for pulling abnormal buried point information in a telephone watch network-free environment is characterized by comprising the following specific processes:
the method comprises the steps that a server firstly issues instruction information to a target telephone watch through a network, wherein the instruction information comprises a unique identifier of the target telephone watch and information of abnormal application buried point data needing to be pulled, and the information of the abnormal application buried point data comprises an application name, an application package name and an abnormal time period; after receiving the instruction information through the network, the target telephone watch reports corresponding abnormal application buried point data to the server through the network;
if the server finds that the instruction information cannot be issued to the target watch telephone through the network, namely the target watch telephone is in a network-free environment, the server issues the instruction information to the target watch telephone in an encrypted short message mode through the short message center; and after receiving the instruction information, the target telephone watch decrypts the instruction information to obtain the content of the instruction information, and reports the corresponding abnormal application embedded data to the server in the form of encrypted short messages or multimedia messages.
2. The method of claim 1, wherein the specific process of reporting the corresponding abnormal application embedded data to the server in the form of the encrypted short message or multimedia message by the target telephone watch comprises:
detecting the text length of the abnormal application buried point data, and if the text length of the abnormal application buried point data after encryption is less than or equal to the maximum text length of 3 short messages, the target telephone watch reports the abnormal application buried point data to a server through a short message center in an encrypted short message form; and if the text length of the encrypted abnormal application buried point data is greater than the maximum text length of 3 short messages, the target telephone watch converts the abnormal application buried point data into an excel table format, then performs screen capture to generate a screen capture picture, and reports the screen capture picture to the server in a multimedia message mode.
3. The method of claim 2, wherein before the multimedia message is sent, the screen capture picture is subjected to binarization grayscale processing, the screen capture picture is compressed, and then the processed screen capture picture is reported to the server in a multimedia message manner.
CN202110171345.3A 2021-02-03 2021-02-03 Method for pulling abnormal buried point information in network-free environment of telephone watch Pending CN112929836A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110171345.3A CN112929836A (en) 2021-02-03 2021-02-03 Method for pulling abnormal buried point information in network-free environment of telephone watch

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110171345.3A CN112929836A (en) 2021-02-03 2021-02-03 Method for pulling abnormal buried point information in network-free environment of telephone watch

Publications (1)

Publication Number Publication Date
CN112929836A true CN112929836A (en) 2021-06-08

Family

ID=76171117

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110171345.3A Pending CN112929836A (en) 2021-02-03 2021-02-03 Method for pulling abnormal buried point information in network-free environment of telephone watch

Country Status (1)

Country Link
CN (1) CN112929836A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115206024A (en) * 2022-07-22 2022-10-18 深圳市智莱科技股份有限公司 Method and device for selling machine offline transaction, computer equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558261A (en) * 2018-11-20 2019-04-02 广东小天才科技有限公司 Method and system for acquiring abnormal log of wearable device
CN111190792A (en) * 2019-12-20 2020-05-22 中移(杭州)信息技术有限公司 Log storage method and device, electronic equipment and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109558261A (en) * 2018-11-20 2019-04-02 广东小天才科技有限公司 Method and system for acquiring abnormal log of wearable device
CN111190792A (en) * 2019-12-20 2020-05-22 中移(杭州)信息技术有限公司 Log storage method and device, electronic equipment and readable storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DOCEXCEL.NET: "如何将pdf或word文档用短信的形式发送", 《EXCEL办公网 WORD技巧》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115206024A (en) * 2022-07-22 2022-10-18 深圳市智莱科技股份有限公司 Method and device for selling machine offline transaction, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
US20180359140A1 (en) Method, device, and system for processing a terminal fault
CN105574096A (en) Method and system for obtaining, uploading and analyzing log information
CN106910146B (en) Heterogeneous education data exchange platform and method based on streaming processing technology
CN112069034B (en) Fast application exception handling method and device, electronic equipment and storage medium
CN103501503A (en) Network problem analyzing method and network problem analyzing device
CN105975856A (en) Method and system for dynamic virus detection of mobile terminal
CN109446042B (en) Log management method and system for intelligent electric equipment
CN105430534A (en) Intelligent device reporting data method and system
US11929904B2 (en) System and method for monitoring network performance
CN111552735A (en) Data link-based data synchronization method, apparatus, computer device and medium
CN112929836A (en) Method for pulling abnormal buried point information in network-free environment of telephone watch
CN111158926B (en) Service request analysis method, device and equipment
CN113485282B (en) Message tracking display method, system, equipment and storage medium for distributed control system
CN112364267B (en) Front-end data acquisition method and device
CN112507265B (en) Method and device for abnormality detection based on tree structure and related products
CN110351577B (en) Live broadcast information processing method and device, storage medium and electronic equipment
CN105430623A (en) Monitoring method, device and system for RCS junk message
CN107204892B (en) Power communication network operation data processing method and device
CN115664992A (en) Network operation data processing method and device, electronic equipment and medium
CN107371141B (en) Junk information monitoring method and device and communication system
CN108390917B (en) Intelligent message sending method and device
CN114416420A (en) Equipment problem feedback method and system
CN101448269A (en) Method and system for determining call failure factor
CN105681163A (en) Message processing method and device
CN110995839B (en) Method and device for analyzing performance of advertisement system and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210608