WO2018202171A1 - Système et procédé de vérification de point enfoui - Google Patents

Système et procédé de vérification de point enfoui Download PDF

Info

Publication number
WO2018202171A1
WO2018202171A1 PCT/CN2018/085722 CN2018085722W WO2018202171A1 WO 2018202171 A1 WO2018202171 A1 WO 2018202171A1 CN 2018085722 W CN2018085722 W CN 2018085722W WO 2018202171 A1 WO2018202171 A1 WO 2018202171A1
Authority
WO
WIPO (PCT)
Prior art keywords
buried point
data
buried
client
verification
Prior art date
Application number
PCT/CN2018/085722
Other languages
English (en)
Chinese (zh)
Inventor
黄华
陈志平
唐洵
张冲
陈灯霞
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2018202171A1 publication Critical patent/WO2018202171A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3676Test management for coverage analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Definitions

  • the present application relates to a data analysis system and method, and more particularly to a buried point verification system and method.
  • the present application provides a buried point verification system that runs on a server.
  • the system includes:
  • a data receiving module configured to receive, by the network, the buried point data and the buried point data summary information transmitted by the client in real time;
  • a data processing module for performing real-time analysis on buried point data to convert buried point data from unstructured data to structured data
  • the data verification module is configured to compare the structured buried point data with the buried point data summary information to determine whether the buried point data is lost.
  • the present application also provides a buried point verification method that runs on a server.
  • the method includes:
  • Data receiving step receiving, by the network, the buried point data and the buried point data summary information transmitted by the client in real time;
  • Data processing steps real-time analysis of buried point data, converting buried point data from unstructured data to structured data;
  • Data verification step Compare the structured buried point data with the buried point data summary information to determine whether the buried point data is lost.
  • the present application further provides a computer readable storage medium storing a buried point verification system, the buried point verification system being executable by at least one processor to implement the following steps:
  • the structured buried point data is compared with the buried point data summary information to determine whether the buried point data is lost.
  • the buried point verification system, the computer storage medium and the method provided by the application enable the server to analyze and process the buried point data in real time after receiving the buried point data and the buried point data summary information transmitted by the client. After converting the buried data from the unstructured data to the structured data, it is judged whether the client's application software has a buried data loss, and the buried point coverage of the client backhaul can also be calculated.
  • FIG. 1 is an application environment diagram of a preferred embodiment of a buried point verification system of the present application.
  • FIG. 2 is a diagram showing the operating environment of a preferred embodiment of the buried point verification system of the present application.
  • FIG. 3 is a functional block diagram of a preferred embodiment of the buried point verification system of the present application.
  • FIG. 4 is a flow chart of a preferred embodiment of a buried point verification method of the present application.
  • FIG. 1 it is an application environment diagram of a preferred embodiment of the buried point verification system 10 of the present application.
  • This buried point verification system 10 is applied to the server 1.
  • the server 1 connects a plurality of clients 3 through the network 2.
  • the network 2 can be a network of a local area network, a wide area network, a metropolitan area network, a personal area network, etc.; it can be a wired network or a wireless network.
  • the client 3 can be a desktop computer, a notebook, a tablet, a mobile phone, or other terminal device in which application software is installed and can communicate with the server 1 via the network 2.
  • Server 1 includes, but is not limited to, memory 11, processor 12, and display 13.
  • the memory 11 stores program code of the buried point verification system 10, which may include at least one type of storage medium including a flash memory, a hard disk, a multimedia card, a card type memory (eg, SD or DX memory, etc.) , random access memory (RAM), static random access memory (SRAM), read only memory (ROM), electrically erasable programmable read only memory (EEPROM), programmable read only memory (PROM), magnetic memory, disk, CD and so on.
  • RAM random access memory
  • SRAM static random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable read only memory
  • PROM programmable read only memory
  • magnetic memory disk, CD and so on.
  • the processor 12 reads and executes the program code of the buried point verification system 10 from the memory 11, and provides the following functions of the buried point verification system 10.
  • the display 13 displays the execution result of the buried point verification system 10.
  • FIG 2 shows only server 1 with components 11-13, it being understood that server 1 may include more or fewer components.
  • Each client 3 (only one shown in Figure 2) is equipped with one or more application software 30 (only one is shown in Figure 2).
  • This embodiment is described by taking an application software 30 as an example.
  • the publisher of the application software 30 sets a number of embedding points in the application software 30 for analyzing the operation behavior of the user of the client 3 to the application software 30 and/or testing the functional effects of the application software 30.
  • the client 3 records the buried point data triggered by the user and the buried point data summary information including the complete operation behavior of the user, and the buried point data and the buried point data are transmitted through the network 2.
  • the summary information is transmitted to the server 1.
  • the buried point verification system 10 of the server 1 processes and analyzes the received buried point data and the buried point data summary information, and determines whether or not the embedded software data is lost in the application software 30 of the client 3.
  • the buried point test system 10 can also compare the received buried point data with the buried point data in the complete buried point specification file of the application software 30 stored in the memory 11 of the server 1, and calculate the client 3 back. Buried coverage. Then, the buried point test system 10 can also generate a buried point verification report, and send the buried point coverage rate and the buried point check report to the preset client 3 through the network 2.
  • the client 3 may be a user of the application software 30 or a developer of the application software 30.
  • FIG. 3 it is a functional block diagram of a preferred embodiment of the buried point verification system 10 of the present application.
  • the buried point verification system 10 includes a data receiving module 110, a data processing module 120, and a data verification module 130.
  • the data receiving module 110 is configured to receive the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • the data processing module 120 is configured to perform real-time analysis on the buried point data, and convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, the open source search engine Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data can be searched once it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, the open source search engine Elasticsearch
  • the buried point data returned by client 3 is unstructured data.
  • the buried data may be a text file including a long string of characters:
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", “action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client IP address, MAC address, etc., the version of the client application software, etc., to the corresponding array of structured data.
  • the data verification module 130 is configured to compare the structured buried point data with the buried point data summary information to determine whether the application software 30 has lost buried data. For example, the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • the buried point verification system 10 includes a data receiving module 110, a data processing module 120, a data verification module 130, and a computing module 140.
  • the data receiving module 110 is configured to receive the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • the data processing module 120 is configured to perform real-time analysis on the buried point data, and convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, the open source search engine Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data can be searched once it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, the open source search engine Elasticsearch
  • the buried data returned by client 3 is unstructured data.
  • the buried data may be a text file that includes a long string of characters (see the example above).
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", "action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client IP address, MAC address, etc., the version of the client application software, etc., to the corresponding array of structured data.
  • the data verification module 130 is configured to compare the structured buried point data with the buried point data summary information to determine whether the application software 30 has lost buried data. For example, the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • the buried point verification system 10 includes a data receiving module 110, a data processing module 120, a data verification module 130, a calculation module 140, and a report generation module 150.
  • the data receiving module 110 is configured to receive the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • the data processing module 120 is configured to perform real-time analysis on the buried point data, and convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, the open source search engine Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data can be searched once it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, the open source search engine Elasticsearch
  • the buried data returned by client 3 is unstructured data.
  • the buried data may be a text file that includes a long string of characters (see the example above).
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", "action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client IP address, MAC address, etc., the version of the client application software, etc., to the corresponding array of structured data.
  • the data verification module 130 is configured to compare the structured buried point data with the buried point data summary information to determine whether the application software 30 has lost buried data. For example, the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • the report generation module 150 is configured to generate a buried point verification report.
  • the burying point verification report includes, but is not limited to, related information of the application software 30 corresponding to the burying check, such as application software name, version, and the like, time of verification occurrence, and related information of the server 1, and verification result Data and other information.
  • the report generation module 150 stores the buried point verification report in the memory 11 of the server 1.
  • the buried point verification system 10 includes a data receiving module 110, a data processing module 120, a data verification module 130, a calculation module 140, and a report generation module 150, and a reminder module 160.
  • the functions of the data receiving module 110, the data processing module 120, the data verification module 130, the calculation module 140, and the report generation module 150 are described in the above embodiments.
  • the reminder module 160 is configured to send the buried point coverage and/or the buried point verification report to the preset client 3.
  • the reminding module 160 may send the buried point coverage and the buried point verification report calculated by each of the buried point verifications to the preset client 3, such as a work computer of the buried point engineer.
  • the buried point verification report and the preset format reminder information are sent, for example, “the software identifier is ***, the version number.
  • the buried point coverage rate is ###, the burying point data missing rate is too large, please check and adjust the burying point scheme", to the default buried point engineer's working computer.
  • FIG. 4 a flow chart of a preferred embodiment of the buried point verification method of the present application.
  • the buried point verification system method may include only steps S110, S120, and S130.
  • step S110 the data receiving module 110 receives the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • step S120 the data processing module 120 performs real-time analysis on the buried point data to convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, an open source search engine, Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data is searched as soon as it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, an open source search engine, Elasticsearch
  • the buried point data returned by client 3 is unstructured data.
  • the buried data may be a text file including a long string of characters:
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", “action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client IP address, MAC address, etc., the version of the client application software, etc., to the corresponding array of structured data.
  • step S130 the data verification module 130 compares the structured buried point data with the buried point data summary information to determine whether the application software 30 has lost buried data.
  • the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • the buried point verification method includes steps S110, S120, S130, and S140.
  • step S110 the data receiving module 110 receives the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • step S120 the data processing module 120 performs real-time analysis on the buried point data to convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, an open source search engine, Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data is searched as soon as it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, an open source search engine, Elasticsearch
  • the buried data returned by client 3 is unstructured data.
  • the buried data may be a text file that includes a long string of characters (see the example above).
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", "action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client's IP address, MAC address, etc., the version of the client application, and so on, to the corresponding array of structured data.
  • step S130 the data verification module 130 compares the structured buried point data with the buried point data summary information to determine whether the application software 30 has lost buried data.
  • the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • the buried point verification method includes steps S110, S120, S130, S140, and S150.
  • step S110 the data receiving module 110 receives the buried point data and the buried point data summary information of the application software 30 transmitted by the client 3 in real time through the network 2.
  • the buried data summary information records the complete behavior of the user operating the application software 30. For example, when the user uses the application software 30, five operations are performed and 30 buried points are triggered, and the information is completely recorded in the buried point data summary information. in. Under the influence of the network 2, or the application software 30 of the client 3 has a missing code, the buried data returned by the client 3 may be missing or lost.
  • step S120 the data processing module 120 performs real-time analysis on the buried point data to convert the buried point data from the unstructured data into the structured data.
  • the burying point verification system 10 uses a search engine, for example, an open source search engine, Elasticsearch, to automatically and in real time obtain the burying point data transmitted back by the client 3, and ensure that the burying point data is searched as soon as it reaches the server 1. , to avoid the delay in time.
  • a search engine for example, an open source search engine, Elasticsearch
  • the buried data returned by client 3 is unstructured data.
  • the buried data may be a text file that includes a long string of characters (see the example above).
  • the data processing module 120 uses the search engine Elasticsearch to convert the unstructured buried data into structured data, organized in a predefined model or in a predefined manner, and stored in a database.
  • Elasticsearch extracts buried point information from unstructured buried point data, such as the identification information of the buried point "process_id: 3", "action_id: 40001", the type of user operation and time corresponding to the buried point, and the write structure. Corresponding array of data.
  • the search engine Elasticsearch also writes other information in the unstructured buried data, such as the client IP address, MAC address, etc., the version of the client application software, etc., to the corresponding array of structured data.
  • step S130 the data verification module 130 compares the structured buried point data with the buried point data summary information, and determines whether the application software 30 has lost buried data.
  • the buried point data summary information records that the user has triggered 30 buried points when using the application software 30, and only 26 out of the 30 buried points in the structured buried point data, then there are 4 The buried point data is lost.
  • Step S150 The report generation module 150 generates a buried point verification report.
  • the burying point verification report includes, but is not limited to, related information of the application software 30 corresponding to the burying check, such as application software name, version, and the like, time of verification occurrence, and related information of the server 1, and verification result Data and other information.
  • the report generation module 150 stores the buried point verification report in the memory 11 of the server 1.
  • the buried point verification system method may further include step S160 in addition to steps S110, S120, S130, S140, and S150.
  • step S160 the reminding module 16 sends the buried point coverage and/or the buried point verification report to the preset client 3.
  • the reminding module 160 may send the buried point coverage and the buried point verification report calculated by each of the buried point verifications to the preset client 3, such as a work computer of the buried point engineer.
  • the preset client 3 such as a work computer of the buried point engineer.
  • the buried point verification report and the preset format reminder information are sent, for example, “the software identifier is ***, the version number. For the *** software, the buried point coverage rate is ###, the burying point data missing rate is too large, please check and adjust the burying point scheme", to the default buried point engineer's working computer.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

La présente invention concerne un système de vérification de point enfoui, le système étant utilisé dans un serveur. Le système comprend une série de modules fonctionnels. Au moyen desdits modules de fonction, le serveur reçoit des données de point enfoui et des informations de résumé de données de point enfoui transmises en temps réel par un terminal client au moyen d'un réseau; effectue une analyse en temps réel des données de point enfoui; convertit les données de points enfouis de données non structurées en données structurées; compare les données de point enfoui structurées aux informations de résumé de point enfoui, et détermine si le logiciel d'application du terminal client a subi une perte de données de point enfoui, et peut également calculer la plage de couverture de point enfoui de liaison terrestre du terminal client.
PCT/CN2018/085722 2017-05-05 2018-05-04 Système et procédé de vérification de point enfoui WO2018202171A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710312809.1 2017-05-05
CN201710312809.1A CN107870860B (zh) 2017-05-05 2017-05-05 埋点验证***及方法

Publications (1)

Publication Number Publication Date
WO2018202171A1 true WO2018202171A1 (fr) 2018-11-08

Family

ID=61761481

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/085722 WO2018202171A1 (fr) 2017-05-05 2018-05-04 Système et procédé de vérification de point enfoui

Country Status (2)

Country Link
CN (1) CN107870860B (fr)
WO (1) WO2018202171A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113642047A (zh) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 埋点数据验证方法及***

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107870860B (zh) * 2017-05-05 2020-12-15 平安科技(深圳)有限公司 埋点验证***及方法
CN108664401B (zh) * 2018-05-11 2021-10-12 创新先进技术有限公司 埋点合理性的评估方法及装置
CN110554951A (zh) * 2018-05-31 2019-12-10 北京京东尚科信息技术有限公司 一种埋点管理的方法和装置
CN111190807B (zh) * 2018-11-14 2023-08-18 杭州萤石软件有限公司 一种埋点测试方法及设备
CN111506489B (zh) * 2019-01-30 2023-05-30 斑马智行网络(香港)有限公司 测试方法、***、设备、服务器及存储介质
CN112749078B (zh) * 2019-10-31 2024-06-18 北京沃东天骏信息技术有限公司 一种埋点测试方法和装置
CN111338933A (zh) * 2020-02-07 2020-06-26 北京每日优鲜电子商务有限公司 埋点验证方法、装置、设备及存储介质
CN111522900B (zh) * 2020-03-18 2023-09-01 携程计算机技术(上海)有限公司 非结构化数据的自动解析方法、***、设备及存储介质
CN111459811B (zh) * 2020-03-26 2023-07-18 广州虎牙科技有限公司 埋点数据校验方法和装置
CN111611140B (zh) * 2020-04-30 2023-05-16 广州华多网络科技有限公司 埋点数据的上报验证方法、装置、电子设备及存储介质
CN113254335B (zh) * 2021-05-20 2024-04-16 北京达佳互联信息技术有限公司 测试数据的处理方法、装置、服务器及存储介质

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296A (zh) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 埋点测试方法、数据的查询方法及装置
CN105046601A (zh) * 2015-07-09 2015-11-11 传成文化传媒(上海)有限公司 用户数据处理方法和***
CN106469185A (zh) * 2016-08-29 2017-03-01 浪潮电子信息产业股份有限公司 一种网站统计中进行数据收集的方法
CN106571949A (zh) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 埋点处理方法及装置
CN107870860A (zh) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 埋点验证***及方法

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101561777A (zh) * 2008-04-14 2009-10-21 中兴通讯股份有限公司 一种实现覆盖率测试的***和方法
CN102158890B (zh) * 2011-02-16 2015-06-03 中国联合网络通信集团有限公司 测试数据的发送、接收方法、设备和***
CN106156212A (zh) * 2015-04-22 2016-11-23 阿里巴巴集团控股有限公司 一种数据采集方法和***、及其终端和服务器
CN106294101B (zh) * 2015-05-19 2019-08-23 阿里巴巴集团控股有限公司 页面打点测试方法和装置
CN106528432B (zh) * 2016-12-12 2019-01-25 北京三快在线科技有限公司 测试场景数据的构建方法及装置、埋点测试方法

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104915296A (zh) * 2015-06-29 2015-09-16 北京金山安全软件有限公司 埋点测试方法、数据的查询方法及装置
CN105046601A (zh) * 2015-07-09 2015-11-11 传成文化传媒(上海)有限公司 用户数据处理方法和***
CN106469185A (zh) * 2016-08-29 2017-03-01 浪潮电子信息产业股份有限公司 一种网站统计中进行数据收集的方法
CN106571949A (zh) * 2016-09-23 2017-04-19 北京五八信息技术有限公司 埋点处理方法及装置
CN107870860A (zh) * 2017-05-05 2018-04-03 平安科技(深圳)有限公司 埋点验证***及方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113642047A (zh) * 2021-08-13 2021-11-12 上海哔哩哔哩科技有限公司 埋点数据验证方法及***

Also Published As

Publication number Publication date
CN107870860A (zh) 2018-04-03
CN107870860B (zh) 2020-12-15

Similar Documents

Publication Publication Date Title
WO2018202171A1 (fr) Système et procédé de vérification de point enfoui
US10795964B2 (en) Text address processing method and apparatus
CN109446068B (zh) 接口测试方法、装置、计算机设备和存储介质
CN110221982B (zh) 业务***的性能测试方法、装置、设备及可读存储介质
US9600393B2 (en) Testing of application service versions on live data
WO2019071891A1 (fr) Procédé d'analyse de couverture de code et serveur d'applications
WO2020125463A1 (fr) Procédé et appareil de génération de rapports, dispositif informatique et support de stockage lisible par ordinateur
WO2018184420A1 (fr) Procédé de test de logiciel, appareil, dispositif électronique et support
KR20180082504A (ko) 애플리케이션 정보 위험 관리를 위한 방법 및 장치
TW201737163A (zh) 問題預測方法及預測系統
CN112491602B (zh) 行为数据的监控方法、装置、计算机设备及介质
US20170329696A1 (en) Techniques for real time server testing in a production environment
WO2016206605A1 (fr) Procédé et dispositif de collecte de données client
US20200050534A1 (en) System error detection
WO2019085466A1 (fr) Procédé et système d'essai d'association, serveur d'application et support d'informations lisible par ordinateur
US20230379235A1 (en) Automated process flow testing system
US20160085664A1 (en) Generating a fingerprint representing a response of an application to a simulation of a fault of an external service
CN113938408B (zh) 一种数据流量测试方法、装置、服务器及存储介质
WO2019100690A1 (fr) Dispositif électronique, procédé de test, système et support d'informations lisible par ordinateur
WO2016188334A1 (fr) Procédé et dispositif de traitement de données d'accès à une application
CN105207829B (zh) 一种入侵检测数据处理方法、装置,及***
CN113362173A (zh) 防重机制验证方法、验证***、电子设备及存储介质
CN110532186B (zh) 利用验证码进行测试的方法、装置、电子设备和存储介质
CN112084114B (zh) 用于测试接口的方法和装置
US11513884B2 (en) Information processing apparatus, control method, and program for flexibly managing event history

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18794832

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 18/02/2020)

122 Ep: pct application non-entry in european phase

Ref document number: 18794832

Country of ref document: EP

Kind code of ref document: A1