Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Website access analysis system and method based on built-in code proxy log

A website access and analysis method technology, applied in the direction of transmission system, digital transmission system, data exchange network, etc., can solve problems such as inability to embed code, time-consuming, and cookie cannot be generated across domain names, so as to avoid statistical errors and errors Effect

Inactive Publication Date: 2008-08-13
刘峰 +1
View PDF0 Cites 54 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The main disadvantages are: codes cannot be embedded in streaming media files such as GIF, JPEG, FLASH, MP3, etc.; cookies cannot be generated across domain names. When the same website links to content from other websites with different domain names, cross-domain statistical analysis is difficult; there is no error message log record, no error analysis can be performed; since the detailed access information does not "land", no access log files are generated, which is inconvenient for data mining in the future
[0004] The log analysis structure uses the access log files generated by the Web server itself for analysis. The main advantages are: detailed record information, which can analyze the access status of streaming media files such as GIF, JPEG, FLASH, MP3, etc.; does not distinguish domain name record information; main disadvantages Yes: Real-time analysis is not possible, and it is inconvenient to use cookies to identify users; for distributed cluster server websites, access logs need to be downloaded and merged separately, which takes time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Website access analysis system and method based on built-in code proxy log
  • Website access analysis system and method based on built-in code proxy log

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] (1) System installation

[0042] Proxy log server: set up a web server on the Internet, and install the JavaScript file of the "information collection web page" program and the JSP file program of the "proxy log program" on the server.

[0043] Analysis engine server: establish a web server on the Internet, connect with the "proxy log server" through the network, and install the "analysis engine program" on this server.

[0044] Error information webpage: copy and install the "error information webpage" provided by this system to the server to be analyzed, change the default error information link path of the server, and set various error information prompts to the path where the "error information webpage" file is located.

[0045] Embedding code: in the webpage of the analyzed website, embed the embedding code provided by the present invention, and the "webpage type mark" Page-Flag place notes indicate whether it is a "registration webpage", "logout webpage" or "commo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A system and a method for actualizing website access analysis by an agent log of embedded code relates to a website analysis system and a method, wherein the system comprises 'webpage-embedded code', 'information acquiring webpage', 'agent log server', 'agent log program', 'error information webpage', ' analysis engine server', and 'analysis engine program'; the webpage-embedded code and the error information webpage link invoke the information acquiring webpage, the information acquiring webpage invokes agent log program, and the agent log program records an access information to generate an access log, an error log and a cookie check list, and the analysis engine program analyzes the file generated by the agent log program. The invention combines two access analysis modes of 'embedded code' and 'log analysis', which satisfies require for rapid and real-time statistics, and uses log to record information to make a deep access analysis and data excavation convenient. The invention simplifies the complexity of the website access analysis system, and provides a better frame design solving scheme for the design of large-sized website access analysis system.

Description

Technical field: [0001] The invention relates to a system and method for website access analysis and traffic analysis. Background technique: [0002] Now there are many website access analysis or traffic analysis systems in the world, usually using two architectures: embedded code and log analysis. [0003] The embedded code structure is to embed a JavaScript program in a web page, record access information, and perform access statistical analysis. Its main advantages are: fast statistics, access information directly enters the analysis system, and real-time statistics of access information; Cookies can be used to identify visitor machines. The main disadvantages are: codes cannot be embedded in streaming media files such as GIF, JPEG, FLASH, MP3, etc.; cookies cannot be generated across domain names. When the same website links to content from other websites with different domain names, cross-domain statistical analysis is difficult; there is no error message log Records,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24G06F17/30
Inventor 刘峰孙宏
Owner 刘峰
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products