Application traffic analyzing method and device

A technology for application traffic and analysis methods, applied in the field of application traffic analysis methods and devices, can solve problems such as inability to analyze the macroscopic analysis of the same type of pages or modules, and achieve the effect of strong practicability

Active Publication Date: 2017-01-04
BEIJING SANKUAI ONLINE TECH CO LTD
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved in this application is: to provide an application traffic analysis method to solve the problem in the prior art that based on frequent path mining to calculate the display rate or click rate, it is impossible to perform macro analysis on the same type of pages or modules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Application traffic analyzing method and device
  • Application traffic analyzing method and device
  • Application traffic analyzing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] An application traffic analysis method disclosed in this application, such as figure 1 As shown, the method includes: Step 100 to Step 130.

[0028] Step 100, obtaining the access log of the application to be analyzed.

[0029] The log data of the application is stored in the distributed file system, and the log system will collect the log data of the application, and the log data includes logs of all users accessing the application. The log data usually includes: user identification (id), application identification, analysis object identification, access time of the analysis object, and the upstream and downstream relationship of the accessed analysis object (ie, the jump relationship of the page or module), etc. Then, the log system extracts the log data of each session belonging to a certain user from the log data of the application to be analyzed according to preset rules, and generates a session-related access log. Wherein, the access log of a session of a certai...

Embodiment 2

[0042] An application traffic analysis method disclosed in this application, such as figure 2 As shown, the method includes: Step 200 to Step 270.

[0043] Step 200, acquiring the funnel configuration file of the application to be analyzed.

[0044] During specific implementation, maintenance personnel or business personnel configure the configuration file of the funnel of the application through a preset graphical user interface. Funnel refers to the user conversion rate model between different steps in the application process, which is used to analyze the depth of user access to the application and the efficiency of each step. target efficiency. Obtaining the funnel configuration file of the application to be analyzed includes: obtaining a funnel description and a funnel level description of the application to be analyzed configured through a graphical user interface, wherein the funnel level description includes at least: a funnel level identifier, the The analysis obje...

Embodiment 3

[0080] Correspondingly, an application flow analysis device disclosed in this application, such as image 3 As shown, the device includes:

[0081] An access log acquisition module 300, configured to acquire an access log of the application to be analyzed;

[0082] The log index table determination module 310 is configured to match each of the access logs obtained by the access log acquisition module 300 based on the preset funnel configuration file of the application to be analyzed, and determine the value of the access log conforming to the funnel configuration file. log index table;

[0083] The path matching module 320 is configured to match the actual access path determined according to the log index table based on the path list obtained after decomposing the access path to be analyzed;

[0084] A traffic analysis module 330, configured to calculate a traffic analysis index of the application to be analyzed according to the matching result of the path matching module 32...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides an application traffic analyzing method and belongs to the technical field of computers. The application traffic analyzing method comprises: acquiring access logs of an application to be analyzed; based on a pre-set funnel configuration file of the application, matching each access log, determining a log index table according with the access logs of the funnel configuration file; based on a path list obtained by decomposing an access path to be analyzed, matching an actual access path determined according to the log index table; calculating a traffic analyzing index of the application to be analyzed according to a matching result. By adopting the application traffic analyzing method, the problems in the prior art that a presentation rate or a click rate is calculated based on frequent path excavation and macroscopic analysis cannot be carried out on pages or modules with the same type are solved; the same analysis object labels are set through the pages with the same type, and data of the pages with the same type can be clustered and analyzed to obtain a macroscopic analysis result.

Description

technical field [0001] The present application relates to the field of computer technology, in particular to an application flow analysis method and device. Background technique [0002] In the prior art, in order to improve the application and further enhance the user experience, it is necessary to analyze the traffic of the application, such as analyzing the conversion rate and the click-through rate of the application. When analyzing the traffic of an application (such as a web application, a mobile terminal application), it is usually necessary to collect statistics on the behavior of each module or page of the application. Behaviors for modules or pages mainly include: display and click. In order to analyze the user's usage preference for the application product, analyze the use effect of the application product, etc., in the prior art, a method of managing application modules and pages is usually used to analyze the display rate or click rate of the modules or pages. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F17/30
Inventor 杨其成夏颖瑛白浚楼
Owner BEIJING SANKUAI ONLINE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products