Buried point verification method, device and equipment and storage medium

A verification method and storage medium technology, applied in the field of devices, buried point verification methods, equipment and storage media, can solve the problems of low buried point verification efficiency and labor consumption, and achieve standardization, improve efficiency, and save labor. cost effect

Pending Publication Date: 2020-06-26
北京每日优鲜科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] When using the above method, the user needs to manually operate to trigger the buried po

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Buried point verification method, device and equipment and storage medium
  • Buried point verification method, device and equipment and storage medium
  • Buried point verification method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0049] In this application, the terms "first" and "second" are used to distinguish the same or similar items with basically the same function and function. It should be understood that "first", "second" and "nth" There are no logical or timing dependencies, nor are there restrictions on quantity or order of execution. It should also be understood that although the following description uses the terms first, second, etc. to describe various elements, these elements should not be limited by the terms. These terms are only used to distinguish one element from another.

[0050] The meaning of the term "at least one" in this application refers to one or more, and the meaning of the term "multiple" in this application refers to two or...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a buried point verification method, device and equipment and a storage medium, and belongs to the computer technology. According to the event burial point triggering script provided by the invention, after the client issues the event burial point triggering script, the event can be automatically triggered by running the event burial point triggering script, so that the event burial point data corresponding to the event is obtained, and compared with a mode of triggering the event through manual operation of a user, the manpower cost is saved, and the efficiency of verifying the event burial point data is improved. Besides, the buried point unified specification is formed, and the buried point data is verified according to the buried point unified specification so that the requirement of buried points can be met, standardization of buried point development can be facilitated, a large amount of invalid data generated by nonstandard buried point data can be avoided, and thus the effectiveness of the acquired buried point data can be guaranteed.

Description

technical field [0001] The present application relates to the field of computer technology, and in particular to a buried point verification method, device, equipment and storage medium. Background technique [0002] Buried point is a term in the computer, which refers to the process of listening to events during the running of the client by embedding code in the client, and when the event is triggered, capturing the event and uploading the context information of the event to the server. The data collected through buried points can be used to analyze user behavior, optimize the client, and so on. [0003] In related technologies, the user needs to manually perform an operation on the client. When the client detects the user's operation, it will trigger an event according to the user's operation, and transmit the buried point data to the server, and the server will verify the buried point data. [0004] When the above method is adopted, the user needs to manually operate to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F11/36
CPCG06F11/368G06F11/3676G06F11/3688
Inventor 林全兴宋威蔡光龙康伟伟
Owner 北京每日优鲜科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products