Search

CN-121980556-A - Data processing method and device, electronic equipment and storage medium

CN121980556ACN 121980556 ACN121980556 ACN 121980556ACN-121980556-A

Abstract

The invention discloses a data processing method, a device, electronic equipment and a storage medium, which are characterized in that an embedded point automatic verification is embedded into an application online flow of an open platform through the associated setting of an embedded point verification and an application state of a target application, the target application is enabled to have online authority under the condition that embedded point log data verification of the target application passes, the front management and control of the embedded point log data are realized, the data quality is ensured from the source, the adverse effects of error data on core services such as user behavior analysis and business recommendation can be effectively avoided through the ensured embedded point data quality, the data quality of the embedded point log data in the whole flow is improved, and the stability and the accuracy of various core services based on the embedded point log data are further improved.

Inventors

  • FANG QIANYU
  • LIU JUNFENG
  • CHEN JINHAI

Assignees

  • 杭州网易云音乐科技有限公司

Dates

Publication Date
20260505
Application Date
20260109

Claims (10)

  1. 1. A method of processing data, comprising: responding to a verification request aiming at a target application in a first state, and acquiring at least one piece of buried point log data generated in the using process of the target application based on the verification request, wherein the first state is used for indicating that the target application does not have online permission; determining a target verification rule matched with the buried point log data from at least one preset verification rule based on the buried point log data and the association relation between the buried point log data; Verifying the buried point log data based on the target verification rule to obtain at least one verification result of each buried point log data; and under the condition that the verification result meets a preset condition, switching the target application from the first state to a second state, wherein the second state is used for indicating that the target application has online permission.
  2. 2. The method of claim 1, wherein each embedded point log data is associated with a corresponding timestamp indicating a time at which the embedded point log data was generated, wherein after the at least one embedded point log data generated during use of the target application is obtained based on the verification request in response to the verification request for the target application in the first state, the method further comprises: and sequencing the buried point log data based on the time stamp corresponding to the buried point log data to obtain sequenced buried point log data.
  3. 3. The method of claim 2, wherein each buried point log data is associated with a corresponding first identifier, each preset verification rule is associated with a corresponding rule identifier, and wherein the determining a target verification rule matching the buried point log data from at least one preset verification rule preset based on each buried point log data and an association relationship between the buried point log data comprises: determining a target verification rule matched with the buried point log data from at least one preset verification rule based on the first identification of each sequenced buried point log data, the association relation between each buried point log data and the preset mapping relation, wherein the preset mapping relation is used for indicating the mapping relation between the first identification and the rule identification.
  4. 4. The method of claim 3, wherein prior to said verifying said buried point log data based on said target verification rule to obtain at least one verification result for each of said buried point log data, said method further comprises: determining a target rule type corresponding to the first identifier based on the first identifier corresponding to each buried point log data; And verifying the buried point log data based on the target verification logic corresponding to the target rule type and the target verification rule to obtain at least one verification result of each buried point log data.
  5. 5. The method of claim 4, wherein the target rule type is a first rule type, and the verifying the buried point log data based on the target verification logic corresponding to the target rule type and the target verification rule to obtain at least one verification result of each buried point log data comprises: And performing traversal verification on the buried point log data by adopting the target verification rule based on the first verification logic corresponding to the first rule type so as to obtain at least one verification result of each buried point log data.
  6. 6. The method of claim 4, wherein the target rule type is a second rule type, and the verifying the buried point log data based on the target verification logic corresponding to the target rule type and the target verification rule to obtain at least one verification result of each buried point log data comprises: And based on second verification logic corresponding to the second rule type, verifying the sequentially corresponding buried point log data by adopting a target verification rule corresponding to each buried point log data according to the time stamp of each buried point log data with the association relationship so as to obtain at least one verification result of each buried point log data.
  7. 7. The method of claim 1, wherein the predetermined condition includes that each of the check results of the buried point log data is a pass of the check.
  8. 8. A data processing apparatus, comprising: The acquisition unit is used for responding to a verification request aiming at a target application in a first state, acquiring at least one piece of buried point log data generated in the using process of the target application based on the verification request, wherein the first state is used for indicating that the target application does not have the online authority; the determining unit is used for determining a target verification rule matched with the buried point log data from at least one preset verification rule based on the buried point log data and the association relation among the buried point log data; the verification unit is used for verifying the buried point log data based on the target verification rule so as to obtain at least one verification result of each buried point log data; and the switching unit is used for switching the target application from the first state to a second state when the verification result meets a preset condition, wherein the second state is used for indicating that the target application has the online authority.
  9. 9. An electronic device comprising a processor and a memory, the memory storing a plurality of instructions, the processor loading instructions from the memory to perform the steps of the method of processing data according to any one of claims 1 to 7.
  10. 10. A computer readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps of the method of processing data according to any one of claims 1 to 7.

Description

Data processing method and device, electronic equipment and storage medium Technical Field The disclosure relates to the technical field of computers, and in particular relates to a data processing method, a data processing device, electronic equipment and a storage medium. Background With the vigorous development of the digital music industry, the business boundary of the digital music platform is continuously expanded, and the mobile terminal equipment, the game application, the vehicle-mounted terminal and other multi-element intelligent hardware are covered, and the full scene access ecology of small programs in the application is realized. In order to realize cross-scene presentation of music content and global perception of user behavior, an open platform is usually connected with each access party in a butt joint way through an Application Programming Interface (API) or a Software Development Kit (SDK), and on one hand, music content resources are output to the access party, and on the other hand, acquisition and analysis of user behavior are completed through buried point log data reported by the access party. However, in the prior art, after the open platform finishes application development and formally goes on line in the access party, whether the reported embedded point log data has errors or not can be found through the background log monitoring system, the problem of post-finding of the embedded point problem exists, the generation of error data cannot be restrained from the source, the data quality of the embedded point log data in the whole process is difficult to guarantee, and the stability and the accuracy of various core services based on the embedded point log data are low. Disclosure of Invention The embodiment of the disclosure provides a data processing method, a device, electronic equipment and a storage medium, which are used for embedding an embedded point automatic verification into an application online process of an open platform by associating and setting the embedded point verification with an application state of a target application, enabling the target application to have online authority under the condition that embedded point log data of the target application passes verification, realizing front management and control of the embedded point log data, guaranteeing data quality from a source, effectively avoiding adverse effects of error data on core services such as user behavior analysis and business recommendation by guaranteeing the embedded point data quality, and being beneficial to improving the data quality of the embedded point log data in the whole process, thereby improving the stability and accuracy of various core services based on the embedded point log data. In a first aspect, an embodiment of the present disclosure provides a method for processing data, including: responding to a verification request aiming at a target application in a first state, and acquiring at least one piece of buried point log data generated in the using process of the target application based on the verification request, wherein the first state is used for indicating that the target application does not have online permission; determining a target verification rule matched with the buried point log data from at least one preset verification rule based on the buried point log data and the association relation between the buried point log data; Verifying the buried point log data based on the target verification rule to obtain at least one verification result of each buried point log data; and under the condition that the verification result meets a preset condition, switching the target application from the first state to a second state, wherein the second state is used for indicating that the target application has online permission. In a second aspect, an embodiment of the present disclosure provides a data processing apparatus, including: The acquisition unit is used for responding to a verification request aiming at a target application in a first state, acquiring at least one piece of buried point log data generated in the using process of the target application based on the verification request, wherein the first state is used for indicating that the target application does not have the online authority; the determining unit is used for determining a target verification rule matched with the buried point log data from at least one preset verification rule based on the buried point log data and the association relation among the buried point log data; the verification unit is used for verifying the buried point log data based on the target verification rule so as to obtain at least one verification result of each buried point log data; and the switching unit is used for switching the target application from the first state to a second state when the verification result meets a preset condition, wherein the second state is used for indicating that the target application has the o