CN105933292A - Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system - Google Patents

Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system Download PDF

Info

Publication number
CN105933292A
CN105933292A CN201610221823.6A CN201610221823A CN105933292A CN 105933292 A CN105933292 A CN 105933292A CN 201610221823 A CN201610221823 A CN 201610221823A CN 105933292 A CN105933292 A CN 105933292A
Authority
CN
China
Prior art keywords
coupon
electronics
diffusion
node
mouth
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610221823.6A
Other languages
Chinese (zh)
Inventor
王玉峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Post and Telecommunication University
Nanjing University of Posts and Telecommunications
Original Assignee
Nanjing Post and Telecommunication University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Post and Telecommunication University filed Critical Nanjing Post and Telecommunication University
Priority to CN201610221823.6A priority Critical patent/CN105933292A/en
Publication of CN105933292A publication Critical patent/CN105933292A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0207Discounts or incentives, e.g. coupons or rebates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0414Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden during transmission, i.e. party's identity is protected against eavesdropping, e.g. by using temporary identifiers, but is known to the other party or parties involved in the communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/062Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party

Abstract

The invention discloses a mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system. According to the method, a real scene in which a certain user always receives coupons from a plurality of friends and neighbors is considered, and a spread activation model is adopted; incentive participants actively replicates and diffuse electronic coupons through smart mobile devices and by using the mobility and social interaction of the incentive participants; and the copy behaviors of the users are recorded in the electronic coupons in a privacy protection manner, and are adopted as a basis for calculating compensations. With the method adopted, the users can be effectively encouraged to spread the coupons, and the privacy of the participants can be also protected, namely, the identity identifiers of the participants are only known by their neighbors who have direct social interaction with the participants. The system involves three types of entities, namely, an information source, mobile users and a trusted third party, and includes a coupon diffusion module and a compensation exchange module, wherein the diffusion module diffuses the coupons in a privacy protection manner between the information source and the mobile users as well as between the mobile users, and records the identity identifiers of the participants in the coupons.

Description

Based on the electronics coupon method of diffusion including excitation secret protection passed from mouth to mouth and system
Technical field
The present invention relates to, based on the electronics coupon method of diffusion including excitation secret protection passed from mouth to mouth and system, belong to In ecommerce and mobile social networking technical field.
Background technology
Nowadays smart machine obtains a wide range of applications, and these equipment have stronger calculating and storage capacity, and support many Plant wave point (such as bluetooth, WiFi and cellular interface etc.), thus excite the application of many innovations.Particularly, A large amount of intelligent terminal will be had in neighbouring region, such that it is able to make full use of mobility and society's connection of people, adopt By mode (as used the technology such as Bluetooth, WiFi Direct) direct-connected between equipment, provide effective collaboratively Social Interaction and content are shared.One application the most promising is the distribution of commercial advertisement, especially electronics coupon Distribution.Coupon is one of the most frequently used on market (being also maximally effective) promotional tool, is used for encouraging and affecting use The product consumption at family.And electronics coupon can pass through mobile device access, due to mobile device all the time with user Together, it is the equipment of height individual character, thus provides a kind of effective manner and make coupon arrive potential consumer.
The mode of traditional coupon distribution by businessman announce/be broadcast to through (or consumption) user is by it passively Receive (so-called Direct Model direct mode), and in neighbouring scope, mobile device can utilize user's Society's mobility, by carrying-Store and forword mode makes coupon reach potential client.In this mode, use The reception electronics coupon that family is the most passive, spreads coupon the most on one's own initiative, is referred to as (the Word of passed from mouth to mouth Mouth) pattern, this pattern significantly enhances the scope of coupon diffusion, ageing and efficiency.
But in the diffusion based on the electronics coupon passed from mouth to mouth, there are two key issues.First, need suitably Incentive mechanism compensate each participant actively forwarding coupon, otherwise participant may forward by refusal.And it is logical In the case of Chang, the forwarding relation of coupon is not simple chain type or tree-like structure, the most each user not only one of which Father node, it will usually receive the coupon of other participant multiple diffusion, therefore constitute general invitation/excitation figure. Second is privacy concern, and this comprises both sides problem, on the one hand, can not reveal each to outside " prier " The privacy information (i.e. from outside threat) of participant;On the other hand, owing to forwarding behavior relates to multiple participant, Usual each participant only trusts (and exposing certain sensitive information, such as identity etc.) to there being direct society with it Mutual participant, and be not intended to other strange participant (i.e. on syntopy 1 jump beyond participant) know Oneself take part in the forwarding of electronics coupon, the sensitive identity not sticked one's chin out is to these strange participants (threat of the inside come).And the present invention can solve problem above well.
Summary of the invention
Present invention aim at for above-mentioned the deficiencies in the prior art, it is proposed that a kind of include excitation based on pass from mouth to mouth The electronics coupon method of diffusion of secret protection, the electronics coupon of the method be asked by user or businessman diffusion one Duan Wenben (or picture) content, including specifically used method, scope (TTL, the Time to of coupon distribution of coupon Live), user can store this coupon, and when buying commodity, it is thus achieved that certain discount (such as 85 foldings etc.).? In the method, user, not only as the recipient of coupon and consumer, also actively spreads coupon, i.e. when neighbouring (Bluetooth or the WiFi Direct on smart mobile phone is used when user in region is in mutual contact range Etc. technology), coupon the most mutually transmits, thus establishes multi-level excitation.But existing scheme will be true The tree shape model that the social network structure that real coupon forwards simplifies, i.e. in interactive region, user only receives one and invites Please (i.e. receiving node only one of which father node), but under most scene, multiple participations cognition is to certain candidate People sends invitation, and such as, the node of invitation is the most, and the probability that invitee accepts and continue to forward is the biggest.Therefore, The coupon of the method diffuses to form subgraph structure rather than untrue in adjacent domain by user's social relations Tree structure;And in coupon repeating process, protect the privacy of user, the most only there is Social Interaction relation Participant just knows the identity of the other side;And based on inviting/excitation subgraph determines coupon turns the compensation of originator.
The present invention solves its technical problem and is adopted the technical scheme that: a kind of include excitation privacy based on pass from mouth to mouth The electronics coupon method of diffusion of protection, the method is based on general PKIX PKI (PKI, Public Key Infrastructure), each participant obtains a pair public-private key.All participants (include information source and mobile subscriber) All know the PKI of the I at excitation centerThe most each participant all can useSend to I and add confidential information;I It is also known that so PKI of participant;The only direct friend/neighbours participant the most mutually know the PKI of the other side.
Method flow:
Step 1: electronics coupon distribution and diffusion;
Step 1-1: information source s (i.e. businessman) is to I application distribution electronics coupon, specifically making including coupon With method, the scope (TTL of coupon distributions) etc., as the content of coupon, it is expressed as TC.Authentication center I Oneself private key will be usedThe following message of encryption,Issue information source s.Wherein TTLsRepresent coupon The jumping figure (i.e. scope) that can spread.Information source s obtains and verifies the content of electronics coupon, adds the body of oneself Part mark and an interim random number, and with the public key encryption of authoritative center I, the electronics stored as it coupon.After i.e. s receives this coupon, utilize the PKI of IObtain and verify the content of electronics coupon, so One random number of rear generation (i.e. one nonce for encryption) xs.And using following message as oneself coupon CsStore,Wherein NsRepresent distribution coupon to letter The number of the father node of breath source s, Ns=1, represent that s only accepts the distribution of coupon from authority center.
The diffusion of step 1-2 electronics coupon;Including two kinds of scenes, the cuopon between information source and participant expands Dissipate;Diffusion between participant and participant (i.e. coupon diffusion person and coupon recipient).Both differences Being, the former is propagation unidirectional from information source to participant, and in the latter, it is many that coupon recipient can receive it The coupon that individual diffusion person propagates.
Cuopon diffusion between information source and participant includes: as user u from information source through (or disappearing in this businessman After taking), the electronics coupon C that information source s is storedsIt is sent to u, i.e. after its key ciphering signature First u usesThe signature of (PKI of s) checking s, then generates a random number xu, and store following content work For its electronics coupon:Wherein TTLu=TTLs-1, represent User u decreases 1 from the TTL of the coupon that information source obtains.The essence of aforesaid operations is: u is saving from upper level After the signature of point (father node), add oneself identity and an interim random number, and with authoritative center I Public key encryption.Then put it to (i.e. TTL deducts 1 accordingly) after the clear content of electronics coupon.I.e. exist The message that between mutual node, (information with and participant, and participant and participant between) is transmitted explicitly is wrapped Include two parts: part in plain text includes coupon specification and life cycle, and the part of ciphertext represents upper hop node Information signature.
Between participant, the diffusion (i.e. between coupon diffusion person and coupon recipient) includes: first coupon Turn originator to judge whether, once to the forwarded over coupon of recipient met, the most not forward coupon, if it is not, Then coupon is transmitted to recipient.Generally coupon recipient can receive multiple coupon turning originator diffusion.If Participant w receives two user u and v simultaneously and spreads to coupon (the situation similarity of more diffusion persons of its signature Reason), and the message of following signature is received respectively from u and v:WithTherefrom obtain TC, TTLuWith TTLv, and store the following message coupon C as ww
Cw=TC|TTLw|Nw
E I ( { C u | w } K u s | x w | u | w )
E I ( { C v | w } K v s | x w | v | w )
Wherein TTLw=max{ (TTLu-1), (TTLv-1) }, expression chooses what bigger TTL stored as user The life cycle of coupon.NwRepresent the number of the user spreading coupon to user w.If TTLwBe 0, then table The bright life cycle reaching this coupon, need to abandon.
Above-mentioned steps can record certain user and traditionally receive the real scene of the coupon from multiple friend/neighbours. And after once this user consumes to businessman, then these all nodes participating in forwarding all should be compensated accordingly.
Step 2: structure excitation network also determines the compensation to participant;
Step 2-1: structure excitation network structure;
Electronics coupon is diffused by the Social Interaction between user in adjacent domain, and uses above-mentioned step (friend that the most only there is Social Interaction relation just knows the identity of the other side in the way of secret protection for 1-1 and step 1-2 Mark) each identity turning originator is joined in the electronics coupon of structure, when certain terminal use w with Electronics coupon to businessman consume time, electronics coupon is uploaded to excitation center I by businessman, by its reconstructed excitation network Structure (subgraph) also determines compensation mechanism.
Specifically, authentication center I from accept to the diffusion junctions extracting coupon electronics coupon iteratively Structure, such as w submit its electronics coupon C preserved tow, this therefrom, I understand, the upper hop node of w has two, Understanding the two node by decryption oprerations is u and v respectively, and obtains the electronics coupon C that they preserve respectivelyuWith Cv(being obtained by their signature information of public key decryptions using u and v), and then the upper hop of u and v can be obtained Node.It is obtained in that by the way of this iteration from information source s to the subgraph exchanging node (representing with d) (subgraph)。
Step 2-2: determine the process of compensation;
The mode using diffusion activation determines the compensation that the participant in subgraph is obtained in that.If constructing The coupon diffusion subgraph G come comprises N number of participant, between them, defines a directed graph G=(N, E).Wherein limit (u, v) ∈ E be from user u point to v directed edge, represent receive coupon from v from u Diffusion;The in-degree of d (v) user v, it is clear that in subgraph G, each user has positive in-degree, because this is user Add the sole mode of coupon circulation.
Assume that terminal consumer w has exchanged coupon, and have purchased the commodity that price is p, then from the beginning of w, a definite proportion The money α p (typical, α=15%) of example is injected in subgraph G, and then iterative upwards according to following rule Diffusion: α p is divided into d (w) part by user w, along the opposite direction of each in-degree, is communicated up α p/d (w), If user u has the directed edge (representing the u requirement to w) pointing to w, then u obtains α p/d (w) amount of money, then divide for u Joining the amount of money award as the dispersal behavior to u of (1-α) α p/d (w), remaining α α p/d (w) is then pressed According to same way as above, the in-degree opposite direction along w spreads, the like.
In iteration, the compensation that each node u is obtained is:
R ( u ) = α · Σ ( u , v ) ∈ E ( R ( v ) / d ( v ) )
In order to eliminate small insignificant compensation stream, if compensation R (u) to any node u is less than what certain set During threshold T, then u no longer upwardly propagates offset.
Present invention also offers a kind of based on the electronics coupon diffusion system including excitation secret protection passed from mouth to mouth, This system includes coupon diffusion module and compensates exchange module.
Coupon diffusion module includes distribution and the diffusion of electronics coupon;Information source s is to I application distribution electronics Coupon, consults discount content and the scope (TTL of coupon distribution of coupons), as in coupon Hold, be expressed as TC.Then the electronics coupon that I is signed,It is sent to s.Once s receives This coupon, s are by with the PKI of IObtain and verify the content of electronics coupon, then produce a random number xs, and the electronics coupon as oneself stores, it may be assumed that
Wherein NsRepresent distribution coupon to save to the father of information source s The number of point.N heres=1, represent that s only accepts the distribution of coupon from authority center.
Compensate exchange module to include constructing excitation network structure and determining compensation mechanism;When certain terminal consumer w is with electricity Sub-coupon to businessman consume time, electronics coupon is uploaded to excitation center I by businessman, by its reconstructed excitation network tie Structure also determines compensation mechanism, I from accept to electronics coupon extracts the diffusion structure of coupon iteratively, example As w submits its electronics coupon C preserved tow, from this coupon, I understands, and a upper hop node of w has two, Understanding the two node by decryption oprerations is u and v respectively, and obtains the electronics couponC that they preserve respectivelyuWith Cv, and then u and v can be obtained, upper hop node.Be obtained in that by the way of this iteration from information source s to Coupon diffusion subgraph (subgraph) of terminal consumption node;The mode using diffusion activation determines at subgraph In the compensation that is obtained in that of participant, when terminal consumer w utilizes the article that the coupon make purchases worth more of storage is p After, then the network subgraph forwarded according to the coupon that constructs, from w according to in-degree direction reverse subgraph by portion The amount of money dividing p spreads to the neighbor node in multi-hop directly or indirectly iteratively.
Beneficial effect:
1, the present invention uses (the Word of Mouth) pattern passed from mouth to mouth, and utilizes the mobility of user and society to close System carrys out actively diffusing electrons coupon, makes coupon reach potential client.In this mode, user not only by Dynamic reception and use electronics coupon, diffusion coupon the most actively, it is possible to greatly strengthen the model of coupon diffusion Enclose, ageing and efficiency.
2, when electronics coupon spreads, the present invention explicitly considers the general figure formed in coupon diffusion process Shape structure (that is, each user would generally receive the invitation of multiple participant, it is generally the case that the number of inviter is the most, The probability that participant adds coupon diffusion is the biggest) rather than false tree structure.
3, the present invention can (friend that only there is Social Interaction just knows the identity mark of the other side in the way of secret protection Know) each identity turning originator is joined in electronics coupon, and can be by authentication center by coupon Identity, the network structure that reconstruct coupon forwards.
4, forwarding network structure based on the coupon constructed, the present invention uses suitable mechanism, compensate for coupon and turns All participants in hairnet network so that coupon turns originator and invites the most participants, and its compensation obtained is the biggest, Thus encourage participant actively to spread coupon.
Accompanying drawing explanation
Fig. 1 is the structural representation of present system.
Fig. 2 is to use spreading activation model to determine the schematic diagram that in coupon forwarding network, participant compensates in invention.
Detailed description of the invention
Below in conjunction with Figure of description, the invention is described in further detail.
Symbol and the implication thereof of the present invention include:
The premise that the present invention implements is to utilize Public Key Infrastructure PKI (PKI, Public Key Infrastructure), Each participant obtains a pair public-private key.The PKI of the I of authentication centerIt is it is well known that the most each ginseng All can use with personSend to I and add confidential information;I is it is also known that so PKI of participant;Only participant's Directly friend/neighbours the most mutually know the PKI of the other side.
As it is shown in figure 1, total system of the present invention is broadly divided into two parts, including:
Part I: coupon diffusion module includes following 2 processes: the distribution of electronics coupon and diffusion.Information Source s (such as businessman), to I application distribution electronics coupon, consults discount content and the coupon distribution of coupon Scope (TTLs) etc., as the content of coupon, it is expressed as TC.Then the electronics coupon that I is signed,It is sent to s.Once s receives this coupon, s by with the PKI of IObtain and verify electronics The content of coupon, then produces a random number (nonce for encryption) xs, and as oneself Electronics coupon store, it may be assumed thatWherein NsRepresent Coupon is to the number of the father node of information source s in distribution.N heres=1, represent that s only accepts from authority center The distribution of coupon.
The diffusion of electronics coupon: include the diffusion in the case of two kinds: by between information source and participant, participant with Between participant.
Coupon diffusion between information source and participant u: as user u from information source through (or consuming in this businessman Afterwards), the electronics coupon C that information source s is storedsIt is sent to u, i.e. after its key ciphering signature The PKI of first u sThe signature of checking s, then generates a random number xu, and store following content conduct Its electronics coupon:
Wherein TTLu=TTLs-1, represent that user u obtains from information source The TTL of coupon decrease 1.The essence of aforesaid operations is: u is at the label from even higher level of node (father node) After Ming, add oneself identity and an interim random number, and with the public key encryption of authoritative center I.So After put it to after the clear content of electronics coupon (i.e. TTL deducts 1 accordingly).
Between participant, the diffusion (between coupon diffusion person and coupon recipient) includes: first coupon turns Originator judges whether, once to the forwarded over coupon of recipient met, the most not forward coupon, if it is not, Then coupon is transmitted to recipient.Generally coupon recipient can receive multiple coupon turning originator diffusion.If Participant w receives two user u and v simultaneously and spreads to coupon (the situation similarity of more diffusion persons of its signature Reason), and the message of following signature is received respectively from u and v:WithTherefrom obtain TC, TTLuWith TTLv, and store the following message coupon C as ww
Cw=TC|TTLw|Nw
E I ( { C u | w } K u s | x w | u | w )
E I ( { C v | w } K v s | x w | v | w )
Wherein TTLw=max{ (TTLu-1), (TTLv-1) }, expression chooses what bigger TTL stored as user The life cycle of coupon.NwRepresent the number of the user spreading coupon to user w.If TTLwIt is 0, Then show to reach the life cycle of this coupon, need to abandon.
Electronics coupon is diffused by the Social Interaction between user in adjacent domain, and uses the above-mentioned step can In the way of secret protection, the identity of the other side (friend only having Social Interaction just know) is by each originator that turns Identity joins in the electronics coupon of structure,
Part II compensates exchange module and includes following 2 processes: constructs excitation network structure and determines compensation mechanism. When certain terminal consumer w consumes with electronics coupon to businessman, electronics coupon is uploaded in excitation by businessman Heart I, by its reconstructed excitation network structure and determine compensation mechanism.I carries to electronics coupon iteratively from accept Taking out the diffusion structure of coupon, such as w submits its electronics coupon C preserved tow, from this coupon, I can Knowing, a upper hop node of w has two, and understanding the two node by decryption oprerations is u and v respectively, and obtains respectively Obtain the electronics coupon C that they preserveuAnd Cv(obtained by the signature information using public key decryptions u and v of u and v ), and then the upper hop node of u and v can be obtained.It is obtained in that from information source s to end by the way of this iteration Coupon diffusion subgraph (subgraph) of end consumption node.
Determine the process of compensation: the benefit that the participant using the mode of diffusion activation to determine in subgraph is obtained in that Repay, basic thought, after terminal consumer w utilizes the coupon make purchases worth more of storage for the article of p, then according to structure The network subgraph that coupon out forwards, from w according to in-degree direction reverse subgraph by part p (as α p, α=15%) the amount of money spread to the neighbor node in multi-hop directly or indirectly iteratively.Concrete diffusion Schematic diagram is as shown in Figure 2.
In order to eliminate small insignificant compensation stream, if compensation R (u) to any node u is less than threshold T, U no longer upwardly propagates offset.

Claims (7)

1. one kind based on pass from mouth to mouth include excitation secret protection electronics coupon method of diffusion, it is characterised in that described Method comprises the steps:
The distribution of step 1:coupon and diffusion module;
Step 1-1: the distribution of electronics coupon;
Information source s is to excitation center I application distribution electronics coupon, and specifically used method, coupon including coupon send out Scope (the TTL of rows) as the content of coupon, it is expressed as TC, then the coupon after signature is issued s, described s by I Obtain and verify the content of electronics coupon, add oneself identity and an interim random number, and use excitation center The public key encryption of I, the electronics coupon stored as it;
Step 1-2: the diffusion of electronics coupon;Including two kinds of scenes, the coupon diffusion between information source and participant; Diffusion between participant and participant, i.e. coupon diffusion person and coupon recipient, the difference of both is, the former It is propagation unidirectional from information source to participant, and in the latter, coupon recipient can receive its multiple diffusion persons and propagate coupon;
When mobile subscriber is through information source, after the coupon signature that s is stored, i.e. with the private key encryption of s, issue shifting Employing family, after receiving this coupon, mobile subscriber uses the public key acquisition of s and verifies the content of electronics coupon, adds certainly Oneself identity and an interim random number, and with encouraging the public key encryption of authority center I, the electronics stored as it coupon;
Coupon is between the mobile subscriber that there is Social Interaction, when i.e. coupon diffusion person and coupon recipient are spread, first First diffusion person judges whether once to be transmitted across coupon to recipient, in this way, then is not repeated to spread coupon;As no, then adopt Spread coupon: recipient by public key verifications coupon of sender by similar mode, add the identity and of oneself Individual interim random number, and with authority center I public key encryption, the electronics coupon stored as it, i.e. mobile subscriber it Between the message of transmission explicitly include two parts: part in plain text includes coupon specification and life cycle, and the part of ciphertext represents Diffusion person's information signature to oneself storage coupon;
Step 2: design compensation exchanges module, including:
Step 2-1: structure excitation network structure;
Electronics coupon is diffused by the Social Interaction between user in adjacent domain, and use above-mentioned step 1-1 and Each identity turning originator, in the way of secret protection, is joined in the electronics coupon of structure, when certain terminal by 1-2 When user w consumes with electronics coupon to businessman, electronics coupon is uploaded to authentication center I by businessman, by its reconstructed excitation Network structure (subgraph) also determines compensation mechanism;
Step 2-2: determine the process of compensation:
The mode using diffusion activation determines the compensation that the participant in subgraph is obtained in that;As terminal consumer w After utilizing the coupon make purchases worth more stored for the article of p, then according to the network of the coupon diffusion constructed by step 2-1 Structure, spreads the value of certain proportion α, the i.e. amount of money of α p to often according to in-degree direction reverse subgraph equably from w Individual upper hop neighbor node;Each receive money, i.e. the node of diffusion activation stays the amount of money of (1-α) to invite behavior as to it Compensation, remaining money uses similar mode, from this node along the transmission of the opposite direction iteration of in-degree, until transmission The amount of money is less than certain threshold T, then activated diffusion process stops, and the money number that the most each node is had is as the compensation to it.
The most according to claim 1 a kind of based on the electronics coupon diffused sheet including excitation secret protection passed from mouth to mouth Method, it is characterised in that described step 1-1 can be divided into two steps, including:
The first step, authentication center I will use oneself private keyThe following message of encryption,Issue information source s, Wherein TTLsRepresent the jumping figure that coupon can spread, i.e. scope;
Second step, once s receives this coupon, s and uses the PKI of IObtain and verify the content of electronics coupon, so One random number of rear generation (nonce for encryption) xs, and using following message as oneself couponCsStorage Get up,Wherein NsThe number of the father node of representative information source s is (i.e. The number of the mechanism of coupon is issued for information source s), it is clear that Ns=1, represent that s only accepts coupon from excitation center Distribution.
The most according to claim 1 a kind of based on the electronics coupon diffused sheet including excitation secret protection passed from mouth to mouth Method, it is characterised in that described step 1-2 can be divided into two steps, including:
Coupon diffusion between first step information source and participant u: as user u from information source through (or consuming in this businessman Afterwards), the electronics coupon C that information source s is storedsIt is sent to u, i.e. after its key ciphering signatureFirst U usesThe signature of (PKI of s) checking s, then generates a random number xu, and store following content as its electronics Coupon, it may be assumed that
Wherein TTLu=TTLs-1, represent that user u obtains from information source The TTL of coupon decrease 1, the essence of aforesaid operations is: u is in the signature information from even higher level of node (father node) After add oneself identity and an interim random number, and with the public key encryption of excitation center I, then by it Be put into after the clear content of electronics coupon, i.e. TTL deducts 1 accordingly, includes information source and participant at mutual node, And the message of transmission explicitly includes two parts between participant and participant: clear portion includes coupon specification and existence Phase, and the part of ciphertext represents the information signature of upper hop node;
Between second step participant, i.e. diffusion between coupon diffusion person and coupon recipient: first coupon turns originator Judge whether, once to the forwarded over coupon of recipient met, the most not forward coupon, if it is not, then by coupon Being transmitted to recipient, coupon recipient can receive multiple coupon turning originator diffusion, if participant w receives two use simultaneously Family u and v spreads to the coupon of its signature, and receives following signature information from u and v respectively:With Therefrom obtain TC, TTLuAnd TTLv, and store the following message couponC as ww, it may be assumed that
Cw=TC|TTLw|Nw
E I ( { C u | w } K u s | x w | u | w )
E I ( { C v | w } K v s | x w | v | w )
Wherein TTLw=max{ (TTLu-1), (TTLv-1) }, expression chooses what bigger TTL stored as user w The life cycle of coupon, if TTLwIt is 0, then shows to reach the life cycle of this coupon, need to abandon;NwRepresentative is given The number of the user of user w diffusion coupon.
The most according to claim 3 a kind of based on the electronics coupon diffused sheet including excitation secret protection passed from mouth to mouth Method, it is characterised in that: described method records certain user and traditionally receives the real scene of the coupon from multiple friend/neighbours, And after once this user consumes to businessman, then these all nodes participating in forwarding all should be compensated accordingly.
The most according to claim 1 a kind of based on the electronics coupon diffused sheet including excitation secret protection passed from mouth to mouth Method, it is characterised in that described step 2-1 includes: authentication center I extracts to electronics coupon iteratively from accept The diffusion structure of coupon, i.e. w submit its electronics coupon C preserved tow, this therefrom, I understand, the upper hop node of w has Two, understanding the two node by decryption oprerations is u and v respectively, and obtains the electronics coupon C that they preserve respectivelyuWith Cv, obtained by their signature information of public key decryptions using u and v, and then the upper hop node of u and v can be obtained, logical The mode crossing this iteration is obtained in that from information source s to the subgraph (subgraph) exchanging node, i.e. terminal consumer.
The most according to claim 1 a kind of based on the electronics coupon diffused sheet including excitation secret protection passed from mouth to mouth Method, it is characterised in that described step 2-2 includes: set in the coupon diffusion subgraph G constructed and comprise N number of ginseng With person, between them, define a directed graph G=(N, E), wherein limit (u, v) ∈ E is the directed edge pointing to v from user u, Represent the diffusion receiving coupon from v from u;D (v) represents the in-degree of user v, it is clear that in subgraph G, each user has Positive in-degree;Assume that terminal consumer w has exchanged coupon, and have purchased the commodity that price is p, then from the beginning of w, a definite proportion The money α p of example is injected in subgraph G, and then according to following rule iterative diffuse up: α p is divided into by user w D (w) part, along the opposite direction of each in-degree, is communicated up α p/d (w), if user u has the directed edge pointing to w (to represent u pair The requirement of w), then u obtains α p/d (w) amount of money, then distribute the amount of money of (1-α) α p/d (w) as the diffusion to u for u The award of behavior, remaining α α p/d (w) is then according to same way as above, and the in-degree opposite direction along w spreads, and depends on Secondary analogize;
In iteration, the compensation that each node u is obtained is:
R ( u ) = α · Σ ( u , v ) ∈ E ( R ( v ) / d ( v ) )
In order to eliminate small insignificant compensation stream, if compensation R (u) to any node u is less than threshold T, u is no longer Upwardly propagate offset.
7. one kind based on pass from mouth to mouth include excitation secret protection electronics coupon diffusion system, it is characterised in that: described System includes coupon diffusion module and compensates exchange module;
Coupon diffusion module includes distribution and the diffusion of electronics coupon;Information source s issues electronics coupon to I application, Consult discount content and the scope (TTL of coupon distribution of coupons), as the content of coupon, it is expressed as TC, Then the electronics coupon that I is signed,Being sent to s, once s receives this coupon, s by with I PKIObtain and verify the content of electronics coupon, then produce a random number xs, and as the electronics of oneself Coupon stores, it may be assumed thatWherein NsRepresent distribution coupon To the number of the father node of information source s, Ns=1, represent that s only accepts the distribution of coupon from authority center;
Compensate exchange module to include constructing excitation network structure and determining compensation mechanism;When certain terminal consumer w is with electronics Coupon to businessman consume time, electronics coupon is uploaded to excitation center I by businessman, by its reconstructed excitation network structure and determine Compensation mechanism, I from accept to electronics coupon extracts the diffusion structure of coupon iteratively, such as w submits to it to preserve Electronics coupon Cw, from this coupon, I understands, and a upper hop node of w has two, by decryption oprerations The two node is u and v respectively, and obtains the electronics couponC that they preserve respectivelyuAnd Cv, and then can obtain u's and v Upper hop node, is obtained in that by the way of this iteration and spreads subgraph from information source s to the coupon of terminal consumption node (subgraph);The mode using diffusion activation determines the compensation that the participant in subgraph is obtained in that, works as terminal After consumer w utilizes the coupon make purchases worth more of storage for the article of p, then network forwarded according to the coupon constructed Figure, spreads iterative for the amount of money of part p to the neighbour in multi-hop directly or indirectly according to in-degree direction reverse subgraph from w Occupy node.
CN201610221823.6A 2016-04-11 2016-04-11 Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system Pending CN105933292A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610221823.6A CN105933292A (en) 2016-04-11 2016-04-11 Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610221823.6A CN105933292A (en) 2016-04-11 2016-04-11 Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system

Publications (1)

Publication Number Publication Date
CN105933292A true CN105933292A (en) 2016-09-07

Family

ID=56840546

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610221823.6A Pending CN105933292A (en) 2016-04-11 2016-04-11 Mouth-to-mouth spread-based incentive privacy protection-containing electronic coupon diffusion method and system

Country Status (1)

Country Link
CN (1) CN105933292A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1527234A (en) * 2003-03-06 2004-09-08 精工爱普生株式会社 Preferential ticket issuing equipment and sales promoting system
CN102289763A (en) * 2010-06-14 2011-12-21 埃森哲环球服务有限公司 Digital voucher distribution system
CN103679504A (en) * 2013-11-15 2014-03-26 北京奇虎科技有限公司 Method and device for distributing electronic ticket

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1527234A (en) * 2003-03-06 2004-09-08 精工爱普生株式会社 Preferential ticket issuing equipment and sales promoting system
CN102289763A (en) * 2010-06-14 2011-12-21 埃森哲环球服务有限公司 Digital voucher distribution system
CN103679504A (en) * 2013-11-15 2014-03-26 北京奇虎科技有限公司 Method and device for distributing electronic ticket

Similar Documents

Publication Publication Date Title
Wang et al. PoRX: A reputation incentive scheme for blockchain consensus of IIoT
He et al. Certificateless public key authenticated encryption with keyword search for industrial internet of things
Mahmood et al. An elliptic curve cryptography based lightweight authentication scheme for smart grid communication
Wang et al. Proof of X-repute blockchain consensus protocol for IoT systems
Su et al. ePASS: An expressive attribute-based signature scheme with privacy and an unforgeability guarantee for the Internet of Things
Huang et al. Cost-effective authentic and anonymous data sharing with forward security
Zhao et al. Social-aware data dissemination via device-to-device communications: Fusing social and mobile networks with incentive constraints
Wang et al. TPP: Traceable privacy-preserving communication and precise reward for vehicle-to-grid networks in smart grids
Luo et al. Privacy-preserving multi-hop profile-matching protocol for proximity mobile social networks
CN107612973A (en) Block chain structure, generation method and transaction verification method for intelligent sliding moved end
CN104168563B (en) A kind of K anonymity motivational techniques based on the storage of local prestige
Zou et al. Reportcoin: A novel blockchain-based incentive anonymous reporting system
CN106934603A (en) The implementation method and device of electronics red packet
CN103052066A (en) Method for performing data exchanging or authorizing based on wireless hotspot identification names
Guo et al. An authenticated group key distribution protocol based on the generalized Chinese remainder theorem
Goutham Reddy et al. Lightweight authentication with key‐agreement protocol for mobile network environment using smart cards
Feng et al. Distributed signing protocol for IEEE P1363‐compliant identity‐based signature scheme
Sureshkumar et al. A lightweight two-gateway based payment protocol ensuring accountability and unlinkable anonymity with dynamic identity
Kamil et al. A secure and privacy-preserving lightweight authentication protocol for wireless communications
Khan et al. A secure and energy efficient key agreement framework for vehicle-grid system
Chain et al. Enhancement authentication protocol using zero‐knowledge proofs and chaotic maps
Tan An efficient pairing‐free identity‐based authenticated group key agreement protocol
Wu et al. Secure and anonymous authentication scheme for the internet of things with pairing
Aggarwal et al. Architecture of blockchain
Artail et al. A privacy-preserving framework for managing mobile ad requests and billing information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907