CN110309634A - A kind of credible advertisement data management system based on block chain - Google Patents

A kind of credible advertisement data management system based on block chain Download PDF

Info

Publication number
CN110309634A
CN110309634A CN201910270691.XA CN201910270691A CN110309634A CN 110309634 A CN110309634 A CN 110309634A CN 201910270691 A CN201910270691 A CN 201910270691A CN 110309634 A CN110309634 A CN 110309634A
Authority
CN
China
Prior art keywords
data
chain
block
certificate
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910270691.XA
Other languages
Chinese (zh)
Other versions
CN110309634B (en
Inventor
王大永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Datong Industrial Co Ltd
Original Assignee
Shenzhen Datong Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Datong Industrial Co Ltd filed Critical Shenzhen Datong Industrial Co Ltd
Priority to CN201910270691.XA priority Critical patent/CN110309634B/en
Publication of CN110309634A publication Critical patent/CN110309634A/en
Application granted granted Critical
Publication of CN110309634B publication Critical patent/CN110309634B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention belongs to technical field of data security; specially a kind of credible advertisement data management system based on block chain, solve data reliability it is low, it is not open and clear enough, may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to the problems such as ensureing.Block chain technology is applied to media industry by the present invention, in conjunction with big data technology, carries out Identity Management and authorization to advertiser and media companies based on credible alliance's chain, ad data cochain is traded to user data and analyzed by user identity two-way authentication.A safe and reliable ad data management method is provided for media companies, advertiser and consumer.

Description

A kind of credible advertisement data management system based on block chain
Technical field
The invention belongs to technical field of data security, specially a kind of credible advertisement data management system based on block chain System.
Background technique
With flourishing for Internet technology, the mankind enter big data era.Support of the Media Industry in big data Under, gradually start to minorityization, personalization, instantaneity, flexible sexual development, the accurate support launched in big data technology of advertisement Under be possibly realized.However, the acquisition of mass data it is low with there is also data reliabilities in management process, it is not open and clear enough, It may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to the problems such as ensureing.Data acquisition and management It is improper not only result in media advertising dispensing there is error, all kinds of equity disputes and safety problem but will be caused.
Block chain technology is considered as that internet is promoted to credible, to be transmitted to the important of value delivery by information by insincere Foundation stone.Block chain technology is put forward for the first time in " a kind of bit coin: point-to-point electronic cash system " by middle acute hearing, earliest conduct The bottom frame technology of bit coin occurs, and essence is the database of a decentralization, is Encryption Algorithm, common recognition mechanism, distribution The combined application models of computer technologies such as the storage of formula data, point-to-point transmission.
Summary of the invention
The purpose of the present invention is to provide a kind of accurate intelligent, it is just it is transparent, can not distort based on the credible of block chain Ad data management method.
Credible advertisement data managing method provided by the invention based on block chain, using following technical scheme.
Media companies carry out identities to the user of credible alliance's chain and carry out the authorization of data usage rights by classification; Media companies are set as system actor, have reading analysis all permissions to the data on credible alliance's chain;Advertiser is set as industry Be engaged in role, possesses reading permission to advertisement playback volume, user clicks and user purchase, collection, sharing rate data;It is credible Can not distorting for alliance's chain makes the trust between media companies and advertiser be protected;
Wherein, system actor obtains the configuration information of certificate and Cryptographic Service Provider according to configuration file, according to matching The example for setting the credible alliance's chain client of information creating, credible alliance's chain client instance are entirely credible wide based on block chain Accuse the entrance of the operation of data management system;Then information (the i.e. system actor for being responsible for submitting the greffier of subscriber data is obtained Information), if it does not exist, then needing first to initialize the information of greffier, obtain the certificate of registry and personal information of greffier;
According to the example of the client of configuration information and organizational information creation certificate;The user information registered as needed is raw At registration request, the client of certificate is submitted to;Greffier can submit the certificate request for accessing credible alliance's chain;By credible The step of certificate request of alliance's chain generates the password of user's registration, finally returns that application program, completes user information registration;
Application program calls the tune of the client of certificate using the password of the user information of application and the user's registration of return Use interface;
The client of certificate generates private key and Certificate Signature Request, and the calling interface for calling credible alliance's chain to provide generates note Volume certificate;
The certificate of registry generated and private key are returned to application program;
It saves in user information to distributed data-storage system KeyValueStore device;
The two-way authentication technology based on elliptic curve that authentication uses between media companies and advertiser;It is two-way Certification carries out between system actor and business roles, i.e., needs to carry out before the data trade between media companies and advertiser double To certification;Both parties media companies C and advertiser U are after certificate acquisition digital certificate, the certificate Cert of CC={ IDC, QC, (dC, sC), eC, mC, wherein IDCThe identity of C, r are distributed to for certificateC∈ [2, n-2] is the private key of C, QCIt is the public affairs of C Key, QC=rCP, eCIt indicates by h (IDC||QC||mC) generate abstract, (dC, sC) indicate certificate to eCThe integer pair that signature generates, mCIndicate the Time Of Release and validity period information of certificate relevant to C;The public key of certificate is to for (rc, Qc);Qc, n and user identity It is public information;P indicates that the point on elliptic curve E (a, b), n are the rank of P;Encryption (K, M) indicates to use K pairs of key Message M is encrypted and decrypted, and Decryption (K, M) expression is encrypted and decrypted message M with key K, h (IDC|| QC||mC) indicate one-way function;The target of authentication is exactly that both sides are close by the way that one secret shared session of creation is mutually authenticated Key;Two-way authentication process step are as follows:
C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and message M is sent to user U1=Q1;C → U:Q1
After U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1b=rbQ1, Q12=r2Q1, then with Q12As shared key and the certificate Cert of UU, generate ciphertext CU=Encryption (Q12, CertU||T1), T1It is close for this The timestamp of literary message, by message M2=Q2||CU||h(Q12||Q1b||CertU||T1) it is sent to user C;
U → C:Q2||CU||h(Q12||Q1u||CertU||T1);
C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate Cert of UUWith timestamp CertU||T1= Decryption(Y12, CU), verify CertUValidity;Continue in next step, otherwise to require to retransmit message if being proved to be successful M2
Calculate Q1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1Validity;If success It carries out in next step, otherwise re-initiating session;
C calculates Q2c=rcQ2And CC=EnCryption (Y12, CertC||T2), generate message M3=CC||h(Q12||Q2c| |CertC||T2), it is sent to U;
C → U:CC||h(Q12||Q2c||CertC||T2);
U receives message M3Afterwards first by CertC||T2=Decryption (Y12, CC) decryption, obtain the certificate Cert of CCAnd T2, Then Cert is verifiedCWith h (Q12||Q2c||CertC||T2) and T2Validity;It completes mutually to test both if being proved to be successful Card and key agreement generate shared session key Q12, otherwise re-initiate session;
It is ad data cochain that ad content is added to the process in credible alliance's chain by advertiser;Credible alliance's chain passes through Multi-level encryption, common recognition mechanism are by ad data cochain, and ad data can not be revoked once cochain, distort, and ad data exists Full disclosure in credible alliance's chain, transparent, traceable, the trust solved between advertiser, media companies and consumer is asked Topic, steps are as follows:
Advertiser provides ad data, and ad data is text, picture, video or their combination;
Hash Hash calculating, the ratio that is calculated Hash values H (W), and will obtain are carried out to the information of ad data Spy's string is converted into integer;Using the public key cryptography of digital signature, the Hash functional value h of the information of ad data is counted Word signature, to obtain the signature of the information of ad data;
Block file manager safeguards that the data of a presently written block file, the data of write area block file include two A part, one is block size, the other is block data;Block size and block data in the block file of write area are all By serializing processing;If after block size and serializing is written, the size of current block file is more than setting value, then can It is written in next block file;A new block checkpoint information is created, is saved in database;
The information of ad data after analysis is fed back to advertiser by media companies, i.e., in instantiated chain code channel On, a transaction is initiated, the content of transaction is user behavior data and big data analysis as a result, in instantiated chain code On channel, all endorsement nodes that block chain client is appointed before transaction request is issued, endorsement node receives above-mentioned letter It after breath, is signed first with public key verifications, endorsement node executes intelligent contract, executing at this time the result is that mock trading, will not write To in account book, the result of execution is fed back into client;According to elliptic curve parameter and the public key of ad data, advertisement is verified The signature of data, until signature passes through verifying;
Phase sorting receives the transaction of signed endorsement, determines the sequence and quantity of transaction, and sorted transaction is beaten It wraps in block, is broadcast to fellow's node and verifies, in general, sequence service will not export individually from the aspect of efficiency Transaction is used as a block, but multiple transaction are packaged into a block;
Result is broadcast to all fellow's nodes by common recognition node, and then each fellow's node updates oneself account book again;
The node of multiple and different types may operate on same physical server, and there are many nodes of type: client, Fellow's node, sequence service node and certificate node;
Client or application program represent the entity operated by end user, it is necessary to be connected to some fellow's node Or communicated on sequence service node with credible alliance's chain, client submits transaction motion to endorsement node, when being collected into Enough after endorsement, to sequence serviced broadcast transaction, it is ranked up, generates block;
All fellow's nodes are all accounting nodes, are responsible for verifying from the transaction in sequence service node block, maintenance The copy of status data and account book;Part fellow's node, which can execute, trades and carries out signature endorsement to result, serves as endorsement section The role of point;Node of endorsing is dynamic role, is bound with specific chain code;Each chain code can be set when instantiation Endorsement strategy is set, specifies which node effective to being only after transaction endorsement;Also transaction back only is initiated to it in application program Book request when be only endorsement node, other when be exactly common accounting nodes, only be responsible for verifying trade simultaneously keeps accounts;
Identity Management realizes that the technology in channel is used for the range that restricted information is propagated by the technology in channel;Passage technology Be it is associated with some account book, the technology in channel clearly determine which tissue and its member can pay close attention to this transaction;And it is each Transaction is all associated with unique channel;System provides the function in creation channel, and provides for user and channel is added and moves back The function in channel out;
Authentication is carried out using the two-way authentication technology based on elliptic curve in credible alliance's chain;Authentication purport Data transmission between protection system actor and business roles guarantees data content correct by the certification to both sides' identity Channel on correct encrypted transmission;Authentication protocol can make authenticate mutually between legitimate user, and generate altogether for two users Same content-encrypt seed;
Advertiser possesses ad data, and ad data may be text, picture, video either their combination;Medium Company encrypts the ad data of advertiser, carries out data verification using the relative theory of cryptography;Wherein hashed using Hash Algorithm is realized the Input transformation of random length with irreversibility at the output of regular length being made of letter and number It can not distort;Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature;
Block is formally to be included in block chain to store by algorithm of knowing together, and the whole network node indicates region of acceptance at the same time Block, and indicate the method received, the random hash value of block is exactly considered as newest block hashed value, the manufacture of new block will Extend based on to credible alliance's chain;To guarantee data consistency, transparent, safe;
Advertisement is delivered to user by media companies, and user is decrypted ad data by various terminals, generates viewing, point It hits, buy, collect, share user behavior;User behavior as data by real-time storage in credible alliance's chain;
Media companies are analyzed the data of the user behavior of the magnanimity on credible alliance's chain by big data technology, from And realize accurate dispensing and the personalized recommendation of advertisement, so that the data of the user behavior of magnanimity are utilized to more effective;
The information of the data of the user behavior of magnanimity after analysis is fed back to advertiser by media companies, i.e., in example On the chain code channel of change, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.
Detailed description of the invention
Fig. 1 is credible block chain data management scheme figure;
Fig. 2 is credible block chain Identity Management flow chart;
Fig. 3 is credible block chain identity two-way identification flow chart;
Fig. 4 is credible block chain data cochain flow chart;
Fig. 5 is credible block chain data trade flow chart;
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
Block catenary system has multicenter, opening and common recognition, feature trusty.Its major technique has at following 4 points:
(1) distributed account book
Transaction is recorded jointly by multiple nodes in distributed system.Each complete transaction note of node record Record, therefore each node can participate in the verifying to the supervision of transaction legitimacy and to transaction validity.With conventional center Unlike the mode of change, the node in block chain haves no right individually to record transaction, so as to avoid single book keeping operation people or node quilt A possibility that controlling and faking.Meanwhile the whole network node participates in record, it is therefore prevented that data are lost caused by receiving attack because of individual node It loses, ensure that the safety of data.
(2) encryption technology and authorization technique
Block chain technology combines many advantages of current symmetric cryptography, asymmetric encryption and hash algorithm, uses simultaneously Elliptic curve encryption algorithm generates the public private key pair of user and guarantees transaction security using elliptic curve digital signature algorithm.Area The Transaction Information being packaged on block discloses all nodes for participating in common recognition, while the identity information of account also passes through stringent add It is close.
(3) common recognition mechanism
Common recognition mechanism is the strategy and method that each node is reached an agreement in block catenary system.Common recognition mechanism in block chain The third-party institution with safety is trusted using the guarantee of centralization instead of tradition, is reduced as caused by each side's mutual trust problem Third party's Cost of Credit, time cost and capital consume.Common common recognition mechanism mainly have PoW, POS, DPOS, Paxos, PBFT etc., common recognition mechanism are writing modes, while being also anti-tamper effective means.
(4) intelligent contract
Intelligent contract is one section of computer program code that rule can be pre-defined with automated execution.It can be realized valence Storage, transmitting, management and the control of value provide innovative solution for the application based on block chain.
Step1: media companies carry out identities to the user of credible alliance's chain and carry out data usage rights by classification Authorization.The present invention realizes Identity Management by the passage technology of block chain, and system channel function is for restricted information propagation Range.Channel be it is associated with some account book, this can clearly define which tissue and its member can pay close attention to this transaction. And each transaction is associated with unique channel.System provides the function in creation channel, and provides addition for user and lead to Road and the function of exiting channel.
Step2: credible block chain carries out authentication using the two-way authentication technology based on elliptic curve.Identity is recognized Card is intended to protect the data between system actor and business roles to transmit, and guarantees that data content exists by the certification to both sides' identity Correct encrypted transmission on correct channel.The purpose of authentication protocol is to make to recognize mutually between legitimate user in the present invention Card, and common content-encrypt seed is generated for two users.
Step3: advertiser possesses ad data, and ad data may be text, picture, video or their group It closes.Media companies encrypt the ad data of advertiser, carry out data verification using the relative theory of cryptography.Wherein using Kazakhstan Uncommon hash (hash) algorithm has the Input transformation of random length at the output of regular length being made of letter and number Irreversibility, realization can not distort.Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature.
Step4: common recognition is realized using kafka ranking function.Block is formally included in block chain by algorithm of knowing together and is deposited Storage, the whole network node indicates to receive the block, and indicates the method received, is exactly considered as the random hash value of block newest The manufacture of block hashed value, new block will be extended based on the block chain.To guarantee data consistency, transparent, peace Entirely.
Step5: advertisement is delivered to user by media companies, and user is decrypted ad data by various terminals, generates sight The user behaviors such as see, click, buying, collecting, sharing.These user behaviors as data by real-time storage in block chain.
Step6: media companies are analyzed the mass users behavioral data on block chain by big data technology, thus Accurate dispensing and the personalized recommendation for realizing advertisement, so that user data is used more effectively.
Step7: the data information after analysis is fed back to advertiser by media companies, i.e., in instantiated chain code channel On, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.To help advertiser real Existing ad content quality optimization and audience analysis.So that user data is utilized to the greatest extent, advertiser is helped to realize The minorityization of advertisement, personalization, instantaneity, flexibility.
User behavior is changed into practical value by block chain technology by credible alliance's chain, flows user's behavior memory Logical, realization.The subjective initiative and enthusiasm of user preferably are excited, and is disclosed using the decentralization of block chain and data Bright characteristic forms reliable data flow closed loop to solve value trust problem.From the point of view of broad sense, advertisement media product is final It is all to be showed in a manner of digital asset.Credible alliance's chain can establish one for the digital asset running of the new type of media industry It is a it is good, stable, can the bad order of standing.Therefore, the addition of credible alliance's chain can carry out great machine to medium data band It meets and unlimited possibility.
Credible advertisement data managing method of the technical solution of the present invention based on block chain includes credible block chain Identity Management Process, credible block chain identity two-way identification process, chain process in credible advertisement data, credible block chain transaction are initiated, are called Process and can new ad data analyze feedback procedure.Fig. 1 is credible block chain data management scheme figure, and Fig. 2 is credible block Chain Identity Management flow chart, Fig. 3 are credible block chain identity two-way identification flow charts, and Fig. 4 is credible block chain data cochain stream Cheng Tu, Fig. 5 are credible block chain data trade flow charts.
Credible block chain Identity Management is that media companies carry out identities simultaneously to the user of credible alliance's chain in the present invention The process of the authorization registration of data usage rights is carried out by classification.CA node is the certificate authority machine of credible alliance's chain in the present invention Structure (Certificate Authority), is made of server and client side's component.The registration Shen of CA node reception client Please, it returns to log-in password to log in for user, to obtain letter of identity.All operations can all be verified in block chain network The identity of user.As shown in Fig. 2, steps are as follows:
Step 201, system actor is set by media companies, super keepe identity has reading point to the data on chain The all permissions such as analysis.Business roles are set by advertiser, advertisement playback volume, user clicks and user are bought, collected, The data such as sharing rate possess reading permission.Block catenary system can not tamper make trusting between media companies and advertiser To guarantee.
Step 202, the configuration information that CA and CSP is obtained according to configuration file creates credible alliance's chain according to configuration information The example of Client, credible alliance's chain Client example are the entrances of whole operation.
Step 203, the greffier's information Registrar (i.e. system actor information) for being responsible for submitting subscriber data is obtained, such as Fruit is not present, then needs first to initialize greffier user, obtains the certificate of registry and personal letter breath of greffier.
Step 204, the example for credible alliance's chain CAClient being created according to configuration information and organizational information.
Step 205, the user information registered as needed generates RegistrationRequest request, submits to credible Alliance chain CAClient.
Step 206, greffier Registrar can submit the post request for accessing credible alliance's chain CA.
Step 207, credible alliance's chain CA request generates the password Secret of user's registration, finally returns that application program, The step of completing user information registration.
Step 208, application program calls credible alliance's chain using the user information of application and the log-in password of return The Enroll interface of CAClient.
Step 209, credible alliance's chain CAClient generates private key and Certificate Signature Request CSR (Certificate Signing Request), the enroll interface for calling credible alliance's chain to provide generates certificate of registry.
Step 210, the certificate of registry and private key for returning to generation are to application program.
Step 211, it saves in user information to KeyValueStore.
Authentication is carried out using the two-way authentication technology based on elliptic curve in the present invention.Two-way authentication is in system It is carried out between role and business roles, i.e., needs to carry out two-way authentication before the data trade between media companies and advertiser.It hands over Easy both sides media companies C and advertiser U is after CA obtains digital certificate, the certificate Cert of CC={ IDC, QC, (dC, sC), eC, mC, wherein IDCThe identity of user C, r are distributed to for CAC∈ [2, n-2] is the private key of C, QCIt is the public key of C, QC=rCP, eCIt indicates by h (IDC||QC||mC) generate abstract, (dC, sC) indicate CA to eCThe integer pair that signature generates, mCIt indicates related to C Other information (such as certificate issued time and validity period).The public key of CA is to for (rsc, Qsc), Qsc, n and user identity are public affairs Open information.P indicates that the point on elliptic curve E (a, b), n are the rank of P.Encryption (K, M), Decryption (K, M) table Show and message M is encrypted and decrypted with key K, h () indicates one-way function.The target of authentication is exactly that both sides pass through phase Mutually one secret shared session key of verifying creation.Two-way authentication process is as shown in figure 3, steps are as follows:
Step 301, C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and message M is sent to user U1=Q1
C → U:Q1
Step 302, after U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1b=rbQ1, Q12= r2Q1, then with Q12As shared key, ciphertext C is generatedU=Encryption (Q12, CertU||T1), T1For the cipher-text message Timestamp, by message M2=Q2||CU||h(Q12||Q1b||CertU||T1) it is sent to user C;
U → C:Q2||CU||h(Q12||Q1u||CertU||T1)。
Step 303, C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate and timestamp Cert of Uu||T1= Decryption(Y12, CU), verify CertUValidity.Continue in next step, otherwise to require to retransmit message if being proved to be successful M2
Step 304, Q is calculated1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1Validity.Such as Fruit success then carries out in next step, otherwise re-initiating session.
Step 305, C calculates Q2c=rcQ2And CC=Encryption (Y12, CertC||T2), generate message M3=CC||h (Q12||Q2c||CertC||T2), it is sent to U.
C → U:CC||h(Q12||Q2c||CertC||T2)。
Step 306, U receives message M3Afterwards first by CertC||T2=Decryption (Y12, CC) decryption, obtain CertCWith T2, then verify CertCWith h (Q12||Q2c||CertC||T2) and T2Validity.It is completed both if being proved to be successful mutual Verifying and key agreement generate shared session key Q12, otherwise re-initiate session.
Ad data cochain is the process that ad content is added in credible alliance's chain by advertiser in the present invention.It is credible Alliance's chain is by multi-level encryption, common recognition mechanism by data cochain, and ad data can not be revoked once cochain, distort, advertisement number According to the full disclosure, transparent, traceable in credible alliance's chain, solves the letter between advertiser, media companies and consumer Appoint problem, as shown in figure 4, steps are as follows:
Step 401, advertiser provides ad data, and ad data may be text, picture, video or their group It closes.
Step 402, Hash calculating is carried out to advertising information, be calculated hash value H (W), and obtained Bit String is turned Turn to integer e.
Step 403, using the public key cryptography of digital signature, the Hash functional value h of advertising data information is counted Word signature, it is assumed here that the elliptic curve parameter used is D=(p, a, b, G, n, h), and corresponding key pair is (k, Q), wherein Q For public key, k is private key, is digitally signed as follows:
1. generating random number d, 1≤d≤n-1;
2. calculating dG=(x1, y1), integer is converted by x1
3. calculatingIf r=0, random number is recalculated, d is otherwise calculated-1mod n;
4. calculating s=d-1(e+kr)mod n;
Then (r, s) is the signature of advertising information.
Step 404, block file manager safeguards the currentFileWriter of a presently written block file, writes The data for entering block file include two parts, and one is block size, the other is block data.In the block file of write area Block size and block data are handled by serializing.After if block size and serializing were written, current block text The size of part is more than setting value, then can be written in next block file.A new block checkpoint information is created, is saved Into database.
The data information after analysis is fed back to advertiser by media companies in the present invention, i.e., logical in instantiated chain code On road, a transaction is initiated, this transaction content is user behavior data and big data analysis result.It is instantiated On chain code channel, from a calling transaction is initiated to the overall process finally kept accounts as shown in figure 5, steps are as follows:
Step 501, all endorsement node (endorsing that block chain client is appointed before transaction request is issued peer).Here illustratively the selection of endorsing peer is that have a certain range of, is not in all endorsing It is chosen at random in peer, is that the Endorsement Policy as defined in affiliated ChainCode and the Chaincode is total to With what is determined.
Step 502, after endorsement node receives above- mentioned information, its signature of public key verifications is used first, and endorsement node executes intelligence Energy contract (being mock trading, will not write in account book), feeds back to client for the result of execution.According to elliptic curve parameter D The public key Q of=(p, a, b, G, n, h) and ad data verify the signature (r, s) of ad data according to the following steps:
1. verifying r and s is the integer on section [1, n-1];
2. calculating w=s-1mod n;
3. calculating u1=ew mod n and u2=rw mod n;
4. calculating X=u1G+u2G;
5. refusing to sign if X=0, integer otherwise is converted by the x coordinate x1 of XAnd it calculates
6. signature passes through verifying when v=r.
Step 503, phase sorting receives the transaction of signed endorsement, determines the sequence and quantity of transaction, will sequence sequence Transaction be bundled in block, be broadcast to Peer node and verified.In general, sequence service will not be defeated from the aspect of efficiency Single transaction is used as a block out, but multiple transaction are packaged into a block.
Step 504, result is broadcast to all nodes (peer) by common recognition node.Then each node updates oneself account again This.
Interior joint of the present invention is the communication agent of block chain, is a logical concept.The node of multiple and different types can be with It operates on same physical server.There are many nodes of type: client, Peer node, sequence service node and CA node.
Client or application program represent the entity operated by end user in the present invention, it is necessarily connected to some It is communicated on Peer node or sequence service node with block chain network.Client is mentioned to endorsement node (Endorser) Transaction motion (Transaction Proposal), to sequence serviced broadcast transaction, is arranged after being collected into endorsement enough Sequence generates block.
All Peer nodes are all accounting nodes (Committer) in the present invention, are responsible for verifying from sequence service node The copy of status data and account book is safeguarded in transaction in block.Part of nodes, which can execute, trades and carries out signature endorsement to result, Serve as the role of endorsement node.Node of endorsing is dynamic role, is bound with specific chain code.Each chain code is in instantiation When endorsement strategy can be all set, specify which node effective to being only after transaction endorsement.Also only application program to it Initiate transaction endorsement request when is only endorsement node, other when be exactly common accounting nodes, only be responsible for verifying transaction And it keeps accounts.
In the present invention sort service node (Orderer) receive comprising endorsement signature transaction, to the transaction not being packaged into Row sequence generates block, is broadcast to Peer node.Sequence service provides atomic broadcasting (AtomicBroadcast), guarantees Node on the same chain receives identical message, and has identical logical order.
The multichannel (MultiChannel) of sequence service realizes the data isolation of multichain, guarantees there was only the same chain Peer node could access the data on chain, protect the privacy of user data.
The utility model has the advantages that the present invention is a kind of credible advertisement data management system based on block chain, it is reliable to solve data Property it is low, not open and clear enough, may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to ensure Problem.Block chain technology is applied to media industry by the present invention, in conjunction with big data technology, based on credible alliance's chain to advertiser with Media companies carry out Identity Management and authorization, and user identity two-way authentication trades ad data cochain to user data And analysis.A safe and reliable ad data management method is provided for media companies, advertiser and consumer.To help Advertiser is helped to realize ad content quality optimization and audience analysis.So that user data is utilized to the greatest extent, help Minorityization, personalization, the instantaneity, flexibility of advertiser's realization advertisement.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto, Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.

Claims (1)

1. a kind of credible advertisement data management system based on block chain, it is characterised in that: media companies are to credible alliance's chain User carries out identities and carries out the authorization of data usage rights by classification;Media companies are set as system actor, to credible Data on alliance's chain have reading analysis all permissions;Advertiser is set as business roles, to advertisement playback volume, user clicks And user buys, collects, sharing rate data possess reading permission;Can not distorting for credible alliance's chain makes media companies and advertisement Trust between master is protected;Wherein, system actor obtains matching for certificate and Cryptographic Service Provider according to configuration file Confidence breath, according to the example that configuration information creates credible alliance's chain client, credible alliance's chain client instance is entirely to be based on The entrance of the operation of the credible advertisement data management system of block chain;Then the letter for being responsible for submitting the greffier of subscriber data is obtained It ceases (i.e. system actor information) and obtains the certificate of registry of greffier if it does not exist, then needing first to initialize the information of greffier And personal information;According to the example of the client of configuration information and organizational information creation certificate;The user's letter registered as needed Breath generates registration request, submits to the client of certificate;Greffier can submit the certificate request for accessing credible alliance's chain;By can Believe that the certificate request of alliance's chain generates the password of user's registration, finally returns that application program, complete the step of user information registration Suddenly;Application program calls the calling of the client of certificate to connect using the password of the user information of application and the user's registration of return Mouthful;The client of certificate generates private key and Certificate Signature Request, and the calling interface for calling credible alliance's chain to provide generates registration certificate Book;The certificate of registry generated and private key are returned to application program;User information is saved to distributed data-storage system In KeyValueStore device;Between media companies and advertiser authentication use based on the two-way of elliptic curve Authentication techniques;Two-way authentication carries out between system actor and business roles, i.e., the data between media companies and advertiser are handed over It needs to carry out two-way authentication before easily;Both parties media companies C and advertiser U are after certificate acquisition digital certificate, the certificate of C CertC={ IDC,QC,(dC,sC),eC,mC, wherein IDCThe identity of C, r are distributed to for certificateC∈ [2, n-2] is the private of C Key, QCIt is the public key of C, QC=rCP, eCIt indicates by h (IDC||QC||mC) generate abstract, (dC,sC) indicate certificate to eCSignature The integer pair of generation, mCIndicate the Time Of Release and validity period information of certificate relevant to C;The public key of certificate is to for (rc,Qc); Qc, n and user identity be public information;P indicates that the point on elliptic curve E (a, b), n are the rank of P;Encryption(K,M) Expression is encrypted and decrypted message M with key K, Decryption (K, M) expression with key K to message M carry out encryption and Decryption, h (IDC||QC||mC) indicate one-way function;The target of authentication is exactly both sides by the way that one secret of creation is mutually authenticated Shared session key;Two-way authentication process step are as follows: C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and to user U sends message M1=Q1;C→U:Q1;After U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1c=rcQ1, Q12=r2Q1, then with Q12As shared key and the certificate Cert of UU, generate ciphertext CU=Encryption (Q12,CertU ||T1), T1For the timestamp of the cipher-text message, by message M2=Q2||CU||h(Q12||Q1c||CertU||T1) it is sent to user C; That is U → C:Q2||CU||h(Q12||Q1c||CertU||T1);C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate Cert of UU With timestamp CertU||T1=Decryption (Q12,CU), verify CertUValidity;Continue if being proved to be successful next Otherwise step requires to retransmit message M2;Calculate Q1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1It is effective Property;It carries out in next step, otherwise re-initiating session if success;C calculates Q2c=rcQ2And CC=Encryption (Q12, CertC||T2), generate message M3=CC||h(Q12||Q2c||CertC||T2), it is sent to U;That is C → U:CC||h(Q12||Q2c|| CertC||T2);U receives message M3Afterwards first by CertC||T2=Decryption (Q12,CC) decryption, obtain the certificate Cert of CCWith T2, then verify CertCWith h (Q12||Q2c||CertC||T2) and T2Validity;It is completed both if being proved to be successful mutual Verifying and key agreement generate shared session key, otherwise re-initiate session;Ad content is added to credible by advertiser Process in alliance's chain is ad data cochain;Credible alliance's chain is by multi-level encryption, common recognition mechanism by ad data cochain, advertisement Data can not be revoked once cochain, distort, ad data full disclosure, transparent, traceable, solution in credible alliance's chain Trust problem between advertiser, media companies and consumer, steps are as follows: advertiser provides ad data, advertisement number According to being text, picture, video or their combination;Hash Hash calculating is carried out to the information of ad data, Kazakhstan is calculated Uncommon hash value H (W), and integer is converted by obtained Bit String;Using the public key cryptography of digital signature, to ad data The Hash functional value h of information be digitally signed, to obtain the signature of the information of ad data;Block file manager dimension The data of a presently written block file are protected, the data of write area block file include two parts, and one is block size, separately One is block data;Block size and block data in the block file of write area are handled by serializing;If write After entering block size and serializing, the size of current block file is more than setting value, then can be written in next block file; A new block checkpoint information is created, is saved in database;Media companies are anti-by the information of the ad data after analysis Feed advertiser, i.e., on instantiated chain code channel, initiates a transaction, the content of transaction be user behavior data with And big data analysis, as a result, on instantiated chain code channel, block chain client is arranged before transaction request is issued Good all endorsement nodes are signed with public key verifications first after endorsement node receives above- mentioned information, and endorsement node executes intelligence and closes About, executing at this time the result is that mock trading, will not write in account book, the result of execution is fed back into client;According to ellipse The public key of parameter of curve and ad data verifies the signature of ad data, until signature passes through verifying;Phase sorting receives The transaction of signed endorsement determines the sequence and quantity of transaction, and sorted transaction is bundled in block, fellow is broadcast to Node is verified, in general, sequence service will not export single trade and be used as a block, but handle from the aspect of efficiency Multiple transaction are packaged into a block;Result is broadcast to all fellow's nodes by common recognition node, then each fellow's node Oneself account book is updated again;The node of multiple and different types may operate on same physical server, and there are many nodes of type: Client, fellow's node, sequence service node and certificate node;Client or application program representative are operated by end user Entity, it is necessary to be connected to some fellow's node or sequence service node on communicated with credible alliance's chain, client It holds to endorsement node and submits transaction motion, after being collected into endorsement enough, to sequence serviced broadcast transaction, be ranked up, generate Block;All fellow's nodes are all accounting nodes, are responsible for verifying from the transaction in sequence service node block, safeguard state The copy of data and account book;Part fellow's node, which can execute, trades and carries out signature endorsement to result, serves as endorsement node Role;Node of endorsing is dynamic role, is bound with specific chain code;Back can be arranged when instantiation in each chain code Which node book strategy specifies effective to being only after transaction endorsement;Also only transaction endorsement is initiated to it in application program to ask Endorsement node is only when asking, other when be exactly common accounting nodes, only be responsible for verifying trade simultaneously keep accounts;Identity Management It is realized by the technology in channel, the technology in channel is used for the range that restricted information is propagated;Passage technology is closed with some account book Connection, the technology in channel clearly determines which tissue and its member can pay close attention to this transaction;And it is each transaction be with uniquely Channel is associated;System provides the function in creation channel, and provides the function that channel is added and exits channel for user;It is credible Authentication is carried out using the two-way authentication technology based on elliptic curve in alliance's chain;Authentication is intended to protect system angle Data transmission between color and business roles guarantees that data content is correct on correct channel by the certification to both sides' identity Encrypted transmission;Authentication protocol can make authenticate mutually between legitimate user, and generate common content-encrypt for two users Seed;Advertiser possesses ad data, and ad data may be text, picture, video either their combination;Media companies The ad data of advertiser is encrypted, carries out data verification using the relative theory of cryptography;Hash hashing algorithm is wherein used, The Input transformation of random length at the output of regular length being made of letter and number, there is irreversibility, realization can not It distorts;Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature;Block is by algorithm of knowing together It is formally included in block chain and is stored, the whole network node indicates to receive block at the same time, and indicates the method received, and being exactly will The random hash value of block is considered as newest block hashed value, and the manufacture of new block will prolong based on to credible alliance's chain It is long;To guarantee data consistency, transparent, safe;Advertisement is delivered to user by media companies, and user will be wide by various terminals Data deciphering is accused, viewing is generated, clicks, purchase, collection, shares user behavior;User behavior is existed as data by real-time storage In credible alliance's chain;Media companies are divided the data of the user behavior of the magnanimity on credible alliance's chain by big data technology Analysis, to realize accurate dispensing and the personalized recommendation of advertisement, so that the data of the user behavior of magnanimity are to more effectively sharp With;The information of the data of the user behavior of magnanimity after analysis is fed back to advertiser by media companies, i.e., instantiated On chain code channel, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.
CN201910270691.XA 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain Expired - Fee Related CN110309634B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910270691.XA CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910270691.XA CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Publications (2)

Publication Number Publication Date
CN110309634A true CN110309634A (en) 2019-10-08
CN110309634B CN110309634B (en) 2020-12-22

Family

ID=68074399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910270691.XA Expired - Fee Related CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Country Status (1)

Country Link
CN (1) CN110309634B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807209A (en) * 2019-11-01 2020-02-18 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN110852886A (en) * 2019-11-21 2020-02-28 西南石油大学 Second-hand transaction and article borrowing and returning system based on alliance chain
CN111028064A (en) * 2019-12-17 2020-04-17 中国科学院计算技术研究所 Internet of things platform transaction system, method and equipment based on block chain
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111160997A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Advertisement supervision method and device based on block chain and advertisement delivery system
CN111241196A (en) * 2020-01-03 2020-06-05 腾讯科技(深圳)有限公司 Advertisement frequency control method and system
CN111383378A (en) * 2020-03-11 2020-07-07 合肥鼎方信息科技有限公司 Access control identification system information node interconnection method based on block chain architecture
CN111476548A (en) * 2020-04-16 2020-07-31 山东师范大学 Title review method and system based on block chain
CN111741062A (en) * 2020-05-12 2020-10-02 成都芯域矩阵科技有限公司 Electronic equipment local area management system based on block chain technology
CN112039866A (en) * 2020-08-26 2020-12-04 北京计算机技术及应用研究所 Design method of block chain-based data trusted configuration management system
CN112235368A (en) * 2020-09-29 2021-01-15 中国人民武装警察部队工程大学 RFID equipment management system based on alliance block chain
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN113379416A (en) * 2020-03-10 2021-09-10 本无链科技(深圳)有限公司 Method and system for realizing similar biological groups with consistent memory but different behaviors
CN113468551A (en) * 2021-05-31 2021-10-01 南京邮电大学 Domestic intelligent electric meter data storage system and method based on alliance block chain
CN113538042A (en) * 2021-06-30 2021-10-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113779095A (en) * 2021-11-11 2021-12-10 江苏荣泽信息科技股份有限公司 Job title rating electronic certificate supervision system based on block chain technology
CN114127771A (en) * 2021-03-04 2022-03-01 罗伯特·詹姆斯·马克·海恩 System and method for proof of viewing via blockchain
CN114155010A (en) * 2021-12-06 2022-03-08 广州繁星互娱信息科技有限公司 Method and device for generating product identification code, electronic equipment and storage medium
CN114301608A (en) * 2021-12-31 2022-04-08 鄢华中 Block chain decentralized multi-element cross consensus signature lock and access control construction method
CN114528356A (en) * 2022-01-26 2022-05-24 广东南方新视界传媒科技有限公司 Multi-dimensional media data fusion management system and method based on block chain
CN115840787A (en) * 2023-02-20 2023-03-24 塔比星信息技术(深圳)有限公司 Supply chain data sharing method, device, equipment and medium based on block chain
CN116151828A (en) * 2023-04-20 2023-05-23 成都航空职业技术学院 Block chain-based carbon footprint tracking method, system, equipment and medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355442A (en) * 2016-08-30 2017-01-25 杭州启冠网络技术有限公司 Online precise advertising method and system based on big data driving
CN108764966A (en) * 2018-04-28 2018-11-06 深圳市元征科技股份有限公司 Advertisement placement method, block chain node device and relevant device
CN108985818A (en) * 2018-06-15 2018-12-11 微梦创科网络科技(中国)有限公司 Advertisement delivery system and method based on block chain technology
CN109086622A (en) * 2018-07-25 2018-12-25 深圳慧安康科技有限公司 A kind of implementation method and node device of intelligence community
CN109255661A (en) * 2018-09-27 2019-01-22 王国俊 A kind of business datum authentication method and system based on block chain
CN109308638A (en) * 2018-09-30 2019-02-05 北京奇虎科技有限公司 Ad trafficking system, server and readable storage medium storing program for executing based on block chain
CN109325331A (en) * 2018-09-13 2019-02-12 北京航空航天大学 Transaction system is acquired based on the big data of block chain and credible calculating platform
CN109325368A (en) * 2018-09-11 2019-02-12 云量区块链(深圳)有限公司 City outdoor scene management method, electronic equipment and storage medium based on block chain
CN109493088A (en) * 2018-10-31 2019-03-19 周更新 A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake
US20190087844A1 (en) * 2017-09-18 2019-03-21 Gregory H. Leekley Crypto Asset Compliance and Payment Systems and Methods
CN109523302A (en) * 2018-10-19 2019-03-26 中链科技有限公司 Advertisement sending method, device and calculating equipment based on block chain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355442A (en) * 2016-08-30 2017-01-25 杭州启冠网络技术有限公司 Online precise advertising method and system based on big data driving
US20190087844A1 (en) * 2017-09-18 2019-03-21 Gregory H. Leekley Crypto Asset Compliance and Payment Systems and Methods
CN108764966A (en) * 2018-04-28 2018-11-06 深圳市元征科技股份有限公司 Advertisement placement method, block chain node device and relevant device
CN108985818A (en) * 2018-06-15 2018-12-11 微梦创科网络科技(中国)有限公司 Advertisement delivery system and method based on block chain technology
CN109086622A (en) * 2018-07-25 2018-12-25 深圳慧安康科技有限公司 A kind of implementation method and node device of intelligence community
CN109325368A (en) * 2018-09-11 2019-02-12 云量区块链(深圳)有限公司 City outdoor scene management method, electronic equipment and storage medium based on block chain
CN109325331A (en) * 2018-09-13 2019-02-12 北京航空航天大学 Transaction system is acquired based on the big data of block chain and credible calculating platform
CN109255661A (en) * 2018-09-27 2019-01-22 王国俊 A kind of business datum authentication method and system based on block chain
CN109308638A (en) * 2018-09-30 2019-02-05 北京奇虎科技有限公司 Ad trafficking system, server and readable storage medium storing program for executing based on block chain
CN109523302A (en) * 2018-10-19 2019-03-26 中链科技有限公司 Advertisement sending method, device and calculating equipment based on block chain
CN109493088A (en) * 2018-10-31 2019-03-19 周更新 A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
ALEXANDER YAKUBOV等: "A Blockchain-Based PKI Management Framework", 《IEEE/IFIP MAN2BLOCK 2018》 *
张艳: "基于区块链技术的广告场景应用与生态网络变革", 《中国出版》 *
蓝狐笔记: "链云 UST:用区块链重塑互联网广告行业", 《HTTPS://WWW.CHAINNEWS.COM/ARTICLES/288575287248.HTM》 *

Cited By (30)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110807209B (en) * 2019-11-01 2021-04-30 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN110807209A (en) * 2019-11-01 2020-02-18 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110852886A (en) * 2019-11-21 2020-02-28 西南石油大学 Second-hand transaction and article borrowing and returning system based on alliance chain
CN111028064A (en) * 2019-12-17 2020-04-17 中国科学院计算技术研究所 Internet of things platform transaction system, method and equipment based on block chain
CN111028064B (en) * 2019-12-17 2023-07-21 中国科学院计算技术研究所 Block chain-based internet of things platform transaction system, method and equipment
CN111241196A (en) * 2020-01-03 2020-06-05 腾讯科技(深圳)有限公司 Advertisement frequency control method and system
CN111241196B (en) * 2020-01-03 2021-07-13 腾讯科技(深圳)有限公司 Advertisement frequency control method and system
CN113379416A (en) * 2020-03-10 2021-09-10 本无链科技(深圳)有限公司 Method and system for realizing similar biological groups with consistent memory but different behaviors
CN111383378A (en) * 2020-03-11 2020-07-07 合肥鼎方信息科技有限公司 Access control identification system information node interconnection method based on block chain architecture
CN111160997A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Advertisement supervision method and device based on block chain and advertisement delivery system
CN111476548A (en) * 2020-04-16 2020-07-31 山东师范大学 Title review method and system based on block chain
CN111476548B (en) * 2020-04-16 2024-01-23 山东师范大学 Title review method and system based on blockchain
CN111741062A (en) * 2020-05-12 2020-10-02 成都芯域矩阵科技有限公司 Electronic equipment local area management system based on block chain technology
CN112039866A (en) * 2020-08-26 2020-12-04 北京计算机技术及应用研究所 Design method of block chain-based data trusted configuration management system
CN112039866B (en) * 2020-08-26 2022-05-27 北京计算机技术及应用研究所 Design method of block chain-based data trusted configuration management system
CN112235368A (en) * 2020-09-29 2021-01-15 中国人民武装警察部队工程大学 RFID equipment management system based on alliance block chain
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN114127771A (en) * 2021-03-04 2022-03-01 罗伯特·詹姆斯·马克·海恩 System and method for proof of viewing via blockchain
CN113468551A (en) * 2021-05-31 2021-10-01 南京邮电大学 Domestic intelligent electric meter data storage system and method based on alliance block chain
CN113538042A (en) * 2021-06-30 2021-10-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113538042B (en) * 2021-06-30 2023-09-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113779095A (en) * 2021-11-11 2021-12-10 江苏荣泽信息科技股份有限公司 Job title rating electronic certificate supervision system based on block chain technology
CN114155010A (en) * 2021-12-06 2022-03-08 广州繁星互娱信息科技有限公司 Method and device for generating product identification code, electronic equipment and storage medium
CN114301608A (en) * 2021-12-31 2022-04-08 鄢华中 Block chain decentralized multi-element cross consensus signature lock and access control construction method
CN114528356A (en) * 2022-01-26 2022-05-24 广东南方新视界传媒科技有限公司 Multi-dimensional media data fusion management system and method based on block chain
CN115840787B (en) * 2023-02-20 2023-05-02 塔比星信息技术(深圳)有限公司 Block chain-based supply chain data sharing method, device, equipment and medium
CN115840787A (en) * 2023-02-20 2023-03-24 塔比星信息技术(深圳)有限公司 Supply chain data sharing method, device, equipment and medium based on block chain
CN116151828A (en) * 2023-04-20 2023-05-23 成都航空职业技术学院 Block chain-based carbon footprint tracking method, system, equipment and medium

Also Published As

Publication number Publication date
CN110309634B (en) 2020-12-22

Similar Documents

Publication Publication Date Title
CN110309634A (en) A kind of credible advertisement data management system based on block chain
US11481768B2 (en) System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures
US20200193432A1 (en) Method and system for settling a blockchain transaction
US6490358B1 (en) Enabling business transactions in computer networks
US20200127813A1 (en) Method and system for creating a user identity
US10410213B2 (en) Encapsulated security tokens for electronic transactions
JP2023036876A (en) Computer-implemented method, system, and storage medium in blockchain
CN111159750A (en) Automobile maintenance data storage method based on alliance chain
KR102307574B1 (en) Cloud data storage system based on blockchain and method for storing in cloud
WO2018088475A1 (en) Electronic authentication method and program
CN114389811B (en) Cross-domain authentication method based on medical alliance chain
US11334884B2 (en) Encapsulated security tokens for electronic transactions
CN111915349A (en) Cross-platform integral using system and method based on block chain
CN111160998A (en) Comment data processing method and device based on block chain and comment system
CN115049398A (en) Complete data asset trusted management and value transfer system and method
CN111049806B (en) Joint authority control method and device, electronic equipment and storage medium
Onieva et al. Secure multi-party non-repudiation protocols and applications
Boontaetae et al. RDI: Real digital identity based on decentralized PKI
CN115883214A (en) Electronic medical data sharing system and method based on alliance chain and CP-ABE
CN113673893A (en) Retired power battery management method and system
Kossick The Emerging Disharmony of Electronic Commerce Legislation in Latin America
Yildiz A proposal for Turkish government public key infrastructure trust model
Ismail Security of reputation systems
Yu et al. SPRA: Scalable policy‐based regulatory architecture for blockchain transactions
CN115296918A (en) Decentralized financial strategy sharing method based on chain uplink as contribution certification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201222