CN110309634A - A kind of credible advertisement data management system based on block chain - Google Patents
A kind of credible advertisement data management system based on block chain Download PDFInfo
- Publication number
- CN110309634A CN110309634A CN201910270691.XA CN201910270691A CN110309634A CN 110309634 A CN110309634 A CN 110309634A CN 201910270691 A CN201910270691 A CN 201910270691A CN 110309634 A CN110309634 A CN 110309634A
- Authority
- CN
- China
- Prior art keywords
- data
- chain
- block
- certificate
- user
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The invention belongs to technical field of data security; specially a kind of credible advertisement data management system based on block chain, solve data reliability it is low, it is not open and clear enough, may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to the problems such as ensureing.Block chain technology is applied to media industry by the present invention, in conjunction with big data technology, carries out Identity Management and authorization to advertiser and media companies based on credible alliance's chain, ad data cochain is traded to user data and analyzed by user identity two-way authentication.A safe and reliable ad data management method is provided for media companies, advertiser and consumer.
Description
Technical field
The invention belongs to technical field of data security, specially a kind of credible advertisement data management system based on block chain
System.
Background technique
With flourishing for Internet technology, the mankind enter big data era.Support of the Media Industry in big data
Under, gradually start to minorityization, personalization, instantaneity, flexible sexual development, the accurate support launched in big data technology of advertisement
Under be possibly realized.However, the acquisition of mass data it is low with there is also data reliabilities in management process, it is not open and clear enough,
It may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to the problems such as ensureing.Data acquisition and management
It is improper not only result in media advertising dispensing there is error, all kinds of equity disputes and safety problem but will be caused.
Block chain technology is considered as that internet is promoted to credible, to be transmitted to the important of value delivery by information by insincere
Foundation stone.Block chain technology is put forward for the first time in " a kind of bit coin: point-to-point electronic cash system " by middle acute hearing, earliest conduct
The bottom frame technology of bit coin occurs, and essence is the database of a decentralization, is Encryption Algorithm, common recognition mechanism, distribution
The combined application models of computer technologies such as the storage of formula data, point-to-point transmission.
Summary of the invention
The purpose of the present invention is to provide a kind of accurate intelligent, it is just it is transparent, can not distort based on the credible of block chain
Ad data management method.
Credible advertisement data managing method provided by the invention based on block chain, using following technical scheme.
Media companies carry out identities to the user of credible alliance's chain and carry out the authorization of data usage rights by classification;
Media companies are set as system actor, have reading analysis all permissions to the data on credible alliance's chain;Advertiser is set as industry
Be engaged in role, possesses reading permission to advertisement playback volume, user clicks and user purchase, collection, sharing rate data;It is credible
Can not distorting for alliance's chain makes the trust between media companies and advertiser be protected;
Wherein, system actor obtains the configuration information of certificate and Cryptographic Service Provider according to configuration file, according to matching
The example for setting the credible alliance's chain client of information creating, credible alliance's chain client instance are entirely credible wide based on block chain
Accuse the entrance of the operation of data management system;Then information (the i.e. system actor for being responsible for submitting the greffier of subscriber data is obtained
Information), if it does not exist, then needing first to initialize the information of greffier, obtain the certificate of registry and personal information of greffier;
According to the example of the client of configuration information and organizational information creation certificate;The user information registered as needed is raw
At registration request, the client of certificate is submitted to;Greffier can submit the certificate request for accessing credible alliance's chain;By credible
The step of certificate request of alliance's chain generates the password of user's registration, finally returns that application program, completes user information registration;
Application program calls the tune of the client of certificate using the password of the user information of application and the user's registration of return
Use interface;
The client of certificate generates private key and Certificate Signature Request, and the calling interface for calling credible alliance's chain to provide generates note
Volume certificate;
The certificate of registry generated and private key are returned to application program;
It saves in user information to distributed data-storage system KeyValueStore device;
The two-way authentication technology based on elliptic curve that authentication uses between media companies and advertiser;It is two-way
Certification carries out between system actor and business roles, i.e., needs to carry out before the data trade between media companies and advertiser double
To certification;Both parties media companies C and advertiser U are after certificate acquisition digital certificate, the certificate Cert of CC={ IDC,
QC, (dC, sC), eC, mC, wherein IDCThe identity of C, r are distributed to for certificateC∈ [2, n-2] is the private key of C, QCIt is the public affairs of C
Key, QC=rCP, eCIt indicates by h (IDC||QC||mC) generate abstract, (dC, sC) indicate certificate to eCThe integer pair that signature generates,
mCIndicate the Time Of Release and validity period information of certificate relevant to C;The public key of certificate is to for (rc, Qc);Qc, n and user identity
It is public information;P indicates that the point on elliptic curve E (a, b), n are the rank of P;Encryption (K, M) indicates to use K pairs of key
Message M is encrypted and decrypted, and Decryption (K, M) expression is encrypted and decrypted message M with key K, h (IDC||
QC||mC) indicate one-way function;The target of authentication is exactly that both sides are close by the way that one secret shared session of creation is mutually authenticated
Key;Two-way authentication process step are as follows:
C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and message M is sent to user U1=Q1;C → U:Q1
After U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1b=rbQ1, Q12=r2Q1, then with
Q12As shared key and the certificate Cert of UU, generate ciphertext CU=Encryption (Q12, CertU||T1), T1It is close for this
The timestamp of literary message, by message M2=Q2||CU||h(Q12||Q1b||CertU||T1) it is sent to user C;
U → C:Q2||CU||h(Q12||Q1u||CertU||T1);
C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate Cert of UUWith timestamp CertU||T1=
Decryption(Y12, CU), verify CertUValidity;Continue in next step, otherwise to require to retransmit message if being proved to be successful
M2;
Calculate Q1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1Validity;If success
It carries out in next step, otherwise re-initiating session;
C calculates Q2c=rcQ2And CC=EnCryption (Y12, CertC||T2), generate message M3=CC||h(Q12||Q2c|
|CertC||T2), it is sent to U;
C → U:CC||h(Q12||Q2c||CertC||T2);
U receives message M3Afterwards first by CertC||T2=Decryption (Y12, CC) decryption, obtain the certificate Cert of CCAnd T2,
Then Cert is verifiedCWith h (Q12||Q2c||CertC||T2) and T2Validity;It completes mutually to test both if being proved to be successful
Card and key agreement generate shared session key Q12, otherwise re-initiate session;
It is ad data cochain that ad content is added to the process in credible alliance's chain by advertiser;Credible alliance's chain passes through
Multi-level encryption, common recognition mechanism are by ad data cochain, and ad data can not be revoked once cochain, distort, and ad data exists
Full disclosure in credible alliance's chain, transparent, traceable, the trust solved between advertiser, media companies and consumer is asked
Topic, steps are as follows:
Advertiser provides ad data, and ad data is text, picture, video or their combination;
Hash Hash calculating, the ratio that is calculated Hash values H (W), and will obtain are carried out to the information of ad data
Spy's string is converted into integer;Using the public key cryptography of digital signature, the Hash functional value h of the information of ad data is counted
Word signature, to obtain the signature of the information of ad data;
Block file manager safeguards that the data of a presently written block file, the data of write area block file include two
A part, one is block size, the other is block data;Block size and block data in the block file of write area are all
By serializing processing;If after block size and serializing is written, the size of current block file is more than setting value, then can
It is written in next block file;A new block checkpoint information is created, is saved in database;
The information of ad data after analysis is fed back to advertiser by media companies, i.e., in instantiated chain code channel
On, a transaction is initiated, the content of transaction is user behavior data and big data analysis as a result, in instantiated chain code
On channel, all endorsement nodes that block chain client is appointed before transaction request is issued, endorsement node receives above-mentioned letter
It after breath, is signed first with public key verifications, endorsement node executes intelligent contract, executing at this time the result is that mock trading, will not write
To in account book, the result of execution is fed back into client;According to elliptic curve parameter and the public key of ad data, advertisement is verified
The signature of data, until signature passes through verifying;
Phase sorting receives the transaction of signed endorsement, determines the sequence and quantity of transaction, and sorted transaction is beaten
It wraps in block, is broadcast to fellow's node and verifies, in general, sequence service will not export individually from the aspect of efficiency
Transaction is used as a block, but multiple transaction are packaged into a block;
Result is broadcast to all fellow's nodes by common recognition node, and then each fellow's node updates oneself account book again;
The node of multiple and different types may operate on same physical server, and there are many nodes of type: client,
Fellow's node, sequence service node and certificate node;
Client or application program represent the entity operated by end user, it is necessary to be connected to some fellow's node
Or communicated on sequence service node with credible alliance's chain, client submits transaction motion to endorsement node, when being collected into
Enough after endorsement, to sequence serviced broadcast transaction, it is ranked up, generates block;
All fellow's nodes are all accounting nodes, are responsible for verifying from the transaction in sequence service node block, maintenance
The copy of status data and account book;Part fellow's node, which can execute, trades and carries out signature endorsement to result, serves as endorsement section
The role of point;Node of endorsing is dynamic role, is bound with specific chain code;Each chain code can be set when instantiation
Endorsement strategy is set, specifies which node effective to being only after transaction endorsement;Also transaction back only is initiated to it in application program
Book request when be only endorsement node, other when be exactly common accounting nodes, only be responsible for verifying trade simultaneously keeps accounts;
Identity Management realizes that the technology in channel is used for the range that restricted information is propagated by the technology in channel;Passage technology
Be it is associated with some account book, the technology in channel clearly determine which tissue and its member can pay close attention to this transaction;And it is each
Transaction is all associated with unique channel;System provides the function in creation channel, and provides for user and channel is added and moves back
The function in channel out;
Authentication is carried out using the two-way authentication technology based on elliptic curve in credible alliance's chain;Authentication purport
Data transmission between protection system actor and business roles guarantees data content correct by the certification to both sides' identity
Channel on correct encrypted transmission;Authentication protocol can make authenticate mutually between legitimate user, and generate altogether for two users
Same content-encrypt seed;
Advertiser possesses ad data, and ad data may be text, picture, video either their combination;Medium
Company encrypts the ad data of advertiser, carries out data verification using the relative theory of cryptography;Wherein hashed using Hash
Algorithm is realized the Input transformation of random length with irreversibility at the output of regular length being made of letter and number
It can not distort;Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature;
Block is formally to be included in block chain to store by algorithm of knowing together, and the whole network node indicates region of acceptance at the same time
Block, and indicate the method received, the random hash value of block is exactly considered as newest block hashed value, the manufacture of new block will
Extend based on to credible alliance's chain;To guarantee data consistency, transparent, safe;
Advertisement is delivered to user by media companies, and user is decrypted ad data by various terminals, generates viewing, point
It hits, buy, collect, share user behavior;User behavior as data by real-time storage in credible alliance's chain;
Media companies are analyzed the data of the user behavior of the magnanimity on credible alliance's chain by big data technology, from
And realize accurate dispensing and the personalized recommendation of advertisement, so that the data of the user behavior of magnanimity are utilized to more effective;
The information of the data of the user behavior of magnanimity after analysis is fed back to advertiser by media companies, i.e., in example
On the chain code channel of change, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.
Detailed description of the invention
Fig. 1 is credible block chain data management scheme figure;
Fig. 2 is credible block chain Identity Management flow chart;
Fig. 3 is credible block chain identity two-way identification flow chart;
Fig. 4 is credible block chain data cochain flow chart;
Fig. 5 is credible block chain data trade flow chart;
Specific embodiment
To further illustrate the technical scheme of the present invention below with reference to the accompanying drawings and specific embodiments.
Block catenary system has multicenter, opening and common recognition, feature trusty.Its major technique has at following 4 points:
(1) distributed account book
Transaction is recorded jointly by multiple nodes in distributed system.Each complete transaction note of node record
Record, therefore each node can participate in the verifying to the supervision of transaction legitimacy and to transaction validity.With conventional center
Unlike the mode of change, the node in block chain haves no right individually to record transaction, so as to avoid single book keeping operation people or node quilt
A possibility that controlling and faking.Meanwhile the whole network node participates in record, it is therefore prevented that data are lost caused by receiving attack because of individual node
It loses, ensure that the safety of data.
(2) encryption technology and authorization technique
Block chain technology combines many advantages of current symmetric cryptography, asymmetric encryption and hash algorithm, uses simultaneously
Elliptic curve encryption algorithm generates the public private key pair of user and guarantees transaction security using elliptic curve digital signature algorithm.Area
The Transaction Information being packaged on block discloses all nodes for participating in common recognition, while the identity information of account also passes through stringent add
It is close.
(3) common recognition mechanism
Common recognition mechanism is the strategy and method that each node is reached an agreement in block catenary system.Common recognition mechanism in block chain
The third-party institution with safety is trusted using the guarantee of centralization instead of tradition, is reduced as caused by each side's mutual trust problem
Third party's Cost of Credit, time cost and capital consume.Common common recognition mechanism mainly have PoW, POS, DPOS, Paxos,
PBFT etc., common recognition mechanism are writing modes, while being also anti-tamper effective means.
(4) intelligent contract
Intelligent contract is one section of computer program code that rule can be pre-defined with automated execution.It can be realized valence
Storage, transmitting, management and the control of value provide innovative solution for the application based on block chain.
Step1: media companies carry out identities to the user of credible alliance's chain and carry out data usage rights by classification
Authorization.The present invention realizes Identity Management by the passage technology of block chain, and system channel function is for restricted information propagation
Range.Channel be it is associated with some account book, this can clearly define which tissue and its member can pay close attention to this transaction.
And each transaction is associated with unique channel.System provides the function in creation channel, and provides addition for user and lead to
Road and the function of exiting channel.
Step2: credible block chain carries out authentication using the two-way authentication technology based on elliptic curve.Identity is recognized
Card is intended to protect the data between system actor and business roles to transmit, and guarantees that data content exists by the certification to both sides' identity
Correct encrypted transmission on correct channel.The purpose of authentication protocol is to make to recognize mutually between legitimate user in the present invention
Card, and common content-encrypt seed is generated for two users.
Step3: advertiser possesses ad data, and ad data may be text, picture, video or their group
It closes.Media companies encrypt the ad data of advertiser, carry out data verification using the relative theory of cryptography.Wherein using Kazakhstan
Uncommon hash (hash) algorithm has the Input transformation of random length at the output of regular length being made of letter and number
Irreversibility, realization can not distort.Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature.
Step4: common recognition is realized using kafka ranking function.Block is formally included in block chain by algorithm of knowing together and is deposited
Storage, the whole network node indicates to receive the block, and indicates the method received, is exactly considered as the random hash value of block newest
The manufacture of block hashed value, new block will be extended based on the block chain.To guarantee data consistency, transparent, peace
Entirely.
Step5: advertisement is delivered to user by media companies, and user is decrypted ad data by various terminals, generates sight
The user behaviors such as see, click, buying, collecting, sharing.These user behaviors as data by real-time storage in block chain.
Step6: media companies are analyzed the mass users behavioral data on block chain by big data technology, thus
Accurate dispensing and the personalized recommendation for realizing advertisement, so that user data is used more effectively.
Step7: the data information after analysis is fed back to advertiser by media companies, i.e., in instantiated chain code channel
On, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.To help advertiser real
Existing ad content quality optimization and audience analysis.So that user data is utilized to the greatest extent, advertiser is helped to realize
The minorityization of advertisement, personalization, instantaneity, flexibility.
User behavior is changed into practical value by block chain technology by credible alliance's chain, flows user's behavior memory
Logical, realization.The subjective initiative and enthusiasm of user preferably are excited, and is disclosed using the decentralization of block chain and data
Bright characteristic forms reliable data flow closed loop to solve value trust problem.From the point of view of broad sense, advertisement media product is final
It is all to be showed in a manner of digital asset.Credible alliance's chain can establish one for the digital asset running of the new type of media industry
It is a it is good, stable, can the bad order of standing.Therefore, the addition of credible alliance's chain can carry out great machine to medium data band
It meets and unlimited possibility.
Credible advertisement data managing method of the technical solution of the present invention based on block chain includes credible block chain Identity Management
Process, credible block chain identity two-way identification process, chain process in credible advertisement data, credible block chain transaction are initiated, are called
Process and can new ad data analyze feedback procedure.Fig. 1 is credible block chain data management scheme figure, and Fig. 2 is credible block
Chain Identity Management flow chart, Fig. 3 are credible block chain identity two-way identification flow charts, and Fig. 4 is credible block chain data cochain stream
Cheng Tu, Fig. 5 are credible block chain data trade flow charts.
Credible block chain Identity Management is that media companies carry out identities simultaneously to the user of credible alliance's chain in the present invention
The process of the authorization registration of data usage rights is carried out by classification.CA node is the certificate authority machine of credible alliance's chain in the present invention
Structure (Certificate Authority), is made of server and client side's component.The registration Shen of CA node reception client
Please, it returns to log-in password to log in for user, to obtain letter of identity.All operations can all be verified in block chain network
The identity of user.As shown in Fig. 2, steps are as follows:
Step 201, system actor is set by media companies, super keepe identity has reading point to the data on chain
The all permissions such as analysis.Business roles are set by advertiser, advertisement playback volume, user clicks and user are bought, collected,
The data such as sharing rate possess reading permission.Block catenary system can not tamper make trusting between media companies and advertiser
To guarantee.
Step 202, the configuration information that CA and CSP is obtained according to configuration file creates credible alliance's chain according to configuration information
The example of Client, credible alliance's chain Client example are the entrances of whole operation.
Step 203, the greffier's information Registrar (i.e. system actor information) for being responsible for submitting subscriber data is obtained, such as
Fruit is not present, then needs first to initialize greffier user, obtains the certificate of registry and personal letter breath of greffier.
Step 204, the example for credible alliance's chain CAClient being created according to configuration information and organizational information.
Step 205, the user information registered as needed generates RegistrationRequest request, submits to credible
Alliance chain CAClient.
Step 206, greffier Registrar can submit the post request for accessing credible alliance's chain CA.
Step 207, credible alliance's chain CA request generates the password Secret of user's registration, finally returns that application program,
The step of completing user information registration.
Step 208, application program calls credible alliance's chain using the user information of application and the log-in password of return
The Enroll interface of CAClient.
Step 209, credible alliance's chain CAClient generates private key and Certificate Signature Request CSR (Certificate
Signing Request), the enroll interface for calling credible alliance's chain to provide generates certificate of registry.
Step 210, the certificate of registry and private key for returning to generation are to application program.
Step 211, it saves in user information to KeyValueStore.
Authentication is carried out using the two-way authentication technology based on elliptic curve in the present invention.Two-way authentication is in system
It is carried out between role and business roles, i.e., needs to carry out two-way authentication before the data trade between media companies and advertiser.It hands over
Easy both sides media companies C and advertiser U is after CA obtains digital certificate, the certificate Cert of CC={ IDC, QC, (dC, sC), eC,
mC, wherein IDCThe identity of user C, r are distributed to for CAC∈ [2, n-2] is the private key of C, QCIt is the public key of C, QC=rCP,
eCIt indicates by h (IDC||QC||mC) generate abstract, (dC, sC) indicate CA to eCThe integer pair that signature generates, mCIt indicates related to C
Other information (such as certificate issued time and validity period).The public key of CA is to for (rsc, Qsc), Qsc, n and user identity are public affairs
Open information.P indicates that the point on elliptic curve E (a, b), n are the rank of P.Encryption (K, M), Decryption (K, M) table
Show and message M is encrypted and decrypted with key K, h () indicates one-way function.The target of authentication is exactly that both sides pass through phase
Mutually one secret shared session key of verifying creation.Two-way authentication process is as shown in figure 3, steps are as follows:
Step 301, C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and message M is sent to user U1=Q1;
C → U:Q1。
Step 302, after U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1b=rbQ1, Q12=
r2Q1, then with Q12As shared key, ciphertext C is generatedU=Encryption (Q12, CertU||T1), T1For the cipher-text message
Timestamp, by message M2=Q2||CU||h(Q12||Q1b||CertU||T1) it is sent to user C;
U → C:Q2||CU||h(Q12||Q1u||CertU||T1)。
Step 303, C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate and timestamp Cert of Uu||T1=
Decryption(Y12, CU), verify CertUValidity.Continue in next step, otherwise to require to retransmit message if being proved to be successful
M2。
Step 304, Q is calculated1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1Validity.Such as
Fruit success then carries out in next step, otherwise re-initiating session.
Step 305, C calculates Q2c=rcQ2And CC=Encryption (Y12, CertC||T2), generate message M3=CC||h
(Q12||Q2c||CertC||T2), it is sent to U.
C → U:CC||h(Q12||Q2c||CertC||T2)。
Step 306, U receives message M3Afterwards first by CertC||T2=Decryption (Y12, CC) decryption, obtain CertCWith
T2, then verify CertCWith h (Q12||Q2c||CertC||T2) and T2Validity.It is completed both if being proved to be successful mutual
Verifying and key agreement generate shared session key Q12, otherwise re-initiate session.
Ad data cochain is the process that ad content is added in credible alliance's chain by advertiser in the present invention.It is credible
Alliance's chain is by multi-level encryption, common recognition mechanism by data cochain, and ad data can not be revoked once cochain, distort, advertisement number
According to the full disclosure, transparent, traceable in credible alliance's chain, solves the letter between advertiser, media companies and consumer
Appoint problem, as shown in figure 4, steps are as follows:
Step 401, advertiser provides ad data, and ad data may be text, picture, video or their group
It closes.
Step 402, Hash calculating is carried out to advertising information, be calculated hash value H (W), and obtained Bit String is turned
Turn to integer e.
Step 403, using the public key cryptography of digital signature, the Hash functional value h of advertising data information is counted
Word signature, it is assumed here that the elliptic curve parameter used is D=(p, a, b, G, n, h), and corresponding key pair is (k, Q), wherein Q
For public key, k is private key, is digitally signed as follows:
1. generating random number d, 1≤d≤n-1;
2. calculating dG=(x1, y1), integer is converted by x1
3. calculatingIf r=0, random number is recalculated, d is otherwise calculated-1mod n;
4. calculating s=d-1(e+kr)mod n;
Then (r, s) is the signature of advertising information.
Step 404, block file manager safeguards the currentFileWriter of a presently written block file, writes
The data for entering block file include two parts, and one is block size, the other is block data.In the block file of write area
Block size and block data are handled by serializing.After if block size and serializing were written, current block text
The size of part is more than setting value, then can be written in next block file.A new block checkpoint information is created, is saved
Into database.
The data information after analysis is fed back to advertiser by media companies in the present invention, i.e., logical in instantiated chain code
On road, a transaction is initiated, this transaction content is user behavior data and big data analysis result.It is instantiated
On chain code channel, from a calling transaction is initiated to the overall process finally kept accounts as shown in figure 5, steps are as follows:
Step 501, all endorsement node (endorsing that block chain client is appointed before transaction request is issued
peer).Here illustratively the selection of endorsing peer is that have a certain range of, is not in all endorsing
It is chosen at random in peer, is that the Endorsement Policy as defined in affiliated ChainCode and the Chaincode is total to
With what is determined.
Step 502, after endorsement node receives above- mentioned information, its signature of public key verifications is used first, and endorsement node executes intelligence
Energy contract (being mock trading, will not write in account book), feeds back to client for the result of execution.According to elliptic curve parameter D
The public key Q of=(p, a, b, G, n, h) and ad data verify the signature (r, s) of ad data according to the following steps:
1. verifying r and s is the integer on section [1, n-1];
2. calculating w=s-1mod n;
3. calculating u1=ew mod n and u2=rw mod n;
4. calculating X=u1G+u2G;
5. refusing to sign if X=0, integer otherwise is converted by the x coordinate x1 of XAnd it calculates
6. signature passes through verifying when v=r.
Step 503, phase sorting receives the transaction of signed endorsement, determines the sequence and quantity of transaction, will sequence sequence
Transaction be bundled in block, be broadcast to Peer node and verified.In general, sequence service will not be defeated from the aspect of efficiency
Single transaction is used as a block out, but multiple transaction are packaged into a block.
Step 504, result is broadcast to all nodes (peer) by common recognition node.Then each node updates oneself account again
This.
Interior joint of the present invention is the communication agent of block chain, is a logical concept.The node of multiple and different types can be with
It operates on same physical server.There are many nodes of type: client, Peer node, sequence service node and CA node.
Client or application program represent the entity operated by end user in the present invention, it is necessarily connected to some
It is communicated on Peer node or sequence service node with block chain network.Client is mentioned to endorsement node (Endorser)
Transaction motion (Transaction Proposal), to sequence serviced broadcast transaction, is arranged after being collected into endorsement enough
Sequence generates block.
All Peer nodes are all accounting nodes (Committer) in the present invention, are responsible for verifying from sequence service node
The copy of status data and account book is safeguarded in transaction in block.Part of nodes, which can execute, trades and carries out signature endorsement to result,
Serve as the role of endorsement node.Node of endorsing is dynamic role, is bound with specific chain code.Each chain code is in instantiation
When endorsement strategy can be all set, specify which node effective to being only after transaction endorsement.Also only application program to it
Initiate transaction endorsement request when is only endorsement node, other when be exactly common accounting nodes, only be responsible for verifying transaction
And it keeps accounts.
In the present invention sort service node (Orderer) receive comprising endorsement signature transaction, to the transaction not being packaged into
Row sequence generates block, is broadcast to Peer node.Sequence service provides atomic broadcasting (AtomicBroadcast), guarantees
Node on the same chain receives identical message, and has identical logical order.
The multichannel (MultiChannel) of sequence service realizes the data isolation of multichain, guarantees there was only the same chain
Peer node could access the data on chain, protect the privacy of user data.
The utility model has the advantages that the present invention is a kind of credible advertisement data management system based on block chain, it is reliable to solve data
Property it is low, not open and clear enough, may be manipulated, easily be tampered, secret protection is difficult and data safety is difficult to ensure
Problem.Block chain technology is applied to media industry by the present invention, in conjunction with big data technology, based on credible alliance's chain to advertiser with
Media companies carry out Identity Management and authorization, and user identity two-way authentication trades ad data cochain to user data
And analysis.A safe and reliable ad data management method is provided for media companies, advertiser and consumer.To help
Advertiser is helped to realize ad content quality optimization and audience analysis.So that user data is utilized to the greatest extent, help
Minorityization, personalization, the instantaneity, flexibility of advertiser's realization advertisement.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (1)
1. a kind of credible advertisement data management system based on block chain, it is characterised in that: media companies are to credible alliance's chain
User carries out identities and carries out the authorization of data usage rights by classification;Media companies are set as system actor, to credible
Data on alliance's chain have reading analysis all permissions;Advertiser is set as business roles, to advertisement playback volume, user clicks
And user buys, collects, sharing rate data possess reading permission;Can not distorting for credible alliance's chain makes media companies and advertisement
Trust between master is protected;Wherein, system actor obtains matching for certificate and Cryptographic Service Provider according to configuration file
Confidence breath, according to the example that configuration information creates credible alliance's chain client, credible alliance's chain client instance is entirely to be based on
The entrance of the operation of the credible advertisement data management system of block chain;Then the letter for being responsible for submitting the greffier of subscriber data is obtained
It ceases (i.e. system actor information) and obtains the certificate of registry of greffier if it does not exist, then needing first to initialize the information of greffier
And personal information;According to the example of the client of configuration information and organizational information creation certificate;The user's letter registered as needed
Breath generates registration request, submits to the client of certificate;Greffier can submit the certificate request for accessing credible alliance's chain;By can
Believe that the certificate request of alliance's chain generates the password of user's registration, finally returns that application program, complete the step of user information registration
Suddenly;Application program calls the calling of the client of certificate to connect using the password of the user information of application and the user's registration of return
Mouthful;The client of certificate generates private key and Certificate Signature Request, and the calling interface for calling credible alliance's chain to provide generates registration certificate
Book;The certificate of registry generated and private key are returned to application program;User information is saved to distributed data-storage system
In KeyValueStore device;Between media companies and advertiser authentication use based on the two-way of elliptic curve
Authentication techniques;Two-way authentication carries out between system actor and business roles, i.e., the data between media companies and advertiser are handed over
It needs to carry out two-way authentication before easily;Both parties media companies C and advertiser U are after certificate acquisition digital certificate, the certificate of C
CertC={ IDC,QC,(dC,sC),eC,mC, wherein IDCThe identity of C, r are distributed to for certificateC∈ [2, n-2] is the private of C
Key, QCIt is the public key of C, QC=rCP, eCIt indicates by h (IDC||QC||mC) generate abstract, (dC,sC) indicate certificate to eCSignature
The integer pair of generation, mCIndicate the Time Of Release and validity period information of certificate relevant to C;The public key of certificate is to for (rc,Qc);
Qc, n and user identity be public information;P indicates that the point on elliptic curve E (a, b), n are the rank of P;Encryption(K,M)
Expression is encrypted and decrypted message M with key K, Decryption (K, M) expression with key K to message M carry out encryption and
Decryption, h (IDC||QC||mC) indicate one-way function;The target of authentication is exactly both sides by the way that one secret of creation is mutually authenticated
Shared session key;Two-way authentication process step are as follows: C: random number r is generated1∈ (2, n-2) calculates Q1=r1P, and to user
U sends message M1=Q1;C→U:Q1;After U receives message, random number r is generated2∈ (2, n-2) calculates Q2=r2P, Q1c=rcQ1,
Q12=r2Q1, then with Q12As shared key and the certificate Cert of UU, generate ciphertext CU=Encryption (Q12,CertU
||T1), T1For the timestamp of the cipher-text message, by message M2=Q2||CU||h(Q12||Q1c||CertU||T1) it is sent to user C;
That is U → C:Q2||CU||h(Q12||Q1c||CertU||T1);C receives message M2Afterwards, Q is calculated12=r1Q2, obtain the certificate Cert of UU
With timestamp CertU||T1=Decryption (Q12,CU), verify CertUValidity;Continue if being proved to be successful next
Otherwise step requires to retransmit message M2;Calculate Q1u=r1Qu, verify h (Q12||Q1u||CertU||T1) and time stamp T1It is effective
Property;It carries out in next step, otherwise re-initiating session if success;C calculates Q2c=rcQ2And CC=Encryption (Q12,
CertC||T2), generate message M3=CC||h(Q12||Q2c||CertC||T2), it is sent to U;That is C → U:CC||h(Q12||Q2c||
CertC||T2);U receives message M3Afterwards first by CertC||T2=Decryption (Q12,CC) decryption, obtain the certificate Cert of CCWith
T2, then verify CertCWith h (Q12||Q2c||CertC||T2) and T2Validity;It is completed both if being proved to be successful mutual
Verifying and key agreement generate shared session key, otherwise re-initiate session;Ad content is added to credible by advertiser
Process in alliance's chain is ad data cochain;Credible alliance's chain is by multi-level encryption, common recognition mechanism by ad data cochain, advertisement
Data can not be revoked once cochain, distort, ad data full disclosure, transparent, traceable, solution in credible alliance's chain
Trust problem between advertiser, media companies and consumer, steps are as follows: advertiser provides ad data, advertisement number
According to being text, picture, video or their combination;Hash Hash calculating is carried out to the information of ad data, Kazakhstan is calculated
Uncommon hash value H (W), and integer is converted by obtained Bit String;Using the public key cryptography of digital signature, to ad data
The Hash functional value h of information be digitally signed, to obtain the signature of the information of ad data;Block file manager dimension
The data of a presently written block file are protected, the data of write area block file include two parts, and one is block size, separately
One is block data;Block size and block data in the block file of write area are handled by serializing;If write
After entering block size and serializing, the size of current block file is more than setting value, then can be written in next block file;
A new block checkpoint information is created, is saved in database;Media companies are anti-by the information of the ad data after analysis
Feed advertiser, i.e., on instantiated chain code channel, initiates a transaction, the content of transaction be user behavior data with
And big data analysis, as a result, on instantiated chain code channel, block chain client is arranged before transaction request is issued
Good all endorsement nodes are signed with public key verifications first after endorsement node receives above- mentioned information, and endorsement node executes intelligence and closes
About, executing at this time the result is that mock trading, will not write in account book, the result of execution is fed back into client;According to ellipse
The public key of parameter of curve and ad data verifies the signature of ad data, until signature passes through verifying;Phase sorting receives
The transaction of signed endorsement determines the sequence and quantity of transaction, and sorted transaction is bundled in block, fellow is broadcast to
Node is verified, in general, sequence service will not export single trade and be used as a block, but handle from the aspect of efficiency
Multiple transaction are packaged into a block;Result is broadcast to all fellow's nodes by common recognition node, then each fellow's node
Oneself account book is updated again;The node of multiple and different types may operate on same physical server, and there are many nodes of type:
Client, fellow's node, sequence service node and certificate node;Client or application program representative are operated by end user
Entity, it is necessary to be connected to some fellow's node or sequence service node on communicated with credible alliance's chain, client
It holds to endorsement node and submits transaction motion, after being collected into endorsement enough, to sequence serviced broadcast transaction, be ranked up, generate
Block;All fellow's nodes are all accounting nodes, are responsible for verifying from the transaction in sequence service node block, safeguard state
The copy of data and account book;Part fellow's node, which can execute, trades and carries out signature endorsement to result, serves as endorsement node
Role;Node of endorsing is dynamic role, is bound with specific chain code;Back can be arranged when instantiation in each chain code
Which node book strategy specifies effective to being only after transaction endorsement;Also only transaction endorsement is initiated to it in application program to ask
Endorsement node is only when asking, other when be exactly common accounting nodes, only be responsible for verifying trade simultaneously keep accounts;Identity Management
It is realized by the technology in channel, the technology in channel is used for the range that restricted information is propagated;Passage technology is closed with some account book
Connection, the technology in channel clearly determines which tissue and its member can pay close attention to this transaction;And it is each transaction be with uniquely
Channel is associated;System provides the function in creation channel, and provides the function that channel is added and exits channel for user;It is credible
Authentication is carried out using the two-way authentication technology based on elliptic curve in alliance's chain;Authentication is intended to protect system angle
Data transmission between color and business roles guarantees that data content is correct on correct channel by the certification to both sides' identity
Encrypted transmission;Authentication protocol can make authenticate mutually between legitimate user, and generate common content-encrypt for two users
Seed;Advertiser possesses ad data, and ad data may be text, picture, video either their combination;Media companies
The ad data of advertiser is encrypted, carries out data verification using the relative theory of cryptography;Hash hashing algorithm is wherein used,
The Input transformation of random length at the output of regular length being made of letter and number, there is irreversibility, realization can not
It distorts;Asymmetric encryption part proves Node Ownership using private key, is realized by digital signature;Block is by algorithm of knowing together
It is formally included in block chain and is stored, the whole network node indicates to receive block at the same time, and indicates the method received, and being exactly will
The random hash value of block is considered as newest block hashed value, and the manufacture of new block will prolong based on to credible alliance's chain
It is long;To guarantee data consistency, transparent, safe;Advertisement is delivered to user by media companies, and user will be wide by various terminals
Data deciphering is accused, viewing is generated, clicks, purchase, collection, shares user behavior;User behavior is existed as data by real-time storage
In credible alliance's chain;Media companies are divided the data of the user behavior of the magnanimity on credible alliance's chain by big data technology
Analysis, to realize accurate dispensing and the personalized recommendation of advertisement, so that the data of the user behavior of magnanimity are to more effectively sharp
With;The information of the data of the user behavior of magnanimity after analysis is fed back to advertiser by media companies, i.e., instantiated
On chain code channel, a transaction is initiated, this transaction content is user behavior data and rich and influential family according to analysis result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270691.XA CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270691.XA CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110309634A true CN110309634A (en) | 2019-10-08 |
CN110309634B CN110309634B (en) | 2020-12-22 |
Family
ID=68074399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910270691.XA Expired - Fee Related CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110309634B (en) |
Cited By (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807209A (en) * | 2019-11-01 | 2020-02-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN110852886A (en) * | 2019-11-21 | 2020-02-28 | 西南石油大学 | Second-hand transaction and article borrowing and returning system based on alliance chain |
CN111028064A (en) * | 2019-12-17 | 2020-04-17 | 中国科学院计算技术研究所 | Internet of things platform transaction system, method and equipment based on block chain |
CN111079136A (en) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN111160997A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Advertisement supervision method and device based on block chain and advertisement delivery system |
CN111241196A (en) * | 2020-01-03 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN111383378A (en) * | 2020-03-11 | 2020-07-07 | 合肥鼎方信息科技有限公司 | Access control identification system information node interconnection method based on block chain architecture |
CN111476548A (en) * | 2020-04-16 | 2020-07-31 | 山东师范大学 | Title review method and system based on block chain |
CN111741062A (en) * | 2020-05-12 | 2020-10-02 | 成都芯域矩阵科技有限公司 | Electronic equipment local area management system based on block chain technology |
CN112039866A (en) * | 2020-08-26 | 2020-12-04 | 北京计算机技术及应用研究所 | Design method of block chain-based data trusted configuration management system |
CN112235368A (en) * | 2020-09-29 | 2021-01-15 | 中国人民武装警察部队工程大学 | RFID equipment management system based on alliance block chain |
CN112241435A (en) * | 2020-10-23 | 2021-01-19 | 山西特信环宇信息技术有限公司 | Cone block chain storage system and consensus storage method |
CN113379416A (en) * | 2020-03-10 | 2021-09-10 | 本无链科技(深圳)有限公司 | Method and system for realizing similar biological groups with consistent memory but different behaviors |
CN113468551A (en) * | 2021-05-31 | 2021-10-01 | 南京邮电大学 | Domestic intelligent electric meter data storage system and method based on alliance block chain |
CN113538042A (en) * | 2021-06-30 | 2021-10-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113779095A (en) * | 2021-11-11 | 2021-12-10 | 江苏荣泽信息科技股份有限公司 | Job title rating electronic certificate supervision system based on block chain technology |
CN114127771A (en) * | 2021-03-04 | 2022-03-01 | 罗伯特·詹姆斯·马克·海恩 | System and method for proof of viewing via blockchain |
CN114155010A (en) * | 2021-12-06 | 2022-03-08 | 广州繁星互娱信息科技有限公司 | Method and device for generating product identification code, electronic equipment and storage medium |
CN114301608A (en) * | 2021-12-31 | 2022-04-08 | 鄢华中 | Block chain decentralized multi-element cross consensus signature lock and access control construction method |
CN114528356A (en) * | 2022-01-26 | 2022-05-24 | 广东南方新视界传媒科技有限公司 | Multi-dimensional media data fusion management system and method based on block chain |
CN115840787A (en) * | 2023-02-20 | 2023-03-24 | 塔比星信息技术(深圳)有限公司 | Supply chain data sharing method, device, equipment and medium based on block chain |
CN116151828A (en) * | 2023-04-20 | 2023-05-23 | 成都航空职业技术学院 | Block chain-based carbon footprint tracking method, system, equipment and medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355442A (en) * | 2016-08-30 | 2017-01-25 | 杭州启冠网络技术有限公司 | Online precise advertising method and system based on big data driving |
CN108764966A (en) * | 2018-04-28 | 2018-11-06 | 深圳市元征科技股份有限公司 | Advertisement placement method, block chain node device and relevant device |
CN108985818A (en) * | 2018-06-15 | 2018-12-11 | 微梦创科网络科技(中国)有限公司 | Advertisement delivery system and method based on block chain technology |
CN109086622A (en) * | 2018-07-25 | 2018-12-25 | 深圳慧安康科技有限公司 | A kind of implementation method and node device of intelligence community |
CN109255661A (en) * | 2018-09-27 | 2019-01-22 | 王国俊 | A kind of business datum authentication method and system based on block chain |
CN109308638A (en) * | 2018-09-30 | 2019-02-05 | 北京奇虎科技有限公司 | Ad trafficking system, server and readable storage medium storing program for executing based on block chain |
CN109325331A (en) * | 2018-09-13 | 2019-02-12 | 北京航空航天大学 | Transaction system is acquired based on the big data of block chain and credible calculating platform |
CN109325368A (en) * | 2018-09-11 | 2019-02-12 | 云量区块链(深圳)有限公司 | City outdoor scene management method, electronic equipment and storage medium based on block chain |
CN109493088A (en) * | 2018-10-31 | 2019-03-19 | 周更新 | A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake |
US20190087844A1 (en) * | 2017-09-18 | 2019-03-21 | Gregory H. Leekley | Crypto Asset Compliance and Payment Systems and Methods |
CN109523302A (en) * | 2018-10-19 | 2019-03-26 | 中链科技有限公司 | Advertisement sending method, device and calculating equipment based on block chain |
-
2019
- 2019-04-04 CN CN201910270691.XA patent/CN110309634B/en not_active Expired - Fee Related
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355442A (en) * | 2016-08-30 | 2017-01-25 | 杭州启冠网络技术有限公司 | Online precise advertising method and system based on big data driving |
US20190087844A1 (en) * | 2017-09-18 | 2019-03-21 | Gregory H. Leekley | Crypto Asset Compliance and Payment Systems and Methods |
CN108764966A (en) * | 2018-04-28 | 2018-11-06 | 深圳市元征科技股份有限公司 | Advertisement placement method, block chain node device and relevant device |
CN108985818A (en) * | 2018-06-15 | 2018-12-11 | 微梦创科网络科技(中国)有限公司 | Advertisement delivery system and method based on block chain technology |
CN109086622A (en) * | 2018-07-25 | 2018-12-25 | 深圳慧安康科技有限公司 | A kind of implementation method and node device of intelligence community |
CN109325368A (en) * | 2018-09-11 | 2019-02-12 | 云量区块链(深圳)有限公司 | City outdoor scene management method, electronic equipment and storage medium based on block chain |
CN109325331A (en) * | 2018-09-13 | 2019-02-12 | 北京航空航天大学 | Transaction system is acquired based on the big data of block chain and credible calculating platform |
CN109255661A (en) * | 2018-09-27 | 2019-01-22 | 王国俊 | A kind of business datum authentication method and system based on block chain |
CN109308638A (en) * | 2018-09-30 | 2019-02-05 | 北京奇虎科技有限公司 | Ad trafficking system, server and readable storage medium storing program for executing based on block chain |
CN109523302A (en) * | 2018-10-19 | 2019-03-26 | 中链科技有限公司 | Advertisement sending method, device and calculating equipment based on block chain |
CN109493088A (en) * | 2018-10-31 | 2019-03-19 | 周更新 | A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake |
Non-Patent Citations (3)
Title |
---|
ALEXANDER YAKUBOV等: "A Blockchain-Based PKI Management Framework", 《IEEE/IFIP MAN2BLOCK 2018》 * |
张艳: "基于区块链技术的广告场景应用与生态网络变革", 《中国出版》 * |
蓝狐笔记: "链云 UST:用区块链重塑互联网广告行业", 《HTTPS://WWW.CHAINNEWS.COM/ARTICLES/288575287248.HTM》 * |
Cited By (30)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807209B (en) * | 2019-11-01 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN110807209A (en) * | 2019-11-01 | 2020-02-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN111079136A (en) * | 2019-11-07 | 2020-04-28 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN111079136B (en) * | 2019-11-07 | 2022-02-11 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN110852886A (en) * | 2019-11-21 | 2020-02-28 | 西南石油大学 | Second-hand transaction and article borrowing and returning system based on alliance chain |
CN111028064A (en) * | 2019-12-17 | 2020-04-17 | 中国科学院计算技术研究所 | Internet of things platform transaction system, method and equipment based on block chain |
CN111028064B (en) * | 2019-12-17 | 2023-07-21 | 中国科学院计算技术研究所 | Block chain-based internet of things platform transaction system, method and equipment |
CN111241196A (en) * | 2020-01-03 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN111241196B (en) * | 2020-01-03 | 2021-07-13 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN113379416A (en) * | 2020-03-10 | 2021-09-10 | 本无链科技(深圳)有限公司 | Method and system for realizing similar biological groups with consistent memory but different behaviors |
CN111383378A (en) * | 2020-03-11 | 2020-07-07 | 合肥鼎方信息科技有限公司 | Access control identification system information node interconnection method based on block chain architecture |
CN111160997A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Advertisement supervision method and device based on block chain and advertisement delivery system |
CN111476548A (en) * | 2020-04-16 | 2020-07-31 | 山东师范大学 | Title review method and system based on block chain |
CN111476548B (en) * | 2020-04-16 | 2024-01-23 | 山东师范大学 | Title review method and system based on blockchain |
CN111741062A (en) * | 2020-05-12 | 2020-10-02 | 成都芯域矩阵科技有限公司 | Electronic equipment local area management system based on block chain technology |
CN112039866A (en) * | 2020-08-26 | 2020-12-04 | 北京计算机技术及应用研究所 | Design method of block chain-based data trusted configuration management system |
CN112039866B (en) * | 2020-08-26 | 2022-05-27 | 北京计算机技术及应用研究所 | Design method of block chain-based data trusted configuration management system |
CN112235368A (en) * | 2020-09-29 | 2021-01-15 | 中国人民武装警察部队工程大学 | RFID equipment management system based on alliance block chain |
CN112241435A (en) * | 2020-10-23 | 2021-01-19 | 山西特信环宇信息技术有限公司 | Cone block chain storage system and consensus storage method |
CN114127771A (en) * | 2021-03-04 | 2022-03-01 | 罗伯特·詹姆斯·马克·海恩 | System and method for proof of viewing via blockchain |
CN113468551A (en) * | 2021-05-31 | 2021-10-01 | 南京邮电大学 | Domestic intelligent electric meter data storage system and method based on alliance block chain |
CN113538042A (en) * | 2021-06-30 | 2021-10-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113538042B (en) * | 2021-06-30 | 2023-09-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113779095A (en) * | 2021-11-11 | 2021-12-10 | 江苏荣泽信息科技股份有限公司 | Job title rating electronic certificate supervision system based on block chain technology |
CN114155010A (en) * | 2021-12-06 | 2022-03-08 | 广州繁星互娱信息科技有限公司 | Method and device for generating product identification code, electronic equipment and storage medium |
CN114301608A (en) * | 2021-12-31 | 2022-04-08 | 鄢华中 | Block chain decentralized multi-element cross consensus signature lock and access control construction method |
CN114528356A (en) * | 2022-01-26 | 2022-05-24 | 广东南方新视界传媒科技有限公司 | Multi-dimensional media data fusion management system and method based on block chain |
CN115840787B (en) * | 2023-02-20 | 2023-05-02 | 塔比星信息技术(深圳)有限公司 | Block chain-based supply chain data sharing method, device, equipment and medium |
CN115840787A (en) * | 2023-02-20 | 2023-03-24 | 塔比星信息技术(深圳)有限公司 | Supply chain data sharing method, device, equipment and medium based on block chain |
CN116151828A (en) * | 2023-04-20 | 2023-05-23 | 成都航空职业技术学院 | Block chain-based carbon footprint tracking method, system, equipment and medium |
Also Published As
Publication number | Publication date |
---|---|
CN110309634B (en) | 2020-12-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110309634A (en) | A kind of credible advertisement data management system based on block chain | |
US11481768B2 (en) | System and method of generating and validating encapsulated cryptographic tokens based on multiple digital signatures | |
US20200193432A1 (en) | Method and system for settling a blockchain transaction | |
US6490358B1 (en) | Enabling business transactions in computer networks | |
US20200127813A1 (en) | Method and system for creating a user identity | |
US10410213B2 (en) | Encapsulated security tokens for electronic transactions | |
JP2023036876A (en) | Computer-implemented method, system, and storage medium in blockchain | |
CN111159750A (en) | Automobile maintenance data storage method based on alliance chain | |
KR102307574B1 (en) | Cloud data storage system based on blockchain and method for storing in cloud | |
WO2018088475A1 (en) | Electronic authentication method and program | |
CN114389811B (en) | Cross-domain authentication method based on medical alliance chain | |
US11334884B2 (en) | Encapsulated security tokens for electronic transactions | |
CN111915349A (en) | Cross-platform integral using system and method based on block chain | |
CN111160998A (en) | Comment data processing method and device based on block chain and comment system | |
CN115049398A (en) | Complete data asset trusted management and value transfer system and method | |
CN111049806B (en) | Joint authority control method and device, electronic equipment and storage medium | |
Onieva et al. | Secure multi-party non-repudiation protocols and applications | |
Boontaetae et al. | RDI: Real digital identity based on decentralized PKI | |
CN115883214A (en) | Electronic medical data sharing system and method based on alliance chain and CP-ABE | |
CN113673893A (en) | Retired power battery management method and system | |
Kossick | The Emerging Disharmony of Electronic Commerce Legislation in Latin America | |
Yildiz | A proposal for Turkish government public key infrastructure trust model | |
Ismail | Security of reputation systems | |
Yu et al. | SPRA: Scalable policy‐based regulatory architecture for blockchain transactions | |
CN115296918A (en) | Decentralized financial strategy sharing method based on chain uplink as contribution certification |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201222 |