CN110022217A - A kind of credible deposit system of advertisement media business datum based on block chain - Google Patents
A kind of credible deposit system of advertisement media business datum based on block chain Download PDFInfo
- Publication number
- CN110022217A CN110022217A CN201910270370.XA CN201910270370A CN110022217A CN 110022217 A CN110022217 A CN 110022217A CN 201910270370 A CN201910270370 A CN 201910270370A CN 110022217 A CN110022217 A CN 110022217A
- Authority
- CN
- China
- Prior art keywords
- advertisement media
- user
- data
- node
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/104—Peer-to-peer [P2P] networks
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1095—Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
- H04L9/3252—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/72—Signcrypting, i.e. digital signing and encrypting simultaneously
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Development Economics (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Entrepreneurship & Innovation (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Game Theory and Decision Science (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of credible deposit system of advertisement media business datum based on block chain more fully protects the safety of advertisement media business datum.The present invention passes through symmetric encipherment algorithm for advertisement media privacy of service data selective encryption first, secondly by data storage into block chain, significant data is all saved permanently on chain, simultaneously, in conjunction with block chain elliptic curve ensure that the advertisement media business datum being deposited on chain can not tamper, meanwhile also ensuring the privacy of advertisement media privacy of service data.The present invention can effectively prevent advertisement media business datum to be tampered, with high security the advantages of, provide a kind of credible method for depositing card for advertisement media business datum.
Description
Technical field
The present invention relates to be related to block chain technical applications more particularly to a kind of advertisement biography based on block chain
Matchmaker's business datum is credible deposit system.
Background technique
There are the feelings for illegally distorting, deleting, replacing advertisement media content in the development of advertising media technology and network technology
Condition.Mainly by the advertisement media system of attack operator front end, the advertisement biography for issuing terminal user is illegally distorted or replaced
Matchmaker's content propagates invalid information, and terminal user can not accurately judge the true value of information, is easy by malice advertisement media
Content harassing and wrecking.
The continuous development of Internet technology, block chain technology gradually tend to be mature.Block chain with its distributed account book structure,
Disintermediation faith mechanism and the technical characteristics such as can not distort, can for advertisement media business datum it is credible deposit demonstrate,prove provide it is most crucial
It supports.
According to block chain technology decentralization feature, the not single service centre of system safeguards that all nodes are common
Participate in maintenance.By being transmitted after being digitally signed by the way of asymmetric encryption to various Transaction Informations and block, it is ensured that
The various Transaction Informations of block chain transmission and the safety of various block informations allow what data were difficult to tamper with to store.Often
A node all safeguards the copy of data mode and account book, and modifying the data information of any individual node is all invalid, system meeting
Automatically it is verified.
Summary of the invention
In order to solve the problems such as advertisement media content of the existing technology is illegally distorted, deletes, replaces, the present invention is mentioned
A kind of credible deposit system of advertisement media business datum based on block chain out.It is important that advertisement media may be implemented using this method
Business datum is permanently stored on chain, can not be tampered, meanwhile, multiple distributed nodes are owned by a complete account book pair
This.
To achieve the goals above, the present invention adopts the following technical scheme:
In a first aspect, provide a kind of credible deposit system of advertisement media business datum based on block chain, mainly include with
Lower step: step 1 block chain multinode P2P network struction: using management node for receiving advertisement media significant data Data,
Each management node needs to run in block chain network by full node verification;Each node dimension in block chain network
Advertisement media significant data Data is protected and recorded, common recognition service is simultaneously participated in;The user of step 2 advertisement media application program infuses
Volume: it needs to register and register in block chain network simultaneously when the user User of register advertisements medium application program, block
Chain network returns to application program with the user key sessionKey that the form of JWT (Java Web Token) generates;Step 3
Encryption: the user User of advertisement media application program is using symmetric encipherment algorithm to advertisement media privacy of service data Privacy
It is encrypted, encryption function E, the plaintext of advertisement media privacy of service data Privacy is P, key K, computations side
Method is C=E (K, P);Step 4 advertisement media business datum cochain: the user User of advertisement media application program is according to its correspondence
SessionKey by advertisement media business datum encrypt and the advertisement media significant data Data of unencryption be submitted to it is corresponding
In anatomic passages, a transaction is initiated, other nodes being broadcast in block chain network after digitally signed simultaneously wait to be confirmed;Step
Rapid 5 Transaction Information verification: the node in block chain network verifies the information of the data record received, after verification passes through,
Data record is recorded in a block;Step 6 node synchrodata: once advertisement media significant data Data cochain, newly
Block just will create, the node for creating new block needs for message to be broadcast to other all nodes, other all nodes will connect
By new block, and after new block is added to last block block of oneself block chain;Step 7 data query: in block chain
P2P network in network also provides advertisement media business datum query node, often other than providing the node of information checking function
A node all records advertisement media business datum, the user User of advertisement media application program by corresponding sessionKey into
Row data query;The block chain technology that multinode P2P Web vector graphic is constructed in block chain network specifically includes that cryptographic algorithm, divides
Cloth structure, P2P network, consistency algorithm;JWT (Java Web Token) realize user key generate, it can be achieved that it is stateless,
Distributed Web application authorization;Digital signature mainly uses ECDSA algorithm, it is ensured that the various friendships of block chain network transmission
The safety of easy information and various block informations, the storage that data can not be distorted to database;Message broadcast is to use to be based on
The protocol realization P2P data distribution of Gossip, by Gossip agreement, the topological structure of system adjust automatically network is adapted to
The variation of network node guarantees that whole network operates normally.
The beneficial effects of the present invention are: being encrypted by symmetric encipherment algorithm advertisement media privacy of service data, into one
The safety of step protection media business private data.It is stored by media business data onto block chain, relative to traditional concentration
Formula or storage mode provide the data storage scheme of decentralization, while the realization advertisement media industry that can also be encrypted safely
Business data deposit card, effectively prevent advertisement media content from illegally being distorted, deleted, replaced.All important advertisement media business
Data are all saved permanently on chain, to realize that data can not distort.Meanwhile multiple distributed nodes all safeguard data mode and
The copy of account book can restore data automatically when the node of failure reconnects to network, so that avoiding can be by catastrophic loss.
Detailed description of the invention
Fig. 1 is the embodiment system architecture diagram of the method for the invention.
Fig. 2 is the embodiment flow chart of the method for the invention.
Fig. 3 is the embodiment user registration registration timing diagram of the method for the invention.
Fig. 4 is the embodiment privacy of service data encryption flow chart of the method for the invention.
Fig. 5 is the embodiment data cochain flow chart of the method for the invention.
Fig. 6 is the embodiment inquiring and authenticating difference node account book consistency flow chart of the method for the invention.
Fig. 7 is that the embodiment of the method for the invention generates the JWT timing diagram of user key.
Fig. 8 is the embodiment ECDSA signature flow chart of the method for the invention.
Fig. 9 is the embodiment ECDSA verifying flow chart of the method for the invention.
Specific embodiment
The invention will be further described with embodiment with reference to the accompanying drawing.
A kind of embodiment system architecture of the credible deposit system of advertisement media business datum based on block chain, such as Fig. 1 institute
Show.Deposit system embodiment step that a kind of advertisement media business datum based on block chain is credible, as shown in Fig. 2, specific as follows:
Step 1: bottom block chain constructs block chain multinode using super account book technology, using super account book technology
P2P network, and realize that multi-channel data is isolated.
Step 2: advertisement media application program User user's registration " return " key" sessionKey, while in block chain network
Middle registration and registration.The timing diagram of SDK and other assemblies interaction under User registration and registration application scenarios, as shown in figure 3, each
Interactive process between component is as follows:
(1) configuration information of CA and CSP is obtained according to configuration file;
(2) according to configuration information create advertisement media Client example, and be arranged CryptoSuite and
The information such as KeyValueStore;
(3) the greffier information Registrar for being responsible for submitting subscriber data is obtained, if it does not exist, then needing first initial
Change greffier user, obtains greffier's certificate of registry and private key information;
(4) advertisement media CAClient example is created according to configuration information and organizational information;
(5) user information registered as needed generates RegistrationRequest request, submits to advertisement media
CAClient;
(6) greffier Registrar submits the POST request of access advertisement media-ca;
(7) advertisement media-ca checking request generates the password Secret of user's registration, finally returns that and gives advertisement media application
Program completes user information register step;
(8) advertisement media application program calls advertisement media according to the user information of application and the log-in password of return
The Enroll interface of CAClient;
(9) advertisement media CAClient generates private key and Certificate Signature Request CSR, and advertisement media-ca is called to provide
Enroll interface generates certificate of registry;
(10) certificate of registry and private key returned gives advertisement media application program;
(11) user information is optionally saved in KeyValueStore.
After the completion of User user's registration, API meeting " return " key" sessionKey give advertisement media application program, advertisement media
Application program saves user sessionKey, so as to subsequent operation use.
Step 3: advertisement media privacy of service data being encrypted using symmetric encipherment algorithm AES, it is assumed that Yao Jiami's
Advertisement media privacy of service clear data is CPD, and encrypted ciphertext data are CFD, key Key, specific encryption flow
As shown in Figure 4.
Step 4:User user encrypts advertisement media business datum and the significant data Data of unencryption is stored to block chain
In.The data Data that user submits can find its corresponding tissue, channel C hannel according to the sessionKey of User user,
Submit transaction motion to corresponding endorsement node, node simulation of endorsing executes and motion of endorsing, and transaction back is called after the completion of executing
Book system chain code ESCC signs to simulation implementing result PData, generates the signature (r, s) of PData, transaction flow such as Fig. 5
It is shown.
Step 5: the transaction that the ordering joint in block chain receives endorsement of having signed is ranked up, and generates block, will be arranged
The transaction of good sequence is bundled in block, is broadcast to Peer node and is verified to the signature (r, s) of PData, Peer node verification
Receive the validity for the transaction for including in block.
Step 6: the block node broadcasts block information of generation saves block and to account book and is broadcast to host node, host node
Accounting nodes, mutually message broadcast between node, synchronous account book information.
Step 7:User user according to sessionKey can inquire data on different nodes, inquired on each node
Data it is all consistent, ensure that data can not tamper, inquiring and authenticating difference node account book consistency process is as shown in Figure 6.
User user provides key Key and advertisement media privacy of service data is decrypted, and other users do not have key Key right
Advertisement media privacy of service data are decrypted, and protect security of private data.
In the step 2, the user key of generation is in a manner of JWT (Java Web Token), user information
It is stored in after encryption in the header of http.Different language and platform, as long as server end realizes JWT authorization identifying, user
Key sessionKey then can obtain resource by verifying authorization at any time, be suitble to Distributed Application, JWT authorize timing diagram such as
Shown in Fig. 7.
In the step 4 and step 5, (r, s) verifying that message PData is signed and signed is calculated using ECDSA
Method, the realization of ECDSA algorithm include: choose ECDSA field parameter, generate ECDSA asymmetric key pair, generate ECDSA signature and
Verify ECDSA signature.
1. choosing ECDSA field parameter
The selection of field parameter has certain limitation, and field parameter includes the finite field F that a feature is PqOn ellipse it is bent
Line E (Fq) and a basic point G ∈ E (Fq)。
2. generating ECDSA asymmetric key pair
ECDSA key pair and field parameter set are associated, and the operation for generating key pair is as follows:
S1: randomly or pseudo-randomly integer d, the value range of d are section [1, n-1] for selection one;
S2: calculating Q=dG, and wherein Q is public key, and d is private key, and key pair is { d, Q }.
3. generating ECDSA signature
Known field parameter { q, FR, a, b, G, n, h } and key pair { d, Q }, sending node carry out message PData to be sent
Signature generates randomly or pseudo-randomly integer k first, meets 1≤k≤n-1, calculation formula (3-1):
KG=(x1,y1) (3-1)
By x1Be converted to integerCalculation formula (3-2):
R=x1 mod n (3-2)
If r=0, randomly or pseudo-randomly integer k is regenerated, formula (3-1) and (3-2) is recalculated, then counts
It calculates formula (3-3):
S=k-1{h(PData)+dr}mod n (3-3)
Above formula h (PData) regenerates k if s=0 for SHA-1 (PData), repeats the above steps, until s ≠
0, the signature (r, s) to message PData is generated, ECDSA signature process is as shown in Figure 8.
4. verifying ECDSA signature
In order to verify sender to the signature (r, s) of message PData, receiving node needs to obtain sender's public key Q first
With open ECDSA field parameter { q, FR, a, b, G, n, h }, while the validity of public key and field parameter is verified.It is verified
Signature operation first verifies that r and s is the integer in section [1, n-1], then calculation formula (4-1):
W=s-1 mod n (4-1)
After acquiring w, calculation formula (4-2) and (4-3):
u1=h (PData) w mod n (4-2)
u2=rw mod n (4-3)
Above formula h (PData) is SHA-1 (PData), calculates u1And u2Afterwards, then calculation formula (4-4):
X=u1G+u2Q (4-4)
If X=0, signature is illegal, if X ≠ 0, continues calculation formula (4-5):
V=x1 mod n (4-5)
Above formula x1It is the x coordinate integer of X, calculates the value of v, and if only if v=r, receives label, ECDSA verifies process such as
Shown in Fig. 9.
In the step 6, message broadcast is using the protocol realization P2P data distribution based on Gossip.Advertisement media
The Peer node of bottom chain forms a P2P network, and advertisement media business platform can submit request to submit to again to SDK, SDK
Peer node can submit after Peer node processing transaction motion to give endorsement node, then carry out endorsement signature, finally by sequence
Service is broadcast to Peer node after reaching common understanding.
Gossip module is responsible for connection sequence service and Peer node, realizes efficient from single source node to all nodes
Data distribution, and realize the state synchronized between different nodes, it can handle dynamic node increase and network partition.Account book information,
Status information etc. can be all distributed by Gossip agreement.
Embodiment 2: step 1: block chain multinode P2P network struction.Management node is for receiving the important number of advertisement media
According to Data, each management node needs to run in block chain network by full node verification.Each node maintenance is simultaneously remembered
Advertisement media significant data Data is recorded, common recognition service is simultaneously participated in.
Step 2: the user's registration of advertisement media application program.Advertisement media application program User user's registration needs same
When registered and registered in block chain network, block chain network is generated in the form of JWT (i.e. Java Web Token)
User key sessionKey returns to application program.
Step 3:User encrypts advertisement media privacy of service data using symmetric encipherment algorithm, such as AES, it is assumed that add
Close function is E, is in plain text P, key K, and encryption computing method is C=E (K, P);
Step 4: advertisement media business datum cochain.User is according to its corresponding sessionKey by advertisement media business number
It is submitted in corresponding anatomic passages according to the significant data Data of encryption and unencryption, a transaction is initiated, after digitally signed
Other nodes for being broadcast on network simultaneously wait to be confirmed;
Step 5: Transaction Information verification.Node in network verifies the datalogging information received, and verification passes through
Afterwards, data record is recorded in a block;
Step 6: node synchrodata.Once Data cochain, new block just be will create, and the node for creating the new block needs
The message is broadcast to other all nodes, other all nodes will receive the new block, and the block is added to oneself
After last block block of block chain.
Step 7:Data data query.In the block chain P2P network other than the node of data verification function is provided, also mention
For advertisement media business datum Data query node, each node record advertisement media business datum Data, User pass through it
Corresponding sessionKey carries out data query.
The step 1 of second aspect with reference to first aspect carries out advertisement media business datum based on block chain technology to deposit card,
To guarantee that advertisement media business datum can not distort.Cryptographic algorithm, distributed frame, P2P are specifically included that using block chain technology
Network, consistency algorithm etc..
The step 2 of the third aspect with reference to first aspect realizes that user key generates based on JWT (Java Web Token),
Stateless, distributed Web application authorization can be achieved.
The step 4 of fourth aspect with reference to first aspect, digital signature mainly use ECDSA algorithm, it is ensured that block chain
The various Transaction Informations of transmission and the safety of various block informations, the storage that data can not be distorted to database.
The step 6 of 5th aspect with reference to first aspect, message broadcast is using the protocol realization P2P data based on Gossip point
Hair, after a Peer node receives message, multiple nodes are randomly choosed, message is sent to these nodes.Meanwhile passing through
Gossip agreement, the topological structure of system adjust automatically network adapt to the variation of network node, guarantee that whole network is normally transported
Row.
The utility model has the advantages that the present invention passes through symmetric encipherment algorithm for advertisement media privacy of service data selective encryption first,
Secondly by data storage into block chain, significant data is all saved permanently on chain, meanwhile, in conjunction with the elliptic curve of block chain
Algorithm ensure that the advertisement media business datum being deposited on chain can not tamper, meanwhile, also ensure advertisement media industry
The privacy of business private data.The present invention can effectively prevent advertisement media business datum to be tampered, with high security the advantages of,
A kind of credible method for depositing card is provided for advertisement media business datum.
The foregoing is only a preferred embodiment of the present invention, but scope of protection of the present invention is not limited thereto,
Within the technical scope disclosed by the invention, any changes or substitutions that can be easily thought of by any people for being familiar with the technology, should all cover
Within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Claims (1)
1. a kind of credible deposit system of advertisement media business datum based on block chain, which is characterized in that mainly include following step
It is rapid: step 1 block chain multinode P2P network struction: using management node for receiving advertisement media significant data Data, each
The management node needs to run in block chain network by full node verification;Each node dimension in block chain network
Advertisement media significant data Data is protected and recorded, common recognition service is simultaneously participated in;The user of step 2 advertisement media application program infuses
Volume: it needs to register and register in block chain network simultaneously when the user User of register advertisements medium application program, block
Chain network returns to application program with the user key sessionKey that the form of JWT (Java Web Token) generates;Step 3
Encryption: the user User of the advertisement media application program is using symmetric encipherment algorithm to advertisement media privacy of service data
Privacy is encrypted, and the plaintext of encryption function E, the advertisement media privacy of service data Privacy is P, key K,
Encryption computing method is C=E (K, P);Step 4 advertisement media business datum cochain: the user of the advertisement media application program
User encrypts advertisement media business datum and the advertisement media significant data of unencryption according to its corresponding sessionKey
Data is submitted in corresponding anatomic passages, initiates a transaction, other in block chain network are broadcast to after digitally signed
Node simultaneously waits to be confirmed;The verification of step 5 Transaction Information: the node in block chain network carries out the information of the data record received
Verification, after verification passes through, data record is recorded in a block;Step 6 node synchrodata: once the advertisement media
Significant data Data cochain, new block just will create, and the node for creating new block needs for message to be broadcast to other all sections
Point, other described all nodes will receive new block, and after new block is added to last block block of oneself block chain;
Step 7 data query: in the P2P network in block chain network other than the node of information checking function is provided, also offer advertisement
Media business data query node, each node record advertisement media business datum, the use of the advertisement media application program
Family User carries out data query by corresponding sessionKey;The area of multinode P2P Web vector graphic is constructed in block chain network
Block chain technology specifically includes that cryptographic algorithm, distributed frame, P2P network, consistency algorithm;JWT (the Java Web
Token) realize that user key generates, it can be achieved that stateless, distributed Web application authorization;The digital signature is mainly adopted
With ECDSA algorithm, it is ensured that block chain network transmission various Transaction Informations and various block informations safety, allow data not
The storage that can be distorted is to database;The message broadcast is passed through using the protocol realization P2P data distribution based on Gossip
The Gossip agreement, the topological structure of system adjust automatically network adapt to the variation of network node, guarantee that whole network is normal
Operation;
The user's registration " return " key" sessionKey of the advertisement media application program, at the same in block chain network registration and
Registration;The user's registration of advertisement media application program is registered and registration is needed using SDK under application scenarios and other assemblies interaction
Timing diagram, and:
(1) configuration information of CA and CSP is obtained according to configuration file;
(2) example that advertisement media Client is created according to configuration information, and setting information;
(3) the greffier's information for being responsible for submitting subscriber data is obtained, if it does not exist, then need first to initialize greffier user,
Obtain greffier's certificate of registry and private key information;
(4) advertisement media example is created according to configuration information and organizational information;
(5) user information registered as needed generates registration request, submits to advertisement media client;
(6) greffier submits access advertisement media-certificate request;
(7) advertisement media-certification verification request generates the password of user's registration, finally returns that and gives advertisement media application program, complete
At user information register step;
(8) advertisement media application program calls advertisement media client according to the user information of application and the log-in password of return
Interface;
(9) advertisement media client generates private key and Certificate Signature Request CSR, and the interface for calling advertisement media client to provide is raw
At certificate of registry;
(10) certificate of registry and private key returned gives advertisement media application program;
(11) user information is optionally saved in key storage space.
After the completion of the user's registration of advertisement media application program, API meeting " return " key" sessionKey give advertisement media application journey
Sequence, advertisement media application program save user sessionKey, so as to subsequent operation use;
And advertisement media privacy of service data are encrypted using symmetric encipherment algorithm AES, advertisement media application program
User User submit data can be found according to the sessionKey of the user User of advertisement media application program it is corresponding tissue,
Channel C hannel submits transaction motion to corresponding endorsement node, and node simulation of endorsing executes and motion of endorsing, and executes completion
It calls transaction endorsement system chain code to sign simulation implementing result afterwards, generates the signature of simulation implementing result;Block link network
The transaction that ordering joint in network receives endorsement of having signed is ranked up, and generates block, and sorted transaction is bundled to area
In block, it is broadcast to fellow's node (Peer node), and verify to the signature of fellow's node, fellow's node verification connects
The validity for the transaction for including in block is received, the block node broadcasts block information of generation is to host node, host node conservation zone
Block is to account book and is broadcast to the node of book keeping operation, mutually message broadcast between accounting nodes, synchronous account book information, advertisement media application journey
The user User of sequence according to sessionKey data can be inquired on different accounting nodes, inquired on each accounting nodes
Data are all consistent, ensure that data can not tamper, and inquiring and authenticating difference accounting nodes account book consistency, advertisement media
The user User of application program provides key pair advertisement media privacy of service data and is decrypted, other advertisement media application programs
User User there is no key Key that advertisement media privacy of service data cannot be decrypted, protect security of private data;
It is in a manner of JWT (Java Web Token), use to the user User of the advertisement media application program user key generated
It is stored in the head file of browser after the encryption of family information, different language and platform, as long as server end realizes JWT, authorization is recognized
The key sessionKey of card, user then can obtain resource by verifying authorization at any time, and be suitble to Distributed Application;Then right
Message PData carries out signature and signature verification, and using ECDSA algorithm, the realization of ECDSA algorithm includes: to choose the domain ECDSA ginseng
Number generates ECDSA asymmetric key pair, generates ECDSA signature and verifying ECDSA signature.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270370.XA CN110022217B (en) | 2019-04-04 | 2019-04-04 | Advertisement media service data credible storage system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270370.XA CN110022217B (en) | 2019-04-04 | 2019-04-04 | Advertisement media service data credible storage system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110022217A true CN110022217A (en) | 2019-07-16 |
CN110022217B CN110022217B (en) | 2021-11-05 |
Family
ID=67190667
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910270370.XA Expired - Fee Related CN110022217B (en) | 2019-04-04 | 2019-04-04 | Advertisement media service data credible storage system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110022217B (en) |
Cited By (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572454A (en) * | 2019-09-11 | 2019-12-13 | 深圳钱客多信息科技有限公司 | Advertisement delivery system for guaranteeing safety of advertisement delivery process |
CN111178826A (en) * | 2019-12-10 | 2020-05-19 | 中证信用云科技(深圳)股份有限公司 | Consumption financial risk management method based on block chain and cloud platform |
CN111241196A (en) * | 2020-01-03 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN111461718A (en) * | 2020-04-03 | 2020-07-28 | 中国建设银行股份有限公司 | Access method, device and system of block chain node |
CN112565173A (en) * | 2020-09-04 | 2021-03-26 | 北京京东振世信息技术有限公司 | Method and apparatus for message processing |
CN112559863A (en) * | 2020-12-14 | 2021-03-26 | 杭州趣链科技有限公司 | Information pushing method, device, equipment and storage medium based on block chain |
CN112862616A (en) * | 2021-04-23 | 2021-05-28 | 北京中科金财科技股份有限公司 | Secure multi-party computing method, device and storage medium supporting block chain |
CN112860805A (en) * | 2021-04-01 | 2021-05-28 | 中国工商银行股份有限公司 | Block chain data interaction method and system |
CN113986915A (en) * | 2021-10-13 | 2022-01-28 | 支付宝(杭州)信息技术有限公司 | Data storage method and device |
CN114764709A (en) * | 2021-01-14 | 2022-07-19 | 富士通株式会社 | Information processing apparatus, information processing method, and computer program |
CN115189886A (en) * | 2022-06-14 | 2022-10-14 | 浙江成功软件开发有限公司 | Multi-party credible data interaction method and device based on block chain |
CN115225640A (en) * | 2022-09-20 | 2022-10-21 | 卓望数码技术(深圳)有限公司 | CDN trusted digital content supervision method and system based on block chain |
CN115277716A (en) * | 2022-06-21 | 2022-11-01 | 芯安微众(上海)微电子技术有限公司 | Vehicle networking terminal supporting block chain |
CN117251878A (en) * | 2023-09-20 | 2023-12-19 | 上海财安金融服务集团股份有限公司 | Blockchain-based method for promoting privacy protection and trusted authentication of received data |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108292250A (en) * | 2015-12-21 | 2018-07-17 | 英特尔公司 | Method and apparatus for promoting backing up distributed data |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN108965468A (en) * | 2018-08-16 | 2018-12-07 | 北京京东尚科信息技术有限公司 | Block chain network service platform and its chain code installation method, storage medium |
CN108989285A (en) * | 2018-06-08 | 2018-12-11 | 浙江捷尚人工智能研究发展有限公司 | Personal privacy protection method, electronic equipment, storage medium |
AU2018101669A4 (en) * | 2017-01-08 | 2018-12-13 | Rene F. Bernard | A method for checking and/ or updating information relating to assets |
CN109087104A (en) * | 2018-08-29 | 2018-12-25 | 北京京东尚科信息技术有限公司 | Block chain intelligence contract administration method and system, computer readable storage medium |
CN109409136A (en) * | 2018-11-08 | 2019-03-01 | 中链科技有限公司 | Block chain deposits the verification method, device and calculating equipment of card content |
US20190213633A1 (en) * | 2018-01-10 | 2019-07-11 | Michael Stephen Kokernak | System and method for facilitating clickable links embedded digital assets using a blockchain ledger |
-
2019
- 2019-04-04 CN CN201910270370.XA patent/CN110022217B/en not_active Expired - Fee Related
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108292250A (en) * | 2015-12-21 | 2018-07-17 | 英特尔公司 | Method and apparatus for promoting backing up distributed data |
AU2018101669A4 (en) * | 2017-01-08 | 2018-12-13 | Rene F. Bernard | A method for checking and/ or updating information relating to assets |
US20190213633A1 (en) * | 2018-01-10 | 2019-07-11 | Michael Stephen Kokernak | System and method for facilitating clickable links embedded digital assets using a blockchain ledger |
CN108989285A (en) * | 2018-06-08 | 2018-12-11 | 浙江捷尚人工智能研究发展有限公司 | Personal privacy protection method, electronic equipment, storage medium |
CN108833081A (en) * | 2018-06-22 | 2018-11-16 | 中国人民解放军国防科技大学 | Block chain-based equipment networking authentication method |
CN108965468A (en) * | 2018-08-16 | 2018-12-07 | 北京京东尚科信息技术有限公司 | Block chain network service platform and its chain code installation method, storage medium |
CN109087104A (en) * | 2018-08-29 | 2018-12-25 | 北京京东尚科信息技术有限公司 | Block chain intelligence contract administration method and system, computer readable storage medium |
CN109409136A (en) * | 2018-11-08 | 2019-03-01 | 中链科技有限公司 | Block chain deposits the verification method, device and calculating equipment of card content |
Non-Patent Citations (1)
Title |
---|
李兆森等: "基于区块链的电子数据存证应用研究", 《软件》 * |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110572454A (en) * | 2019-09-11 | 2019-12-13 | 深圳钱客多信息科技有限公司 | Advertisement delivery system for guaranteeing safety of advertisement delivery process |
CN111178826A (en) * | 2019-12-10 | 2020-05-19 | 中证信用云科技(深圳)股份有限公司 | Consumption financial risk management method based on block chain and cloud platform |
CN111241196B (en) * | 2020-01-03 | 2021-07-13 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN111241196A (en) * | 2020-01-03 | 2020-06-05 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN111461718A (en) * | 2020-04-03 | 2020-07-28 | 中国建设银行股份有限公司 | Access method, device and system of block chain node |
CN111461718B (en) * | 2020-04-03 | 2024-08-13 | 中国建设银行股份有限公司 | Block chain node access method, device and system |
CN112565173A (en) * | 2020-09-04 | 2021-03-26 | 北京京东振世信息技术有限公司 | Method and apparatus for message processing |
CN112565173B (en) * | 2020-09-04 | 2023-04-07 | 北京京东振世信息技术有限公司 | Method and apparatus for message processing |
CN112559863A (en) * | 2020-12-14 | 2021-03-26 | 杭州趣链科技有限公司 | Information pushing method, device, equipment and storage medium based on block chain |
CN114764709A (en) * | 2021-01-14 | 2022-07-19 | 富士通株式会社 | Information processing apparatus, information processing method, and computer program |
CN112860805A (en) * | 2021-04-01 | 2021-05-28 | 中国工商银行股份有限公司 | Block chain data interaction method and system |
CN112862616A (en) * | 2021-04-23 | 2021-05-28 | 北京中科金财科技股份有限公司 | Secure multi-party computing method, device and storage medium supporting block chain |
CN113986915A (en) * | 2021-10-13 | 2022-01-28 | 支付宝(杭州)信息技术有限公司 | Data storage method and device |
CN115189886A (en) * | 2022-06-14 | 2022-10-14 | 浙江成功软件开发有限公司 | Multi-party credible data interaction method and device based on block chain |
CN115277716A (en) * | 2022-06-21 | 2022-11-01 | 芯安微众(上海)微电子技术有限公司 | Vehicle networking terminal supporting block chain |
CN115225640A (en) * | 2022-09-20 | 2022-10-21 | 卓望数码技术(深圳)有限公司 | CDN trusted digital content supervision method and system based on block chain |
CN117251878A (en) * | 2023-09-20 | 2023-12-19 | 上海财安金融服务集团股份有限公司 | Blockchain-based method for promoting privacy protection and trusted authentication of received data |
CN117251878B (en) * | 2023-09-20 | 2024-04-05 | 上海财安金融服务集团股份有限公司 | Blockchain-based method for promoting privacy protection and trusted authentication of received data |
Also Published As
Publication number | Publication date |
---|---|
CN110022217B (en) | 2021-11-05 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110022217A (en) | A kind of credible deposit system of advertisement media business datum based on block chain | |
CN106961336B (en) | A kind of key components trustship method and system based on SM2 algorithm | |
CN109768988B (en) | Decentralized Internet of things security authentication system, equipment registration and identity authentication method | |
CN108781161B (en) | Method for controlling and distributing blockchain implementation of digital content | |
CN106357396B (en) | Digital signature method and system and quantum key card | |
CN111371561A (en) | Alliance block chain data access control method based on CP-ABE algorithm | |
CN109922077A (en) | A kind of identity identifying method and its system based on block chain | |
Chen et al. | A novel electronic cash system with trustee-based anonymity revocation from pairing | |
CN109413078B (en) | Anonymous authentication method based on group signature under standard model | |
CN108650252A (en) | The data-sharing systems and method of a kind of safety, fair protection privacy | |
Win et al. | Privacy enabled digital rights management without trusted third party assumption | |
Camenisch et al. | Concepts and languages for privacy-preserving attribute-based authentication | |
JP2002534701A (en) | Auto-recoverable, auto-encryptable cryptosystem using escrowed signature-only keys | |
CN112839046A (en) | Traceable anonymous crowdsourcing method and system based on block chain | |
Gulati et al. | Self-sovereign dynamic digital identities based on blockchain technology | |
CN111738857B (en) | Generation and verification method and device of concealed payment certificate applied to block chain | |
CN115270145A (en) | User electricity stealing behavior detection method and system based on alliance chain and federal learning | |
CN115883214A (en) | Electronic medical data sharing system and method based on alliance chain and CP-ABE | |
CN113746916B (en) | Third party service providing method, system and related nodes based on block chain | |
Blanton | Online subscriptions with anonymous access | |
CN106533681B (en) | A kind of attribute method of proof and system that support section is shown | |
CN110138558A (en) | Transmission method, equipment and the computer readable storage medium of session key | |
JP2012527678A (en) | Method and apparatus enabling portable user reputation | |
Liu et al. | pRate: anonymous star rating with rating secrecy | |
CN112950356B (en) | Personal loan processing method, system, equipment and medium based on digital identity |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20211105 |
|
CF01 | Termination of patent right due to non-payment of annual fee |