CN110309634B - Credible advertisement data management system based on block chain - Google Patents
Credible advertisement data management system based on block chain Download PDFInfo
- Publication number
- CN110309634B CN110309634B CN201910270691.XA CN201910270691A CN110309634B CN 110309634 B CN110309634 B CN 110309634B CN 201910270691 A CN201910270691 A CN 201910270691A CN 110309634 B CN110309634 B CN 110309634B
- Authority
- CN
- China
- Prior art keywords
- data
- block
- certificate
- user
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0823—Network architectures or network communication protocols for network security for authentication of entities using certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
- H04L9/0869—Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
- H04L9/3066—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
- H04L9/3268—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
Abstract
The invention belongs to the technical field of data security, and particularly relates to a block chain-based trusted advertisement data management system which solves the problems of low data reliability, insufficient openness and transparency, possibility of manual operation, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data security and the like. The invention applies the block chain technology to the media industry, combines the big data technology, performs identity management and authorization to advertisers and media companies based on a credible alliance chain, performs bidirectional authentication on the user identity, links the advertisement data, and performs transaction and analysis on the user data. A safe and reliable advertisement data management method is provided for media companies, advertisers and consumers.
Description
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a block chain-based trusted advertisement data management system.
Background
With the vigorous development of internet technology, human beings enter a big data era. The media industry gradually starts to develop towards small-size, individuation, instantaneity and flexibility under the support of big data, and the accurate advertisement putting becomes possible under the support of big data technology. However, the acquisition and management processes of mass data also have the problems of low data reliability, insufficient public transparency, possibility of being manually manipulated, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data security and the like. Improper data acquisition and management can not only lead to errors in media advertisement delivery, but also lead to various equity disputes and security problems.
Blockchain technology is considered to be an important cornerstone for advancing the internet from untrusted to trusted, from information transfer to value transfer. The block chain technology is characterized in that the Chinese book is smart in' bit currency: the point-to-point electronic cash system is firstly proposed, is the earliest as the bottom layer framework technology of the bit currency, is essentially a decentralized database, and is an application mode combining computer technologies such as an encryption algorithm, a consensus mechanism, distributed data storage, point-to-point transmission and the like.
Disclosure of Invention
The invention aims to provide a block chain-based trusted advertisement data management method which is accurate, intelligent, fair, transparent and non-falsifiable.
The trusted advertisement data management method based on the block chain adopts the following technical scheme.
Media company classifies the identity of the users of the credible alliance chain and authorizes the data use authority according to the classification; the media company is set to be in a system role, and all the authorities for reading and analyzing the data on the credible alliance chain are provided; the advertiser sets a business role and has read permission on the advertisement playing amount, the user clicking amount and the user purchasing, collecting and sharing rate data; the non-tampering of the trusted alliance chain ensures the trust between the media company and the advertiser;
the system role acquires configuration information of a certificate and an encryption service providing program according to the configuration file, and creates an instance of a trusted alliance link client according to the configuration information, wherein the trusted alliance link client instance is an entrance of the operation of the whole block chain-based trusted advertisement data management system; then, acquiring the information (namely system role information) of a registrant responsible for submitting user data, if the information does not exist, initializing the information of the registrant, and acquiring a registration certificate and private information of the registrant;
creating an instance of the client of the certificate according to the configuration information and the organization information; generating a registration request according to user information needing to be registered, and submitting the registration request to a certificate client; the registrar would submit a certificate request to access the trusted federation chain; generating a password for user registration through a certificate request of the trusted alliance chain, and finally returning the password to an application program to finish the step of user information registration;
the application program calls a calling interface of a client of the certificate by using the applied user information and the returned password registered by the user;
a client of the certificate generates a private key and a certificate signing request, and calls a calling interface provided by a trusted alliance chain to generate a registration certificate;
returning the generated registration certificate and the private key to the application program;
saving user information into a KeyValueStore device of the distributed data storage system;
mediaThe bidirectional authentication technology based on the elliptic curve algorithm is used for the identity authentication between a company and an advertiser; the mutual authentication is carried out between the system role and the service role, namely the mutual authentication is required to be carried out before the data transaction between the media company and the advertiser; after the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through the certificate, the certificate Cert of the CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity assigned to C for the certificate, rC∈ [2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Express certificate pair eCInteger pair of signature generation, mCInformation indicating the issuance time and validity period of the certificate related to C; the public key pair of the certificate is (r)c,Qc);QcN and the user identity are public information; p represents a point on the elliptic curve E (a, b), n being the order of P; encryption (K, M) denotes encrypting and decrypting the message M with the key K, Decryption (K, M) denotes encrypting and decrypting the message M with the key K, and h (ID)C||QC||mC) Representing a one-way function; the aim of identity authentication is that two parties create a secret shared session key through mutual authentication; the bidirectional authentication process comprises the following steps:
c: generating a random number r1E (2, n-2), calculating Q1=r1P, and sends message M to user U1=Q1; C→U:Q1
After receiving the message, U generates a random number r2E (2, n-2), calculating Q2=r2P,Q1b=rbQ1,Q12= r2Q1Then with Q12As a shared key, and certificate Cert of UUGenerating a ciphertext CU=Encryption(Q12,CertU||T1),T1For the time stamp of the ciphertext message, message M2= Q2||CU||h(Q12||Q1b||CertU||T1) Sending the data to a user C;
U→C:Q2||CU||h(Q12||Q1u||CertU||T1);
c receiving message M2Then, calculate Q12=r1Q2Obtaining certificate Cert of UUAnd a timestamp CertU||T1= Decryption(Y12,CU) Verification of CertUThe effectiveness of (a); if the verification is successful, continuing the next step, otherwise, requiring the message M to be retransmitted2;
Calculating Q1u=r1QuVerification h (Q)12||Q1u||CertU||T1) And a time stamp T1The effectiveness of (a); if successful, the next step is carried out, otherwise, the session is reinitiated;
c calculating Q2c=rcQ2And CC=EnCryption(Y12,CertC||T2) Generating a message M3= CC||h(Q12||Q2c||CertC||T2) And sending the data to U;
C→U:CC||h(Q12||Q2c||CertC||T2);
u receives message M3Thereafter, first CertC||T2=Decryption(Y12,CC) Decrypting to obtain certificate Cert of CCAnd T2Then verify CertCAnd h (Q)12||Q2c||CertC||T2) And T2The effectiveness of (a); if the verification is successful, the two complete mutual verification and key agreement to generate a shared session key Q12Otherwise, the conversation is reinitiated;
the process that the advertiser adds the advertisement content into the credible alliance chain is the uplink of the advertisement data; the credible alliance chain links the advertisement data through a multi-stage encryption and consensus mechanism, the advertisement data cannot be revoked or tampered once the advertisement data is linked, the advertisement data is completely disclosed, transparent and traceable in the credible alliance chain, the trust problem among advertisers, media companies and consumers is solved, and the method comprises the following steps:
the advertiser provides advertisement data, and the advertisement data is characters, pictures, videos or a combination of the characters, the pictures and the videos;
performing Hash calculation on the information of the advertisement data to obtain a Hash value H (W) and converting the obtained bit string into an integer; digitally signing the hash function value h of the advertisement data information by using a public key encryption technology of digital signature, thereby obtaining the signature of the advertisement data information;
the block file manager maintains data written into the block file currently, wherein the data written into the block file comprises two parts, one part is the block size, and the other part is the block data; the block size and the block data written in the block file are processed by serialization; if the size of the current block file exceeds a set value after the block size is written and serialized, the current block file is written into the next block file; creating a new block check point information and storing the new block check point information in a database;
the media company feeds back the analyzed advertisement data information to the advertiser, namely, a transaction is initiated on the instantiated chain code channel, the transaction content is user behavior data and a big data analysis result, on the instantiated chain code channel, the block chain client sends a transaction request to all endorsement nodes appointed before, after the endorsement nodes receive the information, the public key is used for verifying a signature, the endorsement nodes execute an intelligent contract, the executed result is a simulated transaction and cannot be written into an account book, and the executed result is fed back to the client; verifying the signature of the advertisement data according to the elliptic curve parameters and the public key of the advertisement data until the signature passes the verification;
in the sequencing stage, the transactions signed with endorsements are received, the sequence and the number of the transactions are determined, the sequenced transactions are packaged into a block and are broadcast to a peer node for verification, and generally, in the aspect of efficiency, a sequencing service does not output a single transaction as a block, but packages a plurality of transactions into a block;
the consensus node broadcasts the result to all peer nodes, and then each peer node updates the self account book;
a plurality of different types of nodes may run on the same physical server, there being a plurality of types of nodes: a client, a peer node, a sequencing service node, and a certificate node;
the client or the application program represents an entity operated by an end user, and is required to be connected to a certain peer node or a sequencing service node to communicate with the trusted alliance chain, the client submits a transaction proposal to the endorsement node, and when enough endorsements are collected, the transaction is broadcasted to the sequencing service to be sequenced, so that a block is generated;
all peer nodes are accounting nodes and are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book; some peer nodes will perform transactions and sign endorsements on the results, acting as endorsement nodes; the endorsement node is a dynamic role and is bound with a specific chain code; each chain code sets an endorsement strategy when being instantiated, and specifies which nodes are valid after the endorsement of the transaction; the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and the common accounting node is only responsible for verifying the transaction and accounting at other times;
the identity management is realized through a channel technology, and the channel technology is used for limiting the information propagation range; the channel technology is associated with a certain account book, and the channel technology definitely determines which organizations and members thereof concern the transaction; each transaction is associated with a unique channel; the system provides a function of creating a channel and a function of adding and exiting the channel for a user;
the identity authentication is carried out in a trusted alliance chain by using a bidirectional authentication technology based on an elliptic curve algorithm; the identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties; the authentication protocol can ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users;
advertisers have advertising data, which may be text, pictures, video, or a combination thereof; the media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography; the Hash hash algorithm is used for converting an input with any length into an output with fixed length and consisting of letters and numbers, and the output is irreversible and can not be tampered; the asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature;
the block is formally put into a block chain for storage through a consensus algorithm, and meanwhile, all network nodes represent the block to be accepted, namely, the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of a trusted alliance chain; thereby ensuring data consistency, transparency and safety;
the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching, clicking, purchasing, collecting and sharing; user behavior is stored in a trusted alliance chain in real time as data;
the media company analyzes massive user behavior data on a trusted alliance chain through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and massive user behavior data are effectively utilized;
the media company feeds back the analyzed massive data information of the user behavior to the advertiser, namely, a transaction is initiated on the chain code channel instantiated, and the transaction content is the user behavior data and the analysis result of the user behavior data.
Drawings
FIG. 1 is a diagram of a trusted blockchain data management scheme;
FIG. 2 is a flow diagram of trusted blockchain identity management;
FIG. 3 is a flowchart of trusted blockchain identity mutual authentication;
FIG. 4 is a flow diagram of a trusted blockchain data uplink process;
FIG. 5 is a trusted blockchain data transaction flow diagram;
Detailed Description
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
The blockchain system has a multi-center, open and consensus, trusted feature. The main technology comprises the following four points:
(1) distributed account book
The transaction is recorded collectively by a plurality of nodes in the distributed system. Each node records the complete transaction record, so that each node can participate in supervision of the transaction validity and verification of the transaction validity. Unlike traditional centralized approaches, nodes in the blockchain have no authority to record transactions individually, thereby avoiding the possibility of a single biller or node being controlled for fraud. Meanwhile, the nodes of the whole network participate in recording, so that data loss caused by attack received by a single node is prevented, and the safety of the data is ensured.
(2) Encryption and authorization techniques
Blockchain techniques combine many of the advantages of current symmetric encryption, asymmetric encryption, and hash algorithms while using elliptic curve encryption algorithms to generate a user's public and private key pair and elliptic curve digital signature algorithms to secure transactions. The transaction information packaged on the block is disclosed for all nodes participating in consensus, and meanwhile, the identity information of the account is also strictly encrypted.
(3) Consensus mechanism
The consensus mechanism is a policy and method for each node in the blockchain system to agree on. The consensus mechanism in the blockchain replaces the traditional application-centric third-party mechanism for guaranteeing trust and safety, and reduces the credit cost, time cost and capital consumption of the third party caused by the mutual trust problem of all parties. Common consensus mechanisms mainly include PoW, POS, DPOS, Paxos, PBFT, and the like, and are writing methods and effective tamper-proofing means.
(4) Intelligent contract
A smart contract is a piece of computer program code that can automate the execution of predefined rules. The method can realize the storage, transmission, management and control of the value, and provides an innovative solution for the application based on the blockchain.
Step 1: the media company classifies the identities of the users of the trusted alliance chain and authorizes the data use authority according to the classification. The invention realizes identity management through a channel technology of a block chain, and the function of a system channel is to limit the range of information transmission. The channel is associated with a ledger, which will clearly define which organizations and their members will be interested in the transaction. And each transaction is associated with a unique channel. The system provides the function of creating channels and the function of joining and exiting channels for users.
Step 2: the credible block chain carries out identity authentication by using a bidirectional authentication technology based on an elliptic curve algorithm. The identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties. The authentication protocol aims to ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users.
Step 3: advertisers have advertising data that may be text, pictures, video, or a combination thereof. The media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography. The method uses a hash algorithm to convert an input with any length into an output with fixed length and consisting of letters and numbers, has irreversibility, and realizes non-falsification. The asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature.
Step 4: consensus was achieved using the kafka ranking function. The blocks are formally stored in a block chain by a consensus algorithm, all network nodes indicate that the blocks are accepted, and the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of the block chain. Thereby ensuring data consistency, transparency and safety.
Step 5: the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching, clicking, purchasing, collecting, sharing and the like. These user behaviors are stored as data in real time in the blockchain.
Step 6: the mass user behavior data on the block chain are analyzed by the media company through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and the user data are utilized more effectively.
Step 7: the media company feeds the analyzed data information back to the advertiser, namely, a transaction is initiated on the chain code channel which is instantiated, and the transaction content is user behavior data and a big user data analysis result. Thereby helping advertisers to achieve advertisement content quality optimization and audience analysis. The user data is utilized to the maximum extent, and the advertiser is helped to realize the advantages of miniaturization, individuation, instantaneity and flexibility of the advertisement.
The trusted alliance chain converts the user behavior into practical value through a block chain technology, so that the user behavior value can be circulated and presented. The subjective initiative and the enthusiasm of users are better excited, the value trust problem is solved by utilizing the characteristics of block chain decentralization and data disclosure transparency, and a reliable data flow closed loop is formed. In a broad sense, the advertising media products are ultimately presented in the form of digital assets. The trusted alliance chain establishes a good, stable, and trustworthy order for the operation of digital assets in the new media industry. Therefore, the addition of the trusted alliance chain brings great opportunity and infinite possibility to the media data.
The method for managing the credible advertisement data based on the block chain comprises a credible block chain identity management process, a credible block chain identity bidirectional authentication process, a credible advertisement data chaining process, a credible block chain transaction initiation and calling process and a new advertisement data analysis feedback process. Fig. 1 is a diagram of a trusted blockchain data management scheme, fig. 2 is a flowchart of trusted blockchain identity management, fig. 3 is a flowchart of trusted blockchain identity mutual authentication, fig. 4 is a flowchart of trusted blockchain data uplink, and fig. 5 is a flowchart of trusted blockchain data transaction.
The trusted block chain identity management in the invention is a process that media companies classify identities of users of a trusted alliance chain and authorize and register data use authority according to the classifications. The CA node in the invention is a Certificate Authority (Certificate Authority) of a trusted alliance chain and consists of a server and a client component. And the CA node receives the registration application of the client and returns a registration password for user login so as to obtain the identity certificate. All operations on the blockchain network verify the identity of the user. As shown in fig. 2, the steps are as follows:
And step 202, acquiring the configuration information of the CA and the CSP according to the configuration file, and creating an instance of the trusted alliance chain Client according to the configuration information, wherein the instance of the trusted alliance chain Client is an entrance of the whole operation.
And step 204, creating an instance of the trusted alliance chain CAClient according to the configuration information and the organization information.
At step 206, the Registrar Registrar submits a post request to access the trusted federation chain CA.
And step 207, the trusted alliance chain CA requests to generate a password Secret registered by the user, and finally, the Secret is returned to the application program to finish the step of registering the user information.
And step 208, the application program calls an enter interface of the trusted alliance chain CAClient by using the applied user information and the returned registration password.
The invention uses the bidirectional authentication technology based on the elliptic curve algorithm to carry out identity authentication. Mutual authentication is performed between the system role and the business role, namely, mutual authentication is required before data transaction between the media company and the advertiser. After the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through CA, the certificate Cert of CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity, r, assigned to user C for CAC∈ [2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Denotes CA Pair eCInteger pair of signature generation, mCIndicating other information related to C (e.g., certificate issuance time and validity period). The public key pair of CA is (r)sc,Qsc),QscAnd n and the user identity are public information. P denotes a point on the elliptic curve E (a, b), and n is the order of P. Encryption (K, M), Decryption (K, M) represents encrypting and decrypting the message M with the key K, and h () represents a one-way function. The goal of authentication is that two parties create a secret shared session key by authenticating to each other. The bidirectional authentication process is shown in fig. 3, and includes the following steps:
C→U:Q1。
U→C:Q2||CU||h(Q12||Q1u||CertU||T1)。
C→U:CC||h(Q12||Q2c||CertC||T2)。
The advertisement data uplink in the invention is a process for an advertiser to add advertisement content into a trusted alliance chain. The trusted alliance chain links data through a multi-level encryption and consensus mechanism, once the advertisement data is linked, the advertisement data cannot be revoked or tampered, the advertisement data is completely disclosed, transparent and traceable in the trusted alliance chain, and the trust problem among advertisers, media companies and consumers is solved, as shown in fig. 4, the steps are as follows:
in step 401, an advertiser provides advertisement data, which may be text, pictures, video, or a combination thereof.
firstly, generating a random number d, wherein d is more than or equal to 1 and less than or equal to n-1;
D is calculated-1(e+kr)mod n;
Then (r, s) is the signature of the advertisement information.
In step 404, the block file manager maintains a currentFileWriter of the currently written block file, where the data written to the block file includes two parts, one is the block size and the other is the block data. The block size and block data written in the block file are both serialized. If the size of the current block file exceeds the set value after the block size is written and the block file is serialized, the block file is written into the next block file. And creating a new block check point information and storing the new block check point information in the database.
The media company feeds the analyzed data information back to the advertiser, namely, a transaction is initiated on the chain code channel which is instantiated, and the transaction content is user behavior data and a big data analysis result. The whole process from initiating a call transaction to final accounting on the chain code channel already instantiated is shown in fig. 5, and the steps are as follows:
in step 501, the blockchain client sends a transaction request to all previously agreed endorsement nodes (endorsing peers). It is noted that the choice of endorsing peers is limited, and is not freely chosen among all endorsing peers, and is determined by both the ChainCode and the Endorsement Policy defined by the ChainCode.
firstly, verifying that r and s are integers in an interval [1, n-1 ];
② calculating w ═ s-1mod n;
③ calculating u1New mod n and u2=rw mod n;
Calculating X ═ u1G+u2G;
If X is 0, rejecting the signature, otherwise converting the X coordinate X1 of X into an integerAnd calculate
Sixthly, if and only if v is r, the signature is verified.
In step 504, the consensus node broadcasts the result to all nodes (peers). And then each node updates the self account book.
The node in the invention is a communication subject of the block chain and is a logic concept. Multiple different types of nodes may run on the same physical server. There are various types of nodes: client, Peer node, sequencing service node and CA node.
In the present invention, a client or application represents an entity operated by an end user that must be connected to a Peer node or a sequencing service node to communicate with a blockchain network. The client side submits a Transaction Proposal (Transaction progress) to an endorsement node (Endorser), and when enough endorsements are collected, the Transaction is broadcasted to a sequencing service for sequencing to generate a block.
All Peer nodes in the invention are accounting nodes (Committer) which are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book. Some nodes will perform transactions and sign endorsements to the results, acting as endorsement nodes. The endorsement node is a dynamic role and is bound with a specific chain code. Each chain code sets an endorsement policy during instantiation, and specifies which nodes are valid after the endorsement of the transaction. And the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and is a common accounting node at other times, and the endorsement node is only responsible for verifying the transaction and accounting.
In the invention, a sequencing service node (Orderer) receives transactions containing endorsement signatures, sequences the unpacked transactions to generate blocks, and broadcasts the blocks to a Peer node. The ordering service provides an atomic broadcast (AtomicBroadcast) that ensures that nodes on the same chain receive the same message and have the same logical order.
The multi-channel (MultiChannel) of the sequencing service realizes multi-chain data isolation, ensures that only Peer nodes of the same chain can access data on the chain, and protects the privacy of user data.
Has the advantages that: the invention relates to a block chain-based trusted advertisement data management system, which solves the problems of low data reliability, insufficient openness and transparency, possibility of being manually operated, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data safety and the like. The invention applies the block chain technology to the media industry, combines the big data technology, performs identity management and authorization to advertisers and media companies based on a credible alliance chain, performs bidirectional authentication on the user identity, links the advertisement data, and performs transaction and analysis on the user data. A safe and reliable advertisement data management method is provided for media companies, advertisers and consumers. Thereby helping advertisers to achieve advertisement content quality optimization and audience analysis. The user data is utilized to the maximum extent, and the advertiser is helped to realize the advantages of miniaturization, individuation, instantaneity and flexibility of the advertisement.
The above description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (1)
1. A credible advertisement data management system based on a block chain is characterized in that: media company classifies the identity of the users of the credible alliance chain and authorizes the data use authority according to the classification; the media company is set to be in a system role, and all the authorities for reading and analyzing the data on the credible alliance chain are provided; the advertiser sets a business role and has read permission on the advertisement playing amount, the user clicking amount and the user purchasing, collecting and sharing rate data; tamper-resistant streaming media for trusted alliance chainTrust between the company and the advertiser is guaranteed; the system role acquires configuration information of a certificate and an encryption service providing program according to the configuration file, and creates an instance of a trusted alliance link client according to the configuration information, wherein the trusted alliance link client instance is an entrance of the operation of the whole block chain-based trusted advertisement data management system; then obtaining the information of a registrant responsible for submitting user data, if the information does not exist, initializing the information of the registrant, and obtaining a registration certificate and private information of the registrant; creating an instance of the client of the certificate according to the configuration information and the organization information; generating a registration request according to user information needing to be registered, and submitting the registration request to a certificate client; the registrar would submit a certificate request to access the trusted federation chain; generating a password for user registration through a certificate request of the trusted alliance chain, and finally returning the password to an application program to finish the step of user information registration; the application program calls a calling interface of a client of the certificate by using the applied user information and the returned password registered by the user; a client of the certificate generates a private key and a certificate signing request, and calls a calling interface provided by a trusted alliance chain to generate a registration certificate; returning the generated registration certificate and the private key to the application program; saving user information into a KeyValueStore device of the distributed data storage system; the bidirectional authentication technology based on the elliptic curve algorithm is used for the identity authentication between the media company and the advertiser; the mutual authentication is carried out between the system role and the service role, namely the mutual authentication is required to be carried out before the data transaction between the media company and the advertiser; after the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through the certificate, the certificate Cert of the CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity assigned to C for the certificate, rC∈[2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Express certificate pair eCInteger pair of signature generation, mCInformation indicating the issuance time and validity period of the certificate related to C; the public key pair of the certificate is (r)c,Qc);QcN and the user identity are public information; p represents a point on the elliptic curve E (a, b), n being the order of P; encryption (K, M) indicates the Encryption of the message M with the key K, Decryption (K, M) indicates the Decryption of the message M with the key K, h (ID)C||QC||mC) Representing a one-way function; the aim of identity authentication is that two parties create a secret shared session key through mutual authentication; the bidirectional authentication process comprises the following steps: c: generating a random number r1E (2, n-2), calculating Q1=r1P, and sends message M to user U1=Q1;C→U:Q1(ii) a After receiving the message, U generates a random number r2E (2, n-2), calculating Q2=r2P,Q1c=rcQ1,Q12=r2Q1Then with Q12As a shared key, and certificate Cert of UUGenerating a ciphertext CU=Encryption(Q12,CertU||T1),T1For time stamping of ciphertext messages, message M2=Q2||CU||h(Q12||Q1c||CertU||T1) Sending the data to a user C; i.e., U → C: Q2||CU||h(Q12||Q1c||CertU||T1) (ii) a C receiving message M2Then, calculate Q12=r1Q2Obtaining certificate Cert of UUAnd a timestamp CertU||T1=Decryption(Q12,CU) Verification of CertUThe effectiveness of (a); if the verification is successful, continuing the next step, otherwise, requiring the message M to be retransmitted2(ii) a Calculating Q1u=r1QuVerification h (Q)12||Q1u||CertU||T1) And a time stamp T1The effectiveness of (a); if successful, the next step is carried out, otherwise, the session is reinitiated; c calculating Q2c=rcQ2And CC=Encryption(Q12,CertC||T2) Generating a message M3=CC||h(Q12||Q2c||CertC||T2) And sending the data to U; namely, it isC→U:CC||h(Q12||Q2c||CertC||T2) (ii) a U receives message M3Thereafter, first CertC||T2=Decryption(Q12,CC) Decrypting to obtain certificate Cert of CCAnd T2Then verify CertCAnd h (Q)12||Q2c||CertC||T2) And T2The effectiveness of (a); if the verification is successful, the two complete mutual verification and key agreement to generate a shared session key, otherwise, the session is initiated again; the process that the advertiser adds the advertisement content into the credible alliance chain is the uplink of the advertisement data; the credible alliance chain links the advertisement data through a multi-stage encryption and consensus mechanism, the advertisement data cannot be revoked and tampered once the advertisement data is linked, the advertisement data is completely disclosed, transparent and traceable in the credible alliance chain, the trust problem between an advertiser and a media company and a consumer is solved, and the steps are as follows: the advertiser provides advertisement data, wherein the advertisement data are characters, pictures, videos or a combination of the characters, the pictures and the videos; performing Hash calculation on the information of the advertisement data to obtain a Hash value H (W) and converting the obtained bit string into an integer; digitally signing the hash function value h of the advertisement data information by using a public key encryption technology of digital signature, thereby obtaining the signature of the advertisement data information; the block file manager maintains data written into the block file currently, wherein the data written into the block file comprises two parts, one part is the block size, and the other part is the block data; the block size and the block data written in the block file are processed by serialization; if the size of the current block file exceeds a set value after the block size is written and serialized, the current block file is written into the next block file; creating a new block check point information and storing the new block check point information in a database; the media company feeds back the analyzed advertisement data information to the advertiser, namely, a transaction is initiated on the chain code channel instantiated, the transaction content is user behavior data and a big data analysis result, the block chain client sends a transaction request to all endorsement nodes appointed before on the chain code channel instantiated, and the endorsement nodes firstly receive the advertisement data informationThe signature is verified by using a public key, the endorsement node executes an intelligent contract, the executed result is a simulated transaction and cannot be written into an account book, and the executed result is fed back to the client; verifying the signature of the advertisement data according to the elliptic curve parameters and the public key of the advertisement data until the signature passes the verification; in the sequencing stage, the transactions signed with endorsements are received, the sequence and the number of the transactions are determined, the sequenced transactions are packaged into a block and are broadcast to a peer node for verification, and in the aspect of efficiency, the sequencing service does not output a single transaction as a block but packages a plurality of transactions into a block; the consensus node broadcasts the result to all peer nodes, and then each peer node updates the self account book; a plurality of different types of nodes may run on the same physical server, there being a plurality of types of nodes: a client, a peer node, a sequencing service node, and a certificate node; the client or the application program represents an entity operated by an end user, and is required to be connected to a certain peer node or a sequencing service node to communicate with the trusted alliance chain, the client submits a transaction proposal to the endorsement node, and when enough endorsements are collected, the transaction is broadcasted to the sequencing service to be sequenced, so that a block is generated; all peer nodes are accounting nodes and are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book; some peer nodes will perform transactions and sign endorsements on the results, acting as endorsement nodes; the endorsement node is a dynamic role and is bound with a specific chain code; each chain code sets an endorsement strategy when being instantiated, and specifies which nodes are valid after the endorsement of the transaction; the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and the common accounting node is only responsible for verifying the transaction and accounting at other times; the identity management is realized through a channel technology, and the channel technology is used for limiting the information propagation range; the channel technology is associated with a certain account book, and the channel technology definitely determines which organizations and members thereof concern the transaction; each transaction is associated with a unique channel; the system provides the function of creating channel, and provides the user with the channel joining and exitingThe function of (a); the identity authentication is carried out in a trusted alliance chain by using a bidirectional authentication technology based on an elliptic curve algorithm; the identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties; the authentication protocol can ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users; the advertiser has advertising data, which may be text or pictures or video or a combination thereof; the media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography; the Hash hash algorithm is used for converting an input with any length into an output with fixed length and consisting of letters and numbers, and the output is irreversible and can not be tampered; the asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature; the block is formally put into a block chain for storage through a consensus algorithm, and meanwhile, all network nodes represent the block to be accepted, namely, the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of a trusted alliance chain; thereby ensuring data consistency and transparent safety; the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching or clicking, purchasing or collecting or sharing; user behavior is stored in a trusted alliance chain in real time as data; the media company analyzes massive user behavior data on a trusted alliance chain through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and massive user behavior data are effectively utilized; the media company feeds back the analyzed massive data information of the user behavior to the advertiser, namely, a transaction is initiated on the instantiated chain code channel, and the transaction content is the user behavior data and the big data analysis result.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270691.XA CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910270691.XA CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110309634A CN110309634A (en) | 2019-10-08 |
CN110309634B true CN110309634B (en) | 2020-12-22 |
Family
ID=68074399
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910270691.XA Expired - Fee Related CN110309634B (en) | 2019-04-04 | 2019-04-04 | Credible advertisement data management system based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110309634B (en) |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11139977B2 (en) * | 2018-02-07 | 2021-10-05 | Verasity Limited | System and method for proof of view via blockchain |
CN110807209B (en) * | 2019-11-01 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Data processing method, device and storage medium |
CN111079136B (en) * | 2019-11-07 | 2022-02-11 | 北京科技大学 | Fog computing intrusion detection feature sharing system based on block chain technology |
CN110852886B (en) * | 2019-11-21 | 2022-04-22 | 西南石油大学 | Second-hand transaction and article borrowing and returning system based on alliance chain |
CN111028064B (en) * | 2019-12-17 | 2023-07-21 | 中国科学院计算技术研究所 | Block chain-based internet of things platform transaction system, method and equipment |
CN111241196B (en) * | 2020-01-03 | 2021-07-13 | 腾讯科技(深圳)有限公司 | Advertisement frequency control method and system |
CN113379416A (en) * | 2020-03-10 | 2021-09-10 | 本无链科技(深圳)有限公司 | Method and system for realizing similar biological groups with consistent memory but different behaviors |
CN111383378B (en) * | 2020-03-11 | 2021-07-30 | 合肥鼎方信息科技有限公司 | Access control identification system information node interconnection method based on block chain architecture |
CN111160997A (en) * | 2020-04-02 | 2020-05-15 | 支付宝(杭州)信息技术有限公司 | Advertisement supervision method and device based on block chain and advertisement delivery system |
CN111476548B (en) * | 2020-04-16 | 2024-01-23 | 山东师范大学 | Title review method and system based on blockchain |
CN111741062B (en) * | 2020-05-12 | 2023-04-18 | 湖南半岛医疗科技有限公司 | Electronic equipment local area management system based on block chain technology |
CN112039866B (en) * | 2020-08-26 | 2022-05-27 | 北京计算机技术及应用研究所 | Design method of block chain-based data trusted configuration management system |
CN112235368B (en) * | 2020-09-29 | 2022-12-13 | 中国人民武装警察部队工程大学 | RFID equipment management system based on alliance block chain |
CN112241435A (en) * | 2020-10-23 | 2021-01-19 | 山西特信环宇信息技术有限公司 | Cone block chain storage system and consensus storage method |
CN113468551A (en) * | 2021-05-31 | 2021-10-01 | 南京邮电大学 | Domestic intelligent electric meter data storage system and method based on alliance block chain |
CN113538042B (en) * | 2021-06-30 | 2023-09-22 | 杭州电子科技大学 | Block chain-based online advertisement click fraud monitoring and preventing method |
CN113779095B (en) * | 2021-11-11 | 2022-04-01 | 江苏荣泽信息科技股份有限公司 | Job title rating electronic certificate supervision system based on block chain technology |
CN114301608A (en) * | 2021-12-31 | 2022-04-08 | 鄢华中 | Block chain decentralized multi-element cross consensus signature lock and access control construction method |
CN114528356B (en) * | 2022-01-26 | 2022-11-11 | 广东南方新视界传媒科技有限公司 | Multi-dimensional media data fusion management system and method based on block chain |
CN115840787B (en) * | 2023-02-20 | 2023-05-02 | 塔比星信息技术(深圳)有限公司 | Block chain-based supply chain data sharing method, device, equipment and medium |
CN116151828A (en) * | 2023-04-20 | 2023-05-23 | 成都航空职业技术学院 | Block chain-based carbon footprint tracking method, system, equipment and medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109255661A (en) * | 2018-09-27 | 2019-01-22 | 王国俊 | A kind of business datum authentication method and system based on block chain |
CN109325368A (en) * | 2018-09-11 | 2019-02-12 | 云量区块链(深圳)有限公司 | City outdoor scene management method, electronic equipment and storage medium based on block chain |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106355442A (en) * | 2016-08-30 | 2017-01-25 | 杭州启冠网络技术有限公司 | Online precise advertising method and system based on big data driving |
US10997620B2 (en) * | 2017-09-18 | 2021-05-04 | Vertigo Studios, Llc | Blockchain-enabled system for controlling advertiser access to personal user data |
CN108764966A (en) * | 2018-04-28 | 2018-11-06 | 深圳市元征科技股份有限公司 | Advertisement placement method, block chain node device and relevant device |
CN108985818B (en) * | 2018-06-15 | 2022-05-31 | 微梦创科网络科技(中国)有限公司 | Advertisement delivery system and method based on block chain technology |
CN109086622A (en) * | 2018-07-25 | 2018-12-25 | 深圳慧安康科技有限公司 | A kind of implementation method and node device of intelligence community |
CN109325331B (en) * | 2018-09-13 | 2022-05-20 | 北京航空航天大学 | Big data acquisition transaction system based on block chain and trusted computing platform |
CN109308638A (en) * | 2018-09-30 | 2019-02-05 | 北京奇虎科技有限公司 | Ad trafficking system, server and readable storage medium storing program for executing based on block chain |
CN109523302A (en) * | 2018-10-19 | 2019-03-26 | 中链科技有限公司 | Advertisement sending method, device and calculating equipment based on block chain |
CN109493088A (en) * | 2018-10-31 | 2019-03-19 | 周更新 | A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake |
-
2019
- 2019-04-04 CN CN201910270691.XA patent/CN110309634B/en not_active Expired - Fee Related
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109325368A (en) * | 2018-09-11 | 2019-02-12 | 云量区块链(深圳)有限公司 | City outdoor scene management method, electronic equipment and storage medium based on block chain |
CN109255661A (en) * | 2018-09-27 | 2019-01-22 | 王国俊 | A kind of business datum authentication method and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN110309634A (en) | 2019-10-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110309634B (en) | Credible advertisement data management system based on block chain | |
US11842317B2 (en) | Blockchain-based authentication and authorization | |
CN108781161B (en) | Method for controlling and distributing blockchain implementation of digital content | |
CN113595971B (en) | Block chain-based distributed data security sharing method, system and computer readable medium | |
Kou | Payment technologies for E-commerce | |
CN109840771A (en) | A kind of block chain intimacy protection system and its method based on homomorphic cryptography | |
US20020162003A1 (en) | System and method for providing trusted browser verification | |
EP2850772A1 (en) | Secure transaction object creation, propagation and invocation | |
CN110022217A (en) | A kind of credible deposit system of advertisement media business datum based on block chain | |
CN109491965A (en) | The storage method and its network and electronic equipment of purchase sale of electricity contract | |
Camenisch et al. | Concepts and languages for privacy-preserving attribute-based authentication | |
Win et al. | Privacy enabled digital rights management without trusted third party assumption | |
CN112839046A (en) | Traceable anonymous crowdsourcing method and system based on block chain | |
CN113468570A (en) | Private data sharing method based on intelligent contract | |
US20110243328A1 (en) | Data providing process based on an ibpe scheme | |
CN111049806B (en) | Joint authority control method and device, electronic equipment and storage medium | |
Onieva et al. | Secure multi-party non-repudiation protocols and applications | |
CN107403310A (en) | Payment system and its method of payment under quantum Metropolitan Area Network (MAN) | |
CN115883214A (en) | Electronic medical data sharing system and method based on alliance chain and CP-ABE | |
Persiano et al. | A secure and private system for subscription-based remote services | |
CN113673893A (en) | Retired power battery management method and system | |
CN112927026A (en) | Coupon processing method and device, electronic equipment and computer storage medium | |
CN115883102B (en) | Cross-domain identity authentication method and system based on identity credibility and electronic equipment | |
EP2689552B1 (en) | Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (igcp/pki). | |
CN116862508A (en) | Machine learning model transaction system based on alliance blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20201222 |