CN110309634B - Credible advertisement data management system based on block chain - Google Patents

Credible advertisement data management system based on block chain Download PDF

Info

Publication number
CN110309634B
CN110309634B CN201910270691.XA CN201910270691A CN110309634B CN 110309634 B CN110309634 B CN 110309634B CN 201910270691 A CN201910270691 A CN 201910270691A CN 110309634 B CN110309634 B CN 110309634B
Authority
CN
China
Prior art keywords
data
block
certificate
user
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN201910270691.XA
Other languages
Chinese (zh)
Other versions
CN110309634A (en
Inventor
王大永
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Datong Industrial Co ltd
Original Assignee
Shenzhen Datong Industrial Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Datong Industrial Co ltd filed Critical Shenzhen Datong Industrial Co ltd
Priority to CN201910270691.XA priority Critical patent/CN110309634B/en
Publication of CN110309634A publication Critical patent/CN110309634A/en
Application granted granted Critical
Publication of CN110309634B publication Critical patent/CN110309634B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Abstract

The invention belongs to the technical field of data security, and particularly relates to a block chain-based trusted advertisement data management system which solves the problems of low data reliability, insufficient openness and transparency, possibility of manual operation, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data security and the like. The invention applies the block chain technology to the media industry, combines the big data technology, performs identity management and authorization to advertisers and media companies based on a credible alliance chain, performs bidirectional authentication on the user identity, links the advertisement data, and performs transaction and analysis on the user data. A safe and reliable advertisement data management method is provided for media companies, advertisers and consumers.

Description

Credible advertisement data management system based on block chain
Technical Field
The invention belongs to the technical field of data security, and particularly relates to a block chain-based trusted advertisement data management system.
Background
With the vigorous development of internet technology, human beings enter a big data era. The media industry gradually starts to develop towards small-size, individuation, instantaneity and flexibility under the support of big data, and the accurate advertisement putting becomes possible under the support of big data technology. However, the acquisition and management processes of mass data also have the problems of low data reliability, insufficient public transparency, possibility of being manually manipulated, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data security and the like. Improper data acquisition and management can not only lead to errors in media advertisement delivery, but also lead to various equity disputes and security problems.
Blockchain technology is considered to be an important cornerstone for advancing the internet from untrusted to trusted, from information transfer to value transfer. The block chain technology is characterized in that the Chinese book is smart in' bit currency: the point-to-point electronic cash system is firstly proposed, is the earliest as the bottom layer framework technology of the bit currency, is essentially a decentralized database, and is an application mode combining computer technologies such as an encryption algorithm, a consensus mechanism, distributed data storage, point-to-point transmission and the like.
Disclosure of Invention
The invention aims to provide a block chain-based trusted advertisement data management method which is accurate, intelligent, fair, transparent and non-falsifiable.
The trusted advertisement data management method based on the block chain adopts the following technical scheme.
Media company classifies the identity of the users of the credible alliance chain and authorizes the data use authority according to the classification; the media company is set to be in a system role, and all the authorities for reading and analyzing the data on the credible alliance chain are provided; the advertiser sets a business role and has read permission on the advertisement playing amount, the user clicking amount and the user purchasing, collecting and sharing rate data; the non-tampering of the trusted alliance chain ensures the trust between the media company and the advertiser;
the system role acquires configuration information of a certificate and an encryption service providing program according to the configuration file, and creates an instance of a trusted alliance link client according to the configuration information, wherein the trusted alliance link client instance is an entrance of the operation of the whole block chain-based trusted advertisement data management system; then, acquiring the information (namely system role information) of a registrant responsible for submitting user data, if the information does not exist, initializing the information of the registrant, and acquiring a registration certificate and private information of the registrant;
creating an instance of the client of the certificate according to the configuration information and the organization information; generating a registration request according to user information needing to be registered, and submitting the registration request to a certificate client; the registrar would submit a certificate request to access the trusted federation chain; generating a password for user registration through a certificate request of the trusted alliance chain, and finally returning the password to an application program to finish the step of user information registration;
the application program calls a calling interface of a client of the certificate by using the applied user information and the returned password registered by the user;
a client of the certificate generates a private key and a certificate signing request, and calls a calling interface provided by a trusted alliance chain to generate a registration certificate;
returning the generated registration certificate and the private key to the application program;
saving user information into a KeyValueStore device of the distributed data storage system;
mediaThe bidirectional authentication technology based on the elliptic curve algorithm is used for the identity authentication between a company and an advertiser; the mutual authentication is carried out between the system role and the service role, namely the mutual authentication is required to be carried out before the data transaction between the media company and the advertiser; after the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through the certificate, the certificate Cert of the CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity assigned to C for the certificate, rC∈ [2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Express certificate pair eCInteger pair of signature generation, mCInformation indicating the issuance time and validity period of the certificate related to C; the public key pair of the certificate is (r)c,Qc);QcN and the user identity are public information; p represents a point on the elliptic curve E (a, b), n being the order of P; encryption (K, M) denotes encrypting and decrypting the message M with the key K, Decryption (K, M) denotes encrypting and decrypting the message M with the key K, and h (ID)C||QC||mC) Representing a one-way function; the aim of identity authentication is that two parties create a secret shared session key through mutual authentication; the bidirectional authentication process comprises the following steps:
c: generating a random number r1E (2, n-2), calculating Q1=r1P, and sends message M to user U1=Q1; C→U:Q1
After receiving the message, U generates a random number r2E (2, n-2), calculating Q2=r2P,Q1b=rbQ1,Q12= r2Q1Then with Q12As a shared key, and certificate Cert of UUGenerating a ciphertext CU=Encryption(Q12,CertU||T1),T1For the time stamp of the ciphertext message, message M2= Q2||CU||h(Q12||Q1b||CertU||T1) Sending the data to a user C;
U→C:Q2||CU||h(Q12||Q1u||CertU||T1);
c receiving message M2Then, calculate Q12=r1Q2Obtaining certificate Cert of UUAnd a timestamp CertU||T1= Decryption(Y12,CU) Verification of CertUThe effectiveness of (a); if the verification is successful, continuing the next step, otherwise, requiring the message M to be retransmitted2
Calculating Q1u=r1QuVerification h (Q)12||Q1u||CertU||T1) And a time stamp T1The effectiveness of (a); if successful, the next step is carried out, otherwise, the session is reinitiated;
c calculating Q2c=rcQ2And CC=EnCryption(Y12,CertC||T2) Generating a message M3= CC||h(Q12||Q2c||CertC||T2) And sending the data to U;
C→U:CC||h(Q12||Q2c||CertC||T2);
u receives message M3Thereafter, first CertC||T2=Decryption(Y12,CC) Decrypting to obtain certificate Cert of CCAnd T2Then verify CertCAnd h (Q)12||Q2c||CertC||T2) And T2The effectiveness of (a); if the verification is successful, the two complete mutual verification and key agreement to generate a shared session key Q12Otherwise, the conversation is reinitiated;
the process that the advertiser adds the advertisement content into the credible alliance chain is the uplink of the advertisement data; the credible alliance chain links the advertisement data through a multi-stage encryption and consensus mechanism, the advertisement data cannot be revoked or tampered once the advertisement data is linked, the advertisement data is completely disclosed, transparent and traceable in the credible alliance chain, the trust problem among advertisers, media companies and consumers is solved, and the method comprises the following steps:
the advertiser provides advertisement data, and the advertisement data is characters, pictures, videos or a combination of the characters, the pictures and the videos;
performing Hash calculation on the information of the advertisement data to obtain a Hash value H (W) and converting the obtained bit string into an integer; digitally signing the hash function value h of the advertisement data information by using a public key encryption technology of digital signature, thereby obtaining the signature of the advertisement data information;
the block file manager maintains data written into the block file currently, wherein the data written into the block file comprises two parts, one part is the block size, and the other part is the block data; the block size and the block data written in the block file are processed by serialization; if the size of the current block file exceeds a set value after the block size is written and serialized, the current block file is written into the next block file; creating a new block check point information and storing the new block check point information in a database;
the media company feeds back the analyzed advertisement data information to the advertiser, namely, a transaction is initiated on the instantiated chain code channel, the transaction content is user behavior data and a big data analysis result, on the instantiated chain code channel, the block chain client sends a transaction request to all endorsement nodes appointed before, after the endorsement nodes receive the information, the public key is used for verifying a signature, the endorsement nodes execute an intelligent contract, the executed result is a simulated transaction and cannot be written into an account book, and the executed result is fed back to the client; verifying the signature of the advertisement data according to the elliptic curve parameters and the public key of the advertisement data until the signature passes the verification;
in the sequencing stage, the transactions signed with endorsements are received, the sequence and the number of the transactions are determined, the sequenced transactions are packaged into a block and are broadcast to a peer node for verification, and generally, in the aspect of efficiency, a sequencing service does not output a single transaction as a block, but packages a plurality of transactions into a block;
the consensus node broadcasts the result to all peer nodes, and then each peer node updates the self account book;
a plurality of different types of nodes may run on the same physical server, there being a plurality of types of nodes: a client, a peer node, a sequencing service node, and a certificate node;
the client or the application program represents an entity operated by an end user, and is required to be connected to a certain peer node or a sequencing service node to communicate with the trusted alliance chain, the client submits a transaction proposal to the endorsement node, and when enough endorsements are collected, the transaction is broadcasted to the sequencing service to be sequenced, so that a block is generated;
all peer nodes are accounting nodes and are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book; some peer nodes will perform transactions and sign endorsements on the results, acting as endorsement nodes; the endorsement node is a dynamic role and is bound with a specific chain code; each chain code sets an endorsement strategy when being instantiated, and specifies which nodes are valid after the endorsement of the transaction; the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and the common accounting node is only responsible for verifying the transaction and accounting at other times;
the identity management is realized through a channel technology, and the channel technology is used for limiting the information propagation range; the channel technology is associated with a certain account book, and the channel technology definitely determines which organizations and members thereof concern the transaction; each transaction is associated with a unique channel; the system provides a function of creating a channel and a function of adding and exiting the channel for a user;
the identity authentication is carried out in a trusted alliance chain by using a bidirectional authentication technology based on an elliptic curve algorithm; the identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties; the authentication protocol can ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users;
advertisers have advertising data, which may be text, pictures, video, or a combination thereof; the media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography; the Hash hash algorithm is used for converting an input with any length into an output with fixed length and consisting of letters and numbers, and the output is irreversible and can not be tampered; the asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature;
the block is formally put into a block chain for storage through a consensus algorithm, and meanwhile, all network nodes represent the block to be accepted, namely, the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of a trusted alliance chain; thereby ensuring data consistency, transparency and safety;
the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching, clicking, purchasing, collecting and sharing; user behavior is stored in a trusted alliance chain in real time as data;
the media company analyzes massive user behavior data on a trusted alliance chain through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and massive user behavior data are effectively utilized;
the media company feeds back the analyzed massive data information of the user behavior to the advertiser, namely, a transaction is initiated on the chain code channel instantiated, and the transaction content is the user behavior data and the analysis result of the user behavior data.
Drawings
FIG. 1 is a diagram of a trusted blockchain data management scheme;
FIG. 2 is a flow diagram of trusted blockchain identity management;
FIG. 3 is a flowchart of trusted blockchain identity mutual authentication;
FIG. 4 is a flow diagram of a trusted blockchain data uplink process;
FIG. 5 is a trusted blockchain data transaction flow diagram;
Detailed Description
The technical scheme of the invention is further explained by the specific implementation mode in combination with the attached drawings.
The blockchain system has a multi-center, open and consensus, trusted feature. The main technology comprises the following four points:
(1) distributed account book
The transaction is recorded collectively by a plurality of nodes in the distributed system. Each node records the complete transaction record, so that each node can participate in supervision of the transaction validity and verification of the transaction validity. Unlike traditional centralized approaches, nodes in the blockchain have no authority to record transactions individually, thereby avoiding the possibility of a single biller or node being controlled for fraud. Meanwhile, the nodes of the whole network participate in recording, so that data loss caused by attack received by a single node is prevented, and the safety of the data is ensured.
(2) Encryption and authorization techniques
Blockchain techniques combine many of the advantages of current symmetric encryption, asymmetric encryption, and hash algorithms while using elliptic curve encryption algorithms to generate a user's public and private key pair and elliptic curve digital signature algorithms to secure transactions. The transaction information packaged on the block is disclosed for all nodes participating in consensus, and meanwhile, the identity information of the account is also strictly encrypted.
(3) Consensus mechanism
The consensus mechanism is a policy and method for each node in the blockchain system to agree on. The consensus mechanism in the blockchain replaces the traditional application-centric third-party mechanism for guaranteeing trust and safety, and reduces the credit cost, time cost and capital consumption of the third party caused by the mutual trust problem of all parties. Common consensus mechanisms mainly include PoW, POS, DPOS, Paxos, PBFT, and the like, and are writing methods and effective tamper-proofing means.
(4) Intelligent contract
A smart contract is a piece of computer program code that can automate the execution of predefined rules. The method can realize the storage, transmission, management and control of the value, and provides an innovative solution for the application based on the blockchain.
Step 1: the media company classifies the identities of the users of the trusted alliance chain and authorizes the data use authority according to the classification. The invention realizes identity management through a channel technology of a block chain, and the function of a system channel is to limit the range of information transmission. The channel is associated with a ledger, which will clearly define which organizations and their members will be interested in the transaction. And each transaction is associated with a unique channel. The system provides the function of creating channels and the function of joining and exiting channels for users.
Step 2: the credible block chain carries out identity authentication by using a bidirectional authentication technology based on an elliptic curve algorithm. The identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties. The authentication protocol aims to ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users.
Step 3: advertisers have advertising data that may be text, pictures, video, or a combination thereof. The media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography. The method uses a hash algorithm to convert an input with any length into an output with fixed length and consisting of letters and numbers, has irreversibility, and realizes non-falsification. The asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature.
Step 4: consensus was achieved using the kafka ranking function. The blocks are formally stored in a block chain by a consensus algorithm, all network nodes indicate that the blocks are accepted, and the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of the block chain. Thereby ensuring data consistency, transparency and safety.
Step 5: the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching, clicking, purchasing, collecting, sharing and the like. These user behaviors are stored as data in real time in the blockchain.
Step 6: the mass user behavior data on the block chain are analyzed by the media company through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and the user data are utilized more effectively.
Step 7: the media company feeds the analyzed data information back to the advertiser, namely, a transaction is initiated on the chain code channel which is instantiated, and the transaction content is user behavior data and a big user data analysis result. Thereby helping advertisers to achieve advertisement content quality optimization and audience analysis. The user data is utilized to the maximum extent, and the advertiser is helped to realize the advantages of miniaturization, individuation, instantaneity and flexibility of the advertisement.
The trusted alliance chain converts the user behavior into practical value through a block chain technology, so that the user behavior value can be circulated and presented. The subjective initiative and the enthusiasm of users are better excited, the value trust problem is solved by utilizing the characteristics of block chain decentralization and data disclosure transparency, and a reliable data flow closed loop is formed. In a broad sense, the advertising media products are ultimately presented in the form of digital assets. The trusted alliance chain establishes a good, stable, and trustworthy order for the operation of digital assets in the new media industry. Therefore, the addition of the trusted alliance chain brings great opportunity and infinite possibility to the media data.
The method for managing the credible advertisement data based on the block chain comprises a credible block chain identity management process, a credible block chain identity bidirectional authentication process, a credible advertisement data chaining process, a credible block chain transaction initiation and calling process and a new advertisement data analysis feedback process. Fig. 1 is a diagram of a trusted blockchain data management scheme, fig. 2 is a flowchart of trusted blockchain identity management, fig. 3 is a flowchart of trusted blockchain identity mutual authentication, fig. 4 is a flowchart of trusted blockchain data uplink, and fig. 5 is a flowchart of trusted blockchain data transaction.
The trusted block chain identity management in the invention is a process that media companies classify identities of users of a trusted alliance chain and authorize and register data use authority according to the classifications. The CA node in the invention is a Certificate Authority (Certificate Authority) of a trusted alliance chain and consists of a server and a client component. And the CA node receives the registration application of the client and returns a registration password for user login so as to obtain the identity certificate. All operations on the blockchain network verify the identity of the user. As shown in fig. 2, the steps are as follows:
step 201, setting the media company as a system role, super administrator identity, and having all the permissions of reading and analyzing data on the chain. The advertiser is set as a business role, and has reading authority for data such as advertisement playing amount, user click amount, user purchase, collection, sharing rate and the like. The non-tamper-ability of the blockchain system guarantees trust between the media companies and the advertisers.
And step 202, acquiring the configuration information of the CA and the CSP according to the configuration file, and creating an instance of the trusted alliance chain Client according to the configuration information, wherein the instance of the trusted alliance chain Client is an entrance of the whole operation.
Step 203, acquiring registrant information registry (namely system role information) responsible for submitting user data, if the registrant information registry does not exist, initializing the registrant user, and acquiring a registration certificate and private information of the registrant.
And step 204, creating an instance of the trusted alliance chain CAClient according to the configuration information and the organization information.
Step 205, generating a registration request according to the user information to be registered, and submitting the registration request to the trusted alliance chain CAClient.
At step 206, the Registrar Registrar submits a post request to access the trusted federation chain CA.
And step 207, the trusted alliance chain CA requests to generate a password Secret registered by the user, and finally, the Secret is returned to the application program to finish the step of registering the user information.
And step 208, the application program calls an enter interface of the trusted alliance chain CAClient by using the applied user information and the returned registration password.
Step 209, the trusted alliance chain CAClient generates a private key and a certificate Signing request csr (certificate Signing request), and invokes an enroll interface provided by the trusted alliance chain to generate a registration certificate.
Step 210, returning the generated registration certificate and private key to the application.
Step 211, saving the user information to the KeyValueStore.
The invention uses the bidirectional authentication technology based on the elliptic curve algorithm to carry out identity authentication. Mutual authentication is performed between the system role and the business role, namely, mutual authentication is required before data transaction between the media company and the advertiser. After the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through CA, the certificate Cert of CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity, r, assigned to user C for CAC∈ [2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Denotes CA Pair eCInteger pair of signature generation, mCIndicating other information related to C (e.g., certificate issuance time and validity period). The public key pair of CA is (r)sc,Qsc),QscAnd n and the user identity are public information. P denotes a point on the elliptic curve E (a, b), and n is the order of P. Encryption (K, M), Decryption (K, M) represents encrypting and decrypting the message M with the key K, and h () represents a one-way function. The goal of authentication is that two parties create a secret shared session key by authenticating to each other. The bidirectional authentication process is shown in fig. 3, and includes the following steps:
step 301, C: generating a random number r1E (2, n-2), calculating Q1=r1P, and sends message M to user U1=Q1
C→U:Q1
Step 302, after receiving the message, U generates a random number r2E (2, n-2), calculating Q2=r2P,Q1b=rbQ1, Q12=r2Q1Then with Q12Generating ciphertext C as a shared KeyU=Encryption(Q12,CertU||T1), T1For the time stamp of the ciphertext message, message M2=Q2||CU||h(Q12||Q1b||CertU||T1) Sending the data to a user C;
U→C:Q2||CU||h(Q12||Q1u||CertU||T1)。
step 303, C receives message M2Then, calculate Q12=r1Q2Obtaining the certificate and the timestamp Cert of Uu||T1=Decryption(Y12,CU) Verification of CertUThe effectiveness of (c). If the verification is successful, continuing the next step, otherwise, requiring the message M to be retransmitted2
Step 304, calculate Q1u=r1QuVerification h (Q)12||Q1u||CertU||T1) And a time stamp T1The effectiveness of (c). If successful, proceed to the next step, otherwise reinitiate the session.
Step 305, C calculates Q2c=rcQ2And CC=Encryption(Y12,CertC||T2) Generating a message M3= CC||h(Q12||Q2c||CertC||T2) And sending the data to the U.
C→U:CC||h(Q12||Q2c||CertC||T2)。
Step 306, receiving message M by U3Thereafter, first CertC||T2=Decryption(Y12,CC) Decrypting to obtain CertCAnd T2Then verify CertCAnd h (Q)12||Q2c||CertC||T2) And T2The effectiveness of (c). If the verification is successful, the two devices finish mutual verification and key agreement to generate a shared session keyKey Q12Otherwise, the session is reinitiated.
The advertisement data uplink in the invention is a process for an advertiser to add advertisement content into a trusted alliance chain. The trusted alliance chain links data through a multi-level encryption and consensus mechanism, once the advertisement data is linked, the advertisement data cannot be revoked or tampered, the advertisement data is completely disclosed, transparent and traceable in the trusted alliance chain, and the trust problem among advertisers, media companies and consumers is solved, as shown in fig. 4, the steps are as follows:
in step 401, an advertiser provides advertisement data, which may be text, pictures, video, or a combination thereof.
Step 402, performing Hash calculation on the advertisement information to obtain a Hash value h (w), and converting the obtained bit string into an integer e.
Step 403, digitally signing the hash function value h of the advertisement data information by using a public key encryption technology for digital signature, assuming that the used elliptic curve parameter is D ═ p, a, b, G, n, h, and the corresponding key pair is (k, Q), where Q is a public key and k is a private key, and digitally signing according to the following steps:
firstly, generating a random number d, wherein d is more than or equal to 1 and less than or equal to n-1;
② calculating dG ═ x1,y1) Conversion of x1 to an integer
Figure RE-GDA0002160184880000111
Calculating
Figure RE-GDA0002160184880000112
If r is 0, then the random number is recalculated, otherwise d-1mod n;
D is calculated-1(e+kr)mod n;
Then (r, s) is the signature of the advertisement information.
In step 404, the block file manager maintains a currentFileWriter of the currently written block file, where the data written to the block file includes two parts, one is the block size and the other is the block data. The block size and block data written in the block file are both serialized. If the size of the current block file exceeds the set value after the block size is written and the block file is serialized, the block file is written into the next block file. And creating a new block check point information and storing the new block check point information in the database.
The media company feeds the analyzed data information back to the advertiser, namely, a transaction is initiated on the chain code channel which is instantiated, and the transaction content is user behavior data and a big data analysis result. The whole process from initiating a call transaction to final accounting on the chain code channel already instantiated is shown in fig. 5, and the steps are as follows:
in step 501, the blockchain client sends a transaction request to all previously agreed endorsement nodes (endorsing peers). It is noted that the choice of endorsing peers is limited, and is not freely chosen among all endorsing peers, and is determined by both the ChainCode and the Endorsement Policy defined by the ChainCode.
Step 502, after receiving the above information, the endorsement node verifies its signature with the public key, executes the intelligent contract (which is a simulated transaction and cannot be written into the ledger) and feeds back the execution result to the client. Verifying the signature (r, s) of the advertisement data according to the elliptic curve parameter D ═ p, a, b, G, n, h) and the public key Q of the advertisement data, as follows:
firstly, verifying that r and s are integers in an interval [1, n-1 ];
② calculating w ═ s-1mod n;
③ calculating u1New mod n and u2=rw mod n;
Calculating X ═ u1G+u2G;
If X is 0, rejecting the signature, otherwise converting the X coordinate X1 of X into an integer
Figure RE-GDA0002160184880000121
And calculate
Figure RE-GDA0002160184880000122
Sixthly, if and only if v is r, the signature is verified.
Step 503, the sorting stage receives the signed endorsement transactions, determines the sequence and number of the transactions, packs the sorted transactions into blocks, and broadcasts the blocks to the Peer nodes for verification. Typically, the ordering service does not output a single transaction as a block from an efficiency perspective, but rather packages multiple transactions into a block.
In step 504, the consensus node broadcasts the result to all nodes (peers). And then each node updates the self account book.
The node in the invention is a communication subject of the block chain and is a logic concept. Multiple different types of nodes may run on the same physical server. There are various types of nodes: client, Peer node, sequencing service node and CA node.
In the present invention, a client or application represents an entity operated by an end user that must be connected to a Peer node or a sequencing service node to communicate with a blockchain network. The client side submits a Transaction Proposal (Transaction progress) to an endorsement node (Endorser), and when enough endorsements are collected, the Transaction is broadcasted to a sequencing service for sequencing to generate a block.
All Peer nodes in the invention are accounting nodes (Committer) which are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book. Some nodes will perform transactions and sign endorsements to the results, acting as endorsement nodes. The endorsement node is a dynamic role and is bound with a specific chain code. Each chain code sets an endorsement policy during instantiation, and specifies which nodes are valid after the endorsement of the transaction. And the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and is a common accounting node at other times, and the endorsement node is only responsible for verifying the transaction and accounting.
In the invention, a sequencing service node (Orderer) receives transactions containing endorsement signatures, sequences the unpacked transactions to generate blocks, and broadcasts the blocks to a Peer node. The ordering service provides an atomic broadcast (AtomicBroadcast) that ensures that nodes on the same chain receive the same message and have the same logical order.
The multi-channel (MultiChannel) of the sequencing service realizes multi-chain data isolation, ensures that only Peer nodes of the same chain can access data on the chain, and protects the privacy of user data.
Has the advantages that: the invention relates to a block chain-based trusted advertisement data management system, which solves the problems of low data reliability, insufficient openness and transparency, possibility of being manually operated, easiness in tampering, difficulty in privacy protection, difficulty in guaranteeing data safety and the like. The invention applies the block chain technology to the media industry, combines the big data technology, performs identity management and authorization to advertisers and media companies based on a credible alliance chain, performs bidirectional authentication on the user identity, links the advertisement data, and performs transaction and analysis on the user data. A safe and reliable advertisement data management method is provided for media companies, advertisers and consumers. Thereby helping advertisers to achieve advertisement content quality optimization and audience analysis. The user data is utilized to the maximum extent, and the advertiser is helped to realize the advantages of miniaturization, individuation, instantaneity and flexibility of the advertisement.
The above description is only a preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (1)

1. A credible advertisement data management system based on a block chain is characterized in that: media company classifies the identity of the users of the credible alliance chain and authorizes the data use authority according to the classification; the media company is set to be in a system role, and all the authorities for reading and analyzing the data on the credible alliance chain are provided; the advertiser sets a business role and has read permission on the advertisement playing amount, the user clicking amount and the user purchasing, collecting and sharing rate data; tamper-resistant streaming media for trusted alliance chainTrust between the company and the advertiser is guaranteed; the system role acquires configuration information of a certificate and an encryption service providing program according to the configuration file, and creates an instance of a trusted alliance link client according to the configuration information, wherein the trusted alliance link client instance is an entrance of the operation of the whole block chain-based trusted advertisement data management system; then obtaining the information of a registrant responsible for submitting user data, if the information does not exist, initializing the information of the registrant, and obtaining a registration certificate and private information of the registrant; creating an instance of the client of the certificate according to the configuration information and the organization information; generating a registration request according to user information needing to be registered, and submitting the registration request to a certificate client; the registrar would submit a certificate request to access the trusted federation chain; generating a password for user registration through a certificate request of the trusted alliance chain, and finally returning the password to an application program to finish the step of user information registration; the application program calls a calling interface of a client of the certificate by using the applied user information and the returned password registered by the user; a client of the certificate generates a private key and a certificate signing request, and calls a calling interface provided by a trusted alliance chain to generate a registration certificate; returning the generated registration certificate and the private key to the application program; saving user information into a KeyValueStore device of the distributed data storage system; the bidirectional authentication technology based on the elliptic curve algorithm is used for the identity authentication between the media company and the advertiser; the mutual authentication is carried out between the system role and the service role, namely the mutual authentication is required to be carried out before the data transaction between the media company and the advertiser; after the media company C and the advertiser U of the two parties of the transaction acquire the digital certificate through the certificate, the certificate Cert of the CC={IDC,QC,(dC,sC),eC,mCTherein ID ofCIdentity assigned to C for the certificate, rC∈[2,n-2]Is the private key of C, QCIs the public key of C, QC=rCP,eCIs represented by h (ID)C||QC||mC) Generated abstract, (d)C,sC) Express certificate pair eCInteger pair of signature generation, mCInformation indicating the issuance time and validity period of the certificate related to C; the public key pair of the certificate is (r)c,Qc);QcN and the user identity are public information; p represents a point on the elliptic curve E (a, b), n being the order of P; encryption (K, M) indicates the Encryption of the message M with the key K, Decryption (K, M) indicates the Decryption of the message M with the key K, h (ID)C||QC||mC) Representing a one-way function; the aim of identity authentication is that two parties create a secret shared session key through mutual authentication; the bidirectional authentication process comprises the following steps: c: generating a random number r1E (2, n-2), calculating Q1=r1P, and sends message M to user U1=Q1;C→U:Q1(ii) a After receiving the message, U generates a random number r2E (2, n-2), calculating Q2=r2P,Q1c=rcQ1,Q12=r2Q1Then with Q12As a shared key, and certificate Cert of UUGenerating a ciphertext CU=Encryption(Q12,CertU||T1),T1For time stamping of ciphertext messages, message M2=Q2||CU||h(Q12||Q1c||CertU||T1) Sending the data to a user C; i.e., U → C: Q2||CU||h(Q12||Q1c||CertU||T1) (ii) a C receiving message M2Then, calculate Q12=r1Q2Obtaining certificate Cert of UUAnd a timestamp CertU||T1=Decryption(Q12,CU) Verification of CertUThe effectiveness of (a); if the verification is successful, continuing the next step, otherwise, requiring the message M to be retransmitted2(ii) a Calculating Q1u=r1QuVerification h (Q)12||Q1u||CertU||T1) And a time stamp T1The effectiveness of (a); if successful, the next step is carried out, otherwise, the session is reinitiated; c calculating Q2c=rcQ2And CC=Encryption(Q12,CertC||T2) Generating a message M3=CC||h(Q12||Q2c||CertC||T2) And sending the data to U; namely, it isC→U:CC||h(Q12||Q2c||CertC||T2) (ii) a U receives message M3Thereafter, first CertC||T2=Decryption(Q12,CC) Decrypting to obtain certificate Cert of CCAnd T2Then verify CertCAnd h (Q)12||Q2c||CertC||T2) And T2The effectiveness of (a); if the verification is successful, the two complete mutual verification and key agreement to generate a shared session key, otherwise, the session is initiated again; the process that the advertiser adds the advertisement content into the credible alliance chain is the uplink of the advertisement data; the credible alliance chain links the advertisement data through a multi-stage encryption and consensus mechanism, the advertisement data cannot be revoked and tampered once the advertisement data is linked, the advertisement data is completely disclosed, transparent and traceable in the credible alliance chain, the trust problem between an advertiser and a media company and a consumer is solved, and the steps are as follows: the advertiser provides advertisement data, wherein the advertisement data are characters, pictures, videos or a combination of the characters, the pictures and the videos; performing Hash calculation on the information of the advertisement data to obtain a Hash value H (W) and converting the obtained bit string into an integer; digitally signing the hash function value h of the advertisement data information by using a public key encryption technology of digital signature, thereby obtaining the signature of the advertisement data information; the block file manager maintains data written into the block file currently, wherein the data written into the block file comprises two parts, one part is the block size, and the other part is the block data; the block size and the block data written in the block file are processed by serialization; if the size of the current block file exceeds a set value after the block size is written and serialized, the current block file is written into the next block file; creating a new block check point information and storing the new block check point information in a database; the media company feeds back the analyzed advertisement data information to the advertiser, namely, a transaction is initiated on the chain code channel instantiated, the transaction content is user behavior data and a big data analysis result, the block chain client sends a transaction request to all endorsement nodes appointed before on the chain code channel instantiated, and the endorsement nodes firstly receive the advertisement data informationThe signature is verified by using a public key, the endorsement node executes an intelligent contract, the executed result is a simulated transaction and cannot be written into an account book, and the executed result is fed back to the client; verifying the signature of the advertisement data according to the elliptic curve parameters and the public key of the advertisement data until the signature passes the verification; in the sequencing stage, the transactions signed with endorsements are received, the sequence and the number of the transactions are determined, the sequenced transactions are packaged into a block and are broadcast to a peer node for verification, and in the aspect of efficiency, the sequencing service does not output a single transaction as a block but packages a plurality of transactions into a block; the consensus node broadcasts the result to all peer nodes, and then each peer node updates the self account book; a plurality of different types of nodes may run on the same physical server, there being a plurality of types of nodes: a client, a peer node, a sequencing service node, and a certificate node; the client or the application program represents an entity operated by an end user, and is required to be connected to a certain peer node or a sequencing service node to communicate with the trusted alliance chain, the client submits a transaction proposal to the endorsement node, and when enough endorsements are collected, the transaction is broadcasted to the sequencing service to be sequenced, so that a block is generated; all peer nodes are accounting nodes and are responsible for verifying transactions in the sequencing service node block and maintaining state data and copies of the account book; some peer nodes will perform transactions and sign endorsements on the results, acting as endorsement nodes; the endorsement node is a dynamic role and is bound with a specific chain code; each chain code sets an endorsement strategy when being instantiated, and specifies which nodes are valid after the endorsement of the transaction; the endorsement node is only when the application program initiates a transaction endorsement request to the endorsement node, and the common accounting node is only responsible for verifying the transaction and accounting at other times; the identity management is realized through a channel technology, and the channel technology is used for limiting the information propagation range; the channel technology is associated with a certain account book, and the channel technology definitely determines which organizations and members thereof concern the transaction; each transaction is associated with a unique channel; the system provides the function of creating channel, and provides the user with the channel joining and exitingThe function of (a); the identity authentication is carried out in a trusted alliance chain by using a bidirectional authentication technology based on an elliptic curve algorithm; the identity authentication aims to protect data transmission between a system role and a service role, and the correct encrypted transmission of data contents on a correct channel is ensured through the authentication of the identities of the two parties; the authentication protocol can ensure that the legal users can authenticate each other and generate a common content encryption seed for the two users; the advertiser has advertising data, which may be text or pictures or video or a combination thereof; the media company encrypts the advertisement data of the advertiser and verifies the data by using the relevant principle of cryptography; the Hash hash algorithm is used for converting an input with any length into an output with fixed length and consisting of letters and numbers, and the output is irreversible and can not be tampered; the asymmetric encryption part uses a private key to prove the ownership of the node and is realized through digital signature; the block is formally put into a block chain for storage through a consensus algorithm, and meanwhile, all network nodes represent the block to be accepted, namely, the random hash value of the block is regarded as the latest block hash value, and the manufacture of a new block is prolonged on the basis of a trusted alliance chain; thereby ensuring data consistency and transparent safety; the media company puts the advertisement to the user, and the user decrypts the advertisement data through various terminals to generate user behaviors of watching or clicking, purchasing or collecting or sharing; user behavior is stored in a trusted alliance chain in real time as data; the media company analyzes massive user behavior data on a trusted alliance chain through a big data technology, so that accurate advertisement putting and personalized recommendation are achieved, and massive user behavior data are effectively utilized; the media company feeds back the analyzed massive data information of the user behavior to the advertiser, namely, a transaction is initiated on the instantiated chain code channel, and the transaction content is the user behavior data and the big data analysis result.
CN201910270691.XA 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain Expired - Fee Related CN110309634B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910270691.XA CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910270691.XA CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Publications (2)

Publication Number Publication Date
CN110309634A CN110309634A (en) 2019-10-08
CN110309634B true CN110309634B (en) 2020-12-22

Family

ID=68074399

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910270691.XA Expired - Fee Related CN110309634B (en) 2019-04-04 2019-04-04 Credible advertisement data management system based on block chain

Country Status (1)

Country Link
CN (1) CN110309634B (en)

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11139977B2 (en) * 2018-02-07 2021-10-05 Verasity Limited System and method for proof of view via blockchain
CN110807209B (en) * 2019-11-01 2021-04-30 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110852886B (en) * 2019-11-21 2022-04-22 西南石油大学 Second-hand transaction and article borrowing and returning system based on alliance chain
CN111028064B (en) * 2019-12-17 2023-07-21 中国科学院计算技术研究所 Block chain-based internet of things platform transaction system, method and equipment
CN111241196B (en) * 2020-01-03 2021-07-13 腾讯科技(深圳)有限公司 Advertisement frequency control method and system
CN113379416A (en) * 2020-03-10 2021-09-10 本无链科技(深圳)有限公司 Method and system for realizing similar biological groups with consistent memory but different behaviors
CN111383378B (en) * 2020-03-11 2021-07-30 合肥鼎方信息科技有限公司 Access control identification system information node interconnection method based on block chain architecture
CN111160997A (en) * 2020-04-02 2020-05-15 支付宝(杭州)信息技术有限公司 Advertisement supervision method and device based on block chain and advertisement delivery system
CN111476548B (en) * 2020-04-16 2024-01-23 山东师范大学 Title review method and system based on blockchain
CN111741062B (en) * 2020-05-12 2023-04-18 湖南半岛医疗科技有限公司 Electronic equipment local area management system based on block chain technology
CN112039866B (en) * 2020-08-26 2022-05-27 北京计算机技术及应用研究所 Design method of block chain-based data trusted configuration management system
CN112235368B (en) * 2020-09-29 2022-12-13 中国人民武装警察部队工程大学 RFID equipment management system based on alliance block chain
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN113468551A (en) * 2021-05-31 2021-10-01 南京邮电大学 Domestic intelligent electric meter data storage system and method based on alliance block chain
CN113538042B (en) * 2021-06-30 2023-09-22 杭州电子科技大学 Block chain-based online advertisement click fraud monitoring and preventing method
CN113779095B (en) * 2021-11-11 2022-04-01 江苏荣泽信息科技股份有限公司 Job title rating electronic certificate supervision system based on block chain technology
CN114301608A (en) * 2021-12-31 2022-04-08 鄢华中 Block chain decentralized multi-element cross consensus signature lock and access control construction method
CN114528356B (en) * 2022-01-26 2022-11-11 广东南方新视界传媒科技有限公司 Multi-dimensional media data fusion management system and method based on block chain
CN115840787B (en) * 2023-02-20 2023-05-02 塔比星信息技术(深圳)有限公司 Block chain-based supply chain data sharing method, device, equipment and medium
CN116151828A (en) * 2023-04-20 2023-05-23 成都航空职业技术学院 Block chain-based carbon footprint tracking method, system, equipment and medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255661A (en) * 2018-09-27 2019-01-22 王国俊 A kind of business datum authentication method and system based on block chain
CN109325368A (en) * 2018-09-11 2019-02-12 云量区块链(深圳)有限公司 City outdoor scene management method, electronic equipment and storage medium based on block chain

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355442A (en) * 2016-08-30 2017-01-25 杭州启冠网络技术有限公司 Online precise advertising method and system based on big data driving
US10997620B2 (en) * 2017-09-18 2021-05-04 Vertigo Studios, Llc Blockchain-enabled system for controlling advertiser access to personal user data
CN108764966A (en) * 2018-04-28 2018-11-06 深圳市元征科技股份有限公司 Advertisement placement method, block chain node device and relevant device
CN108985818B (en) * 2018-06-15 2022-05-31 微梦创科网络科技(中国)有限公司 Advertisement delivery system and method based on block chain technology
CN109086622A (en) * 2018-07-25 2018-12-25 深圳慧安康科技有限公司 A kind of implementation method and node device of intelligence community
CN109325331B (en) * 2018-09-13 2022-05-20 北京航空航天大学 Big data acquisition transaction system based on block chain and trusted computing platform
CN109308638A (en) * 2018-09-30 2019-02-05 北京奇虎科技有限公司 Ad trafficking system, server and readable storage medium storing program for executing based on block chain
CN109523302A (en) * 2018-10-19 2019-03-26 中链科技有限公司 Advertisement sending method, device and calculating equipment based on block chain
CN109493088A (en) * 2018-10-31 2019-03-19 周更新 A kind of commodity traceability system that on-line off-line MULTIPLE DYNAMIC is anti-fake

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109325368A (en) * 2018-09-11 2019-02-12 云量区块链(深圳)有限公司 City outdoor scene management method, electronic equipment and storage medium based on block chain
CN109255661A (en) * 2018-09-27 2019-01-22 王国俊 A kind of business datum authentication method and system based on block chain

Also Published As

Publication number Publication date
CN110309634A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
CN110309634B (en) Credible advertisement data management system based on block chain
US11842317B2 (en) Blockchain-based authentication and authorization
CN108781161B (en) Method for controlling and distributing blockchain implementation of digital content
CN113595971B (en) Block chain-based distributed data security sharing method, system and computer readable medium
Kou Payment technologies for E-commerce
CN109840771A (en) A kind of block chain intimacy protection system and its method based on homomorphic cryptography
US20020162003A1 (en) System and method for providing trusted browser verification
EP2850772A1 (en) Secure transaction object creation, propagation and invocation
CN110022217A (en) A kind of credible deposit system of advertisement media business datum based on block chain
CN109491965A (en) The storage method and its network and electronic equipment of purchase sale of electricity contract
Camenisch et al. Concepts and languages for privacy-preserving attribute-based authentication
Win et al. Privacy enabled digital rights management without trusted third party assumption
CN112839046A (en) Traceable anonymous crowdsourcing method and system based on block chain
CN113468570A (en) Private data sharing method based on intelligent contract
US20110243328A1 (en) Data providing process based on an ibpe scheme
CN111049806B (en) Joint authority control method and device, electronic equipment and storage medium
Onieva et al. Secure multi-party non-repudiation protocols and applications
CN107403310A (en) Payment system and its method of payment under quantum Metropolitan Area Network (MAN)
CN115883214A (en) Electronic medical data sharing system and method based on alliance chain and CP-ABE
Persiano et al. A secure and private system for subscription-based remote services
CN113673893A (en) Retired power battery management method and system
CN112927026A (en) Coupon processing method and device, electronic equipment and computer storage medium
CN115883102B (en) Cross-domain identity authentication method and system based on identity credibility and electronic equipment
EP2689552B1 (en) Non-hierarchical infrastructure for managing twin-security keys of physical persons or of elements (igcp/pki).
CN116862508A (en) Machine learning model transaction system based on alliance blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201222