CN110796464A - Monitoring data anti-cheating method and verification method, device, storage medium and terminal - Google Patents

Monitoring data anti-cheating method and verification method, device, storage medium and terminal Download PDF

Info

Publication number
CN110796464A
CN110796464A CN201810877494.XA CN201810877494A CN110796464A CN 110796464 A CN110796464 A CN 110796464A CN 201810877494 A CN201810877494 A CN 201810877494A CN 110796464 A CN110796464 A CN 110796464A
Authority
CN
China
Prior art keywords
data
mapping
compared
storage path
monitoring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810877494.XA
Other languages
Chinese (zh)
Inventor
汤奇峰
李元鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jingzan Rongxuan Technology Co Ltd
Original Assignee
Shanghai Jingzan Rongxuan Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Jingzan Rongxuan Technology Co Ltd filed Critical Shanghai Jingzan Rongxuan Technology Co Ltd
Priority to CN201810877494.XA priority Critical patent/CN110796464A/en
Publication of CN110796464A publication Critical patent/CN110796464A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0277Online advertisement

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A monitoring data anti-cheating method, a verification device, a storage medium and a terminal are provided, wherein the monitoring data anti-cheating method comprises the following steps: acquiring monitoring data, storing the monitoring data, and recording a storage path; calculating a mapping value of the monitoring data to obtain mapping data to be compared, wherein the mapping value corresponds to the monitoring data one to one; sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid. The technical scheme of the invention can effectively reduce the cheating action on the monitoring data in the data transaction.

Description

Monitoring data anti-cheating method and verification method, device, storage medium and terminal
Technical Field
The invention relates to the technical field of internet data transaction, in particular to a monitoring data anti-cheating method, a monitoring data anti-cheating verification device, a storage medium and a terminal.
Background
In the exhibition content delivery industry, such as the digital advertising industry or the news push industry, transactions between content publishers and exhibition resource providers are often involved. Taking advertisement delivery as an example, since digital advertisement delivery involves virtual commodity transaction, in the process of advertisement data transaction, there may be cheating behaviors for advertisement sellers for their own interests, such as: false traffic, click cheating, tampering with advertising data, and the like.
Monitoring of ad impressions is desirable because advertisers do not fully guarantee that the seller of the ad with whom they are transacting is fully honest. In the prior art, there are two monitoring methods, the first is that the advertiser monitors the displayed advertisement by itself, which further increases the human or material cost of the advertiser and causes cost waste. In addition, since the monitoring expertise of advertisers is often poor, omission is also easily caused. The second is that the advertiser asks other data monitoring parties to monitor the advertisement data transaction instead. However, there are cases where advertising vendors are bribered by illicit means for their own benefit, and cheat with the monitoring parties. This further leads to a flooding of advertising cheating activities and even to a trust crisis in the digital advertising trading industry.
Disclosure of Invention
The technical problem solved by the invention is how to effectively reduce the cheating action on the monitored data in the data transaction.
In order to solve the above technical problem, an embodiment of the present invention provides a method for monitoring data to prevent cheating, including the following steps: acquiring monitoring data, storing the monitoring data, and recording a storage path; calculating a mapping value of the monitoring data to obtain mapping data to be compared, wherein the mapping value corresponds to the monitoring data one to one; sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid.
Optionally, the verifying the mapping data to be compared by the data demander includes: calculating a mapping value of the stored monitoring data to obtain first reference mapping data; and comparing the first reference mapping data with the mapping data to be compared, and determining that the mapping data to be compared is valid when the first reference mapping data and the mapping data to be compared are consistent.
Optionally, calculating the mapping value of the monitoring data includes: segmenting the monitoring data to obtain a plurality of data blocks; and calculating the mapping value of each data block, wherein the mapping data to be compared comprises the mapping values of the data blocks.
Optionally, the monitoring data anti-cheating method further includes: when the storage path and the mapping data to be compared are sent to a data demand side, the storage path and the mapping data to be compared are sent to a block chain; when the verification result shows that the mapping data to be compared is valid, writing the storage path and the mapping data to be compared into a block chain comprises: and when the verification result shows that the mapping data to be compared is valid, notifying a block chain to write the previously sent storage path and the mapping data to be compared.
Optionally, the mapping value is a hash value.
In order to solve the above technical problem, an embodiment of the present invention further provides a data verification method based on the foregoing monitoring data anti-cheating method, including the following steps: sending a data verification request to search a storage path written in the block chain and mapping data to be compared; searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data; and comparing the second reference mapping data with the mapping data to be compared, and determining that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are consistent.
In order to solve the above technical problem, an embodiment of the present invention further provides a data verification method based on the foregoing monitoring data anti-cheating method, including the following steps: receiving a data verification request from the data demand party, and performing identity authentication; when the identity authentication passes, searching a storage path written in the block chain and mapping data to be compared; searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data; and comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid and informing the data demand side.
In order to solve the above technical problem, an embodiment of the present invention further provides a device for monitoring data to prevent cheating, including: the data acquisition module is suitable for acquiring monitoring data, storing the monitoring data and recording a storage path; the first calculation module is suitable for calculating a mapping value of the monitoring data to obtain mapping data to be compared, and the mapping value corresponds to the monitoring data one to one; the first data sending module is suitable for sending the storage path and the mapping data to be compared to a data demanding party, so that the data demanding party searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and the first data confirmation module is suitable for receiving a verification result from the data demander, and writing the storage path and the mapping data to be compared into the block chain when the verification result shows that the mapping data to be compared is valid.
In order to solve the above technical problem, an embodiment of the present invention further provides a monitoring data verification apparatus, including: the second data sending module is suitable for sending a data verification request so as to search a storage path written in the block chain and mapping data to be compared; the second calculation module is suitable for searching the stored monitoring data according to the storage path and calculating the mapping value of the stored monitoring data to obtain second reference mapping data; and the second data confirmation module is suitable for comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid.
In order to solve the above technical problem, an embodiment of the present invention further provides a monitoring data verification apparatus, including: the data receiving module is suitable for receiving a data verification request from a data demand party and performing identity authentication; the data searching module is suitable for searching a storage path written in the block chain and mapping data to be compared when the identity authentication passes; the third calculation module is suitable for searching the stored monitoring data according to the storage path and calculating the mapping value of the stored monitoring data to obtain second reference mapping data; and the auxiliary analysis module is suitable for comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid and informing the data demand side.
In order to solve the above technical problem, an embodiment of the present invention further provides a storage medium, where computer instructions are stored, and the computer instructions execute the steps of the monitoring data anti-cheating method or the data verification method when running.
In order to solve the above technical problem, an embodiment of the present invention further provides a terminal, including a memory and a processor, where the memory stores a computer instruction capable of being executed on the processor, and the processor executes the steps of the monitoring data anti-cheating method or the data verification method when executing the computer instruction.
Compared with the prior art, the technical scheme of the embodiment of the invention has the following beneficial effects:
according to the technical scheme, monitoring data are obtained, stored and a storage path is recorded; calculating a mapping value of the monitoring data to obtain mapping data to be compared, and then sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid. Therefore, the difficulty of data tampering is increased, and the cheating behavior on the monitored data in data transaction can be effectively reduced.
Furthermore, the technical scheme of the invention includes that the monitoring data is segmented to obtain a plurality of data blocks, then the mapping value of each data block is calculated, and the mapping data to be compared comprises the mapping value of each data block. Therefore, a large amount of data can be conveniently stored and the mapping value can be conveniently calculated, and confusion is prevented when the large amount of data is processed.
Furthermore, the technical scheme of the invention adopts the hash value as the mapping value of the monitoring data, and because the hash value has strong collision resistance and tamper resistance, the possibility of data tampering can be further reduced by using the hash value to identify the data.
Further, the technical scheme of the invention searches the storage path written in the block chain and the mapping data to be compared by sending a data verification request; searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data; and then comparing the second reference mapping data with the mapping data to be compared, and determining that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are consistent. Therefore, the data demand party can verify whether the stored data is falsified at any time, and timely evaluate whether the data transaction object and the monitoring party can trust according to the verification result.
Drawings
FIG. 1 is a flow chart of a method for monitoring data to prevent cheating according to an embodiment of the present invention;
FIG. 2 is a flowchart of one embodiment of step S13 of FIG. 1;
FIG. 3 is a flow chart of a monitoring data verification method according to an embodiment of the present invention;
FIG. 4 is a flow chart of another monitoring data validation method according to an embodiment of the present invention;
FIG. 5 is a data flow diagram of another monitoring data validation method of FIG. 4;
FIG. 6 is a schematic structural diagram of a monitoring data anti-cheating device according to an embodiment of the present invention;
FIG. 7 is a schematic structural diagram of a monitoring data verification apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of another monitoring data verification apparatus according to an embodiment of the present invention.
Detailed Description
Those skilled in the art understand that in the prior art, there are two monitoring methods in digital advertisement trading, the first is that the advertiser monitors the displayed advertisement by itself, which further increases the labor or material cost of the advertiser, resulting in cost waste. In addition, because the speciality of the supervision of the advertiser is poor, the supervision vulnerability is easily caused. The second is that the advertiser asks other data monitoring parties to supervise the advertisement data transaction instead. However, there are cases where advertising vendors utilize illicit means to bribery supervisors for their own benefit, and do cheating with the supervisors. This further leads to a flooding of advertising cheating activities and even to a trust crisis in the digital advertising trading industry.
According to the technical scheme, monitoring data are obtained, stored and a storage path is recorded; calculating a mapping value of the monitoring data to obtain mapping data to be compared, and then sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid. Therefore, the difficulty of data tampering is increased, and the cheating behavior on the monitored data in data transaction can be effectively reduced.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in detail below. It is to be understood that the described embodiments are merely exemplary of the invention, and not restrictive of the full scope of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, belong to the scope of the present invention.
Fig. 1 is a flowchart of a method for monitoring data to prevent cheating according to an embodiment of the present invention.
Referring to fig. 1, the monitoring data anti-cheating method may include the steps of:
step S11: acquiring monitoring data, storing the monitoring data, and recording a storage path;
step S12: calculating a mapping value of the monitoring data to obtain mapping data to be compared, wherein the mapping value corresponds to the monitoring data one to one;
step S13: sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared;
step S14: and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid.
Specifically, the monitoring data may be data generated in a transaction between the data demand party and the data supply party recorded by the monitoring party or data related to the transaction. The monitoring party can monitor the transaction process of the data demand party and the data supply party according to the indication of the data demand party and verify whether the transaction result is the result required by the data demand party. Taking the advertisement putting process as an example, the data demander is the advertisement buyer, and the data provides the position advertisement seller. For example: the advertisement purchaser purchases ten times of webpage display opportunities, the monitoring party monitors whether the advertisement seller performs ten times of webpage display on the advertisement put by the purchaser according to the requirement of the purchaser, and records relevant data corresponding to the ten times of webpage display. The monitoring data may be the number of times the advertisement is shown, the number of times the advertisement is clicked, etc.
In addition, the data demander may also be a content pusher, a financial product purchaser, an insurance purchaser, or the like. Accordingly, the data provider may be a push resource provider, a financial product provider, or an insurance provider, etc., which is an object that the monitoring party needs to monitor.
When the step S11 is implemented, the monitoring data may be stored in a database, a distributed file system, or a file server.
More specifically, the distributed File system may use Fastdfs or hdfs (hadoop DistributedFile system), the File server may use a secure File transfer protocol (sftp) (secure File transfer protocol) type server, and the database may use an open-source database redis (remote directorary server).
In the specific implementation of step S12, the monitoring party may calculate a mapping value of the monitoring data by using a function to obtain mapping data to be compared, where the mapping value corresponds to the monitoring data one to one.
Further, for a large amount of monitoring data, the monitoring party may also segment the monitoring data to obtain a plurality of data blocks; and calculating the mapping value of each data block, wherein the mapping data to be compared can comprise the mapping values of the data blocks.
Specifically, the data may be segmented by rows or by columns to obtain the data blocks.
Further, the mapping value may be a Hash (Hash) value, and the data may be converted into the Hash value through a Hash (Hash) function calculation.
Further, each data block may be computationally transformed into a corresponding Hash value by a Hash function, which may serve as an identifier of the data block and which is not tampered with.
Specifically, a Hash (Hash) function may map data in a data block to fixed length data, which is a Hash value of the data block. The hash values of any two different data blocks are different. In addition, for a data block, as long as few bits in the data block are tampered with, the hash value corresponding to the data block may also change greatly.
When step S13 is specifically implemented, the monitoring party may send the storage path and the mapping data to be compared to the data demanding party in a wired or wireless communication manner, so that the data demanding party searches the stored monitoring data according to the storage path and verifies the mapping data to be compared.
Specifically, the data requiring party can verify the mapping data to be compared through the steps shown in fig. 2.
Step S21: calculating a mapping value of the stored monitoring data to obtain first reference mapping data;
step S22: and comparing the first reference mapping data with the mapping data to be compared, and determining that the mapping data to be compared is valid when the first reference mapping data and the mapping data to be compared are consistent.
In the specific implementation of step S21, the data demander may calculate the mapping values in the same way as the monitoring party calculates the mapping values, that is, the data demander may also calculate the mapping values using the same function as the monitoring party to obtain the first reference mapping data.
Next, when step S22 is specifically implemented, the data demander may compare the first reference mapping data with the mapping data to be compared, and if the first reference mapping data and the mapping data to be compared are consistent, it indicates that the mapping data to be compared is valid; if the two are not consistent, the mapping data to be compared is invalid.
Referring to fig. 1, after the mapping data to be compared is verified to be valid, the data demander sends the verification result that the mapping data to be compared is valid to the monitoring party, and then performs step S14, and after receiving the verification result from the data demander, the monitoring party writes the storage path and the mapping data to be compared into the block chain.
Specifically, the blockchain can utilize the advantage of decentralized distributed ledger to ensure that the written storage path and the mapping data to be compared are not tampered.
In order to save the time for data transmission and mapping data verification, the monitoring data anti-cheating method can further comprise the following steps: when the storage path and the mapping data to be compared are sent to a data demand side, the storage path and the mapping data to be compared are sent to a block chain; and when the verification result shows that the mapping data to be compared is valid, notifying a block chain to write the previously sent storage path and the mapping data to be compared.
Specifically, the monitoring party may send the storage path and the mapping data to be compared to the data demand party and the block chain in a wired or wireless communication manner. The monitoring party can also inform a block chain to write the previously sent storage path and the mapping data to be compared in a wired or wireless mode.
According to the technical scheme, monitoring data are obtained, stored and a storage path is recorded; calculating a mapping value of the monitoring data to obtain mapping data to be compared, and then sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared; and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid. Therefore, the difficulty of data tampering is increased, and the cheating behavior on the monitored data in data transaction can be effectively reduced. According to the technical scheme, the monitoring data can be segmented to obtain a plurality of data blocks, then the mapping value of each data block is calculated, and the mapping data to be compared comprises the mapping value of each data block. Therefore, a large amount of data can be conveniently stored and the mapping value can be conveniently calculated, and confusion is prevented when the large amount of data is processed.
After the storage path and the mapping data to be compared are written into the block chain, the data demander can also initiate data verification to the block chain according to the requirement of the data demander.
Further, the embodiment of the invention also discloses a data verification method based on the monitoring data anti-cheating method. Referring to FIG. 3, in one non-limiting embodiment, the data verification method may include the following steps:
step S31: sending a data verification request to search a storage path written in the block chain and mapping data to be compared;
step S32: searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data;
step S33: and comparing the second reference mapping data with the mapping data to be compared, and determining that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are consistent.
In step S31, the data demander may send a data verification request to the blockchain, and the blockchain returns the previously written storage path and the mapping data to be compared to the data demander in response to the data verification request.
Further, the communication between the data demander and the blockchain may be in a wired or wireless manner, which is not limited in this embodiment of the present invention.
Next, when specifically executing step S32, the data demander may calculate the mapping values in the same way as the monitoring party calculates the mapping values, that is, the data demander may also calculate the mapping values using the same function as the monitoring party to obtain the second reference mapping data.
Then, the data demander may compare the second reference mapping data with the mapping data to be compared, and if the two are consistent, may determine that the stored monitoring data is valid; if the two are not consistent, the stored monitoring data can be determined to be tampered after the storage path and the mapping data to be compared are written in the block chain, and at the moment, the data demand party can evaluate the data transaction object and whether the monitoring party can trust or not in time according to the verification result.
Further, the embodiment of the invention also discloses a data verification method based on the monitoring data anti-cheating method. Please refer to fig. 4 and 5, wherein fig. 4 is a flowchart of another monitoring data verification method, and fig. 5 is a data flow diagram of the another monitoring data verification method in fig. 4.
In another non-limiting embodiment, the data demander may entrust the auxiliary analyst to assist in completing the data verification, and the auxiliary analyst may serve the data demander and may complete the corresponding action according to the data demander's instruction.
The data verification method in fig. 4 may include the steps of:
step S41: receiving a data verification request from the data demand party, and performing identity authentication;
step S42: when the identity authentication passes, searching a storage path written in the block chain and mapping data to be compared;
step S43: searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data;
step S44: and comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid and informing the data demand side.
Next, another monitoring data verification method will be specifically described with reference to fig. 4 and 5.
In the specific implementation of step S41, the auxiliary analyst may receive a data verification request from the data demander, and perform identity authentication. More specifically, the identity authentication can be completed by an identity authentication platform subordinate to the data demand party.
After the identity authentication is passed, step S42 is executed, the auxiliary analysis party sends a data query request to the blockchain, and in response to the data query request, the blockchain returns the storage path and the mapping data to be compared to the auxiliary analysis party.
Next, step S43 is executed, where the auxiliary analysis party may search the stored monitoring data by using the storage path according to the authorization of the blockchain, and calculate a mapping value of the stored monitoring data to obtain second reference mapping data.
Further, the auxiliary analyzer may calculate the mapping value in the same manner as the monitoring party calculates the mapping value, that is, the auxiliary analyzer may also calculate the mapping value using the same function as the monitoring party to obtain the second reference mapping data.
Next, step S44 is executed, where the auxiliary analyzer may compare the second reference mapping data with the mapping data to be compared, determine that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are identical, and notify the data demander of an analysis result that the stored monitoring data is valid; and when the monitoring data and the monitoring data are inconsistent, determining that the stored monitoring data are tampered, and informing a data demand side of an analysis result that the monitoring data are tampered.
According to the technical scheme, a data verification request is sent, and a data demand party or a delegated auxiliary analysis party searches a storage path written in the block chain and mapping data to be compared; searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data; and then comparing the second reference mapping data with the mapping data to be compared, and determining that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are consistent. Therefore, the data demand party can verify whether the stored data is falsified at any time, and timely evaluate whether the data transaction object and the monitoring party can trust according to the verification result.
In one particular application scenario, for example: the advertisement purchaser purchases ten advertisement presentation opportunities from the seller, the ten advertisement presentations being 50 minutes in time, and the number of times that should be presented in every ten minutes is agreed upon.
The monitoring party is responsible for monitoring whether the advertisement seller displays the advertisement delivered by the buyer according to the requirement of the advertisement buyer and recording relevant data corresponding to the ten-time webpage display.
Further, the monitoring party can segment the related data within 50 minutes according to time intervals to obtain a plurality of data blocks. For example: the corresponding data in every ten minutes is divided into 5 data blocks, which are respectively marked as data block A1, data block A2, data block A3, data block A4 and data block A5. And storing the 5 data blocks and recording the storage path.
Next, the monitoring party calculates Hash values corresponding to 5 data blocks respectively by using a Hash (Hash) function as mapping data to be compared, and records the Hash values as a1, a2, a3, a4 and a5 respectively. The monitoring party sends the storage path sum a1, a2, a3, a4, a5 to the data demand party.
The data demander finds the stored data blocks A1-A5 according to the storage path, calculates hash values of the data blocks as first reference mapping data, records the hash values as a11, a21, a31, a41 and a51, compares whether a11, a21, a31, a41 and a51 are respectively consistent with a1, a2, A3, a4 and a5, and if the hash values are consistent, confirms that the mapping data to be compared are valid.
And then, the data demand party can send the effective information of the mapping data to be compared to the monitoring party, and the monitoring party writes the storage path and the mapping data to be compared into the block chain.
After a certain time interval, the data demand side can initiate data verification according to the business needs of the data demand side, and can entrust the auxiliary analysis side to verify whether the data corresponding to the data block A3 and the data block a4 are tampered.
The auxiliary analyst may receive a data verification request from the data demander and perform identity authentication thereof by the data demander. After the identity authentication is passed, the auxiliary analysis party can obtain the authority to search the storage path written in the block chain and the mapping data a3 and a4 to be compared.
Next, the auxiliary analyst may search the stored data chunk A3 and the data chunk a4 according to the storage path, and calculate mapping values corresponding to the data chunk A3 and the data chunk a4 to obtain second reference mapping data a32 and a 42.
The auxiliary analyst may compare whether a32 is consistent with A3 and whether a42 is consistent with a4, and if so, may determine that the data in data block A3 and data block a4 have not been tampered, that is, the data in 20 th-30 th minute and 30 th-40 th minute have not been tampered.
Next, the auxiliary analyst may notify the data demander that the data in data chunk A3 and data chunk a4 has not been tampered with, and end the delegation.
Further, the embodiment of the invention also discloses a data anti-cheating device 50.
As shown in fig. 6, the data anti-cheating device 50 may include: the data acquisition module 501 is adapted to acquire monitoring data, store the monitoring data, and record a storage path; the first calculating module 503 is adapted to calculate a mapping value of the monitoring data to obtain mapping data to be compared, where the mapping value corresponds to the monitoring data one to one; the first data sending module 504 is adapted to send the storage path and the mapping data to be compared to a data demander, so that the data demander searches stored monitoring data according to the storage path and verifies the mapping data to be compared; the first data confirmation module 505 is adapted to receive a verification result from the data demander, and write the storage path and the mapping data to be compared into the block chain when the verification result indicates that the mapping data to be compared is valid.
Further, the data acquisition module 501 may comprise a storage sub-module 502 adapted to store the monitoring data.
Further, the embodiment of the present invention also provides a monitoring data verification apparatus 60.
As shown in fig. 7, the monitoring data verification apparatus 60 may include: the second data sending module 601 is adapted to send a data verification request to search a storage path written in the block chain and mapping data to be compared; a second calculating module 602, adapted to search the stored monitoring data according to the storage path, and calculate a mapping value of the stored monitoring data to obtain second reference mapping data; a second data confirmation module 603 adapted to compare the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determine that the stored monitoring data is valid.
Further, another monitoring data verification device 60 is provided in the embodiment of the present invention.
As shown in fig. 8, the monitoring data verification apparatus 60 may include: the data receiving module 701 is suitable for receiving a data verification request from a data demand party and performing identity authentication; the data searching module 702 is adapted to search a storage path written in the block chain and mapping data to be compared when the identity authentication passes; a third calculating module 703, adapted to search the stored monitoring data according to the storage path, and calculate a mapping value of the stored monitoring data to obtain second reference mapping data; and the auxiliary analysis module 704 is suitable for comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data is valid and informing the data demand side.
For more information on the operation principle and operation mode of the monitoring data anti-cheating device 50 or the verification device 60 shown in fig. 6-8, reference may be made to fig. 1-5 and the related description thereof, which are not repeated herein.
Further, the embodiment of the present invention further discloses a storage medium, on which a computer instruction is stored, and when the computer instruction runs, the technical solution of the monitoring data anti-cheating method in the embodiment shown in fig. 1-2 or the data verification method in the embodiment shown in fig. 3-5 is executed. Preferably, the storage medium may include a computer-readable storage medium such as a non-volatile (non-volatile) memory or a non-transitory (non-transient) memory. The storage medium may include ROM, RAM, magnetic or optical disks, etc.
Further, an embodiment of the present invention further discloses a terminal, including a memory and a processor, where the memory stores a computer instruction capable of being executed on the processor, and the processor executes the technical solution of the monitoring data anti-cheating method in the embodiment shown in fig. 1-2 or the data verification method in the embodiment shown in fig. 3-5 when executing the computer instruction.
Although the present invention is disclosed above, the present invention is not limited thereto. Various changes and modifications may be effected therein by one skilled in the art without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (12)

1. A method for monitoring data to prevent cheating, comprising:
acquiring monitoring data, storing the monitoring data, and recording a storage path;
calculating a mapping value of the monitoring data to obtain mapping data to be compared, wherein the mapping value corresponds to the monitoring data one to one;
sending the storage path and the mapping data to be compared to a data demand side, so that the data demand side searches the stored monitoring data according to the storage path and verifies the mapping data to be compared;
and receiving a verification result from the data demand side, and writing the storage path and the mapping data to be compared into a block chain when the verification result shows that the mapping data to be compared is valid.
2. The monitored data anti-cheating method according to claim 1, wherein the verification of the mapping data to be compared by the data demander comprises:
calculating a mapping value of the stored monitoring data to obtain first reference mapping data;
and comparing the first reference mapping data with the mapping data to be compared, and determining that the mapping data to be compared is valid when the first reference mapping data and the mapping data to be compared are consistent.
3. The surveillance data anti-cheating method of claim 1, wherein calculating a mapping value for the surveillance data comprises:
segmenting the monitoring data to obtain a plurality of data blocks;
and calculating the mapping value of each data block, wherein the mapping data to be compared comprises the mapping values of the data blocks.
4. The monitored data anti-cheating method according to claim 1, further comprising:
when the storage path and the mapping data to be compared are sent to a data demand side, the storage path and the mapping data to be compared are sent to a block chain;
when the verification result shows that the mapping data to be compared is valid, writing the storage path and the mapping data to be compared into a block chain comprises: and when the verification result shows that the mapping data to be compared is valid, notifying a block chain to write the previously sent storage path and the mapping data to be compared.
5. The surveillance data anti-cheating method according to any of claims 1-4, wherein the mapping value is a hash value.
6. A data verification method based on the monitoring data anti-cheating method of any one of claims 1 to 5, comprising:
sending a data verification request to search a storage path written in the block chain and mapping data to be compared;
searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data;
and comparing the second reference mapping data with the mapping data to be compared, and determining that the stored monitoring data is valid when the second reference mapping data and the mapping data to be compared are consistent.
7. A data verification method based on the monitoring data anti-cheating method of any one of claims 1 to 5, comprising:
receiving a data verification request from the data demand party, and performing identity authentication;
when the identity authentication passes, searching a storage path written in the block chain and mapping data to be compared;
searching for stored monitoring data according to the storage path, and calculating a mapping value of the stored monitoring data to obtain second reference mapping data;
and comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid and informing the data demand side.
8. A monitoring data anti-cheating device, comprising:
the data acquisition module is suitable for acquiring monitoring data, storing the monitoring data and recording a storage path;
the first calculation module is suitable for calculating a mapping value of the monitoring data to obtain mapping data to be compared, and the mapping value corresponds to the monitoring data one to one;
the first data sending module is suitable for sending the storage path and the mapping data to be compared to a data demanding party, so that the data demanding party searches the stored monitoring data according to the storage path and verifies the mapping data to be compared;
and the first data confirmation module is suitable for receiving a verification result from the data demander, and writing the storage path and the mapping data to be compared into the block chain when the verification result shows that the mapping data to be compared is valid.
9. A monitoring data verification apparatus, comprising:
the second data sending module is suitable for sending a data verification request so as to search a storage path written in the block chain and mapping data to be compared;
the second calculation module is suitable for searching the stored monitoring data according to the storage path and calculating the mapping value of the stored monitoring data to obtain second reference mapping data;
and the second data confirmation module is suitable for comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid.
10. A monitoring data verification apparatus, comprising:
the data receiving module is suitable for receiving a data verification request from a data demand party and performing identity authentication;
the data searching module is suitable for searching a storage path written in the block chain and mapping data to be compared when the identity authentication passes;
the third calculation module is suitable for searching the stored monitoring data according to the storage path and calculating the mapping value of the stored monitoring data to obtain second reference mapping data;
and the auxiliary analysis module is suitable for comparing the second reference mapping data with the mapping data to be compared, and when the second reference mapping data and the mapping data to be compared are consistent, determining that the stored monitoring data are valid and informing the data demand side.
11. A storage medium having stored thereon computer instructions, wherein the computer instructions are operable to perform the steps of the monitored data anti-cheating method according to any one of claims 1-5 or the data verification method based on the monitored data anti-cheating method according to claim 6 or 7.
12. A terminal comprising a memory and a processor, the memory having stored thereon computer instructions capable of being executed on the processor, wherein the processor executes the computer instructions to execute the steps of the monitored data anti-cheating method according to any one of claims 1 to 5 or the data verification method based on the monitored data anti-cheating method according to claim 6 or 7.
CN201810877494.XA 2018-08-03 2018-08-03 Monitoring data anti-cheating method and verification method, device, storage medium and terminal Pending CN110796464A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810877494.XA CN110796464A (en) 2018-08-03 2018-08-03 Monitoring data anti-cheating method and verification method, device, storage medium and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810877494.XA CN110796464A (en) 2018-08-03 2018-08-03 Monitoring data anti-cheating method and verification method, device, storage medium and terminal

Publications (1)

Publication Number Publication Date
CN110796464A true CN110796464A (en) 2020-02-14

Family

ID=69425998

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810877494.XA Pending CN110796464A (en) 2018-08-03 2018-08-03 Monitoring data anti-cheating method and verification method, device, storage medium and terminal

Country Status (1)

Country Link
CN (1) CN110796464A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581079A (en) * 2020-04-16 2020-08-25 微梦创科网络科技(中国)有限公司 Third-party advertisement monitoring method and system based on asynchronous verification

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653944A (en) * 2015-12-25 2016-06-08 北京奇虎科技有限公司 Detection method and device of cheating behaviors
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107239953A (en) * 2017-06-20 2017-10-10 无锡井通网络科技有限公司 Fast data store method and system based on block chain
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105653944A (en) * 2015-12-25 2016-06-08 北京奇虎科技有限公司 Detection method and device of cheating behaviors
CN107169125A (en) * 2017-05-31 2017-09-15 北京小米移动软件有限公司 The dispensing statistics acquisition methods and device of multimedia resource
CN107239953A (en) * 2017-06-20 2017-10-10 无锡井通网络科技有限公司 Fast data store method and system based on block chain
CN107391298A (en) * 2017-07-06 2017-11-24 上海策链信息科技有限公司 State data memory detection method, device and computer-readable recording medium
CN107994991A (en) * 2017-10-31 2018-05-04 深圳市轱辘车联数据技术有限公司 A kind of data processing method, data processing server and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111581079A (en) * 2020-04-16 2020-08-25 微梦创科网络科技(中国)有限公司 Third-party advertisement monitoring method and system based on asynchronous verification

Similar Documents

Publication Publication Date Title
US11810167B2 (en) Item level data aggregation
AU2019232865B2 (en) Systems and methods for detecting and scoring anomalies
US10282755B2 (en) Systems, methods, and media for mobile advertising conversion attribution
US20190244243A1 (en) Scalable decentralized digital and programmatic advertising analytics system
US20180225605A1 (en) Risk assessment and alert system
US10970263B1 (en) Computer system and method of initiative analysis using outlier identification
US20180182042A1 (en) Systems and methods for estimating transaction rates
US20230128174A1 (en) Proportional markers on a map
US10318546B2 (en) System and method for test data management
US20160034898A1 (en) Systems and Methods for Identifying Merchants that Pose Transaction Risks to Purchasing Entities
US20170316455A1 (en) System and Method for Counting Advertisement Impressions
EP4174747A1 (en) Blockchain-based transaction processing method, client, processing terminal and system
US10348844B2 (en) Method and device for monitoring push effect of push information
US20150332291A1 (en) Systems and methods for identifying customers using payments data
US20150262222A1 (en) Method and system for calculating advertisement conversion rates
US20150262226A1 (en) Method and system for identifying fraudulent and unconverted clicks in web advertisements
US20160092895A1 (en) Method and system for identifying merchant market shares based on purchase data
TW201732672A (en) Published information processing method and device, and information publishing system
US20160292753A1 (en) Systems and Methods for Generating Donations From Payment Account Transactions
CN110796464A (en) Monitoring data anti-cheating method and verification method, device, storage medium and terminal
US20130203443A1 (en) Providing information about a location to a mobile device based on the location of the mobile device
US20180165738A1 (en) Enhanced View System
CN111754259A (en) Satisfaction evaluation task obtaining method, device, system, equipment and storage medium
US20200193468A1 (en) Blockchain for ads and coupons
US20150348209A1 (en) Method and system for linking forensic data with purchase behavior

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200214

WD01 Invention patent application deemed withdrawn after publication