CN113538042A - Block chain-based online advertisement click fraud monitoring and preventing method - Google Patents
Block chain-based online advertisement click fraud monitoring and preventing method Download PDFInfo
- Publication number
- CN113538042A CN113538042A CN202110736776.XA CN202110736776A CN113538042A CN 113538042 A CN113538042 A CN 113538042A CN 202110736776 A CN202110736776 A CN 202110736776A CN 113538042 A CN113538042 A CN 113538042A
- Authority
- CN
- China
- Prior art keywords
- advertisement
- pub
- ade
- user
- identity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000012544 monitoring process Methods 0.000 title claims abstract description 46
- 230000008520 organization Effects 0.000 claims abstract description 15
- 108091008193 PUBs Proteins 0.000 claims description 153
- 230000002265 prevention Effects 0.000 claims description 37
- 238000007726 management method Methods 0.000 claims description 14
- 238000011084 recovery Methods 0.000 claims description 6
- 238000012545 processing Methods 0.000 claims description 5
- 238000012795 verification Methods 0.000 claims description 5
- 241000287196 Asthenes Species 0.000 claims description 3
- 230000003993 interaction Effects 0.000 claims description 3
- 238000013507 mapping Methods 0.000 claims description 3
- 238000012163 sequencing technique Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 5
- 238000001514 detection method Methods 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0248—Avoiding fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0241—Advertisements
- G06Q30/0251—Targeted advertisements
- G06Q30/0252—Targeted advertisements based on events or environment, e.g. weather or festivals
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Game Theory and Decision Science (AREA)
- Environmental & Geological Engineering (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses an online advertisement click fraud monitoring and preventing method based on a block chain. The entity involved in the invention comprises an identity management authority, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain. Firstly, an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertiser initialize to generate parameters required by a system and public and private key information required by the system; then, the user UiThe advertisement publisher PUB and the advertiser ADE register with an identity management organization IMA; then, the advertisement publisher and the site publish relevant advertisements to the target users to attract the users to click; finally, the advertisement publisher PUB, the advertiser ADE, and the site MS are all able to monitor and prevent click fraud. The invention ensures the authenticity of the click rate in the settlement process of the online advertising system by utilizing the characteristic that the block chain can not be tampered.
Description
Technical Field
The invention relates to the technical field of fraud monitoring and prevention, in particular to an online advertisement click fraud monitoring and prevention method based on a block chain.
Background
Consumers generate revenue for advertising providers by clicking on online advertisements, but subsequent click fraud by criminals poses a threat to this advertising system.
In this scenario, although some online advertisement click fraud monitoring and prevention techniques have been proposed; however, the proposed method is either vulnerable to adversarial attacks or difficult to cope with potential click fraud. Therefore, this section proposes a block-chain-based online advertisement click fraud detection and prevention method BCFDPS (a block-based click front detection and prediction scheme for online advertisement adaptation).
Disclosure of Invention
The invention mainly aims at the defects of the existing click fraud monitoring and preventing technology and provides an online advertisement click fraud monitoring and preventing method based on a block chain.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the invention comprises seven components of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain, and the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertisement main to generate parameters required by the system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity licenses to prove authenticity and legality of the user; the user also obtains the signature of the identity related information after the process, and the advertisement publisher also obtains the identity related attribute information; after a certain period, the identity management organization writes an entity registration result into the entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertisement publishing;
3-1, an advertisement publisher publishes online advertisements: when a user accesses an advertisement network, encrypted user identity information needs to be sent to a website in the advertisement network, and then the website forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes online advertisements which bid successfully in the advertisement network managed by the website; after a certain period, the website in the advertisement network writes the advertisement publishing result into the access behavior block chain: storing the advertisement identification, the encrypted bidding cost, the site identification and the advertisement publisher identification information into an access behavior block chain in a transaction form;
3-2, clicking the online advertisement by the user: the user clicks the interested advertisement in the advertisement network, the user embeds the identity permission to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the site in the advertisement network writes the advertisement forwarding result into the access behavior block chain: performing hash processing on the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information, and then storing a hash result into an access behavior block chain in a transaction form;
step 4, click fraud monitoring and prevention;
4-1, advertisement publisher monitoring and click fraud prevention: the advertisement publisher decrypts the advertisement click information by using the private key of the advertisement publisher, and then verifies the advertisement click information by combining the identity permission of the advertisement publisher and the identity permission in the click information so as to complete monitoring and prevention of malicious click fraud;
4-2, advertiser monitoring and click fraud prevention: the advertisement master-slave advertisement publisher obtains part of the invariable parameters in the advertisement click information, decrypts the part of the parameters by using a private key of the advertisement master-slave advertisement publisher, and then verifies the parameters by combining the identity permission of the advertisement master-slave advertisement publisher and the identity permission in the decryption result so as to complete monitoring and prevention of malicious click fraud;
4-3, site monitoring and click fraud prevention: site monitoring and click fraud prevention in advertising networks; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain to complete monitoring and prevention of malicious click fraud.
Further, the system initialization in step 1 is the initialization of an identity management authority and an entity identity block chain EIB, and provides parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide a public and private key pair for registration, and the method is specifically realized as follows:
1-1, initializing an identity management authority: the identity management organization IMA firstly generates a public and private key PK of the identity management organization IMAIMA/SKIMAThe public key PK is published in the systemIMA(ii) a IMA defines an attribute set S { { PUB }, { Hat { [ Clouuthes { [ Tunts { [ Tu ] Shoes [ Tu ] Food } … } according to an advertisement type of an advertisement publisher PUB agent; wherein Hat, Clouthes, Pants, Shoes and Food are attribute labels;
1-2. entity identity Block chains EIB for all users UiThe public parameter PP of the system is initialized by the advertisement publisher PUB and the advertiser ADE, and the method is specifically realized as follows:
EIB selects a large prime number p and an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; then IMA selects a bilinear group G with a generator G and two random numbersThe following parameters were calculated: h is gβ,f=g1 /β,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm; when the IMA joins the EIB network, the EIB sends the public parameter PP to the IMA; finally, the EIB generates a shared secret key X and distributes the X to each IMA by dividing the X into a plurality of sub-secrets by using a Shamir (t, n) threshold secret sharing algorithm;
1-3. user UiThe advertisement publisher PUB and the advertiser ADE respectively generate their public and private keys, which are respectively recorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE。
Further, user UiThe advertisement publisher PUB and the advertiser ADE can all register with the identity management organization IMA in advance and can carry out the next step after obtaining the identity identification and the identity permission, wherein UiAnd further obtaining a signature of the identity related information, and obtaining attribute information related to the identity by the advertisement publisher PUB, wherein the specific implementation is as follows:
2-1. user UiRegistering with IMA;
the first step is as follows: IMA Collection to user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code library according to the digitized information of the fingerprint, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity UID of; after that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signatureThen IMA will informationIs sent to user UiIn the browser plug-in of (1), where PP is a common parameter generated by EIB initialization, h (IL)U) Representation pair ILUThe hash process is carried out to carry out the hash process,representing IMA versus content h (IL)U) I MUID use privacyKey SKIMAThe signature is carried out and the signature is carried out,representing U versus UID ILU||USigThe | PP uses the public key PKUEncrypting;
the second step is that: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, and is used for accountability of the user U when click fraud occursi;
2-2, registering the advertisement publisher PUB with the IMA;
the first step is as follows: IMA generates an identity PUBID and an attribute set S { { PUB }, { Bat { [ U ] FOod [ U ] … } } for the PUB according to the advertisement types proxied by the PUB, then IMAs recover a shared key X by using a Shamir (t, n) threshold secret sharing algorithm, and then the identity permission IL of the advertisement publisher PUB is calculatedPUBPUBID h (x) P, then IMA will informationSending the advertisement to the advertisement publisher PUB;
the second step is that: IMA hashes the information PUBID, records the result h (PUBID) in the EIB block chain, and monitors the PUB of the advertisement publisher when click fraud occurs;
2-3, registering an ADE to the IMA;
the first step is as follows: IMA generates identity ADEID for ADE according to advertisement type required to be released by ADE, then IMA recovers shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates identity permission IL of advertiser ADEADEADEID.h (X) P, and then IMA will transmit the informationSending to the advertiser ADE; the second step is that: IMA records information h (adeid) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
Further, in step 3-1, the advertisement publisher publishes the online advertisement, which is specifically realized as follows:
the first step is as follows: advertisement publisher PUB and advertiser just wideAdvertising matters to reach consensus and agree on the ID of the advertisementad;
The second step is that: user UiAccess web pages of site MS while UiThe browser plug-in uses an encryption CP-ABE scheme based on the attribute of the ciphertext policy to sign USigAfter being encrypted, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically, the method comprises the following steps: user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, and the signature U is encrypted using the common parameters PP and CP-ABE encryption schemeSigObtaining a ciphertextls,C=hs,Wherein, ts1Is a user UiEncrypted signature USigA time stamp of the time,is a random number, h ═ gβ,pyIs a polynomial, p, represented by each node y in the access tree Ty(0) Is the value represented by the node y, att (y) is the attribute owned by a leaf node y in the access tree T;c is secret information needing to be transmitted in the ciphertext CT; cy、C'yIs the auxiliary information when decrypting the CT; after obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, and then the MS forwards the CT to different PUBs;
the third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP Wherein,is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { [ U ] } of the PUB satisfies the user U … } }iAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed asThen PUB gets the plaintext Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT;
the fourth step: MS shows advertisement in its advertisement network and simultaneously puts PUBID, ADEID, PKPUBAnd PKADEEmbedded in a display frame of the advertisement;
the fifth step: after a certain period, the MS sends the advertisement bidding information according to the periodAnd advertisement identification IDadClassifying and sequencing to obtain the advertisement publishing result of Where fe indicates that the PUB needs to be the user UiThe cost paid to the MS by a single click of the advertisement; finally, the MS records the advertisement publishing result into the access behavior block chain ABB in a transaction form.
Further, step 3-2 user UiClicking the online advertisement specifically realizes the following steps:
the first step is as follows: user UiThe browser obtains PUBID, ADEID and PK from the advertisement display framePUBAnd PKADEInformation, then calculates the PUB authenticator And ADE authenticatorThen, user UiTime stamp ts embedded at this time2Computing a PUB Security credential And ADE Security Authenticator The plug-in then connects user UiClick information for advertisement Sending to the MS;
the second step is that: MS Forwarding { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID};
The third step: after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and is recorded in an access behavior block chain ABB in a transaction form.
Further, step 4 includes PUB monitoring and fraud prevention, ADE monitoring and fraud prevention and MS monitoring and fraud prevention.
Further, the PUB monitors and prevents click fraud, and is specifically implemented as follows:
the first step is as follows: PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks;
the second step is that: PUB uses IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
The third step: PUB verification equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature USigThe number of different MUIDs in the period is marked as n, and the value represents the effective advertisement click quantity in a certain period, which means that the PUB only needs to pay for the n advertisement clicks in the period; thereafter, PUB records the ad access behavior { ID ] of the MUID in its local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadAccess behavior of (2);
the fourth step: after a certain period, the PUB follows the period and IDadSorting, user UiAdvertisement access result of { n | | IDad||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
Further, the ADE monitoring and click fraud prevention are specifically realized as follows:
the first step is as follows: ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe getIt is compared with the result recorded by MS in the access behavior block chain ABBComparing to avoid cheating fe by PUB;
the second step is that: ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2Timeliness to avoid replay attacks;
the third step: similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator ADE verification equation AuS'ADE=AuSADEIf it is true, if the equation isImmediately, ADE counts all signatures USigThe number of different MUIDs in the set is marked as n';
the fourth step: the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares if n is true, and if the equation is true, the ADE pays the PUB for the n clicks.
Further, the MS monitors and prevents click fraud, which is specifically implemented as follows:
MS communicates with PUB to obtain AuS in all click information MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbolAfter that, the MS reads from the local databaseAnd compare equation SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.
The invention has the following beneficial effects:
in the registration, advertisement release and click fraud detection and prevention processes, the entity registration results are all recorded in the entity identity block chain; the relevant results of advertisement release, forwarding and access are recorded in the access behavior block chain, and the authenticity of click rate in the settlement process of the online advertisement system is ensured by utilizing the characteristic that the block chain cannot be tampered.
Drawings
FIG. 1 is a block chain based on-line advertisement click fraud monitoring and prevention system model diagram;
FIG. 2 is a flow diagram of a protocol for publishing an advertisement to a target user and enticing the user to click on the advertisement;
FIG. 3 is a flow diagram of an advertisement publisher click fraud detection and prevention protocol;
FIG. 4 is a flow diagram of an advertiser click fraud prevention protocol.
Detailed Description
The invention is further illustrated by the following figures and examples.
As shown in fig. 1, an online advertisement click fraud monitoring and prevention method based on a block chain includes an identity management authority, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain component, and each component has the following interaction steps:
1, initializing an identity management authority and an entity identity block chain in the process, and providing parameters for system entity registration; secondly, the user, the advertisement publisher and the advertiser initialize to generate a public and private key pair for registration,
1-1 identity management organization initialization: the identity management organization IMA firstly generates a public and private key PK of the identity management organization IMAIMA/SKIMAThe public key PK is published in the systemIMA(ii) a IMA defines attribute sets S { { PUB }, { Hat { [ Clouuthes { [ U ] Pants { [ U ] Shoes { [ U ] Food } … } according to the advertisement types of the PUB agents.
1-2 entity identity block chains EIB are all users UiAdvertisement publisher PUB and advertiser ADE initialise system public parameters PP. The concrete implementation is as follows:
EIB is a large prime number p selected as an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; next, IMA selects a bilinear group G with generator G and two random numbersThe following parameters were calculated: h is gβ,f=g1/β,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm. When IMA joins the EIB network, EIB sends this common parameter PP to IMA. Finally, the EIB generates a shared key X and distributes X to each IMA in divided sub-secrets using the Shamir (t, n) threshold secret sharing algorithm.
1-3 user UiThe advertisement publisher PUB and the advertiser ADE respectively generate the public and private keys thereofRecorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE。
2 the user, the advertisement publisher and the advertiser register the user with the identity management authority in advance, the advertisement publisher and the advertiser register with the identity management authority in advance and obtain the identity and the identity licensor to carry out the next step, wherein the user also obtains the signature of the information related to the identity of the user, the advertisement publisher also obtains the attribute information related to the identity of the advertisement publisher,
2-1 user UiAnd registering with IMA. First, IMA collects user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code base according to the digitized information, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity of UID. After that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signature Then IMA will informationIs sent to user UiThe browser plug-in of (1), wherein PP is a common parameter generated by EIB initialization.
Secondly, IMA records information h (UID) in EIB block chain for asking user U when click fraud occursi。
The 2-2 ad publisher PUB registers with IMA. Firstly, IMA generates an identity PUBID and an attribute set S { { PUB }, { Hat @ Food @ … } } for the PUB according to the advertisement type proxied by the PUB, and then uses Shamir (t, n) threshold secret sharing algorithm to recover a shared key X, and then counts upCalculating identity permissions IL for Ad publishers PUBsPUBPUBID h (x) P, then IMA will information And sending the parameters to the advertisement publisher PUB, wherein PP is a common parameter generated by EIB initialization.
In a second step, IMA records information h (PUBID) in the EIB blockchain, which is used to supervise the advertisement publisher PUB when click fraud occurs.
The 2-3 advertiser ADE registers with IMA. Firstly, IMA generates an identity ADEID for ADE according to the advertisement type required to be released by ADE, then IMA recovers a shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates an identity permission IL of an advertiser ADEADEADEID.h (X) P, and then IMA will transmit the informationSent to the advertiser ADE, where PP is the common parameter generated by EIB initialization.
Second, IMA records information h (adeid) in the EIB blockchain to audit the advertiser ADE when click fraud occurs.
3 advertisement publisher and site publish advertisement to target user to attract user click on the advertisement: the advertisement publisher PUB publishes the advertisement to the target user U through the advertisement bidding process of the site MSiTo obtain a higher reward; thereafter, the user UiClick on an advertisement of interest to it; the protocol flow for publishing an advertisement to a target user and attracting the user to click on the advertisement is shown in fig. 2.
3-1 the advertisement publisher publishes the online advertisement. First, the advertisement publisher PUB and the advertiser agree on the advertisement placement matter, and the identity of the agreed advertisement is IDad。
Second, user UiAccess to the web page of the station MS, while UiThe browser plug-in uses ciphertext-policy attribute-based encryption (CP-AB)E) Scheme will sign USigEncrypted and sent to the MS, which then forwards it to the PUB. In particular, user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, and the signature U is encrypted using the common parameters PP and CP-ABE schemeSigObtaining a ciphertext C=hs,Wherein, ts1Is a user UiEncrypted signature USigThe time stamp of the time of day,is a random number, pyIs a polynomial represented by each node y in the access tree T, and att (y) is an attribute owned by a leaf node y in the access tree T. After obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, which then forwards it to a different PUB.
The third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP Wherein,is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { [ U ] } of the PUB satisfies the user U … } }iAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed asThen PUB gets the plaintext Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT.
Fourthly, the MS displays the advertisement in the advertisement network and simultaneously displays PUBID, ADEID and PKPUBAnd PKADEEmbedded in the display frame of the advertisement.
Fifthly, after a certain period, the MS enables the advertisement bidding information to be according to the period and the advertisement identification IDadClassifying and sequencing to obtain the advertisement publishing result of Wherein fe is PUB and needs to be user UiThe MS pays the MS for a single advertisement click, and finally, the MS records the advertisement distribution result in the access behavior blockchain ABB in the form of a transaction.
3-2 user UiClick on the online advertisement. First, user UiThe browser obtains PUBID, ADEID and PK from the display framePUBAnd PKADEInformation, then calculates the PUB authenticatorAnd ADE authenticator Then, UiTime stamp ts embedded at this time2Computing a PUB Security credentialAnd ADE Security Authenticator The plug-in then connects user UiClick information for advertisement And sending to the MS.
Second, MS forwards { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID}。
Step three, after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and recorded in the access behavior block chain ABB.
4-click fraud monitoring and prevention: after the advertisement is displayed, the PUB, ADE and MS need to monitor and prevent click fraud;
4-1PUB click fraud monitoring and prevention, a PUB click fraud monitoring and prevention protocol flow diagram is shown in FIG. 3. In a first step, the PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks.
Second, the PUB uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
Third, PUB verifies equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature UsigThe number of different MUIDs is marked as n, the value represents the effective advertisement click quantity in a certain period, which means that in the period, the PUB only needs to pay for the n advertisement clicks, and then the PUB records the advertisement access behavior { ID of the MUID in a local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadThe access behavior of.
Fourthly, after a certain period, the PUB follows the period and the IDadSorting, user UiAdvertisement access result of { n | | IDda||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
4-2ADE monitoring and fraud prevention on click fraud, a flow chart for the ADE monitoring and fraud prevention on click fraud protocol is shown in fig. 4. First, ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe getIt is compared with the result recorded by MS in the access behavior block chain ABBThe comparison is used for avoiding the price cheating of the PUB.
Second, ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2To avoid replay attacks.
Third, similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator ADE verification equation AuS'ADE=AuSADEIf true, ADE counts all signatures U if the equation is trueSigThe number of MUIDs in (1) is denoted as n'.
And fourthly, the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares whether n is equal to n' or not, and if the equation is satisfied, the ADE pays the PUB fee for the n clicks.
4-3MS monitors and prevents click fraud. MS communicates with PUB to acquire AuS in all MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbolAfter that, the MS reads from the local databaseAnd compareEquality SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.
Claims (9)
1. An online advertisement click fraud monitoring and preventing method based on a block chain is characterized by comprising seven components of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain, wherein the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertisement main to generate parameters required by the system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity licenses to prove authenticity and legality of the user; the user also obtains the signature of the identity related information after the process, and the advertisement publisher also obtains the identity related attribute information; after a certain period, the identity management organization writes an entity registration result into the entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertisement publishing;
3-1, an advertisement publisher publishes online advertisements: when a user accesses an advertisement network, encrypted user identity information needs to be sent to a website in the advertisement network, and then the website forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes online advertisements which bid successfully in the advertisement network managed by the website; after a certain period, the website in the advertisement network writes the advertisement publishing result into the access behavior block chain: storing the advertisement identification, the encrypted bidding cost, the site identification and the advertisement publisher identification information into an access behavior block chain in a transaction form;
3-2, clicking the online advertisement by the user: the user clicks the interested advertisement in the advertisement network, the user embeds the identity permission to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the site in the advertisement network writes the advertisement forwarding result into the access behavior block chain: performing hash processing on the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information, and then storing a hash result into an access behavior block chain in a transaction form;
step 4, click fraud monitoring and prevention;
4-1, advertisement publisher monitoring and click fraud prevention: the advertisement publisher decrypts the advertisement click information by using the private key of the advertisement publisher, and then verifies the advertisement click information by combining the identity permission of the advertisement publisher and the identity permission in the click information so as to complete monitoring and prevention of malicious click fraud;
4-2, advertiser monitoring and click fraud prevention: the advertisement master-slave advertisement publisher obtains part of the invariable parameters in the advertisement click information, decrypts the part of the parameters by using a private key of the advertisement master-slave advertisement publisher, and then verifies the parameters by combining the identity permission of the advertisement master-slave advertisement publisher and the identity permission in the decryption result so as to complete monitoring and prevention of malicious click fraud;
4-3, site monitoring and click fraud prevention: site monitoring and click fraud prevention in advertising networks; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain to complete monitoring and prevention of malicious click fraud.
2. The method for detecting and preventing fraud in advertisement clicking online based on block chain as claimed in claim 1, wherein the system initialization in step 1 is an identity authority and entity identity block chain EIB initialization providing parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide a public and private key pair for registration, and the method is specifically realized as follows:
1-1, initializing an identity management authority: the identity management organization IMA firstly generates a self public and private key PKIMA/SKIMAIn the system, a publicationKey PKIMA(ii) a IMA defines an attribute set S { { PUB }, { Hat { [ Clouuthes { [ Conts { [ Counts } Coues } Food } according to an advertisement type of an advertisement publisher PUB agent; wherein Hat, Clouthes, Pants, Shoes and Food are attribute labels;
1-2. entity identity Block chains EIB for all users UiThe public parameter PP of the system is initialized by the advertisement publisher PUB and the advertiser ADE, and the method is specifically realized as follows:
EIB selects a large prime number p and an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; then IMA selects a bilinear group G with a generator G and two random numbersThe following parameters were calculated: h is gβ,f=g1/β,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm; when the IMA joins the EIB network, the EIB sends the public parameter PP to the IMA; finally, the EIB generates a shared secret key X and distributes the X to each IMA by dividing the X into a plurality of sub-secrets by using a Shamir (t, n) threshold secret sharing algorithm;
1-3. user UiThe advertisement publisher PUB and the advertiser ADE respectively generate their public and private keys, which are respectively recorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE。
3. The blockchain-based online advertisement click fraud monitoring and prevention method of claim 1, wherein a user U is a useriThe advertisement publisher PUB and the advertiser ADE can all register with the identity management organization IMA in advance and can carry out the next step after obtaining the identity identification and the identity permission, wherein UiAnd further obtaining a signature of the identity related information, and obtaining attribute information related to the identity by the advertisement publisher PUB, wherein the specific implementation is as follows:
2-1. user UiRegistering with IMA;
the first step is as follows: IMA Collection to user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code library according to the digitized information of the fingerprint, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity UID of; after that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signatureThen IMA will informationIs sent to user UiIn the browser plug-in of (1), where PP is a common parameter generated by EIB initialization, h (IL)U) Representation pair ILUThe hash process is carried out to carry out the hash process,representing IMA versus content h (IL)U) I MUID uses the private key SKIMAThe signature is carried out and the signature is carried out,representing U versus UID ILU||USigThe | PP uses the public key PKUEncrypting;
the second step is that: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, and is used for accountability of the user U when click fraud occursi;
2-2, registering the advertisement publisher PUB with the IMA;
the first step is as follows: IMA generates an identity PUBID and an attribute set S { { PUB }, { Hat @ U Food @ U.S. } } for the PUB according to the advertisement type proxied by the PUB, and then IMAs use Shamir (t, n)Recovering the shared secret key X by a threshold secret sharing algorithm, and then calculating the identity permission IL of the advertisement publisher PUBPUBPUBID h (x) P, then IMA will informationSending the advertisement to the advertisement publisher PUB;
the second step is that: IMA hashes the information PUBID, records the result h (PUBID) in the EIB block chain, and monitors the PUB of the advertisement publisher when click fraud occurs;
2-3, registering an ADE to the IMA;
the first step is as follows: IMA generates identity ADEID for ADE according to advertisement type required to be released by ADE, then IMA recovers shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates identity permission IL of advertiser ADEADEADEID.h (X) P, and then IMA will transmit the informationSending to the advertiser ADE;
the second step is that: IMA records information h (adeid) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
4. The block chain-based online advertisement click fraud monitoring and preventing method according to claim 3, wherein the advertisement distribution is characterized in that the advertisement distributor distributes online advertisements in step 3-1, and the implementation is as follows:
the first step is as follows: the advertisement publisher PUB and the advertiser agree on the advertisement delivery affairs and agree on the identity ID of the advertisementad;
The second step is that: user UiAccess web pages of site MS while UiThe browser plug-in uses an encryption CP-ABE scheme based on the attribute of the ciphertext policy to sign USigAfter being encrypted, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically, the method comprises the following steps: user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, encrypted using the common parameters PP and CP-ABE encryption schemeSignature USigObtaining a ciphertext C=hs,Wherein, ts1Is a user UiEncrypted signature USigA time stamp of the time,is a random number, h ═ gβ,l,g,pyIs a polynomial, p, represented by each node y in the access tree Ty(0) Is the value represented by the node y, att (y) is the attribute owned by a leaf node y in the access tree T;c is secret information needing to be transmitted in the ciphertext CT; cy、C′yIs the auxiliary information when decrypting the CT; after obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, and then the MS forwards the CT to different PUBs;
the third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP Wherein, is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { } satisfies the user U, the attribute set S { { PUB }, { Hat { [ coo } satisfies the user UiAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed asThen PUB gets the plaintext Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT;
the fourth step: MS shows advertisement in its advertisement network and simultaneously puts PUBID, ADEID, PKPUBAnd PKADEEmbedded in a display frame of the advertisement;
the fifth step: after a certain period, MS sends the advertisement bidding information according to the period and the advertisement identification IDadCarry out classification and sequencing to obtain the productThe result of the announcement is Where fe indicates that the PUB needs to be the user UiThe cost paid to the MS by a single click of the advertisement; finally, the MS records the advertisement publishing result into the access behavior block chain ABB in a transaction form.
5. The block chain based online advertisement click fraud monitoring and prevention method according to claim 3 or 4, wherein advertisement distribution is characterized by step 3-2 user UiClicking the online advertisement specifically realizes the following steps:
the first step is as follows: user UiThe browser obtains PUBID, ADEID and PK from the advertisement display framePUBAnd PKADEInformation, then calculates the PUB authenticator And ADE authenticatorThen, user UiTime stamp ts embedded at this time2Computing a PUB Security credential And ADE Security Authenticator The plug-in then connects user UiClick information for advertisement Sending to the MS;
the second step is that: MS Forwarding { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID};
The third step: after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and is recorded in an access behavior block chain ABB in a transaction form.
6. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 5, characterized by comprising a first step of PUB monitoring and preventing click fraud; second, ADE monitors and prevents click fraud; third, the MS monitors and guards against click fraud.
7. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 6, wherein the PUB monitoring and preventing click fraud is implemented as follows:
the first step is as follows: PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks;
the second step is that: PUB uses IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
The third step: PUB verification equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature USigThe number of different MUIDs in the period is marked as n, and the value represents the effective advertisement click quantity in a certain period, which means that the PUB only needs to pay for the n advertisement clicks in the period; thereafter, PUB records the ad access behavior { ID ] of the MUID in its local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadAccess behavior of (2);
the fourth step: after a certain period, the PUB follows the period and IDadSorting, user UiAdvertisement access result of { n | | IDad||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
8. The block chain-based online advertisement click fraud monitoring and preventing method according to claim 6, wherein the ADE monitoring and click fraud prevention is implemented as follows:
the first step is as follows: ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe getIt is compared with the result recorded by MS in the access behavior block chain ABBComparing to avoid cheating fe by PUB;
the second step is that: ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2Timeliness to avoid replay attacks;
the third step: similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator ADE verification equation AuS'ADE=AuSADEIf true, ADE counts all signatures U if the equation is trueSigThe number of different MUIDs in (d), which is denoted as n':
the fourth step: the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares if n is true, and if the equation is true, the ADE pays the PUB for the n clicks.
9. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 6, wherein the MS monitors and prevents click fraud by specifically implementing the following:
MS communicates with PUB to obtain AuS in all click information MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbolAfter that, the MS reads from the local databaseAnd compare equation SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110736776.XA CN113538042B (en) | 2021-06-30 | 2021-06-30 | Block chain-based online advertisement click fraud monitoring and preventing method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110736776.XA CN113538042B (en) | 2021-06-30 | 2021-06-30 | Block chain-based online advertisement click fraud monitoring and preventing method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113538042A true CN113538042A (en) | 2021-10-22 |
CN113538042B CN113538042B (en) | 2023-09-22 |
Family
ID=78126393
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110736776.XA Active CN113538042B (en) | 2021-06-30 | 2021-06-30 | Block chain-based online advertisement click fraud monitoring and preventing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113538042B (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN110309634A (en) * | 2019-04-04 | 2019-10-08 | 深圳大通实业股份有限公司 | A kind of credible advertisement data management system based on block chain |
CN111260399A (en) * | 2020-01-15 | 2020-06-09 | 腾讯科技(深圳)有限公司 | Advertisement data processing method and device based on block chain network and electronic equipment |
CN111275495A (en) * | 2020-02-21 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Advertisement putting monitoring method, device and system based on block chain |
-
2021
- 2021-06-30 CN CN202110736776.XA patent/CN113538042B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN110309634A (en) * | 2019-04-04 | 2019-10-08 | 深圳大通实业股份有限公司 | A kind of credible advertisement data management system based on block chain |
CN111260399A (en) * | 2020-01-15 | 2020-06-09 | 腾讯科技(深圳)有限公司 | Advertisement data processing method and device based on block chain network and electronic equipment |
CN111275495A (en) * | 2020-02-21 | 2020-06-12 | 腾讯科技(深圳)有限公司 | Advertisement putting monitoring method, device and system based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN113538042B (en) | 2023-09-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11176571B2 (en) | Methods and system for serving targeted advertisements to a consumer device | |
TWI389046B (en) | Trusted third party clearing house for lead tracking | |
WO2019010430A2 (en) | Method and system for privacy-preserving social media advertising | |
US20150170197A1 (en) | Technologies for collecting advertising statistics in a privacy sensitive manner | |
KR20090021514A (en) | Apparatus and method for registering and managing content copyright in advertisement open market system based on content copyright clearing | |
US20240297783A1 (en) | Aggregating encrypted network values | |
Sahoo et al. | Traceability and ownership claim of data on big data marketplace using blockchain technology | |
Chi et al. | Secure and reliable blockchain-based eBook transaction system for self-published eBook trading | |
JP7201848B2 (en) | Generating sequences of network data while preventing acquisition or manipulation of time data | |
US20230281671A1 (en) | Decentralized privacy-preserving rewards with cryptographic black box accumulators | |
Zhong et al. | Ibex: Privacy-preserving ad conversion tracking and bidding | |
JP2022177209A (en) | Preventing data manipulation by using multiple aggregation servers | |
Lyu et al. | BCFDPS: A Blockchain‐Based Click Fraud Detection and Prevention Scheme for Online Advertising | |
Liu et al. | Watermarking protocol for broadcast monitoring | |
CN101763609A (en) | Virtual transaction evidence-obtaining method based on data signature and video technology | |
CN113538042B (en) | Block chain-based online advertisement click fraud monitoring and preventing method | |
Chen et al. | A verifiable and secret buyer–seller watermarking protocol | |
Ramani et al. | Blockchain for digital rights management | |
Aldweesh | BlockTicket: A framework for electronic tickets based on smart contract | |
Wang et al. | Blockchain Data Transaction with Leakage Tracing Based on Digital Fingerprint | |
Mosher et al. | Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising | |
Zhong et al. | Ibex: Privacy-preserving ad conversion tracking and bidding (full version) | |
Deshpande et al. | Towards a comparative and integrative framework for regulatory oversight of online advertising: Challenges, mitigation strategies, outcomes, and areas of intervention | |
Mosher | Privacy and Fairness for Online Targeted Advertising | |
Karuppiah | Blockchain for digital rights management |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |