CN113538042A - Block chain-based online advertisement click fraud monitoring and preventing method - Google Patents

Block chain-based online advertisement click fraud monitoring and preventing method Download PDF

Info

Publication number
CN113538042A
CN113538042A CN202110736776.XA CN202110736776A CN113538042A CN 113538042 A CN113538042 A CN 113538042A CN 202110736776 A CN202110736776 A CN 202110736776A CN 113538042 A CN113538042 A CN 113538042A
Authority
CN
China
Prior art keywords
advertisement
pub
ade
user
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110736776.XA
Other languages
Chinese (zh)
Other versions
CN113538042B (en
Inventor
吕秋云
李�昊
周仁杰
申延召
张纪林
赵乃良
刘焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN202110736776.XA priority Critical patent/CN113538042B/en
Publication of CN113538042A publication Critical patent/CN113538042A/en
Application granted granted Critical
Publication of CN113538042B publication Critical patent/CN113538042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0252Targeted advertisements based on events or environment, e.g. weather or festivals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses an online advertisement click fraud monitoring and preventing method based on a block chain. The entity involved in the invention comprises an identity management authority, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain. Firstly, an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertiser initialize to generate parameters required by a system and public and private key information required by the system; then, the user UiThe advertisement publisher PUB and the advertiser ADE register with an identity management organization IMA; then, the advertisement publisher and the site publish relevant advertisements to the target users to attract the users to click; finally, the advertisement publisher PUB, the advertiser ADE, and the site MS are all able to monitor and prevent click fraud. The invention ensures the authenticity of the click rate in the settlement process of the online advertising system by utilizing the characteristic that the block chain can not be tampered.

Description

Block chain-based online advertisement click fraud monitoring and preventing method
Technical Field
The invention relates to the technical field of fraud monitoring and prevention, in particular to an online advertisement click fraud monitoring and prevention method based on a block chain.
Background
Consumers generate revenue for advertising providers by clicking on online advertisements, but subsequent click fraud by criminals poses a threat to this advertising system.
In this scenario, although some online advertisement click fraud monitoring and prevention techniques have been proposed; however, the proposed method is either vulnerable to adversarial attacks or difficult to cope with potential click fraud. Therefore, this section proposes a block-chain-based online advertisement click fraud detection and prevention method BCFDPS (a block-based click front detection and prediction scheme for online advertisement adaptation).
Disclosure of Invention
The invention mainly aims at the defects of the existing click fraud monitoring and preventing technology and provides an online advertisement click fraud monitoring and preventing method based on a block chain.
The technical scheme adopted by the invention for solving the technical problems is as follows:
the invention comprises seven components of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain, and the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertisement main to generate parameters required by the system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity licenses to prove authenticity and legality of the user; the user also obtains the signature of the identity related information after the process, and the advertisement publisher also obtains the identity related attribute information; after a certain period, the identity management organization writes an entity registration result into the entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertisement publishing;
3-1, an advertisement publisher publishes online advertisements: when a user accesses an advertisement network, encrypted user identity information needs to be sent to a website in the advertisement network, and then the website forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes online advertisements which bid successfully in the advertisement network managed by the website; after a certain period, the website in the advertisement network writes the advertisement publishing result into the access behavior block chain: storing the advertisement identification, the encrypted bidding cost, the site identification and the advertisement publisher identification information into an access behavior block chain in a transaction form;
3-2, clicking the online advertisement by the user: the user clicks the interested advertisement in the advertisement network, the user embeds the identity permission to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the site in the advertisement network writes the advertisement forwarding result into the access behavior block chain: performing hash processing on the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information, and then storing a hash result into an access behavior block chain in a transaction form;
step 4, click fraud monitoring and prevention;
4-1, advertisement publisher monitoring and click fraud prevention: the advertisement publisher decrypts the advertisement click information by using the private key of the advertisement publisher, and then verifies the advertisement click information by combining the identity permission of the advertisement publisher and the identity permission in the click information so as to complete monitoring and prevention of malicious click fraud;
4-2, advertiser monitoring and click fraud prevention: the advertisement master-slave advertisement publisher obtains part of the invariable parameters in the advertisement click information, decrypts the part of the parameters by using a private key of the advertisement master-slave advertisement publisher, and then verifies the parameters by combining the identity permission of the advertisement master-slave advertisement publisher and the identity permission in the decryption result so as to complete monitoring and prevention of malicious click fraud;
4-3, site monitoring and click fraud prevention: site monitoring and click fraud prevention in advertising networks; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain to complete monitoring and prevention of malicious click fraud.
Further, the system initialization in step 1 is the initialization of an identity management authority and an entity identity block chain EIB, and provides parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide a public and private key pair for registration, and the method is specifically realized as follows:
1-1, initializing an identity management authority: the identity management organization IMA firstly generates a public and private key PK of the identity management organization IMAIMA/SKIMAThe public key PK is published in the systemIMA(ii) a IMA defines an attribute set S { { PUB }, { Hat { [ Clouuthes { [ Tunts { [ Tu ] Shoes [ Tu ] Food } … } according to an advertisement type of an advertisement publisher PUB agent; wherein Hat, Clouthes, Pants, Shoes and Food are attribute labels;
1-2. entity identity Block chains EIB for all users UiThe public parameter PP of the system is initialized by the advertisement publisher PUB and the advertiser ADE, and the method is specifically realized as follows:
EIB selects a large prime number p and an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; then IMA selects a bilinear group G with a generator G and two random numbers
Figure BDA0003141933230000031
The following parameters were calculated: h is gβ,f=g1 ,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm; when the IMA joins the EIB network, the EIB sends the public parameter PP to the IMA; finally, the EIB generates a shared secret key X and distributes the X to each IMA by dividing the X into a plurality of sub-secrets by using a Shamir (t, n) threshold secret sharing algorithm;
1-3. user UiThe advertisement publisher PUB and the advertiser ADE respectively generate their public and private keys, which are respectively recorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE
Further, user UiThe advertisement publisher PUB and the advertiser ADE can all register with the identity management organization IMA in advance and can carry out the next step after obtaining the identity identification and the identity permission, wherein UiAnd further obtaining a signature of the identity related information, and obtaining attribute information related to the identity by the advertisement publisher PUB, wherein the specific implementation is as follows:
2-1. user UiRegistering with IMA;
the first step is as follows: IMA Collection to user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code library according to the digitized information of the fingerprint, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity UID of; after that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signature
Figure BDA0003141933230000041
Then IMA will information
Figure BDA0003141933230000042
Is sent to user UiIn the browser plug-in of (1), where PP is a common parameter generated by EIB initialization, h (IL)U) Representation pair ILUThe hash process is carried out to carry out the hash process,
Figure BDA0003141933230000043
representing IMA versus content h (IL)U) I MUID use privacyKey SKIMAThe signature is carried out and the signature is carried out,
Figure BDA0003141933230000044
representing U versus UID ILU||USigThe | PP uses the public key PKUEncrypting;
the second step is that: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, and is used for accountability of the user U when click fraud occursi
2-2, registering the advertisement publisher PUB with the IMA;
the first step is as follows: IMA generates an identity PUBID and an attribute set S { { PUB }, { Bat { [ U ] FOod [ U ] … } } for the PUB according to the advertisement types proxied by the PUB, then IMAs recover a shared key X by using a Shamir (t, n) threshold secret sharing algorithm, and then the identity permission IL of the advertisement publisher PUB is calculatedPUBPUBID h (x) P, then IMA will information
Figure BDA0003141933230000045
Sending the advertisement to the advertisement publisher PUB;
the second step is that: IMA hashes the information PUBID, records the result h (PUBID) in the EIB block chain, and monitors the PUB of the advertisement publisher when click fraud occurs;
2-3, registering an ADE to the IMA;
the first step is as follows: IMA generates identity ADEID for ADE according to advertisement type required to be released by ADE, then IMA recovers shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates identity permission IL of advertiser ADEADEADEID.h (X) P, and then IMA will transmit the information
Figure BDA0003141933230000046
Sending to the advertiser ADE; the second step is that: IMA records information h (adeid) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
Further, in step 3-1, the advertisement publisher publishes the online advertisement, which is specifically realized as follows:
the first step is as follows: advertisement publisher PUB and advertiser just wideAdvertising matters to reach consensus and agree on the ID of the advertisementad
The second step is that: user UiAccess web pages of site MS while UiThe browser plug-in uses an encryption CP-ABE scheme based on the attribute of the ciphertext policy to sign USigAfter being encrypted, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically, the method comprises the following steps: user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, and the signature U is encrypted using the common parameters PP and CP-ABE encryption schemeSigObtaining a ciphertext
Figure BDA0003141933230000051
ls,C=hs,
Figure BDA0003141933230000052
Wherein, ts1Is a user UiEncrypted signature USigA time stamp of the time,
Figure BDA0003141933230000053
is a random number, h ═ gβ
Figure BDA0003141933230000054
pyIs a polynomial, p, represented by each node y in the access tree Ty(0) Is the value represented by the node y, att (y) is the attribute owned by a leaf node y in the access tree T;
Figure BDA0003141933230000055
c is secret information needing to be transmitted in the ciphertext CT; cy、C'yIs the auxiliary information when decrypting the CT; after obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, and then the MS forwards the CT to different PUBs;
the third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP
Figure BDA0003141933230000056
Figure BDA0003141933230000057
Wherein,
Figure BDA0003141933230000058
is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { [ U ] } of the PUB satisfies the user U … } }iAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK
Figure BDA0003141933230000059
Figure BDA00031419332300000510
After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed as
Figure BDA00031419332300000511
Then PUB gets the plaintext
Figure BDA00031419332300000512
Figure BDA00031419332300000513
Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT;
the fourth step: MS shows advertisement in its advertisement network and simultaneously puts PUBID, ADEID, PKPUBAnd PKADEEmbedded in a display frame of the advertisement;
the fifth step: after a certain period, the MS sends the advertisement bidding information according to the periodAnd advertisement identification IDadClassifying and sequencing to obtain the advertisement publishing result of
Figure BDA0003141933230000061
Figure BDA0003141933230000062
Where fe indicates that the PUB needs to be the user UiThe cost paid to the MS by a single click of the advertisement; finally, the MS records the advertisement publishing result into the access behavior block chain ABB in a transaction form.
Further, step 3-2 user UiClicking the online advertisement specifically realizes the following steps:
the first step is as follows: user UiThe browser obtains PUBID, ADEID and PK from the advertisement display framePUBAnd PKADEInformation, then calculates the PUB authenticator
Figure BDA0003141933230000063
Figure BDA0003141933230000064
And ADE authenticator
Figure BDA0003141933230000065
Then, user UiTime stamp ts embedded at this time2Computing a PUB Security credential
Figure BDA0003141933230000066
Figure BDA0003141933230000067
And ADE Security Authenticator
Figure BDA0003141933230000068
Figure BDA0003141933230000069
The plug-in then connects user UiClick information for advertisement
Figure BDA00031419332300000610
Figure BDA00031419332300000611
Sending to the MS;
the second step is that: MS Forwarding { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID};
The third step: after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and is recorded in an access behavior block chain ABB in a transaction form.
Further, step 4 includes PUB monitoring and fraud prevention, ADE monitoring and fraud prevention and MS monitoring and fraud prevention.
Further, the PUB monitors and prevents click fraud, and is specifically implemented as follows:
the first step is as follows: PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks;
the second step is that: PUB uses IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
Figure BDA0003141933230000071
The third step: PUB verification equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature USigThe number of different MUIDs in the period is marked as n, and the value represents the effective advertisement click quantity in a certain period, which means that the PUB only needs to pay for the n advertisement clicks in the period; thereafter, PUB records the ad access behavior { ID ] of the MUID in its local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadAccess behavior of (2);
the fourth step: after a certain period, the PUB follows the period and IDadSorting, user UiAdvertisement access result of { n | | IDad||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
Further, the ADE monitoring and click fraud prevention are specifically realized as follows:
the first step is as follows: ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe get
Figure BDA0003141933230000072
It is compared with the result recorded by MS in the access behavior block chain ABB
Figure BDA0003141933230000073
Comparing to avoid cheating fe by PUB;
the second step is that: ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2Timeliness to avoid replay attacks;
the third step: similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator
Figure BDA0003141933230000074
Figure BDA0003141933230000075
ADE verification equation AuS'ADE=AuSADEIf it is true, if the equation isImmediately, ADE counts all signatures USigThe number of different MUIDs in the set is marked as n';
the fourth step: the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares if n is true, and if the equation is true, the ADE pays the PUB for the n clicks.
Further, the MS monitors and prevents click fraud, which is specifically implemented as follows:
MS communicates with PUB to obtain AuS in all click information MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbol
Figure BDA0003141933230000082
After that, the MS reads from the local database
Figure BDA0003141933230000081
And compare equation SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.
The invention has the following beneficial effects:
in the registration, advertisement release and click fraud detection and prevention processes, the entity registration results are all recorded in the entity identity block chain; the relevant results of advertisement release, forwarding and access are recorded in the access behavior block chain, and the authenticity of click rate in the settlement process of the online advertisement system is ensured by utilizing the characteristic that the block chain cannot be tampered.
Drawings
FIG. 1 is a block chain based on-line advertisement click fraud monitoring and prevention system model diagram;
FIG. 2 is a flow diagram of a protocol for publishing an advertisement to a target user and enticing the user to click on the advertisement;
FIG. 3 is a flow diagram of an advertisement publisher click fraud detection and prevention protocol;
FIG. 4 is a flow diagram of an advertiser click fraud prevention protocol.
Detailed Description
The invention is further illustrated by the following figures and examples.
As shown in fig. 1, an online advertisement click fraud monitoring and prevention method based on a block chain includes an identity management authority, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain component, and each component has the following interaction steps:
1, initializing an identity management authority and an entity identity block chain in the process, and providing parameters for system entity registration; secondly, the user, the advertisement publisher and the advertiser initialize to generate a public and private key pair for registration,
1-1 identity management organization initialization: the identity management organization IMA firstly generates a public and private key PK of the identity management organization IMAIMA/SKIMAThe public key PK is published in the systemIMA(ii) a IMA defines attribute sets S { { PUB }, { Hat { [ Clouuthes { [ U ] Pants { [ U ] Shoes { [ U ] Food } … } according to the advertisement types of the PUB agents.
1-2 entity identity block chains EIB are all users UiAdvertisement publisher PUB and advertiser ADE initialise system public parameters PP. The concrete implementation is as follows:
EIB is a large prime number p selected as an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; next, IMA selects a bilinear group G with generator G and two random numbers
Figure BDA0003141933230000094
The following parameters were calculated: h is gβ,f=g1/β,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm. When IMA joins the EIB network, EIB sends this common parameter PP to IMA. Finally, the EIB generates a shared key X and distributes X to each IMA in divided sub-secrets using the Shamir (t, n) threshold secret sharing algorithm.
1-3 user UiThe advertisement publisher PUB and the advertiser ADE respectively generate the public and private keys thereofRecorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE
2 the user, the advertisement publisher and the advertiser register the user with the identity management authority in advance, the advertisement publisher and the advertiser register with the identity management authority in advance and obtain the identity and the identity licensor to carry out the next step, wherein the user also obtains the signature of the information related to the identity of the user, the advertisement publisher also obtains the attribute information related to the identity of the advertisement publisher,
2-1 user UiAnd registering with IMA. First, IMA collects user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code base according to the digitized information, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity of UID. After that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signature
Figure BDA0003141933230000091
Figure BDA0003141933230000092
Then IMA will information
Figure BDA0003141933230000093
Is sent to user UiThe browser plug-in of (1), wherein PP is a common parameter generated by EIB initialization.
Secondly, IMA records information h (UID) in EIB block chain for asking user U when click fraud occursi
The 2-2 ad publisher PUB registers with IMA. Firstly, IMA generates an identity PUBID and an attribute set S { { PUB }, { Hat @ Food @ … } } for the PUB according to the advertisement type proxied by the PUB, and then uses Shamir (t, n) threshold secret sharing algorithm to recover a shared key X, and then counts upCalculating identity permissions IL for Ad publishers PUBsPUBPUBID h (x) P, then IMA will information
Figure BDA0003141933230000101
Figure BDA0003141933230000102
And sending the parameters to the advertisement publisher PUB, wherein PP is a common parameter generated by EIB initialization.
In a second step, IMA records information h (PUBID) in the EIB blockchain, which is used to supervise the advertisement publisher PUB when click fraud occurs.
The 2-3 advertiser ADE registers with IMA. Firstly, IMA generates an identity ADEID for ADE according to the advertisement type required to be released by ADE, then IMA recovers a shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates an identity permission IL of an advertiser ADEADEADEID.h (X) P, and then IMA will transmit the information
Figure BDA0003141933230000103
Sent to the advertiser ADE, where PP is the common parameter generated by EIB initialization.
Second, IMA records information h (adeid) in the EIB blockchain to audit the advertiser ADE when click fraud occurs.
3 advertisement publisher and site publish advertisement to target user to attract user click on the advertisement: the advertisement publisher PUB publishes the advertisement to the target user U through the advertisement bidding process of the site MSiTo obtain a higher reward; thereafter, the user UiClick on an advertisement of interest to it; the protocol flow for publishing an advertisement to a target user and attracting the user to click on the advertisement is shown in fig. 2.
3-1 the advertisement publisher publishes the online advertisement. First, the advertisement publisher PUB and the advertiser agree on the advertisement placement matter, and the identity of the agreed advertisement is IDad
Second, user UiAccess to the web page of the station MS, while UiThe browser plug-in uses ciphertext-policy attribute-based encryption (CP-AB)E) Scheme will sign USigEncrypted and sent to the MS, which then forwards it to the PUB. In particular, user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, and the signature U is encrypted using the common parameters PP and CP-ABE schemeSigObtaining a ciphertext
Figure BDA0003141933230000111
Figure BDA0003141933230000112
C=hs,
Figure BDA0003141933230000113
Wherein, ts1Is a user UiEncrypted signature USigThe time stamp of the time of day,
Figure BDA0003141933230000114
is a random number, pyIs a polynomial represented by each node y in the access tree T, and att (y) is an attribute owned by a leaf node y in the access tree T. After obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, which then forwards it to a different PUB.
The third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP
Figure BDA0003141933230000115
Figure BDA0003141933230000116
Wherein,
Figure BDA0003141933230000117
is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { [ U ] } of the PUB satisfies the user U … } }iAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK
Figure BDA0003141933230000118
Figure BDA0003141933230000119
After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed as
Figure BDA00031419332300001110
Then PUB gets the plaintext
Figure BDA00031419332300001111
Figure BDA00031419332300001112
Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT.
Fourthly, the MS displays the advertisement in the advertisement network and simultaneously displays PUBID, ADEID and PKPUBAnd PKADEEmbedded in the display frame of the advertisement.
Fifthly, after a certain period, the MS enables the advertisement bidding information to be according to the period and the advertisement identification IDadClassifying and sequencing to obtain the advertisement publishing result of
Figure BDA0003141933230000121
Figure BDA0003141933230000122
Wherein fe is PUB and needs to be user UiThe MS pays the MS for a single advertisement click, and finally, the MS records the advertisement distribution result in the access behavior blockchain ABB in the form of a transaction.
3-2 user UiClick on the online advertisement. First, user UiThe browser obtains PUBID, ADEID and PK from the display framePUBAnd PKADEInformation, then calculates the PUB authenticator
Figure BDA0003141933230000123
And ADE authenticator
Figure BDA0003141933230000124
Figure BDA0003141933230000125
Then, UiTime stamp ts embedded at this time2Computing a PUB Security credential
Figure BDA0003141933230000126
And ADE Security Authenticator
Figure BDA0003141933230000127
Figure BDA0003141933230000128
The plug-in then connects user UiClick information for advertisement
Figure BDA0003141933230000129
Figure BDA00031419332300001210
And sending to the MS.
Second, MS forwards { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID}。
Step three, after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and recorded in the access behavior block chain ABB.
4-click fraud monitoring and prevention: after the advertisement is displayed, the PUB, ADE and MS need to monitor and prevent click fraud;
4-1PUB click fraud monitoring and prevention, a PUB click fraud monitoring and prevention protocol flow diagram is shown in FIG. 3. In a first step, the PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks.
Second, the PUB uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
Figure BDA00031419332300001211
Third, PUB verifies equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature UsigThe number of different MUIDs is marked as n, the value represents the effective advertisement click quantity in a certain period, which means that in the period, the PUB only needs to pay for the n advertisement clicks, and then the PUB records the advertisement access behavior { ID of the MUID in a local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadThe access behavior of.
Fourthly, after a certain period, the PUB follows the period and the IDadSorting, user UiAdvertisement access result of { n | | IDda||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
4-2ADE monitoring and fraud prevention on click fraud, a flow chart for the ADE monitoring and fraud prevention on click fraud protocol is shown in fig. 4. First, ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe get
Figure BDA0003141933230000131
It is compared with the result recorded by MS in the access behavior block chain ABB
Figure BDA0003141933230000132
The comparison is used for avoiding the price cheating of the PUB.
Second, ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2To avoid replay attacks.
Third, similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator
Figure BDA0003141933230000133
Figure BDA0003141933230000134
ADE verification equation AuS'ADE=AuSADEIf true, ADE counts all signatures U if the equation is trueSigThe number of MUIDs in (1) is denoted as n'.
And fourthly, the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares whether n is equal to n' or not, and if the equation is satisfied, the ADE pays the PUB fee for the n clicks.
4-3MS monitors and prevents click fraud. MS communicates with PUB to acquire AuS in all MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbol
Figure BDA0003141933230000141
After that, the MS reads from the local database
Figure BDA0003141933230000142
And compareEquality SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.

Claims (9)

1. An online advertisement click fraud monitoring and preventing method based on a block chain is characterized by comprising seven components of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity block chain and an access behavior block chain, wherein the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management authority, an entity identity block chain, a user, an advertisement publisher and an advertisement main to generate parameters required by the system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity licenses to prove authenticity and legality of the user; the user also obtains the signature of the identity related information after the process, and the advertisement publisher also obtains the identity related attribute information; after a certain period, the identity management organization writes an entity registration result into the entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertisement publishing;
3-1, an advertisement publisher publishes online advertisements: when a user accesses an advertisement network, encrypted user identity information needs to be sent to a website in the advertisement network, and then the website forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes online advertisements which bid successfully in the advertisement network managed by the website; after a certain period, the website in the advertisement network writes the advertisement publishing result into the access behavior block chain: storing the advertisement identification, the encrypted bidding cost, the site identification and the advertisement publisher identification information into an access behavior block chain in a transaction form;
3-2, clicking the online advertisement by the user: the user clicks the interested advertisement in the advertisement network, the user embeds the identity permission to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the site in the advertisement network writes the advertisement forwarding result into the access behavior block chain: performing hash processing on the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information, and then storing a hash result into an access behavior block chain in a transaction form;
step 4, click fraud monitoring and prevention;
4-1, advertisement publisher monitoring and click fraud prevention: the advertisement publisher decrypts the advertisement click information by using the private key of the advertisement publisher, and then verifies the advertisement click information by combining the identity permission of the advertisement publisher and the identity permission in the click information so as to complete monitoring and prevention of malicious click fraud;
4-2, advertiser monitoring and click fraud prevention: the advertisement master-slave advertisement publisher obtains part of the invariable parameters in the advertisement click information, decrypts the part of the parameters by using a private key of the advertisement master-slave advertisement publisher, and then verifies the parameters by combining the identity permission of the advertisement master-slave advertisement publisher and the identity permission in the decryption result so as to complete monitoring and prevention of malicious click fraud;
4-3, site monitoring and click fraud prevention: site monitoring and click fraud prevention in advertising networks; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain to complete monitoring and prevention of malicious click fraud.
2. The method for detecting and preventing fraud in advertisement clicking online based on block chain as claimed in claim 1, wherein the system initialization in step 1 is an identity authority and entity identity block chain EIB initialization providing parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide a public and private key pair for registration, and the method is specifically realized as follows:
1-1, initializing an identity management authority: the identity management organization IMA firstly generates a self public and private key PKIMA/SKIMAIn the system, a publicationKey PKIMA(ii) a IMA defines an attribute set S { { PUB }, { Hat { [ Clouuthes { [ Conts { [ Counts } Coues } Food } according to an advertisement type of an advertisement publisher PUB agent; wherein Hat, Clouthes, Pants, Shoes and Food are attribute labels;
1-2. entity identity Block chains EIB for all users UiThe public parameter PP of the system is initialized by the advertisement publisher PUB and the advertiser ADE, and the method is specifically realized as follows:
EIB selects a large prime number p and an elliptic curve Ep(a, b) and an n-th order finite field EpA lower base point P; then IMA selects a bilinear group G with a generator G and two random numbers
Figure FDA0003141933220000021
The following parameters were calculated: h is gβ,f=g1/β,l=e(g,g)α,MK=(β,gα) And forming a common parameter PP:
PP=<Ep(a,b),P,G,g,h,e,f,l,MK>
wherein e is bilinear mapping function-Weil pairing algorithm; when the IMA joins the EIB network, the EIB sends the public parameter PP to the IMA; finally, the EIB generates a shared secret key X and distributes the X to each IMA by dividing the X into a plurality of sub-secrets by using a Shamir (t, n) threshold secret sharing algorithm;
1-3. user UiThe advertisement publisher PUB and the advertiser ADE respectively generate their public and private keys, which are respectively recorded as PKU/SKU,PKPUB/SKPUBAnd PKADE/SKADE
3. The blockchain-based online advertisement click fraud monitoring and prevention method of claim 1, wherein a user U is a useriThe advertisement publisher PUB and the advertiser ADE can all register with the identity management organization IMA in advance and can carry out the next step after obtaining the identity identification and the identity permission, wherein UiAnd further obtaining a signature of the identity related information, and obtaining attribute information related to the identity by the advertisement publisher PUB, wherein the specific implementation is as follows:
2-1. user UiRegistering with IMA;
the first step is as follows: IMA Collection to user UiThe fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code library according to the digitized information of the fingerprint, then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as user UiThe real identity UID of; after that, IMAs recover the shared secret X using Shamir (t, n) threshold secret sharing algorithm, and then calculate the user UiIdentity permission IL ofUUID · h (x) ·p, mask identity MUID ═ UID · P, and signature
Figure FDA0003141933220000031
Then IMA will information
Figure FDA0003141933220000032
Is sent to user UiIn the browser plug-in of (1), where PP is a common parameter generated by EIB initialization, h (IL)U) Representation pair ILUThe hash process is carried out to carry out the hash process,
Figure FDA0003141933220000033
representing IMA versus content h (IL)U) I MUID uses the private key SKIMAThe signature is carried out and the signature is carried out,
Figure FDA0003141933220000034
representing U versus UID ILU||USigThe | PP uses the public key PKUEncrypting;
the second step is that: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, and is used for accountability of the user U when click fraud occursi
2-2, registering the advertisement publisher PUB with the IMA;
the first step is as follows: IMA generates an identity PUBID and an attribute set S { { PUB }, { Hat @ U Food @ U.S. } } for the PUB according to the advertisement type proxied by the PUB, and then IMAs use Shamir (t, n)Recovering the shared secret key X by a threshold secret sharing algorithm, and then calculating the identity permission IL of the advertisement publisher PUBPUBPUBID h (x) P, then IMA will information
Figure FDA0003141933220000041
Sending the advertisement to the advertisement publisher PUB;
the second step is that: IMA hashes the information PUBID, records the result h (PUBID) in the EIB block chain, and monitors the PUB of the advertisement publisher when click fraud occurs;
2-3, registering an ADE to the IMA;
the first step is as follows: IMA generates identity ADEID for ADE according to advertisement type required to be released by ADE, then IMA recovers shared key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates identity permission IL of advertiser ADEADEADEID.h (X) P, and then IMA will transmit the information
Figure FDA0003141933220000042
Sending to the advertiser ADE;
the second step is that: IMA records information h (adeid) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
4. The block chain-based online advertisement click fraud monitoring and preventing method according to claim 3, wherein the advertisement distribution is characterized in that the advertisement distributor distributes online advertisements in step 3-1, and the implementation is as follows:
the first step is as follows: the advertisement publisher PUB and the advertiser agree on the advertisement delivery affairs and agree on the identity ID of the advertisementad
The second step is that: user UiAccess web pages of site MS while UiThe browser plug-in uses an encryption CP-ABE scheme based on the attribute of the ciphertext policy to sign USigAfter being encrypted, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically, the method comprises the following steps: user UiAfter visiting the MS's web site, an access tree T is defined according to the type of advertisement in which it is interested, encrypted using the common parameters PP and CP-ABE encryption schemeSignature USigObtaining a ciphertext
Figure FDA0003141933220000043
Figure FDA0003141933220000044
C=hs
Figure FDA0003141933220000045
Wherein, ts1Is a user UiEncrypted signature USigA time stamp of the time,
Figure FDA0003141933220000046
is a random number, h ═ gβ,l,g,
Figure FDA0003141933220000047
pyIs a polynomial, p, represented by each node y in the access tree Ty(0) Is the value represented by the node y, att (y) is the attribute owned by a leaf node y in the access tree T;
Figure FDA0003141933220000048
c is secret information needing to be transmitted in the ciphertext CT; cy、C′yIs the auxiliary information when decrypting the CT; after obtaining the ciphertext CT, the user UiThe browser plug-in sends the CT to the MS, and then the MS forwards the CT to different PUBs;
the third step: PUB generates decryption key according to attribute set S obtained in registration process by PUB and using MK in common parameter PP
Figure FDA0003141933220000051
Figure FDA0003141933220000052
Wherein,
Figure FDA0003141933220000053
Figure FDA0003141933220000054
is a random number; next, since the attribute set S { { PUB }, { Hat { [ coo { } satisfies the user U, the attribute set S { { PUB }, { Hat { [ coo } satisfies the user UiAn access tree T is defined so that the PUB can decrypt the secret value represented by each leaf node x in the access tree using SK
Figure FDA0003141933220000055
Figure FDA0003141933220000056
After the PUB decrypts the secret values of all the leaf nodes, the PUB obtains the secret values represented by the parent nodes corresponding to the leaf nodes by using a Lagrangian difference formula; PUB recurses the process until a secret value represented by the root node R in the access tree T is obtained, which can be expressed as
Figure FDA00031419332200000511
Then PUB gets the plaintext
Figure FDA0003141933220000057
Figure FDA0003141933220000058
Finally, the PUB uses the public key PK of IMAIMADecryption USigObtaining user UiThe mask identity MUID is searched for a local database according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether to participate in the advertisement bidding process of the MS is determined; d'jIs a parameter in the decryption key SK, Cx' is a parameter in the ciphertext CT;
the fourth step: MS shows advertisement in its advertisement network and simultaneously puts PUBID, ADEID, PKPUBAnd PKADEEmbedded in a display frame of the advertisement;
the fifth step: after a certain period, MS sends the advertisement bidding information according to the period and the advertisement identification IDadCarry out classification and sequencing to obtain the productThe result of the announcement is
Figure FDA0003141933220000059
Figure FDA00031419332200000510
Where fe indicates that the PUB needs to be the user UiThe cost paid to the MS by a single click of the advertisement; finally, the MS records the advertisement publishing result into the access behavior block chain ABB in a transaction form.
5. The block chain based online advertisement click fraud monitoring and prevention method according to claim 3 or 4, wherein advertisement distribution is characterized by step 3-2 user UiClicking the online advertisement specifically realizes the following steps:
the first step is as follows: user UiThe browser obtains PUBID, ADEID and PK from the advertisement display framePUBAnd PKADEInformation, then calculates the PUB authenticator
Figure FDA0003141933220000061
Figure FDA0003141933220000062
And ADE authenticator
Figure FDA0003141933220000063
Then, user UiTime stamp ts embedded at this time2Computing a PUB Security credential
Figure FDA0003141933220000064
Figure FDA0003141933220000065
And ADE Security Authenticator
Figure FDA0003141933220000066
Figure FDA0003141933220000067
The plug-in then connects user UiClick information for advertisement
Figure FDA0003141933220000068
Figure FDA0003141933220000069
Sending to the MS;
the second step is that: MS Forwarding { IDadM MS to the advertisement publisher PUB and store the ID locallyad||M||MS||PUBID};
The third step: after a certain period, MS follows the period and IDadCategorizing local data IDadM MS PUBID, and hash the classification result, and then the hash result { h (ID)adAnd | M | MS | PUBID) } is recorded as an advertisement forwarding result and is recorded in an access behavior block chain ABB in a transaction form.
6. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 5, characterized by comprising a first step of PUB monitoring and preventing click fraud; second, ADE monitors and prevents click fraud; third, the MS monitors and guards against click fraud.
7. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 6, wherein the PUB monitoring and preventing click fraud is implemented as follows:
the first step is as follows: PUB uses its private key SKPUBDecrypting the advertisement information M forwarded by the MS to obtain { U }Sig||AuSPUB||ts2}, validate the timestamp ts2To avoid replay attacks;
the second step is that: PUB uses IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates the PUB authenticator
Figure FDA00031419332200000610
The third step: PUB verification equation AuS'PUB=AuSPUBIf the equation is true, the PUB counts all signature USigThe number of different MUIDs in the period is marked as n, and the value represents the effective advertisement click quantity in a certain period, which means that the PUB only needs to pay for the n advertisement clicks in the period; thereafter, PUB records the ad access behavior { ID ] of the MUID in its local databasead||M||MUID||USig||SAPUB||ts2||SAADEMS, fe, behavour }, where fe is PUB and is needed by user UiThe fee paid to the MS by a single click of the advertisement, behavour being user UiFor advertisement IDadAccess behavior of (2);
the fourth step: after a certain period, the PUB follows the period and IDadSorting, user UiAdvertisement access result of { n | | IDad||h(MUID)n||h(SAPUB)n||h(SAADE)nRecord in Access behavior Block chain ABB, where h (MUID)n、h(SAPUB)nAnd h (SA)ADE)nRespectively represent n MUIDs and n SAsPUBAnd n SAADEResults of the respective hash.
8. The block chain-based online advertisement click fraud monitoring and preventing method according to claim 6, wherein the ADE monitoring and click fraud prevention is implemented as follows:
the first step is as follows: ADE communicates with PUB to obtain user UiOriginal access information to advertisements IDad||USig||SAADEMS fe, then ADE uses the PUB public key PKPUBEncrypted fe get
Figure FDA0003141933220000071
It is compared with the result recorded by MS in the access behavior block chain ABB
Figure FDA0003141933220000072
Comparing to avoid cheating fe by PUB;
the second step is that: ADE uses its own private key SKADEDecrypting SAADEObtaining AuSADE||ts2Then verifying ts2Timeliness to avoid replay attacks;
the third step: similar to the PUB, the ADE also uses the IMA public key PKIMASlave signature USigRecovery of h (IL)U) And MUID, then calculates ADE authenticator
Figure FDA0003141933220000073
Figure FDA0003141933220000074
ADE verification equation AuS'ADE=AuSADEIf true, ADE counts all signatures U if the equation is trueSigThe number of different MUIDs in (d), which is denoted as n':
the fourth step: the ADE reads the result n of the PUB record from the access behavior block chain ABB, compares if n is true, and if the equation is true, the ADE pays the PUB for the n clicks.
9. The method for monitoring and preventing block chain-based online advertisement click fraud according to claim 6, wherein the MS monitors and prevents click fraud by specifically implementing the following:
MS communicates with PUB to obtain AuS in all click information MPUB||ts2Then MS uses the public key PK of PUBPUBOne-by-one encryption { AuSPUB||ts2Get the PUB security authentication symbol
Figure FDA0003141933220000081
After that, the MS reads from the local database
Figure FDA0003141933220000082
And compare equation SA'PUB=SAPUBAnd if so, the MS receives the counting result of the PUB on the click rate.
CN202110736776.XA 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method Active CN113538042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110736776.XA CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110736776.XA CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Publications (2)

Publication Number Publication Date
CN113538042A true CN113538042A (en) 2021-10-22
CN113538042B CN113538042B (en) 2023-09-22

Family

ID=78126393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110736776.XA Active CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Country Status (1)

Country Link
CN (1) CN113538042B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN111260399A (en) * 2020-01-15 2020-06-09 腾讯科技(深圳)有限公司 Advertisement data processing method and device based on block chain network and electronic equipment
CN111275495A (en) * 2020-02-21 2020-06-12 腾讯科技(深圳)有限公司 Advertisement putting monitoring method, device and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN111260399A (en) * 2020-01-15 2020-06-09 腾讯科技(深圳)有限公司 Advertisement data processing method and device based on block chain network and electronic equipment
CN111275495A (en) * 2020-02-21 2020-06-12 腾讯科技(深圳)有限公司 Advertisement putting monitoring method, device and system based on block chain

Also Published As

Publication number Publication date
CN113538042B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
US11176571B2 (en) Methods and system for serving targeted advertisements to a consumer device
TWI389046B (en) Trusted third party clearing house for lead tracking
WO2019010430A2 (en) Method and system for privacy-preserving social media advertising
US20150170197A1 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
KR20090021514A (en) Apparatus and method for registering and managing content copyright in advertisement open market system based on content copyright clearing
US20240297783A1 (en) Aggregating encrypted network values
Sahoo et al. Traceability and ownership claim of data on big data marketplace using blockchain technology
Chi et al. Secure and reliable blockchain-based eBook transaction system for self-published eBook trading
JP7201848B2 (en) Generating sequences of network data while preventing acquisition or manipulation of time data
US20230281671A1 (en) Decentralized privacy-preserving rewards with cryptographic black box accumulators
Zhong et al. Ibex: Privacy-preserving ad conversion tracking and bidding
JP2022177209A (en) Preventing data manipulation by using multiple aggregation servers
Lyu et al. BCFDPS: A Blockchain‐Based Click Fraud Detection and Prevention Scheme for Online Advertising
Liu et al. Watermarking protocol for broadcast monitoring
CN101763609A (en) Virtual transaction evidence-obtaining method based on data signature and video technology
CN113538042B (en) Block chain-based online advertisement click fraud monitoring and preventing method
Chen et al. A verifiable and secret buyer–seller watermarking protocol
Ramani et al. Blockchain for digital rights management
Aldweesh BlockTicket: A framework for electronic tickets based on smart contract
Wang et al. Blockchain Data Transaction with Leakage Tracing Based on Digital Fingerprint
Mosher et al. Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising
Zhong et al. Ibex: Privacy-preserving ad conversion tracking and bidding (full version)
Deshpande et al. Towards a comparative and integrative framework for regulatory oversight of online advertising: Challenges, mitigation strategies, outcomes, and areas of intervention
Mosher Privacy and Fairness for Online Targeted Advertising
Karuppiah Blockchain for digital rights management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant