CN113538042B - Block chain-based online advertisement click fraud monitoring and preventing method - Google Patents

Block chain-based online advertisement click fraud monitoring and preventing method Download PDF

Info

Publication number
CN113538042B
CN113538042B CN202110736776.XA CN202110736776A CN113538042B CN 113538042 B CN113538042 B CN 113538042B CN 202110736776 A CN202110736776 A CN 202110736776A CN 113538042 B CN113538042 B CN 113538042B
Authority
CN
China
Prior art keywords
advertisement
pub
ade
user
ima
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110736776.XA
Other languages
Chinese (zh)
Other versions
CN113538042A (en
Inventor
吕秋云
李�昊
周仁杰
申延召
张纪林
赵乃良
刘焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dianzi University
Original Assignee
Hangzhou Dianzi University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Dianzi University filed Critical Hangzhou Dianzi University
Priority to CN202110736776.XA priority Critical patent/CN113538042B/en
Publication of CN113538042A publication Critical patent/CN113538042A/en
Application granted granted Critical
Publication of CN113538042B publication Critical patent/CN113538042B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0248Avoiding fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0241Advertisements
    • G06Q30/0251Targeted advertisements
    • G06Q30/0252Targeted advertisements based on events or environment, e.g. weather or festivals
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Strategic Management (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Game Theory and Decision Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain-based online advertisement click fraud monitoring and preventing method. The entities involved in the invention comprise an identity management authority, a user, an advertising network, an advertising publisher, an advertiser, an entity identity blockchain and an access behavior blockchain. Firstly, initializing an identity management organization, an entity identity block chain, a user, an advertisement publisher and an advertiser to generate parameters required by a system and public and private key information required by each; then, user U i Registering the advertisement publisher PUB and the advertiser ADE with an identity management authority IMA; then, the advertisement publisher and the site issue related advertisements to the target user to attract the user to click; finally, the ad publisher PUB, advertiser ADE, and site MS are all able to monitor and prevent click fraud. The invention ensures the authenticity of the click quantity in the settlement process of the online advertising system by utilizing the characteristic that the blockchain is not tamperable.

Description

Block chain-based online advertisement click fraud monitoring and preventing method
Technical Field
The invention relates to the technical field of fraud monitoring and prevention, in particular to an online advertisement click fraud monitoring and prevention method based on a blockchain.
Background
Consumers create revenue for the advertising provider by clicking on online advertisements, but the subsequent criminals' click fraud poses a threat to the advertising system.
In this scenario, although some online advertisement click fraud monitoring and prevention techniques have been proposed; however, the proposed method is either vulnerable to resistance attacks or difficult to deal with potential click fraud. Thus, the present chapter proposes a blockchain-based online advertisement click fraud detection and prevention method BCFDPS (a blockchain-based click fraud detection andprevention scheme foronline advertising).
Disclosure of Invention
The invention provides a block chain-based online advertisement click fraud monitoring and preventing method, which mainly aims at the defects of the existing click fraud monitoring and preventing technology.
The technical scheme adopted for solving the technical problems is as follows:
the invention comprises seven components of an identity management organization, a user, an advertising network, an advertising publisher, an advertiser, an entity identity block chain and an access behavior block chain, wherein the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management organization, an entity identity block chain, a user, an advertisement publisher and an advertiser to generate parameters required by a system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity permissions to prove the authenticity and legitimacy of the user; the user obtains the signature of the identity related information after the process, and the advertisement publisher obtains the identity related attribute information; after a certain period, the identity management organization writes in an entity registration result into an entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertising;
3-1, the advertisement publisher publishes the online advertisement: when a user accesses an advertisement network, the encrypted user identity information needs to be sent to a site in the advertisement network, and then the site forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes the online advertisement which is successfully bid in the managed advertisement network; after a certain period, the website in the advertisement network writes advertisement release results into the access behavior blockchain: storing the advertisement identification, the encrypted bid cost, the site identification and the advertisement publisher identification information in the access behavior blockchain in a transaction form;
3-2, clicking on the online advertisement: the user clicks the interested advertisement in the advertisement network, the user embeds the identity license to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the website in the advertisement network writes advertisement forwarding results into the access behavior blockchain: the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information are subjected to hash processing, and then a hash result is stored in an access behavior blockchain in a transaction mode;
step 4, click fraud monitoring and preventing;
4-1, monitoring and preventing click fraud by the advertisement publisher: the advertisement publisher uses the private key of the advertisement publisher to decrypt the advertisement click information, and then verifies by combining the identity permission of the advertisement publisher with the identity permission in the click information so as to complete the monitoring and prevention of malicious click fraud;
4-2, monitoring and preventing click fraud by advertisers: the advertisement master-slave advertisement publisher obtains part of the unchangeable parameters in the advertisement click information, decrypts the part of the parameters by using the private key of the advertisement master-slave advertisement publisher, and then verifies by combining the identity permission of the advertisement master-slave advertisement publisher with the identity permission in the decryption result so as to complete the monitoring and prevention of malicious click fraud;
4-3, site monitoring and preventing click fraud: site monitoring and click fraud prevention in an advertising network; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain so as to complete the monitoring and prevention of malicious click fraud.
Further, the system initialization in step 1 is the initialization of identity management authorities and entity identity blockchain EIB, providing parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide public and private key pairs for registration, and the specific implementation is as follows:
1-1. Identity management authority initialization: identity managementThe authority IMA first generates its own public and private key PK IMA /SK IMA Public key PK in a system IMA The method comprises the steps of carrying out a first treatment on the surface of the IMA defines a set of attributes s= { PUB }, based on the ad type of the ad publisher PUB agent, { Hat U.S. U.G. Patts U.S. Shoes U.S. Food U.S. … }; wherein Hat, clouthes, pants, shoes, food are attribute tags;
1-2 the entity identity blockchain EIB is all users U i The public parameters PP of the system are initialized by the advertisement publisher PUB and the advertiser ADE, and the method is concretely realized as follows:
EIB selects a large prime number p and an elliptic curve E p (a, b) and an n-order finite field E p A lower base point P; IMA then selects a bilinear group G with generator G and two random numbersThe following parameters were calculated: h=g β ,f=g 1 ,l=e(g,g) α ,MK=(β,g α ) And forms the common parameter PP:
PP=<E p (a,b),P,G,g,h,e,f,l,MK>
wherein e is a bilinear mapping function, weil pairing algorithm; when IMA joins EIB network, EIB sends the public parameter PP to IMA; finally, the EIB generates a shared secret X and distributes the X into a plurality of sub-secrets to each IMA using Shamir (t, n) threshold secret sharing algorithms;
1-3 user U i The public and private keys of the advertisement publisher PUB and the advertiser ADE are respectively generated and respectively recorded as PK U /SK U ,PK PUB /SK PUB And PK ADE /SK ADE
Further, user U i The advertisement publisher PUB and the advertiser ADE all register with the identity management authority IMA in advance and obtain the identity mark and the identity permission before proceeding to the next step, wherein U i The signature of the identity-related information is also obtained, and the advertisement publisher PUB also obtains the identity-related attribute information, which is specifically realized as follows:
2-1 user U i Registering with IMA;
the first step: IMA collects user U i The fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code base according to the digitized information of the fingerprint, and then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as users U i A true identity UID; after this, IMAs recover the shared key X using the Shamir (t, n) threshold secret sharing algorithm, and then calculate the user U i Identity permissions IL of (2) U =uid.h (X) ·p, mask identity muid=uid.p, and signatureIMA then adds the information->To the user U i Wherein PP is a common parameter generated by EIB initialization, h (IL U ) Representation of IL U Hash processing is performed, and->Representing IMA vs. content h (IL U ) Private key SK is used by MUID IMA Signing, fitting up>Representing U versus content UID IL U ||U Sig Public key PK is used by the PP U Encrypting;
and a second step of: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, which is used to account for the user U when click fraud occurs i
2-2, registering the advertisement publisher PUB with IMA;
the first step: IMA generates an identity tag PUBID and an attribute set S= { { PUB }, { Bat U.F. U.S. … } for the PUB according to the advertisement type proxied by the PUB, then IMA recovers the shared secret key X by using a Shamir (t, n) threshold secret sharing algorithm, and then calculates the identity license IL of the advertisement publisher PUB PUB =pubid.h (X) ·p, then IMA will informationSending to the advertisement publisher PUB;
and a second step of: IMA hashes the information PUBID and records the result h (PUBID) in the EIB blockchain, and is used for supervising the advertisement publisher PUB when click fraud occurs;
2-3, registering an advertiser ADE to IMA;
the first step: IMA generates an identity identification ADEID for ADE according to the type of advertisement required to be published by ADE, then IMA recovers a shared secret key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates an identity license IL of an advertiser ADE ADE =adeid.h (X) ·p, then IMA will informationSending to an advertiser ADE; and a second step of: IMA records information h (ADEID) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
Further, the step 3-1 advertisement publisher publishes online advertisements, and the specific implementation is as follows:
the first step: the advertisement publisher PUB and the advertiser agree on the advertisement putting matters to agree on the identification ID of the advertisement ad
And a second step of: user U i Accessing web pages of site MS while U i Is signed U using an encrypted CP-ABE scheme based on ciphertext policy attributes Sig After encryption, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically: user U i After accessing the MS's website, an access tree T is defined according to the advertisement type of interest, and signature U is encrypted using public parameters PP and CP-ABE encryption scheme Sig Obtaining ciphertextl s ,C=h s ,/>Wherein ts is 1 Is user U i Encryption signature U Sig Time stamp of time,,>is a random number, h=g β ,/>p y Is a polynomial represented by each node y in the access tree T, p y (0) Is the value represented by the node y, att (y) is the attribute possessed by a leaf node y in the access tree T; />C is the secret information to be transmitted in the ciphertext CT; c (C) y 、C' y Is auxiliary information for decrypting CT; after obtaining ciphertext CT, user U i The browser plug-in of (a) sends the CT to the MS, which then forwards it to a different PUB;
and a third step of: the PUB generates a decryption key from its set of attributes S obtained during registration, while using MK in the public parameter PP Wherein (1)>Is a random number; then, since the attribute set s= { { PUB }, { Hat U gate … } satisfies the user U i Defined access tree T, so PUB can decrypt the secret value represented by each leaf node x in the access tree using SK, the decryption process being Decrypting secret values of all leaf nodes at a PUBThen, the Lagrangian difference formula is used to obtain the secret value represented by the father node corresponding to the leaf nodes; the PUB recursively repeats this process until a secret value is obtained, represented by the root node R in the access tree T, which can be expressed as +.>Then PUB gets plaintext-> Finally, public key PK with PUB using IMA IMA Decryption U Sig Obtaining user U i The mask identity MUID of the MS is searched according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether the MS participates in the advertisement bidding process is determined; d'. j Is a parameter in the decryption key SK, C x ' is a parameter in ciphertext CT;
fourth step: the MS presents the advertisement in its advertising network while will PUBID, ADEID, PK PUB And PK ADE Embedded in the display frame of the advertisement;
fifth step: after a certain period, the MS calculates the advertisement bidding information according to the period and the advertisement identification ID ad Classifying and sorting to obtain advertisement release result as Wherein fee denotes that the PUB needs to be user U i A fee paid to the MS for a single advertisement click; finally, the MS records the advertising results in the form of transactions in the access behavior blockchain ABB.
Further, step 3-2 user U i Clicking on an online advertisement, wherein the specific implementation is as follows:
the first step: user U i The browser obtains PUBID, ADEID, PK from the ad display frame PUB And PK ADE Information and then calculate the PUB authenticator And ADE authenticatorThen, user U i Embedding the time stamp ts at this time 2 Calculate PUB security authenticator +_> And ADE Security authenticator-> Subsequently, the plug-in will user U i Click information on advertisement-> Transmitting to the MS;
and a second step of: MS forwarding { ID } ad The M MS gives the advertisement to the advertisement publisher PUB of the advertisement and stores { ID locally } ad ||M||MS||PUBID};
And a third step of: after a certain period, MS follows the period and ID ad Classification of local data { ID } ad M MS PUBID, and hash the classification result, and then hash the result { h (ID) ad The M MS PUBID is recorded as advertisement forwarding result in the form of transaction in the access behavior blockchain ABB.
Further, step 4 includes PUB monitoring and prevention of click fraud, ADE monitoring and prevention of click fraud and MS monitoring and prevention of click fraud.
Further, the PUB monitors and prevents click fraud, and specifically implements the following:
the first step: PUB uses its private key SK PUB Decrypting the advertisement information M forwarded by the MS to obtain { U } Sig ||AuS PUB ||ts 2 Verifying the timestamp ts 2 To avoid replay attacks;
and a second step of: public key PK for PUB using IMA IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate PUB authenticator
And a third step of: PUB verification equation AuS' PUB =AuS PUB If the equation is true, the PUB counts all signatures U Sig The number of different MUIDs in a certain period is denoted as n, which represents the effective advertisement click-through amount in a certain period, meaning that the PUB only needs to pay for n advertisement clicks in the certain period; thereafter, the PUB records the ad access behavior { ID } of the MUID in its local database ad ||M||MUID||U Sig ||SA PUB ||ts 2 ||SA ADE MS fee behavour, where fee is PUB and is needed for user U i Is a fee paid to the MS by a single advertisement click, behavour is user U i For advertisement ID ad Access behavior of (c);
fourth step: after a certain period, PUB is according to the period and ID ad Ordering the users U i Advertisement access result { n||ID } ad ||h(MUID) n ||h(SA PUB ) n ||h(SA ADE ) n Record in access behavior blockchain ABB, where h (MUID) n 、h(SA PUB ) n And h (SA ADE ) n Respectively represent n MUIDs and n SAs PUB And n SA' s ADE Results of the respective hashes.
Further, ADE monitors and prevents click fraud, and is specifically implemented as follows:
the first step: ADE communicates with PUB for acquisitionHousehold U i Original access information { ID for advertisement ad ||U Sig ||SA ADE MS fee, then ADE uses the PUB public key PK PUB Encryption of feeComparing it with the results recorded by MS in the Access behavior blockchain ABB>Comparing to avoid PUB spoofing of fees;
and a second step of: ADE uses own private key SK ADE Decrypting SA ADE Obtaining AuS ADE ||ts 2 Then verify ts 2 To avoid replay attacks;
and a third step of: like PUB, ADE likewise uses the IMA public key PK IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate ADE authenticator ADE verification equation AuS' ADE =AuS ADE If the equation is true, ADE counts all signatures U Sig The number of different MUIDs in the system is denoted as n';
fourth step: ADE reads the result n of the PUB record from the access behavior blockchain ABB, compares whether n=n' holds, and if so, ADE pays PUB fee for this n clicks.
Further, the MS monitors and prevents click fraud, and is specifically implemented as follows:
MS communicates with PUB to obtain { AuS } in all click information M PUB ||ts 2 MS then uses public Key PK of PUB PUB Encryption one by one { AuS } PUB ||ts 2 Obtain PUB security authenticatorAfter that, the MS locallyRead +.>And compare equation SA' PUB =SA PUB If so, the MS receives the statistical result of the PUB on the click rate.
The invention has the following beneficial effects:
in the registration, advertisement release and click fraud detection and prevention processes, the results of entity registration are recorded in an entity identity block chain; relevant results of advertisement release, forwarding and access are recorded in an access behavior blockchain, and the authenticity of click quantity in the settlement process of an online advertisement system is ensured by utilizing the characteristic that the blockchain is not tamperable.
Drawings
FIG. 1 is a block chain based online advertisement click fraud monitoring and prevention system model diagram;
FIG. 2 is a flow chart of a protocol for publishing an advertisement to a target user and attracting the user to click on the advertisement;
FIG. 3 is a flow chart of a click fraud prevention protocol for an advertisement publisher;
FIG. 4 is a flow chart of a click fraud prevention protocol.
Detailed Description
The invention is further described below with reference to the drawings and examples.
As shown in FIG. 1, the online advertisement click fraud monitoring and preventing method based on the blockchain comprises the following interaction steps of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity blockchain and an access behavior blockchain component:
1 initializing an identity management organization and an entity identity block chain in the process, and providing parameters for system entity registration; secondly, the user, the advertisement publisher and the advertiser initialize, generate public-private key pairs for their registration,
1-1 identity management authority initialization: the identity management authority IMA first generates its own public and private key PK IMA /SK IMA Public key PK in a system IMA The method comprises the steps of carrying out a first treatment on the surface of the IMA defines an attribute set S= { { PUB }, { Hat U.S. Pat. U.S. Shodes U.S. Pat. U.S. Pat. No. … } according to the advertisement type of the PUB agent.
1-2 entity identity block chain EIB is all users U i The advertisement publisher PUB and the advertiser ADE initialize the system public parameters PP. The specific implementation is as follows:
EIB is a large prime number p, an elliptic curve E p (a, b) and an n-order finite field E p A lower base point P; then IMA selects a bilinear group G with generator G and two random numbersThe following parameters were calculated: h=g β ,f=g 1/β ,l=e(g,g) α ,MK=(β,g α ) And forms the common parameter PP:
PP=<E p (a,b),P,G,g,h,e,f,l,MK>
where e is a bilinear mapping function-Weil pairing algorithm. When an IMA joins an EIB network, the EIB sends this common parameter PP to the IMA. Finally, the EIB generates a shared secret X and distributes the X to each IMA using a Shamir (t, n) threshold secret sharing algorithm, divided into a plurality of sub-secrets.
1-3 user U i The public and private keys of the advertisement publisher PUB and the advertiser ADE are respectively generated and recorded as PK U /SK U ,PK PUB /SK PUB And PK ADE /SK ADE
2 the user, the advertisement publisher and the advertisement owner all register the user with the identity management organization in advance, the advertisement publisher and the advertisement owner all register with the identity management organization in advance and acquire the identity mark and the identity licensor for the next step, wherein the user also acquires the signature of the identity related information, the advertisement publisher also acquires the identity related attribute information,
2-1 user U i Registers with IMA. First step, IMA collects user U i The fingerprint is digitized to obtain corresponding digitized information, and a group of unique code segments are selected and recombined from the local code base according to the digitized information, and then the unique code segments are obtainedThe code segment is subjected to hash processing to obtain a corresponding hash value, and the hash value is used as a user U i Is a true identity UID. After this, IMAs recover the shared key X using the Shamir (t, n) threshold secret sharing algorithm, and then calculate the user U i Identity permissions IL of (2) U =uid.h (X) ·p, mask identity muid=uid.p, and signature IMA then adds the information->To the user U i Wherein PP is a common parameter generated by EIB initialization.
In a second step, IMA records information h (UID) in the EIB blockchain for accountability of user U when click fraud occurs i
2-2 advertisement publisher PUB registers with IMA. Firstly, IMA generates an identity identification PUBID and an attribute set S= { { PUB }, { Hat U Food U … }, for the PUB according to the advertisement type proxied by the PUB, then IMA recovers a shared secret key X by using a Shamir (t, n) threshold secret sharing algorithm, and then calculates an identity license IL of the advertisement publisher PUB PUB =pubid.h (X) ·p, then IMA will information To the advertisement publisher PUB, where PP is a common parameter generated by EIB initialization.
In a second step, the IMA records information h (PUBID) in the EIB blockchain, which is used to supervise the advertisement publisher PUB when click fraud occurs.
2-3 advertiser ADE registers with IMA. The first step, IMA generates an identity identification ADEID for ADE according to the type of advertisement required to be issued by ADE, and then IMA usesShamir (t, n) threshold secret sharing algorithm recovers shared key X, then calculates identity license IL for advertiser ADE ADE =adeid.h (X) ·p, then IMA will informationIs sent to the advertiser ADE where PP is a common parameter generated by EIB initialization.
In a second step, IMA records information h (ADEID) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
3 the advertisement publisher and site publish advertisement to target user to attract user to click the advertisement: the advertisement publisher PUB publishes the advertisement to the target user U through the advertisement bidding process of the site MS i To obtain a higher return; thereafter, user U i Clicking on the advertisement of interest; the protocol flow for publishing an advertisement to a target user and attracting the user to click on the advertisement is shown in FIG. 2.
3-1 advertisement publishers publish online advertisements. First, the advertisement publisher PUB and the advertiser agree on the advertisement delivery matters, and agree on the identity of the advertisement as ID ad
Second step, user U i Visiting site MS web page, at the same time, U i Is signed U using a cryptograph policy attribute based encryption (CP-ABE) scheme Sig After encryption, it is sent to the MS, which then forwards it to the PUB by the MS. Specifically, user U i After accessing the MS's website, an access tree T is defined according to the advertisement type of interest, and signature U is encrypted using the public parameters PP and CP-ABE scheme Sig Obtaining ciphertext C=h s ,/>Wherein ts is 1 Is user U i Encryption signature U Sig Time stamp of time, ">Is a random number, p y Is a polynomial represented by each node y in the access tree T, att (y) is an attribute owned by a leaf node y in the access tree T. After obtaining ciphertext CT, user U i The browser plug-in of (c) sends the CT to the MS, which then forwards it to a different PUB.
And a third step of: the PUB generates a decryption key from its set of attributes S obtained during registration, while using MK in the public parameter PP Wherein, the liquid crystal display device comprises a liquid crystal display device,is a random number; then, since the attribute set s= { { PUB }, { Hat U gate … } satisfies the user U i Defined access tree T, so PUB can decrypt the secret value represented by each leaf node x in access tree using SK, decryption procedure +.> After the PUB decrypts the secret values of all leaf nodes, the secret values represented by father nodes corresponding to the leaf nodes are obtained by using a Lagrangian difference formula; the PUB recursively repeats this process until a secret value is obtained, represented by the root node R in the access tree T, which can be expressed as +.>Then PUB gets plaintext-> Finally, public key PK with PUB using IMA IMA Decryption U Sig Obtaining user U i The mask identity MUID of the MS is searched according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether the MS participates in the advertisement bidding process is determined; d'. j Is a parameter in the decryption key SK, C x ' is a parameter in ciphertext CT.
Fourth step, MS displays advertisements in its advertisement network while PUBID, ADEID, PK PUB And PK ADE Embedded in the display frame of the advertisement.
Fifth, after a certain period, MS will bid the information according to the period and the ID of the advertisement ad Classifying and sorting to obtain advertisement release result as Wherein fee is PUB and is required to be user U i The MS finally records the advertising result in the form of a transaction into the access behavior blockchain ABB.
3-2 user U i Click on the online advertisement. First step, user U i The browser retrieves PUBID, ADEID, PK from the presentation frame PUB And PK ADE Information and then calculate the PUB authenticatorAnd ADE authenticator Then next, U i Embedding the time stamp ts at this time 2 Computing a PUB security authenticatorAnd ADE Security authenticator-> Subsequently, the plug-in will user U i Click information on advertisement-> To the MS.
Second step, MS forwards { ID } ad The M MS gives the advertisement to the advertisement publisher PUB of the advertisement and stores { ID locally } ad ||M||MS||PUBID}。
Third, after a certain period, MS follows the period and ID ad Classification of local data { ID } ad M MS PUBID, and hash the classification result, and then hash the result { h (ID) ad And recording M MS PUBID as advertisement forwarding results in the access behavior blockchain ABB.
4 click fraud monitoring and prevention: after the advertisement is displayed, the PUB, ADE and MS need to monitor and prevent click fraud;
the 4-1PUB monitoring and prevention of click fraud protocol flow chart is shown in fig. 3. First, the PUB uses its private key SK PUB Decrypting the advertisement information M forwarded by the MS to obtain { U } Sig ||AuS PUB ||ts 2 Verifying the timestamp ts 2 To avoid replay attacks.
In the second step, the PUB uses the IMA public key PK IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate PUB authenticator
Third, the PUB verifies the equation AuS' PUB =AuS PUB If the equation is true, the PUB counts all signatures U sig The number of different MUIDs in the database is denoted as n, which represents the number of valid advertisement clicks in a period, meaning that the PUB only needs to pay for n advertisement clicks in the period, after which the PUB records the advertisement access behavior { ID for the MUID in its local database ad ||M||MUID||U Sig ||SA PUB ||ts 2 ||SA ADE MS fee behavour, where fee is PUB and is needed for user U i Is a fee paid to the MS by a single advertisement click, behavour is user U i For advertisement ID ad Is used to access the memory.
Fourth, after a certain period, PUB according to the period and ID ad Ordering the users U i Advertisement access result { n||ID } da ||h(MUID) n ||h(SA PUB ) n ||h(SA ADE ) n Record in access behavior blockchain ABB, where h (MUID) n 、h(SA PUB ) n And h (SA ADE ) n Respectively represent n MUIDs and n SAs PUB And n SA' s ADE Results of the respective hashes.
4-2ADE monitoring and prevention of click fraud the ADE monitoring and prevention click fraud protocol flow chart is shown in fig. 4. In the first step, ADE communicates with PUB to obtain user U i Original access information { ID for advertisement ad ||U Sig ||SA ADE MS fee, then ADE uses the PUB public key PK PUB Encryption of feeComparing it with the results recorded by MS in the Access behavior blockchain ABB>The comparison is used for avoiding the price cheating of the PUB.
Second step, ADE uses its own private key SK ADE Decrypting SA ADE Obtaining AuS ADE ||ts 2 Then verify ts 2 To avoid replay attacks.
Third, similar to PUB, ADE uses IMA as wellPublic key PK IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate ADE authenticator ADE verification equation AuS' ADE =AuS ADE If the equation is true, ADE counts all signatures U Sig The number of different MUIDs in the set is denoted as n'.
Fourth, ADE reads the result n of the PUB record from the access behavior blockchain ABB, compares whether n=n' holds, and if so, ADE pays PUB fee for n clicks.
The 4-3MS monitors and prevents click fraud. MS communicates with PUB to obtain { AuS in all M PUB ||ts 2 MS then uses public Key PK of PUB PUB Encryption one by one { AuS } PUB ||ts 2 Obtain PUB security authenticatorAfter this, MS reads +.>And compare equation SA' PUB =SA PUB If so, the MS receives the statistical result of the PUB on the click rate.

Claims (9)

1. The online advertisement click fraud monitoring and preventing method based on the blockchain is characterized by comprising seven components of an identity management organization, a user, an advertisement network, an advertisement publisher, an advertiser, an entity identity blockchain and an access behavior blockchain, wherein the interaction steps of the components are as follows:
step 1, initializing a system; respectively initializing an identity management organization, an entity identity block chain, a user, an advertisement publisher and an advertiser to generate parameters required by a system;
step 2, the user, the advertisement publisher and the advertiser register with an identity management organization respectively; acquiring respective identity marks and identity permissions to prove the authenticity and legitimacy of the user; the user obtains the signature of the identity related information after the process, and the advertisement publisher obtains the identity related attribute information; after a certain period, the identity management organization writes in an entity registration result into an entity identity block chain, and stores the identity identification information of the user, the advertisement publisher and the advertiser into the entity identity block chain in a transaction form;
step 3, advertising;
3-1, the advertisement publisher publishes the online advertisement: when a user accesses an advertisement network, the encrypted user identity information needs to be sent to a site in the advertisement network, and then the site forwards the information to each advertisement publisher; according to the information, advertisement publishers participate in the advertisement bidding process of the website, and then the website publishes the online advertisement which is successfully bid in the managed advertisement network; after a certain period, the website in the advertisement network writes advertisement release results into the access behavior blockchain: storing the advertisement identification, the encrypted bid cost, the site identification and the advertisement publisher identification information in the access behavior blockchain in a transaction form;
3-2, clicking on the online advertisement: the user clicks the interested advertisement in the advertisement network, the user embeds the identity license to generate advertisement click information, the advertisement click information is sent to the site, and the site forwards the information to the advertisement publisher of the advertisement; after a certain period, the website in the advertisement network writes advertisement forwarding results into the access behavior blockchain: the advertisement, the advertisement click information of the user, the site identification and the advertisement publisher identification information are subjected to hash processing, and then a hash result is stored in an access behavior blockchain in a transaction mode;
step 4, click fraud monitoring and preventing;
4-1, monitoring and preventing click fraud by the advertisement publisher: the advertisement publisher uses the private key of the advertisement publisher to decrypt the advertisement click information, and then verifies by combining the identity permission of the advertisement publisher with the identity permission in the click information so as to complete the monitoring and prevention of malicious click fraud;
4-2, monitoring and preventing click fraud by advertisers: the advertisement master-slave advertisement publisher obtains part of the unchangeable parameters in the advertisement click information, decrypts the part of the parameters by using the private key of the advertisement master-slave advertisement publisher, and then verifies by combining the identity permission of the advertisement master-slave advertisement publisher with the identity permission in the decryption result so as to complete the monitoring and prevention of malicious click fraud;
4-3, site monitoring and preventing click fraud: site monitoring and click fraud prevention in an advertising network; the website obtains the private key decryption result of the advertisement publisher of the click information from the advertisement publisher, encrypts the decryption result by using the public key of the advertisement publisher, and then compares the decryption result with the advertisement forwarding result in the access behavior block chain so as to complete the monitoring and prevention of malicious click fraud.
2. The blockchain-based online advertisement click fraud monitoring and prevention method of claim 1, wherein the system initialization of step 1 is identity management authority and entity identity blockchain EIB initialization, providing parameters for system entity registration; the user, the advertisement publisher and the advertiser are initialized to provide public and private key pairs for registration, and the specific implementation is as follows:
1-1. Identity management authority initialization: the identity management authority IMA first generates an own public-private key PK IMA /SK IMA Public key PK in a system IMA The method comprises the steps of carrying out a first treatment on the surface of the IMA defines an attribute set S= { { PUB }, { Hat U.C. Pathes U.C. Food U.C. according to the advertisement type of the advertisement publisher PUB agent, { Hat U.C. Pathes U.C. Food U.C. }; wherein Hat, clouthes, pants, shoes, food are attribute tags;
1-2 the entity identity blockchain EIB is all users U i The public parameters PP of the system are initialized by the advertisement publisher PUB and the advertiser ADE, and the method is concretely realized as follows:
EIB selects a large prime number p and an elliptic curve E p (a, b) and an n-order finite field E p A lower base point P; IMA then selects a bilinear group G with generator G and two random numbersThe following parameters were calculated: h=g β ,f=g 1/β ,l=e(g,g) α ,MK=(β,g α ) And forms the common parameter PP:
PP=<E p (a,b),P,G,g,h,e,f,l,MK>
wherein e is a bilinear mapping function, weil pairing algorithm; when IMA joins EIB network, EIB sends the public parameter PP to IMA; finally, the EIB generates a shared secret X and distributes the X into a plurality of sub-secrets to each IMA using Shamir (t, n) threshold secret sharing algorithms;
1-3 user U i The public and private keys of the advertisement publisher PUB and the advertiser ADE are respectively generated and respectively recorded as PK U /SK U ,PK PUB /SK PUB And PK ADE /SK ADE
3. The blockchain-based online advertising click fraud monitoring and prevention method of claim 1, characterized by a user U i The advertisement publisher PUB and the advertiser ADE all register with the identity management authority IMA in advance and obtain the identity mark and the identity permission before proceeding to the next step, wherein U i The signature of the identity-related information is also obtained, and the advertisement publisher PUB also obtains the identity-related attribute information, which is specifically realized as follows:
2-1 user U i Registering with IMA;
the first step: IMA collects user U i The fingerprint is digitized to obtain corresponding digitized information, a group of unique code segments are selected and recombined from a local code base according to the digitized information of the fingerprint, and then the code segments are subjected to hash processing to obtain corresponding hash values, and the hash values are used as users U i A true identity UID; after this, IMAs recover the shared key X using the Shamir (t, n) threshold secret sharing algorithm, and then calculate the user U i Identity permissions IL of (2) U =uid.h (X) ·p, mask identity muid=uid.p, and signatureIMA then adds the information->To the user U i Wherein PP is a common parameter generated by EIB initialization, h (IL U ) Representation of IL U Hash processing is performed, and->Representing IMA vs. content h (IL U ) Private key SK is used by MUID IMA Signing, fitting up>Representing U versus content UID IL U ||U Sig Public key PK is used by the PP U Encrypting;
and a second step of: IMA hashes the information UID and then records the hash result h (UID) in the EIB blockchain, which is used to account for the user U when click fraud occurs i
2-2, registering the advertisement publisher PUB with IMA;
the first step: IMA generates an identity identification PUBID and an attribute set S= { { PUB }, { Hat U.F.. Food U.S. for the PUB according to the advertisement type proxied by the PUB, then IMA recovers the shared secret key X by using a Shamir (t, n) threshold secret sharing algorithm, and then calculates an identity license IL of the advertisement publisher PUB PUB =pubid.h (X) ·p, then IMA will informationSending to the advertisement publisher PUB;
and a second step of: IMA hashes the information PUBID and records the result h (PUBID) in the EIB blockchain, and is used for supervising the advertisement publisher PUB when click fraud occurs;
2-3, registering an advertiser ADE to IMA;
the first step: IMA generates an identity identification ADEID for ADE according to the type of advertisement required to be published by ADE, then IMA recovers the shared secret key X by using Shamir (t, n) threshold secret sharing algorithm, and then calculates an advertiser ADIdentity permissions IL for E ADE =adeid.h (X) ·p, then IMA will informationSending to an advertiser ADE;
and a second step of: IMA records information h (ADEID) in the EIB blockchain for auditing the advertiser ADE when click fraud occurs.
4. The online advertisement click fraud monitoring and preventing method based on blockchain as in claim 3, wherein the advertisement publishing is characterized in that the advertisement publisher publishes the online advertisement in step 3-1, concretely implemented as follows:
the first step: the advertisement publisher PUB and the advertiser agree on the advertisement putting matters to agree on the identification ID of the advertisement ad
And a second step of: user U i Accessing web pages of site MS while U i Is signed U using an encrypted CP-ABE scheme based on ciphertext policy attributes Sig After encryption, the encrypted data is sent to the MS, and then the MS forwards the encrypted data to the PUB; specifically: user U i After accessing the MS's website, an access tree T is defined according to the advertisement type of interest, and signature U is encrypted using public parameters PP and CP-ABE encryption scheme Sig Obtaining ciphertext C=h s ,/>Wherein ts is 1 Is user U i Encryption signature U Sig Time stamp of time, ">Is a random number, h=g β ,l,g,/>p y Is a polynomial represented by each node y in the access tree T, p y (0) Is the value represented by the node y, att (y) is the attribute possessed by a leaf node y in the access tree T; />C is the secret information to be transmitted in the ciphertext CT; c (C) y 、C′ y Is auxiliary information for decrypting CT; after obtaining ciphertext CT, user U i The browser plug-in of (a) sends the CT to the MS, which then forwards it to a different PUB;
and a third step of: the PUB generates a decryption key from its set of attributes S obtained during registration, while using MK in the public parameter PP Wherein (1)> Is a random number; next, since the attribute set s= { { PUB }, { Hat u.f. Food i Defined access tree T, so PUB can decrypt the secret value represented by each leaf node x in access tree using SK, decryption procedure +.> After the PUB decrypts the secret values of all leaf nodes, the secret values represented by father nodes corresponding to the leaf nodes are obtained by using a Lagrangian difference formula; the PUB recursively repeats this process until a secret value is obtained, represented by the root node R in the access tree T, which can be expressed as +.>Then PUB gets plaintext-> Finally, public key PK with PUB using IMA IMA Decryption U Sig Obtaining user U i The mask identity MUID of the MS is searched according to the MUID to obtain a digital portrait corresponding to the MUID, so that whether the MS participates in the advertisement bidding process is determined; d'. j Is a parameter in the decryption key SK, C x ' is a parameter in ciphertext CT;
fourth step: the MS presents the advertisement in its advertising network while will PUBID, ADEID, PK PUB And PK ADE Embedded in the display frame of the advertisement;
fifth step: after a certain period, the MS calculates the advertisement bidding information according to the period and the advertisement identification ID ad Classifying and sorting to obtain advertisement release result as Wherein fee denotes that the PUB needs to be user U i A fee paid to the MS for a single advertisement click; finally, the MS records the advertising results in the form of transactions in the access behavior blockchain ABB.
5. The blockchain-based online advertisement click fraud monitoring and prevention method of claim 3 or 4, characterized by the advertisement distribution of step 3-2 user U i Clicking on an online advertisement, wherein the specific implementation is as follows:
the first step: user U i The browser obtains PUBID, ADEID, PK from the ad display frame PUB And PK ADE Information and then calculate the PUB authenticator And ADE authenticator->Then, user U i Embedding the time stamp ts at this time 2 Calculate PUB security authenticator +_> And ADE Security authenticator-> Subsequently, the plug-in will user U i Click information on advertisement-> Transmitting to the MS;
and a second step of: MS forwarding { ID } ad The M MS gives the advertisement to the advertisement publisher PUB of the advertisement and stores { ID locally } ad ||M||MS||PUBID};
And a third step of: after a certain period, MS follows the period and ID ad Classification of local data { ID } ad M MS PUBID, and hash the classification result, and then hash the result { h (ID) ad The M MS PUBID is recorded as advertisement forwarding result in the form of transaction in the access behavior blockchain ABB.
6. The blockchain-based online advertising click fraud monitoring and prevention method of claim 5, comprising first, PUB monitoring and click fraud prevention; second, ADE monitors and prevents click fraud; third, the MS monitors and prevents click fraud.
7. The method for monitoring and preventing click fraud in online advertisements based on blockchain as in claim 6, wherein the PUB monitoring and preventing click fraud is implemented as follows:
the first step: PUB uses its private key SK PUB Decrypting the advertisement information M forwarded by the MS to obtain { U } Sig ||AuS PUB ||ts 2 Verifying the timestamp ts 2 To avoid replay attacks;
and a second step of: public key PK for PUB using IMA IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate PUB authenticator
And a third step of: PUB verification equation AuS' PUB =AuS PUB If the equation is true, the PUB counts all signatures U Sig The number of different MUIDs in a certain period is denoted as n, which represents the effective advertisement click-through amount in a certain period, meaning that the PUB only needs to pay for n advertisement clicks in the certain period; thereafter, the PUB records the ad access behavior { ID } of the MUID in its local database ad ||M||MUID||U Sig ||SA PUB ||ts 2 ||SA ADE MS fee behavour, where fee is PUB and is needed for user U i Is a fee paid to the MS by a single advertisement click, behavour is user U i For advertisement ID ad Access behavior of (c);
fourth step: after a certain period, PUB is according to the period and ID ad Ordering the users U i Advertisement access result { n||ID } ad ||h(MUID) n ||h(SA PUB ) n ||h(SA ADE ) n Record in access behavior blockchain ABB, where h (MUID) n 、h(SA PUB ) n And h (SA ADE ) n Respectively represent n MUIDs and n SAs PUB And n SA' s ADE Results of the respective hashes.
8. The online advertisement click fraud monitoring and preventing method based on blockchain as in claim 6, wherein ADE monitoring and preventing click fraud is implemented as follows:
the first step: ADE communicates with PUB to obtain user U i Original access information { ID for advertisement ad ||U Sig ||SA ADE MS fee, then ADE uses the PUB public key PK PUB Encryption of feeComparing it with the results recorded by MS in the Access behavior blockchain ABB>Comparing to avoid PUB spoofing of fees;
and a second step of: ADE uses own private key SK ADE Decrypting SA ADE Obtaining AuS ADE ||ts 2 Then verify ts 2 To avoid replay attacks;
and a third step of: like PUB, ADE likewise uses the IMA public key PK IMA From signature U Sig H (IL) is recovered from the middle U ) And MUID, then calculate ADE authenticator ADE verification equation AuS' ADE =AuS ADE If the equation is true, ADE counts all signatures U Sig The number of different MUIDs in (a) is denoted as n':
fourth step: ADE reads the result n of the PUB record from the access behavior blockchain ABB, compares whether n=n' holds, and if so, ADE pays PUB fee for this n clicks.
9. The blockchain-based online advertisement click fraud monitoring and prevention method of claim 6, wherein the MS monitors and prevents click fraud by:
MS communicates with PUB to obtain { AuS } in all click information M PUB ||ts 2 MS then uses public Key PK of PUB PUB Encryption one by one { AuS } PUB ||ts 2 Obtain PUB security authenticatorAfter this, MS reads +.>And compare equation SA' PUB =SA PUB If so, the MS receives the statistical result of the PUB on the click rate.
CN202110736776.XA 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method Active CN113538042B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110736776.XA CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110736776.XA CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Publications (2)

Publication Number Publication Date
CN113538042A CN113538042A (en) 2021-10-22
CN113538042B true CN113538042B (en) 2023-09-22

Family

ID=78126393

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110736776.XA Active CN113538042B (en) 2021-06-30 2021-06-30 Block chain-based online advertisement click fraud monitoring and preventing method

Country Status (1)

Country Link
CN (1) CN113538042B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN111260399A (en) * 2020-01-15 2020-06-09 腾讯科技(深圳)有限公司 Advertisement data processing method and device based on block chain network and electronic equipment
CN111275495A (en) * 2020-02-21 2020-06-12 腾讯科技(深圳)有限公司 Advertisement putting monitoring method, device and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN110309634A (en) * 2019-04-04 2019-10-08 深圳大通实业股份有限公司 A kind of credible advertisement data management system based on block chain
CN111260399A (en) * 2020-01-15 2020-06-09 腾讯科技(深圳)有限公司 Advertisement data processing method and device based on block chain network and electronic equipment
CN111275495A (en) * 2020-02-21 2020-06-12 腾讯科技(深圳)有限公司 Advertisement putting monitoring method, device and system based on block chain

Also Published As

Publication number Publication date
CN113538042A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
TWI723658B (en) Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain
US11176571B2 (en) Methods and system for serving targeted advertisements to a consumer device
TWI389046B (en) Trusted third party clearing house for lead tracking
Backes et al. Obliviad: Provably secure and practical online behavioral advertising
US20190013950A1 (en) Method And System For Privacy-Preserving Social Media Advertising
US20080162227A1 (en) Method and apparatus for combatting click fraud
US20150170197A1 (en) Technologies for collecting advertising statistics in a privacy sensitive manner
Juels et al. Combating Click Fraud via Premium Clicks.
US20230281671A1 (en) Decentralized privacy-preserving rewards with cryptographic black box accumulators
Chi et al. Secure and reliable blockchain-based eBook transaction system for self-published eBook trading
CN114223175A (en) Generating a sequence of network data while preventing acquisition or manipulation of time data
JP6674401B2 (en) Detection system, detection method and detection program
Zhong et al. Ibex: Privacy-preserving ad conversion tracking and bidding
WO2019148795A1 (en) Value transfer method, apparatus, computer device, and storage medium
CN113538042B (en) Block chain-based online advertisement click fraud monitoring and preventing method
CN101763609A (en) Virtual transaction evidence-obtaining method based on data signature and video technology
Liu et al. Watermarking protocol for broadcast monitoring
JP7327480B2 (en) Electronic trading system, trading management server, electronic trading method and program
CN111160997A (en) Advertisement supervision method and device based on block chain and advertisement delivery system
KR20220020372A (en) Systems and methods for providing authenticity, integrity and non-repudiation to advertising technology
Ramani et al. Blockchain for digital rights management
CN115964680B (en) Copyright protection method based on double authentication blocking signature and blockchain
Mosher et al. Verifiable and Privacy-Preserving Ad Exchange for Smart Targeted Advertising
Karuppiah Blockchain for digital rights management
JP4689819B2 (en) Electronic information disclosure proof collecting device, browsing proof data providing device, electronic commerce system, method thereof, and computer-readable recording medium recording program in electronic information disclosure proof system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant