CN106897906B - Incentive content distribution method and system - Google Patents
Incentive content distribution method and system Download PDFInfo
- Publication number
- CN106897906B CN106897906B CN201710113362.5A CN201710113362A CN106897906B CN 106897906 B CN106897906 B CN 106897906B CN 201710113362 A CN201710113362 A CN 201710113362A CN 106897906 B CN106897906 B CN 106897906B
- Authority
- CN
- China
- Prior art keywords
- offer
- task
- invitation
- voucher
- winning
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0207—Discounts or incentives, e.g. coupons or rebates
- G06Q30/0208—Trade or exchange of goods or services in exchange for incentives or rewards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Game Theory and Decision Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Entrepreneurship & Innovation (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention provides an incentive content distribution method and system, wherein the method comprises the following steps: configuring an offer task according to the business requirements; generating an offer credential from the offer task; issuing an invitation voucher to each invitation response end in the current block chain network, and receiving respectively returned task execution vouchers; verifying whether each offer response end completes the offer task according to each task execution voucher and a pre-configured verification method; screening the invitation response ends for winning the prize from the invitation response ends for completing the invitation task by adopting a screening method configured according to the service requirements; and generating a winning voucher and sending the winning voucher to an invitation response end for obtaining incentive content. The invention provides a reward mechanism for blockchain networks, wherein the mode and the source of the reward are configurable, and the reward mechanism is independent of a consensus mechanism.
Description
Technical Field
The present application relates to the field of block chain technology, and in particular, to an incentive content distribution method and system.
Background
The reward mechanism for the nodes in the current blockchain system is mainly closely related to the consensus mechanism of the blockchain network, and the rewards related to the nodes can be divided into the following three types according to the current main consensus mechanism workload certification (POW), the equity certification mechanism (POS), the share authorization certification mechanism (DPOS) and the practical byzantine fault-tolerant algorithm (PBFT):
the first type is reward based on ore digging, when using POW or POS to carry out consensus, the ore digging is carried out through nodes so as to select the nodes obtaining block chain writing authority, and the selected nodes carrying out block chain writing are rewarded in a mode of issuing tokens.
The second type is a reward based on the allocation of transaction fees, consensus is made using POS or DPOS, and share equity division is made by the number of tokens held by the node, so that the allocation of commission fees charged through the transaction is rewarded in terms of share proportion.
The third category has no prize, consensus is made using PBFT, no token concept is available, and no additional prize allocation can be made.
The above-mentioned reward mechanism associated with the consensus mechanism has the following problems:
the conventional reward mode depends on a consensus mechanism, because the consensus mechanism is determined at the beginning of the creation of the blockchain system, the reward mode is solidified, and reward distribution of different modes or conditions cannot be configured according to specific service requirements after the reward mode is created; and the source of the reward funds has also solidified, one by giving new issued tokens as a source by creating blocks, and one by collecting transaction commission as a source. The source of the reward cannot be changed according to different service needs.
In addition, the first type of reward also requires that nodes perform ore excavation to complete reward distribution, and the current ore excavation mode is to perform HASH operation on random numbers to find HASH values meeting requirements, so that ore excavation operation is completed. The HASH calculation is characterized in that no method better than exhaustion exists, and the HASH result can fall in a specific range. It is therefore necessary to perform a large number of repetitive operations to determine a certain random number by testing the hash results of different random numbers. In the process, the calculation work of the method is not practical in the service carried by the block chain, and simultaneously, a large amount of energy is wasted.
Disclosure of Invention
In view of the above-described deficiencies or inadequacies in the prior art, it would be desirable to provide an incentive content distribution method and system that provides a configurable pattern and source of reward distribution without relying on a consensus mechanism.
In a first aspect, the present invention provides a method of incentivized content distribution, including
Configuring an offer task according to the business requirements;
generating an offer credential from the offer task;
issuing the invitation voucher to each invitation response end in the current block chain network, and receiving task execution vouchers respectively returned by each invitation response end;
verifying whether each invitation response end completes the invitation task according to each task execution voucher and a pre-configured verification method;
adopting a screening method configured according to the service requirements to screen an offer response end for winning a prize from the offer response ends for completing the offer task;
and generating a winning voucher and sending the winning voucher to an invitation response end for obtaining incentive content.
In a second aspect, the present invention provides another method of incentivized content distribution, the method including:
receiving an offer voucher issued by an offer initiator;
performing an offer task according to the received offer credential;
generating a task execution certificate according to an execution result;
returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening an invitation response end for winning by adopting a screening method configured according to service requirements;
waiting for receiving a winning voucher sent by the offer originator: and if so, acquiring incentive type contents according to the winning voucher.
Wherein the offer voucher is generated according to an offer task configured by business requirements.
In a third aspect, the present invention provides an offer initiator configured in a blockchain network, including:
the task configuration unit is used for configuring an invitation task according to the service requirement;
a first voucher generation unit configured to generate an offer voucher according to the offer task and generate a winning voucher;
the first communication unit is configured to issue the offer voucher to each offer response end in the blockchain network, receive task execution vouchers respectively returned by each offer response end, and send the winning voucher to the winning offer response end to acquire incentive content;
the verification unit is configured to verify whether each invitation response end completes the invitation task according to each task execution voucher and a preconfigured verification method;
and the winning prize screening unit is configured to screen the winning invitation response ends from the invitation response ends which complete the invitation tasks by adopting a screening method configured according to the service requirements.
In a fourth aspect, the present invention provides an offer responding terminal configured in a blockchain network, including:
a task execution unit configured to execute the offer task according to the received offer voucher;
the second certificate generation unit is configured for generating a task execution certificate according to an execution result;
the second communication unit is configured to receive an invitation voucher issued by an invitation initiating end; returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening an invitation response end for winning by adopting a screening method configured according to service requirements; waiting for receiving a winning voucher sent by the invitation initiating terminal;
and the incentive type content acquisition unit is configured to acquire incentive type content according to the winning voucher.
Wherein the offer voucher is generated according to an offer task configured by business requirements.
In a fifth aspect, the invention provides an incentive content distribution system, comprising at least one of the above-mentioned offer initiating terminals, and several of the above-mentioned offer responding terminals.
In a sixth aspect, the present invention also provides an apparatus comprising one or more processors and a memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform an incentivized content distribution method provided in accordance with embodiments of the present invention.
In a seventh aspect, the present invention also provides a computer-readable storage medium storing a computer program for causing a computer to execute the incentive content distribution method according to the embodiments of the present invention.
The incentive type content distribution method and the incentive type content distribution system provided by the embodiments of the invention flexibly configure an invitation task and a verification method thereof according to a service requirement, and adopt a screening method configured according to the service requirement to screen an invitation response end (node) for winning prizes, generate a winning certificate which can flexibly configure and acquire an incentive type content mode and source for acquiring the incentive type content, and provide an incentive mechanism which is provided with an incentive issuing mode and a configurable source and does not depend on a consensus mechanism for a blockchain network;
the incentive type content distribution method and the incentive type content distribution system further adopt an asymmetric public and private key encryption mechanism to carry out encryption verification on key data in the incentive type content distribution method, so that the safety of an incentive mechanism is guaranteed;
the incentive type content distribution method and system provided by some embodiments of the present invention further provide a flexible, controllable, and efficient execution mechanism by customizing the executable file to perform operations such as executing tasks, verifying execution results, and obtaining incentive type content.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the following detailed description of non-limiting embodiments thereof, made with reference to the accompanying drawings in which:
fig. 1 is a flowchart of an incentive content distribution method according to an embodiment of the present invention.
Fig. 2 is a flowchart of step S12 in a preferred embodiment of the method shown in fig. 1.
Fig. 3 is a flowchart of step S14 in a preferred embodiment of the method shown in fig. 1.
Fig. 4 is a flowchart of step S15 in a preferred embodiment of the method shown in fig. 1.
Fig. 5 is a flowchart of step S16 in a preferred embodiment of the method shown in fig. 1.
Fig. 6 is a flowchart of another incentive content distribution method according to an embodiment of the present invention.
Fig. 7 is a flowchart of step S22 in a preferred embodiment of the method shown in fig. 6.
Fig. 8 is a flowchart of step S23 in a preferred embodiment of the method shown in fig. 6.
Fig. 9 is a flowchart of step S25 in a preferred embodiment of the method shown in fig. 6.
Fig. 10 is a schematic structural diagram of an offer initiator according to an embodiment of the present invention.
Figure 11 is a schematic diagram of the structure of a preferred embodiment of the initiation end of the offer shown in figure 10.
Fig. 12 is a schematic structural diagram of an offer response end according to an embodiment of the present invention.
Fig. 13 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the relevant invention and not restrictive of the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of an incentive content distribution method according to an embodiment of the present invention.
As shown in fig. 1, in the present embodiment, the present invention provides an incentive content distribution method suitable for an offer initiator, including:
s11: configuring an offer task according to the business requirements;
s12: generating an offer credential from the offer task;
s13: issuing the invitation voucher to each invitation response end in the current block chain network, and receiving task execution vouchers respectively returned by each invitation response end;
s14: verifying whether each invitation response end completes the invitation task according to each task execution voucher and a pre-configured verification method;
s15: adopting a screening method configured according to the service requirements to screen an offer response end for winning a prize from the offer response ends for completing the offer task;
s16: and generating a winning voucher and sending the winning voucher to an invitation response end for obtaining incentive content.
In this patent, the motivational content may be configured into various different types of rewards, such as virtual currency, discount coupons, vouchers for getting physical rewards, etc., according to actual business requirements.
Specifically, in step S11, in a configuration manner, the completed invitation task configured according to the service requirement may be directly obtained, for example, 15 hash computations are completed, or a registration card is punched to the M node in the current block link network, and an executable file for executing the invitation task is generated according to the obtained invitation task;
in another configuration, the service requirement without specific task limitation may be obtained, for example, only the service category is limited to complete a calculation task, or a card punching task, or different conditions related to other services are defined as the service requirement, and an offer task is randomly generated according to the obtained service requirement, or an offer task is generated according to a preconfigured algorithm, and finally an executable file for executing the offer task is generated according to the generated offer task.
In step S12, the executable file generated in step S11 may be encrypted using various different encryption algorithms to generate an offer voucher. Specifically, the encryption algorithm used in this embodiment is a public-private key encryption algorithm.
Fig. 2 is a flowchart of step S12 in a preferred embodiment of the method shown in fig. 1.
As shown in fig. 2, preferably, step S12 includes:
s121: generating a first public and private key pair;
s123: and encrypting the executable file for executing the invitation task by using a first private key in the first public and private key pair to generate an invitation voucher.
In further embodiments, different types of asymmetric encryption algorithms or other encryption algorithms suitable for use in a blockchain network environment may be used to configure different encryption steps to encrypt the executable file generated in step S11, and the same technical effects may be achieved.
In step S13, each node in the current blockchain network is configured with an offer response end, and each node can be guaranteed to have a chance of winning a prize by issuing an offer voucher to each offer response end.
Fig. 3 is a flowchart of step S14 in a preferred embodiment of the method shown in fig. 1.
As shown in fig. 3, preferably, each task execution voucher received in step S13 is also encrypted by a public and private key encryption algorithm, and step S14 includes:
s141: acquiring a second public key from the invitation response end to verify the task execution certificate and obtain an execution result;
s143: and verifying whether the invitation response end completes the invitation task or not according to the execution result and a pre-configured verification method.
Specifically, in step S141, if the validation of the execution voucher fails for any one of the tasks, the subsequent steps are not performed on the execution voucher for the task, and the corresponding offer response terminal (node) loses the winning qualification.
In step S143, the preconfigured verification method corresponds to the offer task configured in step S11, and may be obtained together with the offer task in step S11, or may be generated and configured together with the offer task to generate an executable file for executing the verification method, for example, if the offer task is registering and checking a card at the M node, the verification method is to query a record of registering and checking a card at the M node and match the result with the execution result. The verification can be completed by running the executable file executing the verification method.
In further embodiments, the same technical effect can be achieved by configuring different authentication manners in step S141 according to different encryption manners adopted by the task execution credential.
Fig. 4 is a flowchart of step S15 in a preferred embodiment of the method shown in fig. 1.
As shown in fig. 4, preferably, step S15 includes:
s151: acquiring and loading a plug-in configured with a screening method configured according to the service requirement;
s153: the plug-in is run to screen out solicitation responses for winnings.
Specifically, the screening method may be configured to complete a plurality of tasks first (screening according to time sequence), complete within a predetermined time (screening according to time nodes), within a certain region (screening according to region), or other different screening strategies, as well as a combined screening strategy, according to actual requirements.
In this embodiment, the screening method is managed in step S15 by using a configuration plug-in, and in further embodiments, the management method of the screening method may be configured to pre-store all types of screening methods for selection according to actual requirements, or obtain a corresponding screening method from the cloud server, and so on.
Fig. 5 is a flowchart of step S16 in a preferred embodiment of the method shown in fig. 1.
As shown in fig. 5, preferably, step S16 includes:
s161: generating an executable file for executing the operation of obtaining the motivational content;
s163: generating a third public and private key pair;
s165: encrypting an executable file for executing the operation of obtaining the incentive type content by using a third private key in a third public and private key pair to generate a winning certificate;
s167: and sending the generated winning voucher to a winning invitation response end for obtaining motivational content.
Specifically, similar to step S12, in further embodiments, different types of asymmetric encryption algorithms or other encryption algorithms suitable for use in the blockchain network environment may be used to configure different encryption steps to encrypt the executable file generated in step S161, and the same technical effect may be achieved.
The above-mentioned embodiment flexibly configures the invitation task and the verification method thereof according to the business requirements, and adopts the screening method configured according to the business requirements to screen the invitation response end (node) for winning prizes, and generates the winning certificate capable of flexibly configuring the mode and the source of obtaining the incentive type content for obtaining the incentive type content, thereby providing a reward mechanism with configurable mode and source for the blockchain network, and being independent of the consensus mechanism.
Fig. 6 is a flowchart of another incentive content distribution method according to an embodiment of the present invention.
As shown in fig. 6, in the present embodiment, the present invention also provides another incentive content distribution method suitable for an offer responding end, including:
s21: receiving an offer voucher issued by an offer initiator;
s22: performing an offer task according to the received offer credential;
s23: generating a task execution certificate according to an execution result;
s24: returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening an invitation response end for winning by adopting a screening method configured according to service requirements;
s25: waiting for receiving a winning voucher sent by the offer originator: and if so, acquiring incentive type contents according to the winning voucher.
Wherein the offer voucher is generated according to an offer task configured by the business requirements.
Fig. 7 is a flowchart of step S22 in a preferred embodiment of the method shown in fig. 6.
Specifically, as shown in fig. 7, preferably, step S22 includes:
s221: obtaining a first public key from an invitation initiating end to verify an invitation certificate to obtain an executable file for executing an invitation task;
s223: executing the executable file in a virtual image to perform the offer task.
Specifically, in this embodiment, the step S221 verifies the offer voucher by obtaining the first public key, and in further embodiments, the step S221 may configure different verification methods according to different encryption verification algorithms adopted by the offer voucher, so as to achieve the same technical effect.
In step S223, the virtual image is a docker image, and in more embodiments, different types of virtual image environments may be configured according to actual requirements to execute the executable file.
Fig. 8 is a flowchart of step S23 in a preferred embodiment of the method shown in fig. 6.
As shown in fig. 8, preferably, step S23 includes:
s231: generating a second public and private key pair;
s233: and encrypting the execution result by using a second private key in the second public and private key pair to generate the task execution certificate.
Specifically, in more embodiments, different types of asymmetric encryption algorithms or other encryption algorithms suitable for the blockchain network environment may also be used to configure different encryption steps to encrypt the execution result generated in step S22, and the same technical effect may be achieved.
Fig. 9 is a flowchart of step S25 in a preferred embodiment of the method shown in fig. 6.
As shown in fig. 9, preferably, step S25 includes:
s251: waiting for receiving a winning voucher sent by the offer originator:
if yes, go to step S253: obtaining a third public key from the invitation initiating terminal to verify the winning certificate, and obtaining an executable file for executing the operation of obtaining the incentive type content; and the number of the first and second groups,
s255: the executable file is executed in the virtual image to obtain the motivational content.
Specifically, the method for acquiring the incentive content may adopt various different configurations according to business requirements, and if the incentive content is acquired from the third-party node, a method for verifying a winning voucher should be preconfigured in the third-party node.
In step S255, the virtual image is also configured as a docker image, and in further embodiments, different types of virtual image environments may be configured according to actual requirements to execute the executable file.
Fig. 10 is a schematic structural diagram of an offer initiator according to an embodiment of the present invention. The invitation originator shown in fig. 10 may correspondingly perform the incentive content distribution method provided by any of the embodiments shown in fig. 1-5 above.
As shown in fig. 10, in the present embodiment, the offer initiator provided by the present invention includes a task configuration unit 11, a first credential generation unit 13, a first communication unit 15, a verification unit 17, and a winning-screening unit 19.
The task configuration unit 11 is configured to configure an offer task according to the business requirements;
the first voucher generation unit 13 is configured to generate an offer voucher according to the offer task, and to generate a winning voucher;
the first communication unit 15 is configured to issue an offer voucher to each offer response end in the blockchain network, receive a task execution voucher returned by each offer response end, and send a winning voucher to a winning offer response end for obtaining motivational content;
the verification unit 17 is configured to verify whether each offer response end completes the offer task according to each task execution credential and a preconfigured verification method;
the winning-prize screening unit 19 is configured to screen the offer response terminals for winning prizes among the offer response terminals that each complete the offer task by using a screening method configured according to the service requirements.
In a preferred embodiment, the first credential generating unit 13 is further configured to generate the offer credential and/or the winning credential by using a public-private key encryption algorithm. For a specific principle, refer to the above steps S12 and S16, which are not described herein again.
In a preferred embodiment, the task execution credentials are generated by encryption according to a public-private key encryption algorithm. The verification unit 17 is further configured to obtain a second public key from the invitation responder through the first communication unit 15 to verify the task execution credential, obtain an execution result, and verify whether the invitation responder completes the invitation task according to the execution result and a preconfigured verification method. For a specific principle, refer to step S14 above, and will not be described herein again.
Figure 11 is a schematic diagram of the structure of a preferred embodiment of the initiation end of the offer shown in figure 10.
As shown in fig. 11, in a preferred embodiment, the winning filter unit 19 further includes:
the plug-in configuration subunit 191 is configured to acquire and load plug-ins configured with screening methods configured according to the service requirements;
a plug-in running subunit 193 configured to run a plug-in to screen out the offered responses for winning the prize.
Fig. 12 is a schematic structural diagram of an offer response end according to an embodiment of the present invention. The offer responder shown in fig. 12 may correspondingly execute the incentive content distribution method provided by any of the embodiments shown in fig. 6-9.
As shown in fig. 12, in the present embodiment, the offer responding end provided by the present invention includes a task executing unit 21, a second credential generating unit 23, a second communication unit 25, and an incentive content acquiring unit 27.
The task execution unit 21 is configured to execute the offer task according to the received offer voucher;
the second credential generating unit 23 is configured to generate a task execution credential according to the execution result;
the second communication unit 25 is configured to receive the offer voucher issued by the offer originator; returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening the invitation response end for winning prize by adopting a screening method configured according to the service requirement; waiting for receiving a winning voucher sent by an invitation initiating end;
the incentive content acquiring unit 27 is configured to acquire incentive content according to the winning ticket.
Wherein the offer voucher is generated according to an offer task configured by the business requirements.
In a preferred embodiment, the task execution unit 21 is further configured to obtain the first public key to verify the offer voucher through the second communication unit 25 to the offer originator, obtain an executable file for executing the offer task, and execute the executable file in the virtual image to execute the offer task. For a specific principle, refer to step S22 above, and will not be described herein again.
In a preferred embodiment, the second credential generating unit 23 is further configured to generate the task execution credential by using a public-private key encryption algorithm. For a specific principle, refer to step S23 above, and will not be described herein again.
In a preferred embodiment, the incentive content acquiring unit 27 is further configured to acquire a third public key to verify the winning voucher through the second communication unit 25 to the invitation originator, obtain an executable file for performing the operation of acquiring incentive content, and execute the executable file in the virtual image to acquire incentive content. For a specific principle, refer to step S25 above, and will not be described herein again.
In this embodiment, the present invention further provides an incentive content distribution system, which includes at least one offer initiating terminal described in any one of the above embodiments, and several offer responding terminals described in any one of the above embodiments.
The above embodiments further adopt an asymmetric public and private key encryption mechanism to perform encryption verification on the key data in the incentive type content distribution method, thereby ensuring the security of the reward mechanism; and by customizing the executable file to perform operations of executing tasks, verifying execution results, acquiring motivational content and the like, a flexible, controllable and efficient execution mechanism is provided.
Fig. 13 is a schematic structural diagram of an apparatus according to an embodiment of the present invention.
As shown in fig. 13, as another aspect, the present application also provides an apparatus 1300 including one or more Central Processing Units (CPUs) 1301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)1302 or a program loaded from a storage section 1308 into a Random Access Memory (RAM) 1303. In the RAM1303, various programs and data necessary for the operation of the device 1300 are also stored. The CPU1301, the ROM1302, and the RAM1303 are connected to each other via a bus 1304. An input/output (I/O) interface 1305 is also connected to bus 1304.
The following components are connected to the I/O interface 1305: an input portion 1306 including a keyboard, a mouse, and the like; an output section 1307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 1308 including a hard disk and the like; and a communication section 1309 including a network interface card such as a LAN card, a modem, or the like. The communication section 1309 performs communication processing via a network such as the internet. A drive 1310 is also connected to the I/O interface 1305 as needed. A removable medium 1311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1310 as necessary, so that a computer program read out therefrom is mounted into the storage portion 1308 as necessary.
In particular, according to an embodiment of the present disclosure, the incentive content distribution method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program containing program code for performing an incentivized content distribution method. In such embodiments, the computer program may be downloaded and installed from a network via communications component 1309 and/or installed from removable media 1311.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the incentivized content distribution methods described herein.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.
Claims (21)
1. An incentive content distribution method, comprising:
configuring an offer task according to the business requirements;
generating an offer credential from the offer task;
issuing the invitation voucher to each invitation response end in the current block chain network, and receiving task execution vouchers respectively returned by each invitation response end;
verifying whether each invitation response end completes the invitation task according to each task execution voucher and a pre-configured verification method;
adopting a screening method configured according to the service requirements to screen an offer response end for winning a prize from the offer response ends for completing the offer task;
and generating a winning voucher and sending the winning voucher to an invitation response end for obtaining incentive content.
2. The method of incentivized content distribution according to claim 1, wherein said configuring of offer tasks according to business requirements includes any of:
acquiring an invitation task configured according to business requirements, and generating an executable file for executing the invitation task;
and acquiring the service requirement, configuring the corresponding offer task, and generating an executable file for executing the offer task.
3. The incentivized content distribution method according to claim 2, wherein said generating offer credentials according to said offer task comprises:
generating a first public and private key pair;
and encrypting the executable file for executing the invitation task by using a first private key in the first public and private key pair to generate an invitation voucher.
4. The incentivized content distribution method according to claim 1, wherein said verifying whether each of said invitation-responding peers completes said invitation task according to each of said task execution credentials and a preconfigured verification method comprises, for each of said invitation-responding peers, respectively:
acquiring a second public key from the invitation response end to verify the task execution certificate and obtain an execution result;
and verifying whether the invitation response end completes the invitation task or not according to the execution result and a pre-configured verification method.
5. The incentive content distribution method according to claim 1, wherein the generating and sending winning vouchers to winning invitation respondents for obtaining incentive content comprises:
generating an executable file for executing the operation of obtaining the motivational content;
generating a third public and private key pair;
encrypting the executable file for executing the operation of obtaining the incentive type content by using a third private key in the third public and private key pair to generate a winning certificate;
and sending the generated winning voucher to a winning invitation response end for obtaining motivational content.
6. The incentivized content distribution method according to any of claims 1-5, wherein said employing a screening method configured according to said business requirements to screen winning offers among the offers responses that each completed the offer task comprises:
acquiring and loading a plug-in configured with a screening method configured according to the service requirement;
the plug-in is run to screen out solicitation responses for winnings.
7. An incentive content distribution method, comprising:
receiving an offer voucher issued by an offer initiator;
performing an offer task according to the received offer credential;
generating a task execution certificate according to an execution result;
returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening an invitation response end for winning by adopting a screening method configured according to service requirements;
waiting for receiving a winning voucher sent by the offer originator: if so, acquiring incentive type contents according to the winning voucher;
wherein the offer voucher is generated according to an offer task configured by business requirements.
8. The incentivized content distribution method according to claim 7, wherein said performing an offer task according to the received offer voucher includes:
obtaining a first public key from the invitation initiating end to verify the invitation voucher to obtain an executable file for executing the invitation task;
executing the executable file in a virtual image to perform the offer task.
9. The method of claim 7, wherein generating task execution credentials based on the execution results comprises:
generating a second public and private key pair;
and encrypting the execution result by using a second private key in the second public and private key pair to generate a task execution certificate.
10. The incentivized content distribution method according to claim 7, wherein said waiting to receive winning vouchers sent by the offer originator: if yes, obtaining incentive content according to the winning voucher comprises the following steps:
waiting for receiving a winning voucher sent by the offer originator:
if so, acquiring a third public key from the invitation initiating terminal to verify the winning certificate to obtain an executable file for executing the operation of acquiring the incentive type content;
the executable file is executed in the virtual image to obtain the motivational content.
11. An offer initiator configured in a blockchain network, comprising:
the task configuration unit is used for configuring an invitation task according to the service requirement;
a first voucher generation unit configured to generate an offer voucher according to the offer task and generate a winning voucher;
the first communication unit is configured to issue the offer voucher to each offer response end in the blockchain network, receive task execution vouchers respectively returned by each offer response end, and send the winning voucher to the winning offer response end to acquire incentive content;
the verification unit is configured to verify whether each invitation response end completes the invitation task according to each task execution voucher and a preconfigured verification method;
and the winning prize screening unit is configured to screen the winning invitation response ends from the invitation response ends which complete the invitation tasks by adopting a screening method configured according to the service requirements.
12. The offer initiator of claim 11, wherein the first credential generation unit is further configured to generate the offer credential and/or the winning credential using a public-private key encryption algorithm.
13. The offer initiator of claim 11, wherein the task execution credentials are generated by encryption according to a public-private key encryption algorithm;
the verification unit is further configured to obtain a second public key from the offer responder through the first communication unit to verify a task execution credential, obtain an execution result, and verify whether the offer responder completes the offer task according to the execution result and a preconfigured verification method.
14. The offer initiator according to any one of claims 11-13, wherein the win screening unit further comprises:
the plug-in configuration subunit is used for acquiring and loading the plug-ins configured with the screening method configured according to the service requirement;
and the plug-in operation subunit is configured to operate the plug-in to screen out the awarded offer responding end.
15. An offer responder configured in a blockchain network, comprising:
a task execution unit configured to execute the offer task according to the received offer voucher;
the second certificate generation unit is configured for generating a task execution certificate according to an execution result;
the second communication unit is configured to receive an invitation voucher issued by an invitation initiating end; returning the task execution voucher to the invitation initiating end so that the invitation initiating end can verify whether the invitation task is completed or not according to a pre-configured verification method, and screening an invitation response end for winning by adopting a screening method configured according to service requirements; waiting for receiving a winning voucher sent by the invitation initiating terminal;
the incentive type content acquisition unit is configured for acquiring incentive type content according to the winning voucher;
wherein the offer voucher is generated according to an offer task configured by business requirements.
16. The offer responder according to claim 15, wherein the task execution unit is further configured to obtain a first public key from the offer initiator via the second communication unit to verify the offer credential, obtain an executable file to perform the offer task, and execute the executable file in a virtual image to perform the offer task.
17. The offer responder according to claim 15, wherein the second credential generation unit is further configured to generate the task execution credential using a public-private key encryption algorithm.
18. The offer responder according to claim 15, wherein the incentivized content obtaining unit is further configured to obtain a third public key from the offer initiator through the second communication unit to verify the winning voucher, obtain an executable file to perform the operation of obtaining incentives, and execute the executable file in a virtual image to obtain incentives.
19. An incentive content distribution system, comprising at least one offer originator according to any one of claims 11-14 and a number of offer respondents according to any one of claims 15-18.
20. A computer device, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-6, or the method of any of claims 7-10.
21. A computer-readable storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method of any one of claims 1-6, or the method of any one of claims 7-10.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710113362.5A CN106897906B (en) | 2017-02-28 | 2017-02-28 | Incentive content distribution method and system |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201710113362.5A CN106897906B (en) | 2017-02-28 | 2017-02-28 | Incentive content distribution method and system |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN106897906A CN106897906A (en) | 2017-06-27 |
| CN106897906B true CN106897906B (en) | 2021-02-12 |
Family
ID=59185264
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201710113362.5A Active CN106897906B (en) | 2017-02-28 | 2017-02-28 | Incentive content distribution method and system |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN106897906B (en) |
Families Citing this family (19)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107423962A (en) * | 2017-07-11 | 2017-12-01 | 成都励睿德企业管理有限公司 | Data block chain mandate based on rewards and punishments participates in the Byzantine failure tolerance method and its rewards and punishments method of common recognition |
| CN107784525A (en) * | 2017-11-21 | 2018-03-09 | 重庆金窝窝网络科技有限公司 | Task method for pushing and device based on block chain |
| CN108418876B (en) * | 2018-02-09 | 2019-04-19 | 北京众享比特科技有限公司 | Storage workload proof method and system, incentive method and system |
| CN108470277A (en) * | 2018-02-28 | 2018-08-31 | 深圳市网心科技有限公司 | Reward settlement method, system, readable storage medium storing program for executing and the computing device of block chain |
| CN108596649A (en) * | 2018-03-22 | 2018-09-28 | 深圳市网心科技有限公司 | Account book rewards settlement method, server and computer readable storage medium |
| CN108769146B (en) * | 2018-05-11 | 2022-01-21 | 北京奇虎科技有限公司 | Data transmission method and device based on block chain and block chain system |
| CN108769145A (en) * | 2018-05-11 | 2018-11-06 | 北京奇虎科技有限公司 | A kind of resources contribution amount method of proof, apparatus and system |
| CN108769033A (en) * | 2018-05-31 | 2018-11-06 | 北京阿尔山金融科技有限公司 | Punch card system based on block chain and facility information processing method of checking card |
| CN108764857A (en) * | 2018-06-08 | 2018-11-06 | 北京阿尔山金融科技有限公司 | Check card motivational techniques and the punch card system for equipment of checking card |
| CN108960904A (en) * | 2018-06-15 | 2018-12-07 | 杭州复杂美科技有限公司 | Promotion method and system, equipment and storage medium |
| WO2020000349A1 (en) * | 2018-06-29 | 2020-01-02 | 财团法人交大思源基金会 | Distributed computing method and management system |
| CN109194718A (en) * | 2018-08-09 | 2019-01-11 | 玄章技术有限公司 | A kind of block chain network and its method for scheduling task |
| CN109271115B (en) * | 2018-10-11 | 2021-07-30 | 重庆晨鲸科技有限公司 | Storage sharing method and device and block chain distributed network topology |
| CN109146337A (en) * | 2018-10-12 | 2019-01-04 | 深圳市有情矿技术有限公司 | A kind of tripartite's task dissemination method and system for block chain |
| CN109447636A (en) * | 2018-10-15 | 2019-03-08 | 联动优势科技有限公司 | A kind of assets transfer method and device |
| CN109298946A (en) * | 2018-10-19 | 2019-02-01 | 上海达家迎信息科技有限公司 | Digging mine method, cloud platform, device, equipment and medium based on block chain |
| CN110363687A (en) * | 2019-07-12 | 2019-10-22 | 百度在线网络技术(北京)有限公司 | Recording method, device, electronic equipment, terminal and the medium of travel information |
| CN110543757B (en) * | 2019-08-01 | 2023-06-06 | 立旃(上海)科技有限公司 | Authentication incentive method and system based on block chain |
| CN114422603A (en) * | 2022-03-30 | 2022-04-29 | 深圳市一航网络信息技术有限公司 | Excitation method and device based on BCDN (binary-coded decimal) network, electronic equipment and storage medium |
Family Cites Families (9)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US7546373B2 (en) * | 2003-11-14 | 2009-06-09 | Microsoft Corporation | Secure dynamic credential distribution over a network |
| US20080119168A1 (en) * | 2006-11-22 | 2008-05-22 | Nokia Corporation | System and method for using terminal resources to consume and disseminate advertisements |
| CN101000683A (en) * | 2007-01-24 | 2007-07-18 | 王兆珉 | System method implenenting reward providing and acquiring between different products |
| US9010528B2 (en) * | 2011-11-07 | 2015-04-21 | Zero Tension Systems LLC | Zero tension system conveyor |
| CN106251144A (en) * | 2015-06-05 | 2016-12-21 | 地气股份有限公司 | Electronic money management method and electronic money node apparatus |
| CN106096967A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of method that block chain carrys out reference numerals money flow |
| CN106296191A (en) * | 2016-08-13 | 2017-01-04 | 深圳市樊溪电子有限公司 | A kind of PoW common recognition mechanism of block chain power-aware |
| CN106452884B (en) * | 2016-10-21 | 2019-06-25 | 北京云图科瑞科技有限公司 | Data distributing method and device in block catenary system |
| CN106611061B (en) * | 2016-12-29 | 2018-02-23 | 北京众享比特科技有限公司 | Database write-in method and system based on block chain network |
-
2017
- 2017-02-28 CN CN201710113362.5A patent/CN106897906B/en active Active
Also Published As
| Publication number | Publication date |
|---|---|
| CN106897906A (en) | 2017-06-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN106897906B (en) | Incentive content distribution method and system | |
| US20210326187A1 (en) | Systems and method for managing memory resources used by smart contracts of a blockchain | |
| US11630808B2 (en) | Proof of lottery (PoL) blockchain | |
| JP7429281B2 (en) | Methods and systems for directing exchanges associated with tokens held anonymously on a blockchain | |
| US20210166126A1 (en) | Architectures, systems and methods for program defined transaction system and decentralized cryptocurrency system | |
| JP2023071977A (en) | Computer-implemented system and method suitable for increasing security of instant off-line blockchain transactions | |
| CN110796449B (en) | Transaction processing method, system, medium and computing device | |
| CN110557403B (en) | Resource allocation method and device based on block chain, storage medium and node equipment | |
| KR102203758B1 (en) | Method and device for handling certificates in blockchain system | |
| CN108431844A (en) | Systems and methods for online/offline synchronization | |
| CN111309745B (en) | Virtual resource processing method and device, electronic equipment and storage medium | |
| CN109063049B (en) | Account processing method, device, equipment and storage medium of block chain network | |
| CN109005208B (en) | Method and device for pushing information | |
| CN111416709A (en) | Voting method, device, equipment and storage medium based on block chain system | |
| CN114331397B (en) | Information processing methods, devices, electronic equipment and storage media | |
| CN111858753A (en) | Block chain-based training parameter processing method, device and storage medium | |
| CN111127159A (en) | Lottery management method, lottery management system, computing device, and medium | |
| CN110795132B (en) | Third party application processing method, system and storage medium | |
| CN112734455A (en) | Prize exchanging result generating method, device and equipment and readable storage medium | |
| KR102039658B1 (en) | Platform system for letter crypto currency | |
| US10997827B2 (en) | Distributed and deterministic random number generation for lottery drawings | |
| US10861036B2 (en) | Systems and methods for randomized reward distribution exchange for loyalty points | |
| EP4142206A1 (en) | Verifying integrity and secure operations of cloud-based software services | |
| CN115599661A (en) | Service development method, device and storage medium | |
| CN112308563A (en) | Guest-obtaining data processing method and node |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |