METHOD AND SYSTEM FOR CREATING DECENTRALIZED REPOSITORY OF FRAUD IPs AND PUBLISHERS USING BLOCKCHAIN
First Claim
1. A computer system comprising:
- one or more processors; and
a memory coupled to the one or more processors, the memory for storing instructions which, when executed by the one or more processors, cause the one or more processors to perform a method for creating decentralized repository of fraud IP and publishers using block chain, the method comprising;
creating, at a block chain network, a central repository for decentralized shared ledger, wherein the central repository comprises blacklist and whitelist, wherein the blacklist and the whitelist are created based on the data collected from a plurality of stakeholders related to fraud, wherein the plurality of stakeholders comprises advertisers, advertising networks, publishers and third party data providers;
adding, at the block chain network, a ledger in decentralized shared ledger for each interactions on an application in real time, wherein each of the interactions is associated with one or more advertisements displayed on one or more media devices, wherein the addition is done based on a smart contract;
authorizing, at the block chain network, at least one of the plurality of stakeholders to access the decentralized shared ledger, wherein the authorization is done after receiving a request from at least one of the plurality of stakeholders, wherein the authorization is done based on a unique root key;
analyzing, at the block chain network, the interaction and past data received from the plurality of stake holders, wherein the analysis is done to identify the fraud behavior, wherein the analysis is done in real time; and
blocking, at the block chain network, device IPs, device Id'"'"'s, device type and the publishers mentioned in blacklist of the decentralized shared ledger, wherein the blacklist is created based on scoring of the publishers in real time.
1 Assignment
0 Petitions
Accused Products
Abstract
The present disclosure provides a method and system for creating decentralized repository of fraud IP and publishers using block chain. The block chain network creates a central repository for decentralized shared ledger. The block chain network adds a ledger in decentralized shared ledger for each interaction on an application. In addition, the block chain network authorizes at least one of a plurality of stakeholders to access the decentralized shared ledger after receiving a request from at least one of the plurality of stakeholders. Further, the block chain network analyzes the interaction and past data received from a plurality of stake holders. Furthermore, the block chain network blocks device IPs, device Id'"'"'s, device type and the publishers mentioned in blacklist of the decentralized shared ledger.
-
Citations
19 Claims
-
1. A computer system comprising:
-
one or more processors; and a memory coupled to the one or more processors, the memory for storing instructions which, when executed by the one or more processors, cause the one or more processors to perform a method for creating decentralized repository of fraud IP and publishers using block chain, the method comprising; creating, at a block chain network, a central repository for decentralized shared ledger, wherein the central repository comprises blacklist and whitelist, wherein the blacklist and the whitelist are created based on the data collected from a plurality of stakeholders related to fraud, wherein the plurality of stakeholders comprises advertisers, advertising networks, publishers and third party data providers; adding, at the block chain network, a ledger in decentralized shared ledger for each interactions on an application in real time, wherein each of the interactions is associated with one or more advertisements displayed on one or more media devices, wherein the addition is done based on a smart contract; authorizing, at the block chain network, at least one of the plurality of stakeholders to access the decentralized shared ledger, wherein the authorization is done after receiving a request from at least one of the plurality of stakeholders, wherein the authorization is done based on a unique root key; analyzing, at the block chain network, the interaction and past data received from the plurality of stake holders, wherein the analysis is done to identify the fraud behavior, wherein the analysis is done in real time; and blocking, at the block chain network, device IPs, device Id'"'"'s, device type and the publishers mentioned in blacklist of the decentralized shared ledger, wherein the blacklist is created based on scoring of the publishers in real time. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer-implemented method for creating decentralized repository of fraud IP and publishers using block chain, the computer-implemented method comprising:
-
creating, at a block chain network with a processor, a central repository for decentralized shared ledger, wherein the central repository comprises blacklist and whitelist, wherein the blacklist and the whitelist are created based on the data collected from a plurality of stakeholders related to fraud; adding, at the block chain network with the processor, a ledger in decentralized shared ledger for each interactions on an application in real time, wherein each of the interactions is associated with one or more advertisements displayed on one or more media devices, wherein the addition is done based on a smart contract; authorizing, at the block chain network with the processor, at least one of the plurality of stakeholders to access the decentralized shared ledger, wherein the authorization is done after receiving a request from at least one of the plurality of stakeholders, wherein the authorization is done based on a unique root key; analyzing, at the block chain network with the processor, the interaction and past data received from the plurality of stake holders, wherein the analysis is done to identify the fraud behavior, wherein the analysis is done in real time; and blocking, at the block chain network with the processor, device IPs, device Id'"'"'s, device type and the publishers mentioned in blacklist of the decentralized shared ledger, wherein the blacklist is created based on scoring of the publishers in real time. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17, 18)
-
-
19. A non-transitory computer-readable storage medium encoding computer executable instructions that, when executed by at least one processor, performs a method for creating decentralized repository of fraud IP and publishers using block chain, the method comprising:
-
creating, at a computing device, a central repository for decentralized shared ledger, wherein the central repository comprises blacklist and whitelist, wherein the blacklist and the whitelist are created based on the data collected from a plurality of stakeholders related to fraud; adding, at the computing device, a ledger in decentralized shared ledger for each interactions on an application in real time, wherein each of the interactions is associated with one or more advertisements displayed on one or more media devices, wherein the addition is done based on a smart contract; authorizing, at the computing device, at least one of the plurality of stakeholders to access the decentralized shared ledger, wherein the authorization is done after receiving a request from at least one of the plurality of stakeholders, wherein the authorization is done based on a unique root key; analyzing, at the computing device, the interaction and past data received from the plurality of stake holders, wherein the analysis is done to identify the fraud behavior, wherein the analysis is done in real time; and blocking, at the computing device, device IPs, device Id'"'"'s, device type and the publishers mentioned in blacklist of the decentralized shared ledger, wherein the blacklist is created based on scoring of the publishers in real time.
-
Specification