WO2011130970A1 - Dispositif et procédé pour protéger les données d'un terminal mobile - Google Patents

Dispositif et procédé pour protéger les données d'un terminal mobile Download PDF

Info

Publication number
WO2011130970A1
WO2011130970A1 PCT/CN2010/075604 CN2010075604W WO2011130970A1 WO 2011130970 A1 WO2011130970 A1 WO 2011130970A1 CN 2010075604 W CN2010075604 W CN 2010075604W WO 2011130970 A1 WO2011130970 A1 WO 2011130970A1
Authority
WO
WIPO (PCT)
Prior art keywords
mobile terminal
verification code
data
user
security
Prior art date
Application number
PCT/CN2010/075604
Other languages
English (en)
Chinese (zh)
Inventor
黄翠荣
李娜娜
何经纬
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011130970A1 publication Critical patent/WO2011130970A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity

Definitions

  • the present invention relates to information security technologies, and more particularly to a data protection device and method for a mobile terminal.
  • BACKGROUND OF THE INVENTION Convenient contact can also store a large amount of important information.
  • memory cards and smart phones personal data stored on mobile terminals has become more and more important. If mobile terminals are lost or illegally obtained by others, the loss to users is far greater than the value of mobile terminals themselves. , which will bring a lot of trouble to the user's life or work.
  • Existing mobile terminals basically support network services, and mobile terminal Internet access has become a trend of development. For example, data obtained by hackers and illegally used will have a great impact on users.
  • the data of the mobile terminal is lost, usually in the following situations:
  • Step A Pre-processing the communication terminal to accept a certain instruction, and can send the user information of the communication terminal to other communication terminals and/or networks according to the instruction;
  • the other communication terminal or network should be in a state in which the user can obtain information from the user to ensure that the user can obtain the received information from the user.
  • User data Pre-processing the communication terminal to accept a certain instruction, and can send the user information of the communication terminal to other communication terminals and/or networks according to the instruction;
  • the other communication terminal or network should be in a state in which the user can obtain information from the user to ensure that the user can obtain the received information from the user.
  • User data Step B. When the user data needs to be transferred, the determined instruction is sent to the communication terminal; Step C.
  • the communication terminal After receiving the determined instruction, the communication terminal sends the user data to the user information by means of MMS The other communication terminal and/or the network, and delete the user profile on the communication terminal after the transmission is successful.
  • MMS Mobile Multimedia Subsystem
  • Chinese patent CN200710140321.1 discloses a mobile communication system, which comprises a communication device, a user identification module and a controller; the user identification module comprises the first a SIM card; in the booting process, when the controller detects that the original second SIM card is removed and the first SIM card is installed in the subscriber identity module of the mobile communication system, the transmitting device is lost through the communication device The notification information is sent to the receiving end, and the data contained therein can determine the location of the mobile communication system or determine the telephone number of the user used in the mobile communication system.
  • the present invention provides a data protection device for a mobile terminal, the device comprising: a user security management module, configured to enable or disable a security function of the mobile terminal, and automatically detect whether the security parameter changes when the mobile terminal is powered on and the security function is enabled. If the security parameter changes, the verification code is regenerated and the user is notified by the verification code sending manner, and the mobile terminal is put into the standby state through the new verification code; if the security parameter does not change, the mobile terminal is entered through the original verification code. standby mode;
  • the security parameters include: a user identity module (SIM) card number, a flash memory identifier (FLASH ID), an international mobile device identity code (IMEI) number, and user identity information.
  • SIM user identity module
  • FLASH ID flash memory identifier
  • IMEI international mobile device identity code
  • the user security management module includes: a security function setting module, a verification code generation module, and a verification code sending module;
  • a security function setting module configured to enable or disable a security function of the mobile terminal
  • a verification code generating module configured to generate a verification code by using a cryptographic algorithm for the security parameter in the mobile terminal, and save the verification code in the mobile terminal;
  • the verification code sending module is configured to notify the user that the generated verification code is sent by using the verification code.
  • the security function setting module turns on or off the security function, and specifically includes: if the currently input user identity information is consistent with the user identity information stored in the mobile terminal, encrypting all data of the mobile terminal and re-storing the encrypted Data, and turn on security features;
  • the verification code sending module notifies the user of the generated verification code by using the verification code, and specifically includes: sending the verification code to the network operator, or sending the mobile terminal or the mailbox specified by the user;
  • the modification of the verification code sending manner is specifically: after the correct user identity information is input and the verification is successful, the verification code sending manner is modified.
  • the user security management module further includes: a key generation module and a verification module; wherein a key generation module, configured to generate a generated verification code by using a certain operation and save the key in the mobile terminal;
  • the verification module is configured to verify whether the currently input verification code is consistent with the verification code stored by the mobile terminal after the mobile terminal is powered on and the security function is enabled. If the authentication code is consistent, the mobile terminal enters a standby state; otherwise, the verification code is required to be re-entered.
  • the present invention also provides a data protection method for a mobile terminal, the method comprising: after the mobile terminal is powered on, if the security function is enabled, the mobile terminal automatically detects whether the security parameter changes, and if the security parameter changes, the mobile terminal regenerates the verification code. And the user is notified by the verification code sending manner, and the mobile terminal enters the standby state by using the new verification code; if the security parameter does not change, the mobile terminal is put into the standby state by using the original verification code;
  • the mobile terminal After the mobile terminal that has turned on the security function enters the standby state, the mobile terminal performs encryption or decryption operations on the data inside the mobile terminal and the data inside the storage medium associated with the mobile terminal according to the key generated by the verification code.
  • the security parameter includes: a SIM card number, a FLASH ID, an IMEI number, and user identity information.
  • the mobile terminal regenerating the verification code specifically includes: the mobile terminal generates a verification code by using a cryptographic algorithm, and saves the verification code in the mobile terminal.
  • the notifying the user by using the verification code sending manner includes: sending the verification code to the network operator, or sending the verification code to the mobile terminal or mailbox specified by the user; wherein, the modification of the verification code sending manner Specifically, after the correct user identity information is entered and the verification is successful, the verification code sending mode is modified.
  • the method further includes: the mobile terminal generates a new key by using a certain algorithm by the verification code, and saves the data in the mobile terminal, decrypts all the data by using the original key, and uses the new key. After the key is re-encrypted, the encrypted data is saved.
  • the method further includes: after the mobile terminal is powered on, if the security function is turned off, Then the mobile terminal directly enters the standby state.
  • the data protection device and method for the mobile terminal provided by the present invention, after the mobile terminal is powered on, if the security function is enabled, the mobile terminal automatically detects whether the security parameter changes. If the security parameter changes, the mobile terminal regenerates the verification code and passes the verification code.
  • the sending method notifies the user that the mobile terminal enters the standby state through the new verification code; if the security parameter does not change, the mobile terminal enters the standby state through the original verification code; the mobile terminal pairs the data of the mobile terminal according to the key stored by the mobile terminal. , or the data inside the storage medium associated with the mobile terminal performs an encryption or decryption operation.
  • the data in the SIM card, the FLASH and the external memory card are all encrypted, and the verification code is difficult to obtain, and the key is verified.
  • the code generation is also difficult to obtain, so the data encrypted by the key can ensure the security of the data, can prevent the illegal user from stealing the data of the mobile terminal, and can completely solve the problem of data security of the mobile terminal, and the advantages thereof are as follows:
  • FIG. 1 is a structural diagram of a data protection device of a mobile terminal according to the present invention.
  • FIG. 2 is a menu interface diagram of a security management module in a data protection device of a mobile terminal of the present invention
  • the basic idea of the present invention is: After the mobile terminal is powered on, if the security function is enabled, the mobile terminal automatically detects whether the security parameter changes. If the security parameter changes, the mobile terminal regenerates the verification code and notifies the user through the verification code sending manner, The verification code causes the mobile terminal to enter the standby state; if the security parameter does not change, the mobile terminal enters the standby state through the original verification code; the mobile terminal pairs the data of the mobile terminal according to the key stored by the mobile terminal, and is related to the mobile terminal The data inside the connected storage medium is encrypted or decrypted.
  • the data protection device of the mobile terminal provided by the present invention includes: a user security management module, located in an existing setting module of the mobile terminal, used to enable or disable the security function of the mobile terminal, and when moving When the terminal is powered on and the security function is enabled, the security parameter is automatically detected. If the security parameter changes, the verification code is regenerated and the user is notified by the verification code sending mode, and the mobile terminal is put into the standby state through the new verification code; If there is no change, the mobile terminal is put into the standby state by using the original verification code;
  • the security parameters include: a SIM card number, a flash memory identifier (FLASH ID), an International Mobile Equipment Identity (IMEI) number, and user identity information; wherein the first three parameters are automatically read by the software of the mobile terminal. Take, and the user identity information is entered by the user.
  • FLASH ID flash memory identifier
  • IMEI International Mobile Equipment Identity
  • the security management module includes: a security function setting module, a verification code generation module, and a verification code sending module; wherein
  • a security function setting module configured to enable or disable a security function of the mobile terminal;
  • the security function can be turned on or off by setting the menu option of the security function on the interface. As shown in Figure 2, if the current security function is enabled, the option to turn off the security function is visible; if the current security function is off, it is turned on. The options for the security feature are visible.
  • the opening security function is specifically: if the currently input user identity information is consistent with the user identity information stored in the mobile terminal, encrypting all data of the mobile terminal, re-storing the encrypted data, and enabling the security function;
  • the security function is turned off, specifically: if the currently input verification code is consistent with the verification code stored in the mobile terminal, all the data of the mobile terminal is decrypted and the decrypted data is re-stored, and the security function is turned off;
  • a verification code generating module configured to generate a verification code by using a certain algorithm, such as a non-symmetric password (RSA, Rivest Shamir Adlemen) algorithm, and save the verification code in a flash memory (FLASH) of the mobile terminal;
  • a certain algorithm such as a non-symmetric password (RSA, Rivest Shamir Adlemen) algorithm
  • the verification code sending module is configured to notify the user that the generated verification code is sent by using the verification code.
  • the verification code sending manner may include: sending the verification code to the network operator, where the user can obtain the verification code by logging in to the operator's website. , or send the verification code to the mobile terminal or mailbox specified by the user, so that the user obtains the verification code by means of a mobile phone short message or email; when the verification code needs to be regenerated, the user can freely select one or more of the above verification codes to send. In the mode, a new verification code is obtained. If the user needs to modify the current verification code, the user identity information needs to be entered. Otherwise, the current verification code cannot be modified.
  • the device further includes: a key generation module and a verification module; wherein
  • the key generation module is configured to generate a key by using a certain algorithm and save the key in a mobile terminal; wherein a relatively secure algorithm may be selected according to an actual situation to generate a key.
  • a new key is generated synchronously, and all data of the mobile terminal is decrypted by the original key, and then encrypted with a new key and stored in a SIM card, a FLASH or an external memory card;
  • Verification module after the mobile terminal is powered on and the security function is turned on, verify the current input test Whether the verification code is consistent with the verification code stored by the mobile terminal. If they are consistent, the mobile terminal enters the standby state; otherwise, the verification code is required to be re-entered.
  • the present invention further provides a data protection method for a mobile terminal, and the power-on verification process of the mobile terminal, as shown in FIG. 3, includes the following steps:
  • Step 301 After the mobile terminal is powered on, it is determined whether the security function is enabled. If the security function is enabled, step 302 is performed; otherwise, the mobile terminal directly enters the standby state, and the process ends.
  • the security function is enabled by looking up the corresponding status bit in the software program in the user security management module, for example: the status bit is 1 means to be on, the status bit is 0 means to be off; if the mobile terminal is After the power is turned on, the security function is turned off, and the mobile terminal directly enters the standby state.
  • Step 302 Detect whether the security parameter of the mobile terminal is changed. If there is no change, go to step 304; otherwise, go to step 303;
  • the mobile terminal automatically detects whether the existing security parameters and the security parameters stored during the last shutdown change, wherein the SIM card number, the FLASH ID, and the IMEI number of the mobile terminal can be automatically read by the software.
  • User identity information needs to be input by the user; if all the parameters are consistent with the parameters stored in the previous shutdown, the security parameters are not changed, and step 304 is performed; as long as one parameter changes, the security parameter is changed, and step 303 is performed, usually In this case, these parameters do not change, so there is no need to regenerate the verification code.
  • Step 303 Regenerate the verification code and notify the user, simultaneously update the key and re-encrypt all data, and save the encrypted data;
  • the mobile terminal can automatically read parameters such as the SIM card number, the FLASH ID, and the IMEI number of the mobile terminal. If the user information changes, the user must first input the correct original user identity information, and then input the new user identity information. And storing the new user identity information in the mobile terminal; all the above parameters are notified to the user by using a certain algorithm, such as an RSA algorithm, to generate a verification code, and the verification code is saved in the FLASH of the mobile terminal; after the verification code is updated, the mobile terminal According to Actually, choose a more secure algorithm to generate a new key synchronously, and use the original key to all
  • a certain algorithm such as an RSA algorithm
  • the method for sending the verification code may include: sending the verification code to the network operator, or sending the verification code to the network operator.
  • the user-specified mobile terminal or mailbox can be selected or modified by the user.
  • Step 304 Enter the verification code and determine whether it is correct. If it is correct, the mobile terminal enters the standby state, and ends the process; otherwise, the user is required to re-enter the verification code, and returns to step 304;
  • a verification code is input in the corresponding menu interface, and the input verification code is compared with the verification code stored in the mobile terminal. If the two are consistent, the user verification code is correct, and the mobile terminal enters a standby state; If the two are inconsistent, the user is required to re-enter the verification code.
  • the security function is turned off when the mobile terminal is powered on, the option to enable the security function is visible, and the security function of the mobile terminal can be turned on by inputting the correct user identity information in the setting menu;
  • the security parameters are: SIM card number, The FLASH ID, the IMEI number, and the user identity information are used to generate a verification code to notify the user through a certain algorithm, such as the RSA algorithm, and the verification code is stored in the FLASH of the mobile terminal; meanwhile, the verification code is generated by a relatively secure algorithm, and the All the data of the mobile terminal is encrypted, and the encrypted data is re-stored; after the user obtains the correct verification code, the mobile terminal enters the standby state under the security function by inputting the verification code.
  • the data in the SIM card, the FLASH and the external memory card are all encrypted, and the data stored in the mobile terminal by the key stored by the mobile terminal itself and associated with the mobile terminal can be associated with the mobile terminal.
  • the data inside the storage medium is encrypted or decrypted.
  • Embodiment 1 Modify the data in the SIM card, and encrypt the modified data and rewrite the data SIM card:
  • the data in the SIM card file is read, decrypted into normal data by using the key, and then saved to a temporary file; secondly, the content of the temporary file is modified, and The data of the temporary file is encrypted by using a key; finally, the encrypted data is written into the SIM card file, and the temporary file is automatically deleted by the mobile terminal, thereby protecting the security of the SIM card file.
  • Embodiment 2 Sending the encrypted picture file in the mobile terminal in the form of a multimedia message: Opening the security function of the mobile terminal, after the mobile terminal enters the standby state, first, opening the picture file in the FLASH of the mobile terminal and reading the data, using the key Decrypt the data and save it to a temporary file; secondly, rename the temporary file to the image file name, and then insert the temporary file into the multimedia message, and after the multimedia message is sent, the mobile terminal automatically deletes The above temporary file, thereby ensuring that the file can be normally received by the other party.
  • Embodiment 3 Encrypt the downloaded data and store it on the external memory card:
  • the file is downloaded to an external memory card such as a USB flash drive, and a temporary file is newly created on the external memory card; secondly, the data in the temporary file is read and Encryption is performed using the key, and then the encrypted data is saved in the temporary file, the temporary file is renamed to the downloaded file name, and the downloaded original file is deleted, thereby ensuring storage on the external memory card.
  • an external memory card such as a USB flash drive
  • a temporary file is newly created on the external memory card
  • the data in the temporary file is read and Encryption is performed using the key, and then the encrypted data is saved in the temporary file, the temporary file is renamed to the downloaded file name, and the downloaded original file is deleted, thereby ensuring storage on the external memory card.
  • the encryption or decryption operation of the data stored in the mobile terminal and the storage medium associated with the mobile terminal by the key pair can effectively prevent data loss and theft, thereby greatly improving the mobile terminal.
  • the security of the data can effectively prevent data loss and theft, thereby greatly improving the mobile terminal.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Storage Device Security (AREA)

Abstract

L'invention concerne un dispositif et procédé pour protéger les données d'un terminal mobile. Après son démarrage, si la fonction sécurité est activée, le terminal mobile détecte automatiquement si un paramètre de sécurité est changé ou non. Le cas échéant, le terminal mobile régénère un code d'authentification, et informe l'utilisateur du code d'authentification par transmission de ce dernier. Puis, le terminal mobile entre à l'état de veille via un nouveau code d'authentification. Si le paramètre de sécurité ne change pas, le terminal mobile entre dans un état de veille via un code d'authentification d'origine. Le terminal mobile, en fonction d'une clé stockée dans le terminal mobile lui-même, crypte ou décrypte ses données et les données d'un support de stockage qui lui est associé. Le dispositif et le procédé de l'invention peuvent empêcher un utilisateur illégal d'utiliser des données du terminal mobile et protège ses données de sécurité.
PCT/CN2010/075604 2010-04-22 2010-07-30 Dispositif et procédé pour protéger les données d'un terminal mobile WO2011130970A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010153938.9 2010-04-22
CN201010153938.9A CN101815292B (zh) 2010-04-22 2010-04-22 一种移动终端的数据保护装置及方法

Publications (1)

Publication Number Publication Date
WO2011130970A1 true WO2011130970A1 (fr) 2011-10-27

Family

ID=42622379

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/075604 WO2011130970A1 (fr) 2010-04-22 2010-07-30 Dispositif et procédé pour protéger les données d'un terminal mobile

Country Status (2)

Country Link
CN (1) CN101815292B (fr)
WO (1) WO2011130970A1 (fr)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102480726A (zh) * 2010-11-24 2012-05-30 比亚迪股份有限公司 密码保护方法、密码保护系统及具有其的移动终端
CN103209240A (zh) * 2013-03-19 2013-07-17 东莞宇龙通信科技有限公司 一种数据加密及解密的方法及系统
CN103338295A (zh) * 2013-05-27 2013-10-02 苏州奇可思信息科技有限公司 一种手机防盗安全系统
CN105228127B (zh) * 2014-05-30 2019-05-21 联想移动通信科技有限公司 一种实现手机锁网的方法、装置、sim卡及终端
CN104951408B (zh) * 2015-05-25 2018-02-06 小米科技有限责任公司 数据保护方法、存储设备和终端设备
CN105530637A (zh) * 2015-12-11 2016-04-27 北京元心科技有限公司 保护智能终端用户隐私的方法以及智能终端
CN108228211B (zh) * 2017-12-15 2021-05-25 中国移动通信集团江苏有限公司 智能卡、智能卡数据安全更新的方法及系统
CN110968274B (zh) * 2019-11-28 2020-10-16 深圳市金城保密技术有限公司 基于soc芯片的彩色打印机控制方法及系统

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472913A (zh) * 2002-08-02 2004-02-04 明基电通股份有限公司 通讯设备中用以保证用户信息安全的装置及方法
US20070082705A1 (en) * 2005-07-25 2007-04-12 Mediatek Inc. Mobile communication apparatus having anti-theft and auto-notification functions
TW200808017A (en) * 2006-07-17 2008-02-01 Inventec Appliances Corp Method of retrieving and encrypting data for mobile communication apparatus
CN101287234A (zh) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 一种移动通信终端防盗方法及装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN100353787C (zh) * 2004-06-23 2007-12-05 华为技术有限公司 一种移动终端内存储的资料信息的安全保障方法
US20080014990A1 (en) * 2005-07-25 2008-01-17 Pixtel Media Technology (P) Ltd. Method of locating a mobile communication system for providing anti theft and data protection during successive boot-up procedure
CN101159542B (zh) * 2007-11-12 2010-06-09 中兴通讯股份有限公司 在终端网络设备上保存和获取鉴权参数的方法及系统
CN101257681B (zh) * 2008-03-26 2011-05-18 宇龙计算机通信科技(深圳)有限公司 私密数据保护装置、移动终端、私密数据存储及读取方法
CN101355765A (zh) * 2008-09-19 2009-01-28 中兴通讯股份有限公司 通信终端数据安全保护方法及系统

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1472913A (zh) * 2002-08-02 2004-02-04 明基电通股份有限公司 通讯设备中用以保证用户信息安全的装置及方法
US20070082705A1 (en) * 2005-07-25 2007-04-12 Mediatek Inc. Mobile communication apparatus having anti-theft and auto-notification functions
TW200808017A (en) * 2006-07-17 2008-02-01 Inventec Appliances Corp Method of retrieving and encrypting data for mobile communication apparatus
CN101287234A (zh) * 2008-05-26 2008-10-15 德信无线通讯科技(北京)有限公司 一种移动通信终端防盗方法及装置

Also Published As

Publication number Publication date
CN101815292B (zh) 2014-04-30
CN101815292A (zh) 2010-08-25

Similar Documents

Publication Publication Date Title
US8913992B2 (en) Methods and apparatus for access data recovery from a malfunctioning device
WO2011130970A1 (fr) Dispositif et procédé pour protéger les données d'un terminal mobile
EP2770702B1 (fr) Téléphone mobile et son procédé de communication
CN107508679B (zh) 一种智能终端主控芯片与加密芯片的绑定及认证方法
WO2012151785A1 (fr) Procédé de cryptage de fichier incorporé pour un terminal mobile, et terminal mobile
US9276748B2 (en) Data-encrypting method and decrypting method for a mobile phone
EP2357859B1 (fr) Procédé d'authentification pour terminal mobile et système correspondant
KR101303278B1 (ko) 비트스트림 보호를 위한 fpga 장치 및 그 방법
CN101026834A (zh) 锁定方法和解锁方法
JP2005316284A (ja) 携帯端末とデータ保護システム
CN107124279B (zh) 擦除终端数据的方法及装置
CN101777106A (zh) 一种移动终端软件防盗用的方法和装置
WO2019109640A1 (fr) Procédé et dispositif permettant de verrouiller une carte sim
CN114785503B (zh) 密码卡及其根密钥保护方法、计算机可读存储介质
JP6231504B2 (ja) 移動端末の情報セキュリティ管理のための方法、装置および移動端末
US20170091483A1 (en) Method and Device for Protecting Address Book, and Communication System
CN115150180A (zh) 存储设备管理方法、存储设备、管理设备及存储介质
US9985960B2 (en) Method for protecting data on a mass storage device and a device for the same
CN101355424B (zh) 一种手持设备数据安全迁移的方法
CN108173906A (zh) 安装包下载方法、装置、存储介质及电子设备
CN111628864A (zh) 一种使用sim卡进行密钥安全恢复的方法
KR101329789B1 (ko) 모바일 디바이스의 데이터베이스 암호화 방법
JP5169904B2 (ja) データバックアップシステム、復号装置及びデータバックアップ方法
CN104573564A (zh) 一种bios管理员密码的系统下管理方法
CN112632586A (zh) Bios硬盘密码找回方法、装置、设备及可读存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10850102

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10850102

Country of ref document: EP

Kind code of ref document: A1