WO2016007158A1 - Archive file - Google Patents

Archive file Download PDF

Info

Publication number
WO2016007158A1
WO2016007158A1 PCT/US2014/046082 US2014046082W WO2016007158A1 WO 2016007158 A1 WO2016007158 A1 WO 2016007158A1 US 2014046082 W US2014046082 W US 2014046082W WO 2016007158 A1 WO2016007158 A1 WO 2016007158A1
Authority
WO
WIPO (PCT)
Prior art keywords
file
archive
copy
location
archive location
Prior art date
Application number
PCT/US2014/046082
Other languages
French (fr)
Inventor
Seth Pickett
Stanley S. Feather
Original Assignee
Hewlett-Packard Development Company, L.P.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hewlett-Packard Development Company, L.P. filed Critical Hewlett-Packard Development Company, L.P.
Priority to PCT/US2014/046082 priority Critical patent/WO2016007158A1/en
Publication of WO2016007158A1 publication Critical patent/WO2016007158A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/11File system administration, e.g. details of archiving or snapshots
    • G06F16/113Details of archiving

Definitions

  • Archiving systems are used to store and track historical data.
  • Current archiving solutions generally rely on computer applications installed on a computer to archive files.
  • the archive itself may be a disk drive, or other type of memory, and is typically external to the local device running an archiving application.
  • FIG. 1 is a block diagram of an example active archiving file system.
  • FIG. 2 is a block diagram of a device using an example active archive system.
  • Fig. 3 is a process flow diagram of a method for actively arching files.
  • FIG. 4 is a block diagram of an example interface for an application using metadata.
  • FIG. 5 is a block diagram of an example of a tangible, non-transitory, computer-readable medium that stores code configured to operate an active archiving system.
  • an archive application backs up a file to an archive.
  • Archiving applications may use a single archive bit on the files to be archived, and the application may take action based on whether the archive bit is set. For example, if the archive bit is not set, the application may decide to archive the file. After backing up the file to the archive, the application may set the archive bit. Additionally, these applications may use a separate database to track archive data. Accordingly, these applications can be expensive to install and maintain. Also, these applications often lock a user into a specific archive format, which may limit the flexibility of the computer system, and limit the ability of the archive system to adapt over time.
  • Examples of the present techniques provide an archiving system that takes an active role in ensuring whether files are archived (or not). Rather than relying on a separate application and database, an active archiving system can provide file metadata that shows with specificity the location of the last copy, in contrast to current systems that can merely describe whether a file has been archived. This active archiving system may also include predefined policies for archiving files with specificity. An example system is described in greater detail with respect to Fig. 1 .
  • Fig. 1 is a block diagram of an example active archiving file system 100.
  • the system 100 includes a computing device 102, in communication with an Internet cloud 104.
  • the computing device 102 may be any of various computing devices, such as a desktop computer, laptop, smart phone, tablet, and the like.
  • the Internet cloud 104 enables network communication with other devices, such as a smart phone or tablet 106.
  • the Internet cloud 1 04 also enables communication with various cloud services, such as file drop services 108, photo services 1 10, and social media services 1 1 2.
  • File drop services 108 provide file storage that can be accessed over the Internet cloud 104, instead of a single computing device.
  • Photo services 1 10 may provide storage, printing, and viewing services for amateur or professional photographers.
  • Social media services 1 12 enable their users to maintain personal social networks over which they may share experiences, photos, games, and so on with friends and family.
  • the computing device 102 may have various peripherals attached.
  • Peripherals may be devices external to the computing device 102, such as an external hard drive 1 14, a camera 1 1 6, a universal serial bus (USB) stick 1 18, and the like.
  • the USB stick 1 18 is a storage device connectable to the computing device 102 using a USB port.
  • Each of the peripheral devices may provide an archive for files local to the computing device 102.
  • the peripheral devices communicate with the computing device 102 using device drivers 120.
  • the computing device 102 also includes an operating system 122 and an active archive manager 124.
  • the active archive manager 124 communicates with the operating system 122 to manage the archiving of files local to the computing device 1 02. For example, every time a file is copied to an external location, the active archive manager 124 updates metadata 126 with information about the archive location.
  • a photo may be copied to the USB stick 1 18, an external device that is physically attached to the computing device 1 02.
  • the active archive manager 124 communicates with the operating system 1 22 to retrieve details about the USB stick 1 1 8, such as a device identifier, file size, file type, and so on.
  • the active archive manager 1 24 updates the metadata 126 of the photo file with these details.
  • the file may be uploaded to a cloud service, such as photo services 1 1 0.
  • the active archive manager 124 interacts with the operating system to determine photo service, details and update the metadata 126 of the photo file with a note indicating the file is archived to a photo upload service, the uniform resource location of the photo service, and a timestamp of when the file is uploaded.
  • metadata 126 may also include information about a file copied to an external archive, such as port number, volume, the application used to copy the file to the archive, and so on.
  • the policies 128 may be used to define archive actions and preferences.
  • An example policy may specify files that are to be automatically archived. Such a policy may specify when and where files are archived.
  • the policies 128 may also limit where files may be archived or prevent files from being archived.
  • Another example policy 128 may schedule the active archive manager 124 to archive all files from a predefined "photos" folder to the photo service 1 10. Such a policy may also specify that the active archive manager re-check the files uploaded to photo service 1 10 every 72 hours.
  • Another example policy may specify a main archive and a backup archive in cases when the main archive location is unavailable.
  • policies include, preventing reads of external archives without specifying the destination metadata; preventing a write to external archives without specifying the source metadata; and, actively arching a specific file whenever the file is updated with a write.
  • policies 128 may also be turned on or off.
  • Fig. 2 is a block diagram of a device 200 using an example active archive system 202.
  • the device 200 includes a port 204, such as a USB port for a physically attached storage device.
  • the system includes a data mover application 206 that transfers files to the device from, and transfer files to, a network-based archive 208.
  • the network-based archive 208 may include URLs accessible over one or more networks, such as the Internet cloud, local area networks, and the like.
  • the system 202 includes a logging and policy application 210, a transaction log file 212, and a file repository 214.
  • the application 210 enforces the policies set forth in a policy management API or configuration file 216.
  • the application 210 logs all archive transactions in the transaction log file 212, which contains the metadata 126.
  • the file repository 214 may include local copies of actively archived files.
  • the device 200 also includes an operating system 216 that interacts with the active archiving system 202 during standard file inputs and outputs (I/O) 21 8.
  • An active archiving system (AAS) application program interface (API) 220 enables applications, such as the application 21 0 to identify the location and other metadata regarding external archives 204, 208. Additionally, the API 220 allows access to physical devices, such as the USB stick 1 18, Further, the API 220 may be used at an application layer to access protocol and port information as well. This allows the application 210 to update the metadata 126 accordingly.
  • AAS active archiving system
  • API application program interface
  • Fig. 3 is a process flow diagram of a method 300 for actively arching files.
  • the method 300 is performed by the logging application 21 0, and begins at block 302, where a file copy to an external archive 204, 208.
  • a file copy to an external archive 204, 208 For example, a user issues a command to copy the file from the file repository 214 to external archive 204 using the operating system 216.
  • the data mover application may attempt to transfer a file from the repository 214 to an external archive 208.
  • the application 21 0 is triggered via standard file I/O 218 when the operating system 216 attempts to write to the external archive 208.
  • the application 210 may compare the I/O request with the policy management settings to determine if the copy is permitted. If the copy is permitted, at block 308, the application 210 queries the metadata for the external archive 208, using the active archiving system API 220.
  • the metadata 126 is updated.
  • Fig. 4 is a block diagram of an example interface 400 for an application using metadata 128.
  • the interface 400 displays file and directory information for an example computing device 102.
  • the interface includes an archive location 406 and archive timestamp 408.
  • the interface 400 also includes a status bar 410 describing the number of archived files displayed.
  • process network traffic diagram of Fig. 4 is not intended to indicate that the elements of the method 400 are to be executed in any particular order, or that all of the elements of the method 400 are to be included in every case. Further, any number of additional elements not shown in Fig. 4 can be included within the method 400, depending on the details of the specific implementation.
  • Fig. 5 is a block diagram of an example of a tangible, non-transitory, computer-readable medium that stores code configured to operate an active archiving system.
  • the computer-readable medium is referred to by the reference number 500.
  • the computer-readable medium 500 can include RAM, a hard disk drive, an array of hard disk drives, an optical drive, an array of optical drives, a nonvolatile memory, a flash drive, a digital versatile disk (DVD), or a compact disk (CD), among others.
  • the computer-readable medium 500 can be accessed by a controller 502 over a computer bus 504. Further, the computer-readable medium 500 may include an active archive manager 506 to perform the methods and provide the systems described herein.
  • the various software components discussed herein may be stored on the computer-readable medium 500.
  • examples of the present techniques provide an active archiving system that has the ability and responsibility to track file archive metadata whenever a file is copied to an external, potentially networked, location. Further, this system provides information to the user about file copy locations, time stamps, etc. This provides a better understanding of the location of file archives. Additionally, example systems may help track and initiate file archiving, freeing the user from installing a separate application and database perform these functions.

Abstract

A method for automatically archiving files determines an operating system is being requested to copy a file to an archive location. The method also includes determining whether a copy of the file is permitted based on a predefined policy. The method further includes copying the file to the archive location if the copy of the file is permitted. Additionally, the method includes tracking archive metadata describing the copy of the file to the archive location.

Description

ARCHIVE FILE
BACKGROUND
[0001] Archiving systems are used to store and track historical data. Current archiving solutions generally rely on computer applications installed on a computer to archive files. The archive itself may be a disk drive, or other type of memory, and is typically external to the local device running an archiving application.
BRIEF DESCRIPTION OF THE DRAWINGS
[0002] Certain exemplary embodiments are described in the following detailed description and in reference to the drawings, in which:
[0003] Fig. 1 is a block diagram of an example active archiving file system.
[0004] Fig. 2 is a block diagram of a device using an example active archive system.
[0005] Fig. 3 is a process flow diagram of a method for actively arching files.
[0006] Fig. 4 is a block diagram of an example interface for an application using metadata.
[0007] Fig. 5 is a block diagram of an example of a tangible, non-transitory, computer-readable medium that stores code configured to operate an active archiving system.
DETAILED DESCRIPTION
[0008] Typically, an archive application backs up a file to an archive. Archiving applications may use a single archive bit on the files to be archived, and the application may take action based on whether the archive bit is set. For example, if the archive bit is not set, the application may decide to archive the file. After backing up the file to the archive, the application may set the archive bit. Additionally, these applications may use a separate database to track archive data. Accordingly, these applications can be expensive to install and maintain. Also, these applications often lock a user into a specific archive format, which may limit the flexibility of the computer system, and limit the ability of the archive system to adapt over time.
[0009] Examples of the present techniques provide an archiving system that takes an active role in ensuring whether files are archived (or not). Rather than relying on a separate application and database, an active archiving system can provide file metadata that shows with specificity the location of the last copy, in contrast to current systems that can merely describe whether a file has been archived. This active archiving system may also include predefined policies for archiving files with specificity. An example system is described in greater detail with respect to Fig. 1 .
[0010] Fig. 1 is a block diagram of an example active archiving file system 100. The system 100 includes a computing device 102, in communication with an Internet cloud 104. The computing device 102 may be any of various computing devices, such as a desktop computer, laptop, smart phone, tablet, and the like. The Internet cloud 104 enables network communication with other devices, such as a smart phone or tablet 106. The Internet cloud 1 04 also enables communication with various cloud services, such as file drop services 108, photo services 1 10, and social media services 1 1 2. File drop services 108 provide file storage that can be accessed over the Internet cloud 104, instead of a single computing device. Photo services 1 10 may provide storage, printing, and viewing services for amateur or professional photographers. Social media services 1 12 enable their users to maintain personal social networks over which they may share experiences, photos, games, and so on with friends and family.
[0011] The computing device 102 may have various peripherals attached.
Peripherals may be devices external to the computing device 102, such as an external hard drive 1 14, a camera 1 1 6, a universal serial bus (USB) stick 1 18, and the like. The USB stick 1 18 is a storage device connectable to the computing device 102 using a USB port. Each of the peripheral devices may provide an archive for files local to the computing device 102. The peripheral devices communicate with the computing device 102 using device drivers 120.
[0012] The computing device 102 also includes an operating system 122 and an active archive manager 124. The active archive manager 124 communicates with the operating system 122 to manage the archiving of files local to the computing device 1 02. For example, every time a file is copied to an external location, the active archive manager 124 updates metadata 126 with information about the archive location. In one example, a photo may be copied to the USB stick 1 18, an external device that is physically attached to the computing device 1 02. The active archive manager 124 communicates with the operating system 1 22 to retrieve details about the USB stick 1 1 8, such as a device identifier, file size, file type, and so on. The active archive manager 1 24 updates the metadata 126 of the photo file with these details. In another example, the file may be uploaded to a cloud service, such as photo services 1 1 0. In such an example, the active archive manager 124 interacts with the operating system to determine photo service, details and update the metadata 126 of the photo file with a note indicating the file is archived to a photo upload service, the uniform resource location of the photo service, and a timestamp of when the file is uploaded. Of course, metadata 126 may also include information about a file copied to an external archive, such as port number, volume, the application used to copy the file to the archive, and so on.
[0013] The policies 128 may be used to define archive actions and preferences. An example policy may specify files that are to be automatically archived. Such a policy may specify when and where files are archived. The policies 128 may also limit where files may be archived or prevent files from being archived. Another example policy 128 may schedule the active archive manager 124 to archive all files from a predefined "photos" folder to the photo service 1 10. Such a policy may also specify that the active archive manager re-check the files uploaded to photo service 1 10 every 72 hours. Another example policy may specify a main archive and a backup archive in cases when the main archive location is unavailable. Additional examples of policies include, preventing reads of external archives without specifying the destination metadata; preventing a write to external archives without specifying the source metadata; and, actively arching a specific file whenever the file is updated with a write. In example systems, such policies 128 may also be turned on or off.
[0014] Fig. 2 is a block diagram of a device 200 using an example active archive system 202. The device 200 includes a port 204, such as a USB port for a physically attached storage device. The system includes a data mover application 206 that transfers files to the device from, and transfer files to, a network-based archive 208. The network-based archive 208 may include URLs accessible over one or more networks, such as the Internet cloud, local area networks, and the like. The system 202 includes a logging and policy application 210, a transaction log file 212, and a file repository 214. The application 210 enforces the policies set forth in a policy management API or configuration file 216. The application 210 logs all archive transactions in the transaction log file 212, which contains the metadata 126. The file repository 214 may include local copies of actively archived files. The device 200 also includes an operating system 216 that interacts with the active archiving system 202 during standard file inputs and outputs (I/O) 21 8. An active archiving system (AAS) application program interface (API) 220 enables applications, such as the application 21 0 to identify the location and other metadata regarding external archives 204, 208. Additionally, the API 220 allows access to physical devices, such as the USB stick 1 18, Further, the API 220 may be used at an application layer to access protocol and port information as well. This allows the application 210 to update the metadata 126 accordingly.
[0015] Fig. 3 is a process flow diagram of a method 300 for actively arching files. The method 300 is performed by the logging application 21 0, and begins at block 302, where a file copy to an external archive 204, 208. For example, a user issues a command to copy the file from the file repository 214 to external archive 204 using the operating system 216. Alternatively, the data mover application may attempt to transfer a file from the repository 214 to an external archive 208.
[0016] At block 304, the application 21 0 is triggered via standard file I/O 218 when the operating system 216 attempts to write to the external archive 208. At block 306, the application 210 may compare the I/O request with the policy management settings to determine if the copy is permitted. If the copy is permitted, at block 308, the application 210 queries the metadata for the external archive 208, using the active archiving system API 220. At block 310, the metadata 126 is updated.
[0017] Current file systems may not provide much useful information about archiving files. If a file is archived, there are no mechanisms to track when or where the file is copied. Rather, this functionality is typically pushed up to application levels, where the application is tasked with identifying information about archived files. In contrast, example active archive file systems automatically record metadata about archived files, and provide this metadata independent of an application. In other words, separate applications and their associated databases are not needed, and the user can simply reference the active archive file system for information about archive timestamps and locations. However, the active archive file system does lend itself to having application integration, where an application could retrieve metadata 126 about files in the file repository 214. For example, applications that display file and directory information on a computer may be updated to display archive locations, identify archived files, or display any other metadata 128 tracked for the file. [0018] Fig. 4 is a block diagram of an example interface 400 for an application using metadata 128. The interface 400 displays file and directory information for an example computing device 102. In addition to typical information, such as file name 402, and timestamp 404, the interface includes an archive location 406 and archive timestamp 408. The interface 400 also includes a status bar 410 describing the number of archived files displayed.
[0019] It is to be understood that the process network traffic diagram of Fig. 4 is not intended to indicate that the elements of the method 400 are to be executed in any particular order, or that all of the elements of the method 400 are to be included in every case. Further, any number of additional elements not shown in Fig. 4 can be included within the method 400, depending on the details of the specific implementation.
[0020] Fig. 5 is a block diagram of an example of a tangible, non-transitory, computer-readable medium that stores code configured to operate an active archiving system. The computer-readable medium is referred to by the reference number 500. The computer-readable medium 500 can include RAM, a hard disk drive, an array of hard disk drives, an optical drive, an array of optical drives, a nonvolatile memory, a flash drive, a digital versatile disk (DVD), or a compact disk (CD), among others. The computer-readable medium 500 can be accessed by a controller 502 over a computer bus 504. Further, the computer-readable medium 500 may include an active archive manager 506 to perform the methods and provide the systems described herein. The various software components discussed herein may be stored on the computer-readable medium 500.
[0021] Advantageously, examples of the present techniques provide an active archiving system that has the ability and responsibility to track file archive metadata whenever a file is copied to an external, potentially networked, location. Further, this system provides information to the user about file copy locations, time stamps, etc. This provides a better understanding of the location of file archives. Additionally, example systems may help track and initiate file archiving, freeing the user from installing a separate application and database perform these functions.
[0022] While the present techniques may be susceptible to various modifications and alternative forms, the exemplary examples discussed above have been shown only by way of example. It is to be understood that the technique is not intended to be limited to the particular examples disclosed herein.

Claims

CLAIMS What is claimed is:
1 . A method for archiving files, comprising:
determining an operating system is being requested to copy a file to an archive location;
determining whether a copy of the file is permitted based on a
predefined policy;
copying the file to the archive location if the copy of the file is permitted; and
tracking archive metadata describing the copy of the file to the archive location.
2. The method of claim 1 , comprising preventing the copy of the file if not permitted.
3. The method of claim 1 , displaying the archive metadata in association with the file.
4. The method of claim 1 , the archive metadata specifying when the copy occurs and the archive location.
5. The method of claim 1 , the archive location comprising storage physically attached to a port of a computing device comprising the file.
6. The method of claim 1 , the archive location comprising a network uniform resource locator.
7. The method of claim 1 , the archive location comprising a cloud service.
8. A computing system, comprising:
a processor; and
a memory comprising code executed to cause the processor to: determine an operating system is being requested to copy a file to an archive location;
determine whether a copy of the file is permitted based on a predefined policy;
copy the file to the archive location if the copy of the file is permitted; track archive metadata describing the copy of the file to the archive location;
prevent the copy of the file if not permitted; and
display the archive metadata in association with the file.
9. The computing system of claim 8, the archive metadata specifying when the copy occurs, the archive location, and a number of files displayed in a directory window that are archived.
10. The computing system of claim 8, the archive location comprising storage physically attached to a port of a computing device comprising the file.
1 1 . The computing system of claim 8, the archive location comprising a network uniform resource locator.
12. The computing system of claim 8, the archive location comprising an application for a cloud service.
13. A tangible, non-transitory, computer-readable medium comprising instructions that direct a processor to:
determine an operating system is being requested to copy a file to an archive location;
determine whether a copy of the file is permitted based on a predefined policy;
copy the file to the archive location if the copy of the file is permitted; track archive metadata describing the copy of the file to the archive location;
prevent the copy of the file if not permitted; and
display the archive metadata in association with the file.
14. The tangible, non-transitory, computer-readable medium system of claim 13, the archive metadata specifying when the copy occurs, the archive location, and a number of files displayed in a directory window that are archived.
15. The tangible, non-transitory, computer-readable medium of claim 13, the archive location comprising storage physically attached to a port of a computing device comprising the file.
PCT/US2014/046082 2014-07-10 2014-07-10 Archive file WO2016007158A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/US2014/046082 WO2016007158A1 (en) 2014-07-10 2014-07-10 Archive file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2014/046082 WO2016007158A1 (en) 2014-07-10 2014-07-10 Archive file

Publications (1)

Publication Number Publication Date
WO2016007158A1 true WO2016007158A1 (en) 2016-01-14

Family

ID=55064622

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2014/046082 WO2016007158A1 (en) 2014-07-10 2014-07-10 Archive file

Country Status (1)

Country Link
WO (1) WO2016007158A1 (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7577689B1 (en) * 2005-06-15 2009-08-18 Adobe Systems Incorporated Method and system to archive data
US20120084524A1 (en) * 2010-09-30 2012-04-05 Parag Gokhale Archiving data objects using secondary copies
US8326805B1 (en) * 2007-09-28 2012-12-04 Emc Corporation High-availability file archiving
US20130110787A1 (en) * 2011-10-27 2013-05-02 International Business Machines Corporation Virtual file system interface for communicating changes of metadata in a data storage system
US8589439B2 (en) * 2009-12-04 2013-11-19 International Business Machines Corporation Pattern-based and rule-based data archive manager

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7577689B1 (en) * 2005-06-15 2009-08-18 Adobe Systems Incorporated Method and system to archive data
US8326805B1 (en) * 2007-09-28 2012-12-04 Emc Corporation High-availability file archiving
US8589439B2 (en) * 2009-12-04 2013-11-19 International Business Machines Corporation Pattern-based and rule-based data archive manager
US20120084524A1 (en) * 2010-09-30 2012-04-05 Parag Gokhale Archiving data objects using secondary copies
US20130110787A1 (en) * 2011-10-27 2013-05-02 International Business Machines Corporation Virtual file system interface for communicating changes of metadata in a data storage system

Similar Documents

Publication Publication Date Title
US10169163B2 (en) Managing backup operations from a client system to a primary server and secondary server
US11178224B2 (en) System and method for automatic cloud-based full-data backup on mobile devices
EP3685268B1 (en) File system point-in-time restore using recycle bin and version history
US8762456B1 (en) Generating prefetching profiles for prefetching data in a cloud based file system
US20160224649A1 (en) Idle state triggered constrained synchronization of shared content items
US20110295798A1 (en) Mobile mirror drive and remote access system
US9600376B1 (en) Backup and replication configuration using replication topology
US20140281301A1 (en) Elastic hierarchical data storage backend
JP2013524358A (en) Information processing system management method and data management computer system
EP3584716B1 (en) Storage constrained synchronization of shared content items
EP3239860B1 (en) Storage constrained synchronization engine
US9760457B2 (en) System, method and computer program product for recovering stub files
US9749193B1 (en) Rule-based systems for outcome-based data protection
US11934358B2 (en) Determining available remote storages in a network to use to replicate a file based on a geographical requirement with respect to the file
US11630737B2 (en) Virtual replication of unstructured data
WO2016148738A1 (en) File management
US11531468B2 (en) System and method for managing storage space
US9135116B1 (en) Cloud enabled filesystems provided by an agent which interfaces with a file system on a data source device
US10496493B1 (en) Method and system for restoring applications of particular point in time
US9830471B1 (en) Outcome-based data protection using multiple data protection systems
WO2016007158A1 (en) Archive file
US20230418741A1 (en) Data storage device management system
US10481813B1 (en) Device and method for extending cache operational lifetime
WO2021050906A1 (en) Virtual recovery and replication of unstructured data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 14897067

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 14897067

Country of ref document: EP

Kind code of ref document: A1