WO2018027461A1 - Method and system for encryption and comparison of big data - Google Patents

Method and system for encryption and comparison of big data Download PDF

Info

Publication number
WO2018027461A1
WO2018027461A1 PCT/CN2016/093929 CN2016093929W WO2018027461A1 WO 2018027461 A1 WO2018027461 A1 WO 2018027461A1 CN 2016093929 W CN2016093929 W CN 2016093929W WO 2018027461 A1 WO2018027461 A1 WO 2018027461A1
Authority
WO
WIPO (PCT)
Prior art keywords
big data
accuracy
encryption
data
present
Prior art date
Application number
PCT/CN2016/093929
Other languages
French (fr)
Chinese (zh)
Inventor
马岩
Original Assignee
深圳市博信诺达经贸咨询有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市博信诺达经贸咨询有限公司 filed Critical 深圳市博信诺达经贸咨询有限公司
Priority to PCT/CN2016/093929 priority Critical patent/WO2018027461A1/en
Publication of WO2018027461A1 publication Critical patent/WO2018027461A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules

Definitions

  • the present invention relates to the field of big data, and in particular to a method and system for encrypting large data.
  • Big data or massive data, refers to the massive, high-growth, and diverse information assets that require new processing models to have greater decision-making, insight, and process optimization capabilities.
  • Victor ⁇ Meyer Schonberg and Kenneth Big data in the Big Data Era written by Cookey refers to the use of all data for analysis without the use of random analysis (sample survey). 4V features of big data: Volume, Velocity, Variety, Value.
  • a method for encrypting alignment of big data is provided, which solves the disadvantage of poor accuracy of the prior art.
  • a method of encryption alignment of big data comprising the steps of:
  • the comparison result is counted to obtain the accuracy of the encryption.
  • the method further includes:
  • the method further includes:
  • a system for encryption comparison of big data comprising:
  • a crawling unit for capturing each encrypted data in the big data
  • a comparison unit configured to compare each encrypted data
  • a statistical unit for counting the comparison result to obtain the accuracy of the encryption is
  • system further includes:
  • An analysis unit for analyzing the accuracy is an analysis unit for analyzing the accuracy.
  • system further includes:
  • a drawing unit is used to draw a comparative analysis diagram of big data according to the analysis result.
  • the technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
  • FIG. 1 is a flowchart of a method for encrypting and comparing big data according to the present invention
  • FIG. 2 is a structural diagram of a system for encrypting and comparing big data according to the present invention.
  • FIG. 1 is a flowchart of a method for providing encryption comparison of big data according to a first preferred embodiment of the present invention.
  • the method is implemented by a server.
  • the method is as shown in FIG. 1 and includes the following steps:
  • Step S101 Grab each encrypted data in the big data
  • Step S102 comparing each encrypted data
  • Step S103 Statistics the comparison result to obtain the accuracy of the encryption.
  • the technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
  • the foregoing method may further include:
  • the foregoing method may further include:
  • FIG. 2 is a system for providing encryption comparison of big data according to a second preferred embodiment of the present invention.
  • the system includes:
  • the crawling unit 201 is configured to capture each encrypted data in the big data
  • the comparing unit 202 is configured to compare each encrypted data.
  • the statistic unit 203 is configured to collect the comparison result to obtain the accuracy of the encryption.
  • the technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
  • the above system may further include:
  • the analyzing unit 204 is configured to analyze the accuracy.
  • the above system may further include:
  • the drawing unit 205 is configured to draw a comparative analysis diagram of the big data according to the analysis result.
  • Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another.
  • a storage medium may be any available media that can be accessed by a computer.
  • the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium.
  • a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.

Abstract

A method and system for encryption and comparison of big data. The method comprises the following steps: capturing each piece of encrypted data in big data (101); comparing each piece of encrypted data (102); and making statistics on a comparison result to acquire the accuracy of the encryption (103). The method and system have the advantage of high accuracy.

Description

大数据的加密比对的方法及系统  Big data encryption comparison method and system 技术领域Technical field
本发明涉及大数据领域,尤其涉及一种大数据的加密比对的方法及系统。The present invention relates to the field of big data, and in particular to a method and system for encrypting large data.
背景技术Background technique
大数据(big data),或称巨量资料,指的是需要新处理模式才能具有更强的决策力、洞察力和流程优化能力的海量、高增长率和多样化的信息资产。在维克托 · 迈尔-舍恩伯格及肯尼斯 · 库克耶编写的《大数据时代》中大数据指不用随机分析法(抽样调查)这样的捷径,而采用所有数据进行分析处理。大数据的4V特点:Volume(大量)、Velocity(高速)、Variety(多样)、Value(价值)。Big data (big Data), or massive data, refers to the massive, high-growth, and diverse information assets that require new processing models to have greater decision-making, insight, and process optimization capabilities. In Victor · Meyer Schonberg and Kenneth Big data in the Big Data Era written by Cookey refers to the use of all data for analysis without the use of random analysis (sample survey). 4V features of big data: Volume, Velocity, Variety, Value.
现有大数据在无法进行加密对比,准确性差。Existing big data cannot be encrypted and compared with poor accuracy.
技术问题technical problem
提供一种大数据的加密比对的方法,其解决了现有技术准确性差的缺点。A method for encrypting alignment of big data is provided, which solves the disadvantage of poor accuracy of the prior art.
技术解决方案Technical solution
一方面,提供一种大数据的加密比对的方法,所述方法包括如下步骤:In one aspect, a method of encryption alignment of big data is provided, the method comprising the steps of:
抓取大数据中各个加密的数据;Grab each encrypted data in big data;
对各个加密的数据进行比对;Comparing each encrypted data;
统计该比对结果获取该加密的准确性。The comparison result is counted to obtain the accuracy of the encryption.
可选的,所述方法还包括:Optionally, the method further includes:
对该准确性进行分析。This accuracy is analyzed.
可选的,所述方法还包括:Optionally, the method further includes:
依据该分析结果绘制大数据的对比分析示意图。Based on the analysis results, a comparative analysis diagram of big data is drawn.
另一方面,提供一种大数据的加密比对的系统,所述系统包括:In another aspect, a system for encryption comparison of big data is provided, the system comprising:
抓取单元,用于抓取大数据中各个加密的数据;a crawling unit for capturing each encrypted data in the big data;
对比单元,用于对各个加密的数据进行比对;a comparison unit, configured to compare each encrypted data;
统计单元,用于统计该比对结果获取该加密的准确性。A statistical unit for counting the comparison result to obtain the accuracy of the encryption.
可选的,所述系统还包括:Optionally, the system further includes:
分析单元,用于对该准确性进行分析。An analysis unit for analyzing the accuracy.
可选的,所述系统还包括:Optionally, the system further includes:
绘制单元,用于依据该分析结果绘制大数据的对比分析示意图。 A drawing unit is used to draw a comparative analysis diagram of big data according to the analysis result.
有益效果Beneficial effect
本发明具体实施方式提供的技术方案抓取大数据中各个加密的数据,对各个加密的数据进行比对,统计该比对结果获取该加密的准确性,所以其具有准确性好的优点。The technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
附图说明DRAWINGS
为了更清楚地说明本发明实施例或现有技术中的技术方案,下面将对实施例或现有技术描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本发明的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the embodiments or the description of the prior art will be briefly described below. Obviously, the drawings in the following description are only It is a certain embodiment of the present invention, and other drawings can be obtained from those skilled in the art without any creative work.
图1为本发明提供的一种大数据的加密比对的方法的流程图;1 is a flowchart of a method for encrypting and comparing big data according to the present invention;
图2为本发明提供的一种大数据的加密比对的系统的结构图。FIG. 2 is a structural diagram of a system for encrypting and comparing big data according to the present invention.
本发明的实施方式Embodiments of the invention
下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都属于本发明保护的范围。The technical solutions in the embodiments of the present invention are clearly and completely described in the following with reference to the accompanying drawings in the embodiments of the present invention. It is obvious that the described embodiments are only a part of the embodiments of the present invention, but not all embodiments. All other embodiments obtained by those skilled in the art based on the embodiments of the present invention without creative efforts are within the scope of the present invention.
参阅图1,图1为本发明第一较佳实施方式提供大数据的加密比对的方法的流程图,该方法由服务器来完成,该方法如图1所示,包括如下步骤:Referring to FIG. 1, FIG. 1 is a flowchart of a method for providing encryption comparison of big data according to a first preferred embodiment of the present invention. The method is implemented by a server. The method is as shown in FIG. 1 and includes the following steps:
步骤S101、抓取大数据中各个加密的数据;Step S101: Grab each encrypted data in the big data;
步骤S102、对各个加密的数据进行比对;Step S102, comparing each encrypted data;
步骤S103、统计该比对结果获取该加密的准确性。Step S103: Statistics the comparison result to obtain the accuracy of the encryption.
本发明具体实施方式提供的技术方案抓取大数据中各个加密的数据,对各个加密的数据进行比对,统计该比对结果获取该加密的准确性,所以其具有准确性好的优点。The technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
对该准确性进行分析。This accuracy is analyzed.
可选的,上述方法在步骤S103之后还可以包括:Optionally, after the step S103, the foregoing method may further include:
依据该分析结果绘制大数据的对比分析示意图。Based on the analysis results, a comparative analysis diagram of big data is drawn.
参阅图2,图2为本发明第二较佳实施方式提供大数据的加密比对的系统,该系统包括:Referring to FIG. 2, FIG. 2 is a system for providing encryption comparison of big data according to a second preferred embodiment of the present invention. The system includes:
抓取单元201,用于抓取大数据中各个加密的数据;The crawling unit 201 is configured to capture each encrypted data in the big data;
对比单元202,用于对各个加密的数据进行比对;The comparing unit 202 is configured to compare each encrypted data.
统计单元203,用于统计该比对结果获取该加密的准确性。The statistic unit 203 is configured to collect the comparison result to obtain the accuracy of the encryption.
本发明具体实施方式提供的技术方案抓取大数据中各个加密的数据,对各个加密的数据进行比对,统计该比对结果获取该加密的准确性,所以其具有准确性好的优点。The technical solution provided by the specific embodiment of the present invention captures each encrypted data in the big data, compares each encrypted data, and compares the comparison result to obtain the accuracy of the encryption, so that it has the advantage of good accuracy.
可选的,上述系统还可以包括:Optionally, the above system may further include:
分析单元204,用于对该准确性进行分析。The analyzing unit 204 is configured to analyze the accuracy.
可选的,上述系统还可以包括:Optionally, the above system may further include:
绘制单元205,用于依据该分析结果绘制大数据的对比分析示意图。The drawing unit 205 is configured to draw a comparative analysis diagram of the big data according to the analysis result.
需要说明的是,对于前述的各方法实施方式或实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本发明并不受所描述的动作顺序的限制,因为根据本发明,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说明书中所描述实施方式或实施例均属于优选实施例,所涉及的动作和单元并不一定是本发明所必须的。It should be noted that, for the foregoing method embodiments or embodiments, for the sake of simple description, they are all expressed as a series of action combinations, but those skilled in the art should know that the present invention is not subject to the described action sequence. Limitations, as certain steps may be performed in other sequences or concurrently in accordance with the present invention. In the following, those skilled in the art should also understand that the embodiments or examples described in the specification are preferred embodiments, and the actions and units involved are not necessarily required by the present invention.
在上述实施例中,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。In the above embodiments, the descriptions of the various embodiments are different, and the details that are not detailed in a certain embodiment can be referred to the related descriptions of other embodiments.
本发明实施例方法中的步骤可以根据实际需要进行顺序调整、合并和删减。The steps in the method of the embodiment of the present invention may be sequentially adjusted, merged, and deleted according to actual needs.
本发明实施例装置中的单元可以根据实际需要进行合并、划分和删减。本领域的技术人员可以将本说明书中描述的不同实施例以及不同实施例的特征进行结合或组合。The units in the apparatus of the embodiment of the present invention may be combined, divided, and deleted according to actual needs. Those skilled in the art can combine or combine the different embodiments described in the specification and the features of the different embodiments.
通过以上的实施方式的描述,所属领域的技术人员可以清楚地了解到本发明可以用硬件实现,或固件实现,或它们的组合方式来实现。当使用软件实现时,可以将上述功能存储在计算机可读介质中或作为计算机可读介质上的一个或多个指令或代码进行传输。计算机可读介质包括计算机存储介质和通信介质,其中通信介质包括便于从一个地方向另一个地方传送计算机程序的任何介质。存储介质可以是计算机能够存取的任何可用介质。以此为例但不限于:计算机可读介质可以包括随机存取存储器(Random Access Memory,RAM)、只读存储器(Read-Only Memory,ROM)、电可擦可编程只读存储器(Electrically Erasable Programmable Read-Only Memory,EEPROM)、只读光盘(Compact Disc Read-Only Memory,CD-ROM)或其他光盘存储、磁盘存储介质或者其他磁存储设备、或者能够用于携带或存储具有指令或数据结构形式的期望的程序代码并能够由计算机存取的任何其他介质。此外。任何连接可以适当的成为计算机可读介质。例如,如果软件是使用同轴电缆、光纤光缆、双绞线、数字用户线(Digital Subscriber Line,DSL)或者诸如红外线、无线电和微波之类的无线技术从网站、服务器或者其他远程源传输的,那么同轴电缆、光纤光缆、双绞线、DSL或者诸如红外线、无线和微波之类的无线技术包括在所属介质的定影中。如本发明所使用的,盘(Disk)和碟(disc)包括压缩光碟(CD)、激光碟、光碟、数字通用光碟(DVD)、软盘和蓝光光碟,其中盘通常磁性的复制数据,而碟则用激光来光学的复制数据。上面的组合也应当包括在计算机可读介质的保护范围之内。Through the description of the above embodiments, those skilled in the art can clearly understand that the present invention can be implemented in hardware, firmware implementation, or a combination thereof. When implemented in software, the functions described above may be stored in or transmitted as one or more instructions or code on a computer readable medium. Computer readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one location to another. A storage medium may be any available media that can be accessed by a computer. Taking this as an example, but not limited to: the computer readable medium may include random access memory (Random) Access Memory, RAM), Read-Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (Electrically Erasable Programmable Read-Only Memory, EEPROM), Compact Disc Read-Only Memory, CD-ROM, or other optical disc storage, magnetic storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer. Also. Any connection may suitably be a computer readable medium. For example, if the software is using coaxial cable, fiber optic cable, twisted pair, digital subscriber line (Digital Subscriber Line, DSL) or wireless technology such as infrared, radio and microwave transmission from a website, server or other remote source, then coaxial cable, fiber optic cable, twisted pair, DSL or such as infrared, wireless and microwave Wireless technology is included in the fixing of the associated medium. As used in the present invention, a disk and a disc include a compact disc (CD), a laser disc, a compact disc, a digital versatile disc (DVD), a floppy disk, and a Blu-ray disc, wherein the disc is usually magnetically copied, and the disc is The laser is used to optically replicate the data. Combinations of the above should also be included within the scope of the computer readable media.
总之,以上所述仅为本发明技术方案的较佳实施例而已,并非用于限定本发明的保护范围。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。 In summary, the above description is only a preferred embodiment of the technical solution of the present invention, and is not intended to limit the scope of the present invention. Any modifications, equivalent substitutions, improvements, etc. made within the spirit and scope of the present invention are intended to be included within the scope of the present invention.

Claims (6)

  1. 一种大数据的加密比对的方法,其特征在于,所述方法包括如下步骤: A method for encrypting and aligning big data, characterized in that the method comprises the following steps:
    抓取大数据中各个加密的数据;Grab each encrypted data in big data;
    对各个加密的数据进行比对;Comparing each encrypted data;
    统计该比对结果获取该加密的准确性。The comparison result is counted to obtain the accuracy of the encryption.
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    对该准确性进行分析。This accuracy is analyzed.
  3. 根据权利要求1所述的方法,其特征在于,所述方法还包括:The method of claim 1 further comprising:
    依据该分析结果绘制大数据的对比分析示意图。Based on the analysis results, a comparative analysis diagram of big data is drawn.
  4. 一种大数据的加密比对的系统,其特征在于,所述系统包括:A system for encrypting large data, characterized in that the system comprises:
    抓取单元,用于抓取大数据中各个加密的数据;a crawling unit for capturing each encrypted data in the big data;
    对比单元,用于对各个加密的数据进行比对;a comparison unit, configured to compare each encrypted data;
    统计单元,用于统计该比对结果获取该加密的准确性。 A statistical unit for counting the comparison result to obtain the accuracy of the encryption.
  5. 根据权利要求4所述的系统,其特征在于,所述系统还包括:The system of claim 4, wherein the system further comprises:
    分析单元,用于对该准确性进行分析。An analysis unit for analyzing the accuracy.
  6. 根据权利要求4所述的系统,其特征在于,所述系统还包括:The system of claim 4, wherein the system further comprises:
    绘制单元,用于依据该分析结果绘制大数据的对比分析示意图。A drawing unit is used to draw a comparative analysis diagram of big data according to the analysis result.
PCT/CN2016/093929 2016-08-08 2016-08-08 Method and system for encryption and comparison of big data WO2018027461A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/093929 WO2018027461A1 (en) 2016-08-08 2016-08-08 Method and system for encryption and comparison of big data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2016/093929 WO2018027461A1 (en) 2016-08-08 2016-08-08 Method and system for encryption and comparison of big data

Publications (1)

Publication Number Publication Date
WO2018027461A1 true WO2018027461A1 (en) 2018-02-15

Family

ID=61161134

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2016/093929 WO2018027461A1 (en) 2016-08-08 2016-08-08 Method and system for encryption and comparison of big data

Country Status (1)

Country Link
WO (1) WO2018027461A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710414A (en) * 2012-05-30 2012-10-03 中国电力科学研究院 Randomized document block encryption method
CN105404824A (en) * 2015-11-11 2016-03-16 成都比特信安科技有限公司 Asynchronous data slow encryption system and method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102710414A (en) * 2012-05-30 2012-10-03 中国电力科学研究院 Randomized document block encryption method
CN105404824A (en) * 2015-11-11 2016-03-16 成都比特信安科技有限公司 Asynchronous data slow encryption system and method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
ZHANG, QINGHUA ET AL.: "Analyses of Several Densification Methods of Precise Satellite Clock Offset", ENGINEERING OF SURVEYING AND MAPPING, vol. 19, no. 2, 30 April 2010 (2010-04-30), pages 66, ISSN: 1006-7949 *

Similar Documents

Publication Publication Date Title
WO2018027461A1 (en) Method and system for encryption and comparison of big data
WO2018035663A1 (en) Infant detection method and system for internet of things quilt cover
WO2018027460A1 (en) Method and system for algorithm comparison
WO2018027462A1 (en) Implementation method and system for search and comparison
WO2018027463A1 (en) Application method and system for keyword analysis in big data
WO2018027459A1 (en) Method and system for classifying and comparing application in big data
WO2018035791A1 (en) Method and system for closed loop control of rotation speed of horizontal winding machine
WO2018027458A1 (en) Method and system for sharing big data in real time
WO2018027470A1 (en) Method and system for sharing big data in wechat
WO2018027455A1 (en) Method and system for sharing big data in social network
WO2018027457A1 (en) Method and system for sharing mobile big data
WO2018027456A1 (en) Method and system for specifying application to be shared in big data
WO2018027576A1 (en) Method and system for collecting operating time in statistics in internet of things
WO2018027343A1 (en) Method and system for implementing voice search
WO2018023482A1 (en) Method and system for implementing voice search
WO2018035788A1 (en) Application method and system for open loop control in vertical winding machine
WO2018027557A1 (en) Wifi attendance record method and system in security
WO2018027464A1 (en) Implementation method and system for different parts of speech in big data search
WO2018023484A1 (en) Method and system of implementing search of different parts of speech in big data
WO2018027560A1 (en) Gprs attendance recording method and system for use in security
WO2018027341A1 (en) Category-based keyword searching method and system in big data
WO2018027465A1 (en) Method and system for real-time backup based on big data
WO2018023483A1 (en) Method and system for implementing real-time search of different languages in big data
WO2018023480A1 (en) Keyword classification-based search method and system in big data
WO2018027468A1 (en) Classified storage method and system for big data

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 16911917

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 03/06/2019)

122 Ep: pct application non-entry in european phase

Ref document number: 16911917

Country of ref document: EP

Kind code of ref document: A1