WO2018213916A1 - A secure transmission method for blockchain data based on sctp - Google Patents

A secure transmission method for blockchain data based on sctp Download PDF

Info

Publication number
WO2018213916A1
WO2018213916A1 PCT/CA2018/000098 CA2018000098W WO2018213916A1 WO 2018213916 A1 WO2018213916 A1 WO 2018213916A1 CA 2018000098 W CA2018000098 W CA 2018000098W WO 2018213916 A1 WO2018213916 A1 WO 2018213916A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
key
data
symmetric
public key
Prior art date
Application number
PCT/CA2018/000098
Other languages
French (fr)
Inventor
Enyan DENG
Original Assignee
Zeu Crypto Networks Inc.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zeu Crypto Networks Inc. filed Critical Zeu Crypto Networks Inc.
Publication of WO2018213916A1 publication Critical patent/WO2018213916A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/166Implementing security features at a particular protocol layer at the transport layer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present application relates generally to blockchain technology, and in particular to secure transmission of blockchain data.
  • P2P peer-to-peer
  • U DP user datagram protocol
  • TCP transmission control protocol
  • I P internet protocol
  • a method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol.
  • a method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) generating the blockchain data; b) receiving an selection of one of a symmetric and asymmetric encryption: c) obtaining an asymmetric encryption private key and public key for the first node; d) obtaining an asymmetric encryption public key for the second node; e) signing the blockchain data with a digital signature using the private key for the first node; f) upon the selection indicating use of asymmetric encryption: i) encrypting the blockchain data and signature using the public key for the second node; g) upon the selection indicating use of symmetric encryption: i) obtaining a symmetric encryption key; ii) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and iii) encrypting the symmetric key using the public key for the second
  • a blockchain system that includes a first node and a second node.
  • the first node comprises a first processor and memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol.
  • the second node comprises: a second processor and second memory coupled to the second processor storing instructions that when executed by the first processor execute the steps of: a) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol; b) obtaining an asymmetric encryption private key for the second node and the public key for the second node; c) obtaining the asymmetric encryption public key for the first node; d) decrypting the encrypted symmetric key using the private key for the second node; e) decrypting the encrypted blockchain data and signature using the symmetric key; and verifying the digital signature using the public key of the first public key for the first node.
  • FIG. 1 is a schematic block diagram of illustrating secure transmission of blockchain data between nodes of a blockchain, according to one exemplary embodiment of the present invention
  • FIG. 2 is a schematic block diagram of illustrating another secure transmission of blockchain data between nodes of a blockchain. according to another exemplary embodiment of the present invention.
  • FIG. 3 is a flowchart depicting steps involved in a process executed in a blockchain network, following the completion of building a block, to transfer blockchain data from one node to another, according to an exemplary embodiment of the present invention.
  • a "blockchain” is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network of computing devices.
  • the ledger is maintained as a growing sequential chain of cryptographic hash-linked blocks.
  • a “node” is a device on a blockchain network.
  • OSI Open Systems Interconnection
  • the OS I model a conceptual model that characterizes and standardizes the communication functions of a telecommunication in a hardware implementation independent manner.
  • the OSI layer is comprised of seven layers, which are the physical layer, data link layer, the network layer, the transport layer, the session layer, the presentation layer and the application layer.
  • the transport layer in such a layered model refers to methods and protocols that provide host-to-host communication services for appl ications and services such as connection- oriented communication, reliabi lity, flow control, and multiplexing.
  • SCTP Stream Control Transmission Protocol
  • SCTP can be used to transport multiple data streams by aggregating the data streams into a single managed bundle.
  • This single managed bundle shares common characteristics, such as a communication path and start and end points.
  • connection information that would have been transmitted over multiple data streams can be handled and managed as connection information of a single bundle.
  • SCTP tunnel can be created between network devices to provide a proxy tunnel for a multiple of TCP sessions. This proxy with the SCTP tunnel is implemented such that multiple TCP sessions can be multiplexed or aggregated into a single (or multiple) managed SCTP association(s).
  • a software, application, firmware or other process obtains (102) its own RSA private key and RSA public key of the other side e.g. client 108.
  • the node uses its private key to sign the data, and uses public key of other side to encrypt data and signature ( 103).
  • the encrypted data 104 is then sent via a socket 105.
  • a socket address data structure is bound using port binding step 106 and the socket is put in a listening state (step 107) to facilitate the transfer of data to the transport layer.
  • the transport layer receives (120) and accepts connection request 130 to establish SCTP connection and receives the data from the port, and transmits the received data in multiple streams from end points 122. 124. 126 to end points 132, 134. 136 respectively to the second node. After data transmission is complete then the connection is closed in steps 128. 138.
  • the received data at the second node or client 108. is routed up though its socket layer 112 to provide encrypted data 11 1 to the application layer of the second node.
  • the second node or client 108 obtains its own RSA private key and the RSA public key of the other side (110) and then decrypts the encrypted data 111 to verify the signature ( 109).
  • a system and method for secure transmission of blockchain data based on the SCTP protocol provided by a representative asymmetric encryption algorithm know as RSA includes the following steps:
  • the application layer obtains the RSA public-private key pair and signs and encrypts blockchain data
  • the transport layer uses the SCTP protocol to transfer the data packet
  • the application layer obtains RSA public and private key pairs and decrypts the blockchain data and verifies the signature.
  • step 1 the asymmetric encryption algorithm RSA is used.
  • the invention is not limited to the use of RSA. and other asymmetric encryption algorithms such as ECC. SM2 and the like may alternately be used.
  • Details of signing and encrypting blockchain data in step 1 may specifically include the following steps.
  • Step 3 of decrypting and verifying the blockchain data specifically includes the following steps:
  • RSA asymmetric encryption is adopted; the second node obtains its own private key to decrypt the encrypted blockchain data transmitted via SCTP; the second node obtains the other side " s (first node's) RSA public key from CA or other key management systems; and the public key is used for verifying the signature;
  • the method selects a representative asymmetric encryption algorithm (e.g.. RSA); a symmetric encryption algorithm (e.g.. Advance Encryption Standard or AES); and an SCTP protocol-based secure transmission method for blockchain data.
  • a representative asymmetric encryption algorithm e.g.. RSA
  • a symmetric encryption algorithm e.g.. Advance Encryption Standard or AES
  • SCTP protocol-based secure transmission method for blockchain data e.g.. a representative asymmetric encryption algorithm
  • AES Advance Encryption Standard
  • a software, application, firmware or other process obtains (202) obtain its ow n RSA private key, RSA public key of other side, and AES symmetric key .
  • the node uses its private key to sign the data.
  • the node uses the AES key of other side to encrypt blockchain data and signature (203) and uses the RSA public key to encrypt the AES key.
  • the encrypted data 204 is then sent via a socket 205.
  • a socket address data structure is bound using port binding step 206 and the socket is put in a listening state (step 207) to facilitate the transfer of data to the transport layer.
  • the transport layer receives (220) and accepts connection request 230 to establish SCTP connection and receives the data from the port, and transmits the received data in multiple streams from end points 222, 224, 226 to end points 232. 234, 236 respectively to the second node.
  • the connection is closed in steps 228, 238.
  • the received data at the second node or client 208 is routed up though its socket layer 212 to provide encrypted data 211 to the application layer of the second node.
  • the second node or client 208 obtains its own RSA private key and RSA public key of the other side (210); decrypts the AES key using its private RSA key, uses the AES key to decrypt the encrypted data 211 and uses RSA public key of the other side to verify the signature (209).
  • the method depicted in FIG. 2 includes the following steps:
  • the application layer (at the first node, e.g. server 201 ) obtains the RSA publ ic- private key pair and the AES key and signs and encrypts the blockchain data;
  • the transport layer uses the SCTP protocol to transfer the data packet
  • the application layer obtains the RSA public and private key pairs and the AES key and decrypts the blockchain data and verifies the signature.
  • the asymmetric encryption algorithm is RSA and the symmetric encryption algorithm is AES. Key sizes of 128-bit, 192-bit. and 256-bit are specified in the AES standard.
  • other asymmetric encryption algorithms such as ECC (Elliptic- Curve cryptography).
  • SM2 and other symmetric encryption algorithms such as DES (Data Encryption Standard) may be used.
  • step 1 The details of signing and encrypting the blockchain data in step 1 may include the following steps:
  • [0054] 1 .1 Use AES symmetric encryption combined with RSA digital envelope to transmit symmetric key. Obtain its own RSA private key to sign blockchain data; obtain the other side ' s RSA public key from CA or other key management systems; encrypt the signature string and biockchain data via AES symmetric encryption, (denoted as P I 2); AES symmetric key is encrypted using the other side's RSA public key (denoted as P I 3 );
  • step 3 The details for decrypting and verifying the biockchain data in step 3 specifically includes the following steps, corresponding to step 1 :
  • AES symmetric encryption is used in conjunction with RSA digital envelope to transmit the AES symmetric key. Obtain its own RSA private key, use it to decrypt the AES symmetric key encrypted by RSA asymmetric algorithm, then, the AES symmetric key is used to decrypt the encrypted biockchain data; Obtain the other side ' s RSA public key from the CA or other key management systems and use it to verify the signature.
  • FIG. 3 depicts a process 300. exemplary of another embodiment of the present invention.
  • the steps inside the dotted box may be performed at a first transmitting node in a biockchain network, while the steps outside the box may be performed at the receiving node in the biockchain network.
  • biockchain data is created (302) and the process asks if asymmetric or symmetric encryption should be used (304).
  • asymmetric data encryption is to be used (304) then, the data is symmetrically encrypted using a digital envelop on symmetric key (314) to transmit the encrypted data to the other node using SCTP transfer (308).
  • the first node ' s private key and second node's public key may be retrieved to create the digital envelop for the symmetric key by asymmetrically encrypting the symmetric key, in addition to symmetrically encrypting the blockchain data and/or signature.
  • first node ' s private key and other side's (second nod's) public key are retrieved (305).
  • the first node ' s private key is used to sign blockchain data and the public key of the second node is used to encrypt the data and signature (306).
  • SCTP transfer (308) is used to send the data to the second node or other side.
  • the data is decrypted (e.g.. using the second node ' s asymmetric private key to open the digital envelop and to obtain the symmetric key. and then using symmetric key to decrypt the blockchain data).
  • the process After decrypting the blockchain data, the process provides blockchain data service (312) to the blockchain.
  • a blockchain system that includes a first node and a second node.
  • the first node comprises a first processor and first memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data: and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol.
  • the second node comprises a first processor and first memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of
  • - I I - node comprises: a second processor and second memory coupled to the second processor storing instructions that when executed by the first processor execute the steps of: a) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol; b) obtaining an asymmetric encryption private key for the second node and the public key for the second node; c) obtaining the asymmetric encryption public key for the first node; d) decrypting the encrypted symmetric key using the private key for the second node: e) decrypting the encrypted blockchain data and signature using the symmetric key; and f) verifying the digital signature using the public key of the first public key for the first node.

Abstract

The present invention describes a method for secure transmission of blockchain data based on a secure transport layer protocol. At the transmitter, the method includes the steps of: acquiring asymmetric encryption public-private key pair and a symmetric encryption key; signing and encrypting the blockchain data; and transmitting the encrypted data using a transport layer protocol. At the receiver, the method includes: obtaining asymmetric encryption public-private key pair, decrypting the symmetric encryption key, decrypting the blockchain data and verifying the signature. Advantageously, embodiments of the present invention provide a safe and efficient method of transmitting blockchain data.

Description

A Secure Transmission Method for Blockchain Data Based on SCTP Technical Field
[0001 ] The present application relates generally to blockchain technology, and in particular to secure transmission of blockchain data.
Background Art
|0002] Common methods for the transmission of blockchain data used by existing blockchain implementations often utilize a peer-to-peer (P2P) protocol. At present, most of the P2P networks are based on the user datagram protocol (U DP) or the transmission control protocol (TCP) which along with the internet protocol (I P), form part of the internet protocol suite.
[0003] In a peer-to-peer network environment of blockchain data transmission, computer nodes do not depend on a dedicated centralized server. Each node is able to both request for and also respond to network service requests from other nodes. However, in such an architecture, there are several challenges that must be dealt with such as poor data security, slow response time, unnecessary data redundancy, and lack of predictability.
[0004] It is therefore an object of the present invention to mitigate at least some of the challenges.
Summary of Invention
[0005| In accordance with an aspect of the present invention, there is provided a method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol.
[0006J In accordance with another aspect of the present invention, there is provided a method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) generating the blockchain data; b) receiving an selection of one of a symmetric and asymmetric encryption: c) obtaining an asymmetric encryption private key and public key for the first node; d) obtaining an asymmetric encryption public key for the second node; e) signing the blockchain data with a digital signature using the private key for the first node; f) upon the selection indicating use of asymmetric encryption: i) encrypting the blockchain data and signature using the public key for the second node; g) upon the selection indicating use of symmetric encryption: i) obtaining a symmetric encryption key; ii) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and iii) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and h) transmitting the encrypted data to the second node, in a plurality of data streams using a secure transport layer protocol.
[0007] In yet another embodiment of the present invention, there is provided a blockchain system that includes a first node and a second node. The first node comprises a first processor and memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol. The second node comprises: a second processor and second memory coupled to the second processor storing instructions that when executed by the first processor execute the steps of: a) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol; b) obtaining an asymmetric encryption private key for the second node and the public key for the second node; c) obtaining the asymmetric encryption public key for the first node; d) decrypting the encrypted symmetric key using the private key for the second node; e) decrypting the encrypted blockchain data and signature using the symmetric key; and verifying the digital signature using the public key of the first public key for the first node.
Brief Description of Drawings
[0008] In the figures, which illustrate by way of example only, embodiments of the present invention,
[0009] FIG. 1 is a schematic block diagram of illustrating secure transmission of blockchain data between nodes of a blockchain, according to one exemplary embodiment of the present invention;
[0010] FIG. 2 is a schematic block diagram of illustrating another secure transmission of blockchain data between nodes of a blockchain. according to another exemplary embodiment of the present invention; and
[0011] FIG. 3 is a flowchart depicting steps involved in a process executed in a blockchain network, following the completion of building a block, to transfer blockchain data from one node to another, according to an exemplary embodiment of the present invention.
[0012] Specific implementations of embodiments of the present disclosure wi ll be described in detail, with reference to the drawings. The same reference numerals in the drawings will be used identify the same or similar parts or portions. The drawings are not necessarily drawn to scale.
Description of Embodiments [0013] A description of various embodiments of the present invention is provided below.
[0014] In this disclosure, the use of the word "a" or "an" when used herein in conjunction with the term "comprising" may mean "one," but it is also consistent with the meaning of "one or more,'* "at least one" and "one or more than one." Any element expressed in the singular form also encompasses its plural form. Any element expressed in the plural form also encompasses its singular form. The term "plurality" as used herein means more than one. for example, two or more, three or more, four or more, and the like. Directional terms such as "top." "bottom," "upwards," "downwards," "vertically," and "laterally" are used for the purpose of providing relative reference only, and are not intended to suggest any limitations on how any article is to be positioned during use, or to be mounted in an assembly or relative to an environment.
[0015] The terms "comprising", "having", "including", and "containing", and grammatical variations thereof, are inclusive or open-ended and do not exclude additional, un-recited elements and/or method steps. The term "consisting essentially of" when used herein in connection with a composition, use or method, denotes that additional elements, method steps or both additional elements and method steps may be present, but that these additions do not materially affect the manner in which the recited composition, method, or use functions. The term "consisting of when used herein in connection with a composition, use. or method, excludes the presence of additional elements and/or method steps.
[0016] A "blockchain" is a tamper-evident, shared digital ledger that records transactions in a public or private peer-to-peer network of computing devices. The ledger is maintained as a growing sequential chain of cryptographic hash-linked blocks.
[0017] A "node" is a device on a blockchain network.
[0018] In the drawings illustrating embodiments of the present invention, the same or similar reference labels correspond to the same or similar parts. In the description of the invention, it should be noted that the meaning of "a plurality of* means two or more unless otherwise specified; The directions or positions of the terms "up", "down", "left", "right", "inside", "outside", "front end", "back end", "head", "tail", the orientation or positional relationship shown in the drawings is merely for the convenience of describing the invention and simplifying the description rather than indicating or implying that the indicated dev ice or element must have a particular orientation and be constructed and operated in a particular orientation, and therefore cannot be used as a l imitation of the invention.
[0019] In addition, the terms "first," "second," "third." and the like are used for descriptive purposes only and cannot be interpreted as indicating or implying relative importance.
[0020] In the description of the invention, it should also be noted that the terms "mounted," "linked," and "connected" should be interpreted in a broad sense unless expl icitly defined and limited otherwise. For example, it could be fixed connection, or assembled connection, or integrally connected; either hard-wired or soft-wired; it may be directly connected or ind irectly connected through an intermediary. For technical professionals, the specific mean ings of the above terms in the invention may be understood in context.
[00211 Standards communication functions of a telecommunication or computer network include several layers which are often abstracted into conceptual models such as the popular Open Systems Interconnection (OSI) model . The OS I model a conceptual model that characterizes and standardizes the communication functions of a telecommunication in a hardware implementation independent manner. The OSI layer is comprised of seven layers, which are the physical layer, data link layer, the network layer, the transport layer, the session layer, the presentation layer and the application layer.
[0022] The transport layer in such a layered model refers to methods and protocols that provide host-to-host communication services for appl ications and services such as connection- oriented communication, reliabi lity, flow control, and multiplexing.
[0023J One of the transport layer protocols used for the transport of data in a network is the Stream Control Transmission Protocol (SCTP). SCTP can be used to transport multiple data streams by aggregating the data streams into a single managed bundle. This single managed bundle shares common characteristics, such as a communication path and start and end points. As a result, connection information that would have been transmitted over multiple data streams can be handled and managed as connection information of a single bundle.
[0024] Properties of SCTP make it a good choice for use as a transport protocol for w ide area network (WAN) optimization. An SCTP tunnel can be created between network devices to provide a proxy tunnel for a multiple of TCP sessions. This proxy with the SCTP tunnel is implemented such that multiple TCP sessions can be multiplexed or aggregated into a single (or multiple) managed SCTP association(s).
Embodiment I
[0025] An exemplary first embodiment of the present invention will be described below with reference to FIG. 1.
[0026] In transmitting blockchain data from a first node such as server 101 to a second end point such as client 108. several steps are involved. Specifically at a first node such as server 101 , a software, application, firmware or other process obtains (102) its own RSA private key and RSA public key of the other side e.g. client 108. The node uses its private key to sign the data, and uses public key of other side to encrypt data and signature ( 103). The encrypted data 104 is then sent via a socket 105. A socket address data structure is bound using port binding step 106 and the socket is put in a listening state (step 107) to facilitate the transfer of data to the transport layer.
[0027] At the first node, the transport layer receives (120) and accepts connection request 130 to establish SCTP connection and receives the data from the port, and transmits the received data in multiple streams from end points 122. 124. 126 to end points 132, 134. 136 respectively to the second node. After data transmission is complete then the connection is closed in steps 128. 138. The received data at the second node or client 108. is routed up though its socket layer 112 to provide encrypted data 11 1 to the application layer of the second node. [0028] The second node or client 108, obtains its own RSA private key and the RSA public key of the other side (110) and then decrypts the encrypted data 111 to verify the signature ( 109).
[0029] As depicted in FIG. 1 , a system and method for secure transmission of blockchain data based on the SCTP protocol provided by a representative asymmetric encryption algorithm know as RSA (Rivest-Shamir-Adleman) includes the following steps:
[0030] 1 . The application layer obtains the RSA public-private key pair and signs and encrypts blockchain data;
[0031] 2. The transport layer uses the SCTP protocol to transfer the data packet;
[0032] 3. The application layer obtains RSA public and private key pairs and decrypts the blockchain data and verifies the signature.
[0033] In a preferred embodiment, in step 1 the asymmetric encryption algorithm RSA is used. However, the invention is not limited to the use of RSA. and other asymmetric encryption algorithms such as ECC. SM2 and the like may alternately be used.
[0034] Details of signing and encrypting blockchain data in step 1 , may specifically include the following steps.
[0035] 1 .1 . Adopting the RSA asymmetric encryption; obtaining the transmitting or first node's own private key; signing the blockchain data; obtaining the receiving or second node's RSA public key from a certification authority (CA) or other key management system: and using the RSA public key to encrypt signature string and blockchain data, denoted as P I 1 :
[0036| The details of transmitting blockchain data in step 2 is as follows:
[0037] 2. 1 . SCTP establishes the connection through four (4) handshakes;
[0038] 2.2. SCTP transfers the encrypted blockchain data based on multi-host, multi-flow, datagram fragmentation and other protocol technologies; [0039] 2.3. SCTP smoothly closes this transmission socket;
[0040] 2.4. Repeat 2.1 -2.3 as needed.
[0041] Step 3 of decrypting and verifying the blockchain data specifically includes the following steps:
[0042| 3.1 . RSA asymmetric encryption is adopted; the second node obtains its own private key to decrypt the encrypted blockchain data transmitted via SCTP; the second node obtains the other side"s (first node's) RSA public key from CA or other key management systems; and the public key is used for verifying the signature;
Embodiment II
[0043] A second embodiment of the present invention will be further described below w ith reference to FIG. 2.
[0044] As shown in FIG. 2, in a second embodiment of the present invention, the method selects a representative asymmetric encryption algorithm (e.g.. RSA); a symmetric encryption algorithm (e.g.. Advance Encryption Standard or AES); and an SCTP protocol-based secure transmission method for blockchain data.
[0045] In transmitting blockchain data from a first node such as server 201 to a second node or end point such as client 208, several steps are involved. Specifically at a first node such as server 201 , a software, application, firmware or other process obtains (202) obtain its ow n RSA private key, RSA public key of other side, and AES symmetric key . The node uses its private key to sign the data. The node uses the AES key of other side to encrypt blockchain data and signature (203) and uses the RSA public key to encrypt the AES key. The encrypted data 204 is then sent via a socket 205. A socket address data structure is bound using port binding step 206 and the socket is put in a listening state (step 207) to facilitate the transfer of data to the transport layer. [0046] At the first node, the transport layer receives (220) and accepts connection request 230 to establish SCTP connection and receives the data from the port, and transmits the received data in multiple streams from end points 222, 224, 226 to end points 232. 234, 236 respectively to the second node. After data transmission is complete then the connection is closed in steps 228, 238. The received data at the second node or client 208, is routed up though its socket layer 212 to provide encrypted data 211 to the application layer of the second node.
[0047] The second node or client 208, obtains its own RSA private key and RSA public key of the other side (210); decrypts the AES key using its private RSA key, uses the AES key to decrypt the encrypted data 211 and uses RSA public key of the other side to verify the signature (209).
[0048] The method depicted in FIG. 2 includes the following steps:
[0049] 1 . the application layer (at the first node, e.g. server 201 ) obtains the RSA publ ic- private key pair and the AES key and signs and encrypts the blockchain data;
[0050] 2. the transport layer uses the SCTP protocol to transfer the data packet;
[0051 ] 3. the application layer (at the second node) obtains the RSA public and private key pairs and the AES key and decrypts the blockchain data and verifies the signature.
[0052[ m a preferred embodiment, the asymmetric encryption algorithm is RSA and the symmetric encryption algorithm is AES. Key sizes of 128-bit, 192-bit. and 256-bit are specified in the AES standard. However, other asymmetric encryption algorithms such as ECC (Elliptic- Curve cryptography). SM2 and other symmetric encryption algorithms such as DES (Data Encryption Standard) may be used.
[0053] The details of signing and encrypting the blockchain data in step 1 may include the following steps:
[0054] 1 .1 . Use AES symmetric encryption combined with RSA digital envelope to transmit symmetric key. Obtain its own RSA private key to sign blockchain data; obtain the other side's RSA public key from CA or other key management systems; encrypt the signature string and biockchain data via AES symmetric encryption, (denoted as P I 2); AES symmetric key is encrypted using the other side's RSA public key (denoted as P I 3 );
[0055] The details of transmitting the biockchain data in step 2 is as follows:
[0056] 2.1 . SCTP establishes the connection through four (4) handshakes;
[0057] 2.2. SCTP transfers the encrypted biockchain data based on multi-host, multi-flow, datagram fragmentation and other protocol technologies.
[0058] 2.3. SCTP smoothly closes this transmission socket;
[0059] 2.4. Repeat steps 2.1 -2.3 as needed
[0060] The details for decrypting and verifying the biockchain data in step 3 specifically includes the following steps, corresponding to step 1 :
[0061] 3.1 . AES symmetric encryption is used in conjunction with RSA digital envelope to transmit the AES symmetric key. Obtain its own RSA private key, use it to decrypt the AES symmetric key encrypted by RSA asymmetric algorithm, then, the AES symmetric key is used to decrypt the encrypted biockchain data; Obtain the other side's RSA public key from the CA or other key management systems and use it to verify the signature.
Embodiment III
[0062] FIG. 3 depicts a process 300. exemplary of another embodiment of the present invention. The steps inside the dotted box may be performed at a first transmitting node in a biockchain network, while the steps outside the box may be performed at the receiving node in the biockchain network.
[0063] As depicted, at the first node, biockchain data is created (302) and the process asks if asymmetric or symmetric encryption should be used (304). [0064] If symmetric data encryption is to be used (304) then, the data is symmetrically encrypted using a digital envelop on symmetric key (314) to transmit the encrypted data to the other node using SCTP transfer (308). The first node's private key and second node's public key may be retrieved to create the digital envelop for the symmetric key by asymmetrically encrypting the symmetric key, in addition to symmetrically encrypting the blockchain data and/or signature.
[0065] If asymmetric data encryption is to be used (304) then the first node's private key and other side's (second nod's) public key are retrieved (305). The first node's private key is used to sign blockchain data and the public key of the second node is used to encrypt the data and signature (306). In either case, SCTP transfer (308) is used to send the data to the second node or other side.
[0066] At the second node, the data is decrypted (e.g.. using the second node's asymmetric private key to open the digital envelop and to obtain the symmetric key. and then using symmetric key to decrypt the blockchain data). After decrypting the blockchain data, the process provides blockchain data service (312) to the blockchain.
Embodiment IV
[0067| In another embodiment of the present invention, there is provided a blockchain system that includes a first node and a second node. The first node comprises a first processor and first memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of: a) obtaining an asymmetric encryption private key and public key for the first node; b) obtaining an asymmetric encryption public key for the second node; c) obtaining a symmetric encryption key; d) signing the blockchain data with a digital signature using the private key for the first node; e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data: and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol. The second
- I I - node comprises: a second processor and second memory coupled to the second processor storing instructions that when executed by the first processor execute the steps of: a) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol; b) obtaining an asymmetric encryption private key for the second node and the public key for the second node; c) obtaining the asymmetric encryption public key for the first node; d) decrypting the encrypted symmetric key using the private key for the second node: e) decrypting the encrypted blockchain data and signature using the symmetric key; and f) verifying the digital signature using the public key of the first public key for the first node.
[0068] It should be noted that the two embodiments or implementations described above are merely preferred implementations of exemplary embodiments and are not intended to limit the invention. That is, the descriptions of the above embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications, replacements and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments.
[0069] Having thus described, by way of example only, embodiments of the present invention, it is to be understood that the invention as defined by the appended claims is not to be limited by particular details set forth in the above description of exemplary embodiments as many variations and permutations are possible without departing from the scope of the claims.

Claims

What is claimed is:
1. A method for secure transmission of biockchain data from a first node to a second node in a biockchain comprising the steps of: at the first node: a) obtaining an asymmetric encryption private key and public key for the first node;
b) obtaining an asymmetric encryption public key for the second node;
c) obtaining a symmetric encryption key;
d) signing the biockchain data with a digital signature using the private key for the first node;
e) encrypting the biockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and
f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and
g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, using a secure transport layer protocol.
2. The method of claim 1 , further comprising: at the second node: a) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol;
b) obtaining an asymmetric encryption private key for the second node and the public key for the second node;
c) obtaining the asymmetric encryption public key for the first node;
d) decrypting the encrypted symmetric key using the private key for the second node;
e) decrypting the symmetrically encrypted biockchain data and signature using the symmetric key; and f) verifying the digital signature using the public key of the first public key for the first node.
3. The method of claim 1 , wherein each of the asymmetric encryption keys is of a type selected from the group consisting of: RSA. ECC and SM2.
4. The method of claim 3, wherein each of the asymmetric encryption keys is an RSA key .
5. The method of claim 1 , wherein the secure transport layer protocol is the SCTP protocol.
6. The method of claim 1 . wherein the symmetric encryption key is of a type selected from the group consisting of: an AES key and a DES key.
7. The method of claim 6, wherein the symmetric encryption key is an AES key.
8. The method if claim 1 , wherein said transmitting involves a plurality of data streams.
9. A method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) obtaining an asymmetric encryption private key and asymmetric encryption public key for the first node;
b) obtaining an asymmetric encryption public key for the second node;
c) signing the blockchain data with a digital signature using the private key for the first node;
d) encrypting the blockchain data and signature using the private key for the first node to form asymmetrically encrypted data; and e) transmitting the asymmetrically encrypted data to the second node, in a plurality of data streams, using a secure transport layer protocol.
10. The method of claim 9, further comprising: at the second node: a) receiving the asymmetrically encrypted data using the secure transport layer protocol; b) obtaining an asymmetric encryption private key for the second node and the public key for the second node;
c) obtaining the asymmetric encryption public key for the first node;
d) decrypting the asymmetrically encrypted data using the private key for the second node; and
e) verifying the digital signature using the public key for the first node.
1 1 . The method of claim 9, wherein each of the asymmetric encryption keys are RSA keys.
12. A method for secure transmission of blockchain data from a first node to a second node in a blockchain comprising the steps of: at the first node: a) generating the blockchain data;
b) receiving an selection of one of a symmetric and asymmetric encryption:
c) obtaining an asymmetric encryption private key and public key for the first node:
d) obtaining an asymmetric encryption public key for the second node;
e) signing the blockchain data with a digital signature using the private key for the first node;
f) upon the selection indicating use of asymmetric encryption:
i) encrypting the blockchain data and signature using the public key for the second node; g) upon the selection indicating use of symmetric encryption:
i) obtaining a symmetric encryption key;
ii) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and
iii) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and
h) transmitting the encrypted data to the second node, in a plurality of data streams using a secure transport layer protocol.
1 3. The method of claim 12 wherein the selection indicates use of symmetric encryption and wherein the symmetric encryption key is an AES key.
14. The method of claim 12 wherein the selection indicates use of asymmetric encryption and each of the asymmetric encryption keys is selected from the group consisting of are RSA. ECC and SM2.
1 5. The method of claim 12 wherein the secure transport layer protocol is the SCTP protocol.
16. A blockchain system comprising a first node and a second node. the first node comprising: a first processor and first memory coupled to the first processor storing instructions that when executed by the first processor execute the steps of: a) obtaining an asymmetric encryption private key and public key for the first node;
b) obtaining an asymmetric encryption public key for the second node;
c) obtaining a symmetric encryption key;
d) signing the blockchain data with a digital signature using the private key for the first node;
e) encrypting the blockchain data and signature using the symmetric encryption key to form symmetrically encrypted data; and f) encrypting the symmetric key using the public key for the second node to form an encrypted symmetric key; and
g) transmitting the symmetrically encrypted data and the encrypted symmetric key to the second node, in a plurality of data streams, using a secure transport layer protocol.
the second node comprising: a second processor and second memory coupled to the second processor storing instructions that when executed by the first processor execute the steps of: h) receiving the symmetrically encrypted data and encrypted symmetric key using the secure transport layer protocol;
i) obtaining an asymmetric encryption private key for the second node and the public key for the second node;
j) obtaining the asymmetric encryption public key for the first node;
k) decrypting the encrypted symmetric key using the private key for the second node:
1) decrypting the encrypted biockchain data and signature using the symmetric key: and m) verifying the digital signature using the public key of the first public key for the first node.
PCT/CA2018/000098 2017-05-23 2018-05-18 A secure transmission method for blockchain data based on sctp WO2018213916A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710367410.3 2017-05-23
CN201710367410.3A CN107104977B (en) 2017-05-23 2017-05-23 Block chain data secure transmission method based on SCTP

Publications (1)

Publication Number Publication Date
WO2018213916A1 true WO2018213916A1 (en) 2018-11-29

Family

ID=59669875

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CA2018/000098 WO2018213916A1 (en) 2017-05-23 2018-05-18 A secure transmission method for blockchain data based on sctp

Country Status (2)

Country Link
CN (1) CN107104977B (en)
WO (1) WO2018213916A1 (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111585754A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device
US10824601B1 (en) 2019-08-01 2020-11-03 Alibaba Group Holding Limited Shared blockchain data storage based on error correction code
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
US11175987B2 (en) 2019-08-01 2021-11-16 Advanced New Technologies Co., Ltd. Shared blockchain data storage based on error correction code
CN113872946A (en) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 Front-end and back-end separated data encryption transmission method and system
CN115987693A (en) * 2023-03-21 2023-04-18 成都运荔枝科技有限公司 Data transmission method and system based on block chain
US11868509B2 (en) 2017-11-17 2024-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for detecting digital content tampering

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109241016B (en) * 2018-08-14 2020-07-07 阿里巴巴集团控股有限公司 Multi-party security calculation method and device and electronic equipment
CN109802940A (en) * 2018-12-12 2019-05-24 北京众享比特科技有限公司 Block chain data base encryption and decryption method, device, equipment and its storage medium
CN109450937A (en) * 2018-12-24 2019-03-08 深圳市华讯方舟卫星产业科技有限公司 Information secure communications method, system, network interface card and storage medium
CN109784931B (en) * 2019-02-27 2024-04-05 成都埃克森尔科技有限公司 Query method of data query platform based on blockchain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172278A1 (en) * 2002-01-17 2003-09-11 Kabushiki Kaisha Toshiba Data transmission links
US20050172132A1 (en) * 2004-01-30 2005-08-04 Chen Sherman (. Secure key authentication and ladder system

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI430674B (en) * 2009-08-14 2014-03-11 Ind Tech Res Inst Security method in wireless communication method having relay node
CN106100847B (en) * 2016-06-14 2021-10-26 惠众商务顾问(北京)有限公司 Method and device for verifying identity information of asymmetric encryption block chain
CN106549933B (en) * 2016-09-22 2020-11-03 中金云金融(北京)大数据科技股份有限公司 Data transmission system and method of block chain
CN106656784B (en) * 2016-10-14 2020-01-21 中国银联股份有限公司 Data stream propagation system and method for block chain network

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030172278A1 (en) * 2002-01-17 2003-09-11 Kabushiki Kaisha Toshiba Data transmission links
US20050172132A1 (en) * 2004-01-30 2005-08-04 Chen Sherman (. Secure key authentication and ladder system

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11868509B2 (en) 2017-11-17 2024-01-09 Telefonaktiebolaget Lm Ericsson (Publ) Method and arrangement for detecting digital content tampering
US10824601B1 (en) 2019-08-01 2020-11-03 Alibaba Group Holding Limited Shared blockchain data storage based on error correction code
WO2021016998A1 (en) * 2019-08-01 2021-02-04 Advanced New Technologies Co., Ltd. Shared blockchain data storage based on error correction code
US11119987B2 (en) 2019-08-01 2021-09-14 Advanced New Technologies Co., Ltd. Shared blockchain data storage based on error correction code
US11175987B2 (en) 2019-08-01 2021-11-16 Advanced New Technologies Co., Ltd. Shared blockchain data storage based on error correction code
US11188418B2 (en) 2019-08-01 2021-11-30 Advanced New Technologies Co., Ltd. Shared blockchain data storage based on error correction code
CN113497709A (en) * 2020-04-02 2021-10-12 浪潮云信息技术股份公司 Trusted data source management method based on block chain, signature device and verification device
CN111585754A (en) * 2020-04-29 2020-08-25 中国联合网络通信集团有限公司 Information sharing method and device
CN113872946A (en) * 2021-09-15 2021-12-31 上海宝康电子控制工程有限公司 Front-end and back-end separated data encryption transmission method and system
CN115987693A (en) * 2023-03-21 2023-04-18 成都运荔枝科技有限公司 Data transmission method and system based on block chain
CN115987693B (en) * 2023-03-21 2023-06-13 成都运荔枝科技有限公司 Data transmission method and system based on block chain

Also Published As

Publication number Publication date
CN107104977B (en) 2020-07-31
CN107104977A (en) 2017-08-29

Similar Documents

Publication Publication Date Title
WO2018213916A1 (en) A secure transmission method for blockchain data based on sctp
US11575660B2 (en) End-to-end encryption for personal communication nodes
US11626979B2 (en) ECDHE key exchange for mutual authentication using a key server
US9154468B2 (en) Efficient forwarding of encrypted TCP retransmissions
EP1748615A1 (en) Method and system for providing public key encryption security in insecure networks
US20040161110A1 (en) Server apparatus, key management apparatus, and encrypted communication method
CN108650227A (en) Handshake method based on datagram secure transfer protocol and system
WO2009055802A1 (en) Method and system for secure session establishment using identity-based encryption (vdtls)
US20170126623A1 (en) Protected Subnet Interconnect
EP1557970A1 (en) Eaves dropping apparatus for VPN using IKE (diffie Hellman encryption scheme)
WO2012083653A1 (en) Switch equipment and data processing method for supporting link layer security transmission
CN111447276A (en) Encryption continuous transmission method with key agreement function
TW201629836A (en) Secure transactions in a memory fabric
KR20180130203A (en) APPARATUS FOR AUTHENTICATING IoT DEVICE AND METHOD FOR USING THE SAME
US8281134B2 (en) Methods and apparatus for layer 2 and layer 3 security between wireless termination points
CN106209401B (en) A kind of transmission method and device
GB2581096A (en) Altering cipher and key within an established session
WO2016134631A1 (en) Processing method for openflow message, and network element
JP2006019975A (en) Cipher packet communication system, receiving device and transmitting device with which same is equipped , and communication method, receiving method, transmitting method, receiving program and transmitting program for cipher packet which are applied thereto
US6920556B2 (en) Methods, systems and computer program products for multi-packet message authentication for secured SSL-based communication sessions
CN109474667B (en) Unmanned aerial vehicle communication method based on TCP and UDP
CN114827307B (en) Data sharing method, system and server based on multiple data systems
CN114186213B (en) Data transmission method, device, equipment and medium based on federal learning
JP5835162B2 (en) Cryptographic communication system and cryptographic communication method
JP4910956B2 (en) Communication control system, terminal, and program

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18806864

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18806864

Country of ref document: EP

Kind code of ref document: A1