WO2019052465A1 - 通话的方法及终端 - Google Patents

通话的方法及终端 Download PDF

Info

Publication number
WO2019052465A1
WO2019052465A1 PCT/CN2018/105212 CN2018105212W WO2019052465A1 WO 2019052465 A1 WO2019052465 A1 WO 2019052465A1 CN 2018105212 W CN2018105212 W CN 2018105212W WO 2019052465 A1 WO2019052465 A1 WO 2019052465A1
Authority
WO
WIPO (PCT)
Prior art keywords
call
address book
request
party secure
built
Prior art date
Application number
PCT/CN2018/105212
Other languages
English (en)
French (fr)
Inventor
李志刚
Original Assignee
西安中兴新软件有限责任公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 西安中兴新软件有限责任公司 filed Critical 西安中兴新软件有限责任公司
Publication of WO2019052465A1 publication Critical patent/WO2019052465A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/68Circuit arrangements for preventing eavesdropping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72403User interfaces specially adapted for cordless or mobile telephones with means for local support of applications that increase the functionality
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/724User interfaces specially adapted for cordless or mobile telephones
    • H04M1/72484User interfaces specially adapted for cordless or mobile telephones wherein functions are triggered by incoming communication events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/72Mobile telephones; Cordless telephones, i.e. devices for establishing wireless links to base stations without route selection
    • H04M1/725Cordless telephones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]

Definitions

  • Embodiments of the present disclosure relate to, but are not limited to, the field of communication technology.
  • Mobile phone call security has become a focus of attention, and operators have launched their own voice call security solutions.
  • the advantage of this scheme is that the encrypted call is unified with the ordinary telephone, but the disadvantage is that the security based on "soft encryption" is not high.
  • Many mobile phone manufacturers have partnered with third parties to launch a more secure "hard encryption” calling solution.
  • this solution is often two sets of independent call applications (APP), the secure call uses a secure call APP provided by a third party, and the normal call uses the ordinary call APP built in the mobile phone.
  • APP independent call applications
  • a method for providing a call includes: calling up a built-in address book to receive a call request; and triggering a third-party secure call application to enter a call state if the received encrypted telephone request is received.
  • a call terminal on which a third party secure call application is installed comprising: a user interface module configured to call up a built-in address book to receive a call request; and a call The module is configured to trigger the third-party secure call application to enter a call state if the user interface module receives a request to dial an encrypted phone.
  • a call terminal including a memory and a processor on which is stored a computer program that, when the processor executes the program, performs a call according to the present disclosure method.
  • a computer storage medium having stored thereon one or more programs, the one or more programs being executed by one or more processors, the one or more processors executing The method of the call of the present disclosure.
  • FIG. 1 is a flow chart of a method of a call in accordance with an embodiment of the present disclosure
  • FIG. 2 is a flowchart of an example of a method of a call according to an embodiment of the present disclosure
  • FIG. 3 is a schematic diagram of a call terminal in accordance with an embodiment of the present disclosure.
  • FIG. 1 is a flow chart of a method of a call in accordance with an embodiment of the present disclosure.
  • a method of a call may include steps 101 and 102.
  • step 101 the built-in address book is called up to receive a call request.
  • step 102 if a request to dial an encrypted telephone is received, the third party secure call application is triggered to enter the call state.
  • Embodiments of the present disclosure relate to a fusion of a third-party secure call application (APP) and a built-in call APP of a terminal, which can be integrated by the address book of the third-party secure call APP and the built-in address book of the terminal, and when the secure call is made, the terminal
  • the built-in address book directly calls the third-party secure call APP and initiates a call to enter a secure call state, thereby avoiding the problem that the user switches back and forth between the two APPs, thereby improving the user experience.
  • the functions provided by the third-party secure call APP include reading of the address book, calling of the application, and transfer of parameters.
  • the third-party secure call APP also provides an API (Application Programming Interface) that can be attached with contact parameters for the delivery of contact information.
  • FIG. 2 is a flow chart of an example of a method of a call in accordance with an embodiment of the present disclosure.
  • the example includes steps 201 to 209.
  • step 201 the built-in address book is called up.
  • step 202 the address book of the third party secure call APP is read.
  • step 203 it is determined whether the address book of the third-party secure call APP is read for the first time. If the first-time reading is performed, step 204 is performed; otherwise, step 205 is performed.
  • step 204 the address book of the third-party secure call APP is directly saved in the terminal built-in address book.
  • step 205 the terminal built-in address book is updated according to the address book of the third-party secure call APP.
  • the address book of the read third-party secure call APP can be compared with the built-in address book of the terminal, and according to the comparison result, the built-in address book on the terminal side is updated, deleted, changed, etc., so that the terminal built-in address book is called each time.
  • the built-in address book can be updated to the latest status.
  • Encrypted calls can be made to entries (ie, contacts) from the address book of the third-party secure call APP.
  • the entry of the address book from the third-party secure call APP can be marked in the built-in address book as a secure call identifier.
  • a contact indicates a secure call identifier, you can dial an encrypted call, otherwise you can only make a regular call.
  • a call request is received.
  • step 207 it is determined whether the call making request is a dialing encrypted telephone request.
  • step 208 is performed; otherwise, step 210 is performed.
  • the third party secure call APP is triggered to enter the call state.
  • step 209 after the call ends, the third party secure call APP is automatically closed.
  • a regular call is made.
  • the third-party secure call APP has two startup portals, one is the startup entry of the APP itself, and the user clicks to run; the other is the startup portal invoked by the terminal built-in address book (or call record).
  • the user can also invoke a third-party secure call APP to make an encrypted call in the call log.
  • a third-party secure call APP to make an encrypted call in the call log.
  • any encrypted call that has been dialed can be recorded in the call log to re-enable the encrypted call.
  • the address book provided by the two APPs can be merged, and the merged address book can be used as a unified entrance of the two APPs, thereby eliminating the need for the user to switch back and forth between the two APPs, thereby improving the user experience.
  • FIG. 3 is a schematic diagram of a call terminal in accordance with an embodiment of the present disclosure.
  • a call terminal may include: a user interface module configured to call up a built-in address book to receive a call request; and a call module configured to receive as the user interface module The call to the encrypted phone request triggers the third party secure call application to enter the call state.
  • the call terminal may further include a reading module configured to read an address book of the third party secure call application.
  • the call terminal may further include an update module configured to update the built-in address book according to an address book of a third-party secure call application read by the reading module.
  • the update module may be further configured to mark the contact in the built-in address book updated according to the address book of the third-party secure call application with a secure call identifier.
  • the call module may be configured to determine that the call request is to make an encrypted call request if the contact to be called is marked with a secure call identity when receiving the call request.
  • the call module may be configured to pass information of the contact to be called to the third party secure call application after determining that the make a call request is to make an encrypted call request.
  • the call module may be further configured to trigger the third-party secure call application to automatically close after the call ends.
  • Embodiments of the present disclosure also provide a terminal including a memory and a processor on which a computer program is stored, the processor executing a call according to various embodiments of the present disclosure when the processor executes the program Methods.
  • Embodiments of the present disclosure also provide a computer storage medium having stored thereon one or more programs, the one or more programs being executed by one or more processors, the one or more processors executing A method of talking in various embodiments of the present disclosure.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Human Computer Interaction (AREA)
  • Computer Security & Cryptography (AREA)
  • Telephone Function (AREA)
  • Telephonic Communication Services (AREA)

Abstract

本公开提供一种通话的方法和通话终端。所述方法包括:调出内置通讯录,以接收拨打电话请求;以及如接收到的是拨打加密电话请求,则触发第三方安全通话应用程序进入呼叫状态。

Description

通话的方法及终端 技术领域
本公开实施例涉及(但不限于)通信技术领域。
背景技术
手机通话安全越来越成为大家关注的焦点,各运营商相继推出了自己的语音通话安全方案。这种方案的优点是加密通话与普通电话统一,但缺点是基于“软加密”的安全性不高。很多手机厂家与第三方合作,开始推出安全性更高的“硬加密”通话方案。但这种方案往往是两套独立的通话应用程序(APP),安全通话使用第三方提供的安全通话APP,普通通话使用手机内置的普通通话APP。对手机用户而言,在拨打加密通话或普通电话时,必须在两个不同的APP之间进行切换,用户体验不好。
发明内容
根据本公开实施例,提供一种通话的方法,包括:调出内置通讯录,以接收拨打电话请求;以及如接收到的是拨打加密电话请求,则触发第三方安全通话应用程序进入呼叫状态。
根据本公开实施例,提供一种通话终端,其上安装有第三方安全通话应用程序,所述通话终端包括:用户界面模块,其设置为调出内置通讯录,以接收拨打电话请求;以及通话模块,其设置为如所述用户界面模块接收到的是拨打加密电话请求,则触发所述第三方安全通话应用程序进入呼叫状态。
根据本公开实施例,提供一种通话终端,包括存储器和处理器,在所述存储器上存储有计算机程序,当所述处理器执行所述程序时,所述处理器执行根据本公开的通话的方法。
根据本公开实施例,提供一种计算机存储介质,其上存储有一个或多个程序,所述一个或多个程序被一个或多个处理器执行时,所述一个或多个处理器执行根据本公开的通话的方法。
附图说明
附图用来提供对本公开实施例的进一步理解,并且构成说明书的一部分,与本公开的实施例一起用于解释本公开,并不构成对本公开的限制。在附图中:
图1为根据本公开实施例的通话的方法的流程图;
图2为根据本公开实施例的通话的方法的示例的流程图;以及
图3为根据本公开实施例的通话终端的示意图。
具体实施方式
为使本公开的目的、技术方案和优点更加清楚明白,下文中将结合附图对本公开的实施例进行详细说明。需要说明的是,在不冲突的情况下,本公开中的实施例及实施例中的特征可以相互任意组合。
图1为根据本公开实施例的通话的方法的流程图。
如图1所示,根据本公开实施例的通话的方法可以包括步骤101和102。
在步骤101,调出内置通讯录,以接收拨打电话请求。
在步骤102,如接收到的是拨打加密电话请求,则触发第三方安全通话应用程序进入呼叫状态。
本公开实施例涉及第三方安全通话应用程序(APP)与终端内置通话APP的融合,可以通过将第三方安全通话APP的通讯录与终端内置通讯录进行融合,并且当进行安全通话时,在终端内置通讯录直接调用第三方安全通话APP并发起呼叫,以进入安全通话状态,从而避免了用户在两个APP间来回切换的问题,提升用户体验。
在本公开实施例中,第三方安全通话APP提供的功能包括通讯录的读取、应用的调用和参数的传递。此外,第三方安全通话APP还提供能够附带联系人参数的API(Application Programming Interface,应用程序编程接口),以便运传递的联系人信息。
图2为根据本公开实施例的通话的方法的示例的流程图。
如图2所示,该示例包括步骤201至209。
在步骤201,调出内置通讯录。
在步骤202,读取第三方安全通话APP的通讯录。
在步骤203,判断是否首次读取第三方安全通话APP的通讯录,如是首次读取,则执行步骤204;否则,执行步骤205。
在步骤204,直接将第三方安全通话APP的通讯录保存到终端内置通讯录中。
在步骤205,根据第三方安全通话APP的通讯录对终端内置通讯录进行更新。可以将读取的第三方安全通话APP的通讯录与终端内置通讯录进行比较,并根据比较结果,对终端侧内置通讯录进行增、删、改等更新操作,从而每次调用终端内置通讯录时都可以将内置通讯录更新到最新状态。
对于来自第三方安全通话APP的通讯录的条目(即,联系人)可以拨打加密通话。可以在内置通讯录中将来自第三方安全通话APP的通讯录的条目标示安全通话标识。当某一联系人标示有安全通话标识时,可以拨打加密通话,否则只拨打普通电话。
在步骤206,接收拨打电话请求。
在步骤207,识别拨打电话请求是否为拨打加密电话请求,当拨打加密电话请求时,执行步骤208;否则,执行步骤210。
在步骤208,触发第三方安全通话APP进入呼叫状态。
在步骤209,通话结束后,第三方安全通话APP自动关闭。
在步骤210,拨打普通电话。
本实施例中,第三方安全通话APP有两个启动入口,一个是该APP自身的启动入口,由用户点击运行;另一个通过终端内置通讯录(或者通话记录)调用的启动入口。
点击启动第三方安全通话APP时,不需要附带任何参数,通过终端内置通讯录(或者通话记录)调用第三方安全通话APP时,需要将标示有安全通话标识联系人作为附加参数传递给第三方安全通话APP,然后进行加密通话。
用户也可以在通话记录中调用第三方安全通话APP进行加密通话。例如,凡是拨打过的加密通话都可以记录在通话记录中,以重新 拨打加密电话。
通过以上技术方案,可以将两种APP提供的通讯录进行融合,融合后的通讯录可以作为两个APP的统一入口,从而不需要用户在两个APP间来回切换,提升了用户体验。
图3为根据本公开实施例的通话终端的示意图。
如图3所示,根据本公开实施例的通话终端可以包括:用户界面模块,其设置为调出内置通讯录,以接收拨打电话请求;以及通话模块,其设置为如所述用户界面模块接收到的是拨打加密电话请求,则触发第三方安全通话应用程序进入呼叫状态。
在一实施例中,所述通话终端还可以包括读取模块,其设置为读取第三方安全通话应用的通讯录。
在一实施例中,所述通话终端还可以包括更新模块,其设置为根据所述读取模块读取的第三方安全通话应用程序的通讯录对所述内置通讯录进行更新。
在一实施例中,更新模块还可设置为将所述内置通讯录中根据所述第三方安全通话应用程序的通讯录更新的联系人标示安全通话标识。
在一实施例中,通话模块可以设置为在接收到拨打电话请求时,如待呼叫的联系人标示有安全通话标识,则确定所述拨打电话请求为拨打加密电话请求。
在一实施例中,通话模块可以设置为在确定所述拨打电话请求为拨打加密电话请求之后,将待呼叫的联系人的信息传递给所述第三方安全通话应用程序。
在一实施例中,通话模块还可以设置为,在通话结束之后,触发所述第三方安全通话应用程序自动关闭。
本公开实施例还提供一种终端,包括存储器和处理器,在所述存储器上存储有计算机程序,当所述处理器执行所述程序时,所述处理器执行根据本公开各实施例的通话的方法。
本公开实施例还提供了一种计算机存储介质,其上存储有一个或多个程序,所述一个或多个程序被一个或多个处理器执行时,所述 一个或多个处理器执行根据本公开各实施例的通话的方法。
本领域普通技术人员可以理解上述方法中的全部或部分步骤可通过程序来指令相关硬件完成,所述程序可以存储于计算机可读存储介质中,如只读存储器、磁盘或光盘等。上述实施例的全部或部分步骤也可以使用一个或多个集成电路来实现。相应地,上述实施例中的各模块/单元可以采用硬件的形式实现,也可以采用软件功能模块的形式实现。本公开不限制于任何特定形式的硬件和软件的结合。
以上仅为本公开的实施例,当然,本公开还可有其他多种实施例,在不背离本公开精神及其实质的情况下,本领域的技术人员当可根据本公开作出各种相应的改变和变形,但这些相应的改变和变形都应属于本公开所附的权利要求的保护范围。

Claims (16)

  1. 一种通话的方法,包括:
    调出内置通讯录,以接收拨打电话请求;以及
    如接收到的是拨打加密电话请求,则触发第三方安全通话应用程序进入呼叫状态。
  2. 如权利要求1所述的方法,其中,在调出内置通讯录的步骤之后,读取所述第三方安全通话应用程序的通讯录。
  3. 如权利要求2所述的方法,其中,在读取所述第三方安全通话应用程序的通讯录的步骤之后,根据所述第三方安全通话应用程序的通讯录对所述内置通讯录进行更新。
  4. 如权利要求3所述的方法,其中,在根据所述第三方安全通话应用程序的通讯录对所述内置通讯录进行更新的步骤之后,将所述内置通讯录中根据所述第三方安全通话应用程序的通讯录更新的联系人标示安全通话标识。
  5. 如权利要求4所述的方法,其中,在接收到所述拨打电话请求时,如待呼叫的联系人标示有安全通话标识,则确定所述拨打电话请求为拨打加密电话请求。
  6. 如权利要求5所述的方法,其中,在确定所述拨打电话请求为拨打加密电话请求之后,将所述待呼叫的联系人的信息传递给所述第三方安全通话应用程序。
  7. 如权利要求1至6中任一项所述的方法,其中,在通话结束之后,触发所述第三方安全通话应用程序自动关闭。
  8. 一种通话终端,安装有第三方安全通话应用程序,所述通话终端包括:
    用户界面模块,其设置为调出内置通讯录,以接收拨打电话请求;以及
    通话模块,其设置为如所述用户界面模块接收到的是拨打加密电话请求,则触发所述第三方安全通话应用程序进入呼叫状态。
  9. 如权利要求8所述的通话终端,还包括:
    读取模块,其设置为读取第三方安全通话应用程序的通讯录。
  10. 如权利要求9所述的通话终端,还包括:
    更新模块,其设置为根据所述读取模块读取的第三方安全通话应用程序的通讯录对所述内置通讯录进行更新。
  11. 如权利要求10所述的通话终端,其中,所述更新模块还设置为:
    将所述内置通讯录中根据所述第三方安全通话应用程序的通讯录更新的联系人标示安全通话标识。
  12. 如权利要求11所述的通话终端,其中,所述通话模块设置为:
    在接收到所述拨打电话请求时,如待呼叫的联系人标示有安全通话标识,则确定所述拨打电话请求为拨打加密电话请求。
  13. 如权利要求12所述的通话终端,其中,所述通话模块设置为:
    在确定所述拨打电话请求为拨打加密电话请求之后,将所述待呼叫的联系人的信息传递给所述第三方安全通话应用程序。
  14. 如权利要求8至13中任一项所述的通话终端,其中,所述 通话模块还设置为:
    在通话结束之后,触发所述第三方安全通话应用程序自动关闭。
  15. 一种通话终端,包括存储器和处理器,其中,
    所述存储器上存储有计算机程序,当所述处理器执行所述程序时,所述处理器执行根据权利要求1至7中任一项所述的通话的方法。
  16. 一种计算机存储介质,其上存储有一个或多个程序,所述一个或多个程序被一个或多个处理器执行时,所述一个或多个处理器执行根据权利要求1至7中任一项所述的通话的方法。
PCT/CN2018/105212 2017-09-14 2018-09-12 通话的方法及终端 WO2019052465A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710828029.2A CN109510893A (zh) 2017-09-14 2017-09-14 一种通话的方法及终端
CN201710828029.2 2017-09-14

Publications (1)

Publication Number Publication Date
WO2019052465A1 true WO2019052465A1 (zh) 2019-03-21

Family

ID=65722398

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/105212 WO2019052465A1 (zh) 2017-09-14 2018-09-12 通话的方法及终端

Country Status (2)

Country Link
CN (1) CN109510893A (zh)
WO (1) WO2019052465A1 (zh)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007360A (zh) * 2015-07-14 2015-10-28 伍威 一种融合VoIP电话功能的手机通讯录系统
CN105120455A (zh) * 2015-07-22 2015-12-02 北京元心科技有限公司 一种语音通信加密解密的方法及系统
WO2017050150A1 (zh) * 2015-09-22 2017-03-30 阿里巴巴集团控股有限公司 基于即时通讯的安全语音通讯方法及装置
CN106657623A (zh) * 2016-12-05 2017-05-10 北京奇虎科技有限公司 安全通讯的方法、装置及移动终端

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105007360A (zh) * 2015-07-14 2015-10-28 伍威 一种融合VoIP电话功能的手机通讯录系统
CN105120455A (zh) * 2015-07-22 2015-12-02 北京元心科技有限公司 一种语音通信加密解密的方法及系统
WO2017050150A1 (zh) * 2015-09-22 2017-03-30 阿里巴巴集团控股有限公司 基于即时通讯的安全语音通讯方法及装置
CN106657623A (zh) * 2016-12-05 2017-05-10 北京奇虎科技有限公司 安全通讯的方法、装置及移动终端

Also Published As

Publication number Publication date
CN109510893A (zh) 2019-03-22

Similar Documents

Publication Publication Date Title
US10979560B2 (en) Computing device and system for rendering contact information that is retrieved from a network service
KR101110427B1 (ko) 장치 활성화 및 액세스
US9148431B2 (en) Systems and methods for caller identification customization and remote management of communication devices
US9380166B2 (en) Dynamically constructing and updating social media status for use as ringback tones
US8244282B2 (en) Performing recipient based routing of a phone call
US20230421616A1 (en) Queryless device configuration determination-based techniques for mobile device management
KR102313395B1 (ko) 사용자 계정에 기반한 통신 처리 방법 및 장치
US10269347B2 (en) Method for detecting voice and electronic device using the same
US20200050469A1 (en) A method and system for creating multi mobilephone environments and numbers on a single handset with single sim-card
US10594862B2 (en) Contextual contact substitution for mobile devices
WO2015085906A1 (zh) 企业数据的保护方法和装置
CN105979062B (zh) 通讯事件处理方法及装置
US20180262873A1 (en) Secure mobile device recovery
WO2018006591A1 (zh) 一种多用户终端业务处理方法及装置
WO2019052465A1 (zh) 通话的方法及终端
US9363711B2 (en) User experiences during call handovers on a hybrid telecommunications network
CN106293717A (zh) 终端的设置的处理方法、装置及终端
CN111835920B (zh) 通话处理方法、装置、设备及存储介质
KR101418577B1 (ko) 스마트 디바이스의 주소록에 기반한 알람 제어 방법
US20150063171A1 (en) Method and apparatus for transmitting multimedia data during call origination in communication terminal
CN106775986B (zh) 一种进程管理方法及电子设备
KR101528419B1 (ko) Pc와 전화의 통신 융합 서비스 제공 방법 및 시스템
KR101723242B1 (ko) 휴대 단말의 메시지를 관리하는 장치 및 그 동작 방법
CN116204861A (zh) 应用程序中的用户身份识别方法、装置、设备及存储介质
TW201608866A (zh) 情境答訊的方法及其系統

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18856110

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18856110

Country of ref document: EP

Kind code of ref document: A1