WO2020228304A1 - Procédé et appareil d'interaction avec des informations, dispositif informatique et support de stockage lisible - Google Patents

Procédé et appareil d'interaction avec des informations, dispositif informatique et support de stockage lisible Download PDF

Info

Publication number
WO2020228304A1
WO2020228304A1 PCT/CN2019/123141 CN2019123141W WO2020228304A1 WO 2020228304 A1 WO2020228304 A1 WO 2020228304A1 CN 2019123141 W CN2019123141 W CN 2019123141W WO 2020228304 A1 WO2020228304 A1 WO 2020228304A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
information
ciphertext
interactive
interaction
Prior art date
Application number
PCT/CN2019/123141
Other languages
English (en)
Chinese (zh)
Inventor
冯承勇
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2020228304A1 publication Critical patent/WO2020228304A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0478Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Definitions

  • This application belongs to the field of data transmission technology, and particularly relates to an information interaction method, device, computer equipment and readable storage medium.
  • the health information platform uses electronic medical records to store all patient data and update the data in real time.
  • the currently established health information platforms usually rely on a centralized information system to carry them, and based on the centralized information system to realize the storage and storage of electronic medical records. Update.
  • each hospital has established a centralized information system.
  • the information system of the hospital stores all the information involved in the hospital, such as staff information, patient treatment information, and hospital Operational information, etc., in order to achieve interconnection of information between major hospitals, generally speaking, information exchanges between hospitals.
  • hospitals conduct information interaction, they need to extract the information to be interacted from the information system, and transmit the information to be interacted to other hospitals in the form of paper or electronic versions.
  • the related technology has at least the following problems: the information stored in the information system of each hospital is only relevant information in the hospital. If the paper or electronic version is used, the information to be interacted The transmission of information to other hospitals will result in poor privacy in the information interaction process, easy information leakage, and poor information security.
  • this application provides an information interaction method, device, computer equipment, and readable storage medium.
  • the main purpose is to solve the problem that the current use of paper or electronic version to transmit the information to be interacted to other hospitals will cause information
  • the privacy of the interaction process is not good, the information is easy to leak, and the security of the information is poor.
  • an information exchange method which includes:
  • the first node When it is detected that the user requests information interaction with the second node, the first node obtains the second digital certificate of the second node, uses the second node public key in the second digital certificate to encrypt the identification of the information to be interacted, and generates the first initial Ciphertext
  • the information ciphertext is generated by the second node after receiving the interactive ciphertext transmitted by the electronic medical record storage device and transmitted to the electronic medical record storage equipment;
  • the interactive information is extracted from the second initial ciphertext obtained by decrypting the information ciphertext, and the interactive information is stored.
  • the second initial ciphertext is based on the interactive information by the second node Get encrypted.
  • an information exchange method includes:
  • the electronic medical record storage device determines the second node that the first node requests for information interaction.
  • the first node and the second node are nodes for information interaction, and the interactive ciphertext is determined by the first node.
  • the node is generated based on an information exchange request that carries an identification of the information to be exchanged;
  • the information ciphertext returned by the second node after receiving the interactive ciphertext is received, the information ciphertext is returned to the first node, and the information ciphertext is generated by the second node based on the interactive information indicated by the information identifier to be interacted.
  • an information exchange method includes:
  • the second node When receiving the interactive ciphertext transmitted by the electronic medical record storage device, the second node obtains the first digital certificate of the first node, and uses the public key of the first node in the first digital certificate to decrypt the interactive ciphertext.
  • the first node is generated based on an information exchange request carrying an identification of the information to be exchanged, and the first node is a node that requests information exchange with the second node;
  • the interactive ciphertext is successfully decrypted using the public key of the first node, extract the first initial ciphertext from the decrypted interactive ciphertext, and the first initial ciphertext is generated by the first node after encrypting the information interaction request;
  • the interactive information indicated by the identification of the information to be interactive is extracted, the information ciphertext is generated based on the interactive information, and the information ciphertext is transmitted to the electronic medical record storage device.
  • an information interaction device which includes:
  • the first encryption module is configured to, when detecting a user request for information interaction with the second node, the first node obtains the second digital certificate of the second node, and uses the second node public key in the second digital certificate to identify the information to be exchanged Encrypt and generate the first initial ciphertext;
  • the second encryption module is used to obtain the private key of the first node, encrypt the first initial ciphertext with the private key of the first node, generate the interactive ciphertext, and transmit the interactive ciphertext to the electronic medical record storage device;
  • the decryption module is used to receive the information ciphertext returned by the electronic medical record storage device, and decrypt the information ciphertext using the public key of the second node.
  • the information ciphertext is generated and combined by the second node after receiving the interactive ciphertext transmitted by the electronic medical record storage device Transfer to electronic medical record storage device;
  • the storage module is used for extracting the interactive information from the second initial ciphertext obtained by decrypting the information ciphertext if the public key of the second node is used to successfully decrypt the information ciphertext, and storing the interactive information.
  • the two nodes are encrypted based on the interactive information.
  • an information interaction device which includes:
  • the determining module is configured to, when receiving the interactive ciphertext transmitted by the first node, the electronic medical record storage device determines the second node that the first node requests for information interaction.
  • the first node and the second node are nodes for information interaction.
  • the ciphertext is generated by the first node based on the information interaction request carrying the identification of the information to be exchanged;
  • the first transmission module is used to transmit the interactive ciphertext to the second node
  • the return module is used to return the information ciphertext to the first node if the information ciphertext returned by the second node after receiving the interactive ciphertext is received, and the information ciphertext is interacted by the second node based on the information identifier to be interacted Information generation.
  • an information interaction device which includes:
  • the first decryption module is configured to, when receiving the interactive ciphertext transmitted by the electronic medical record storage device, the second node obtains the first digital certificate of the first node, and uses the first node public key in the first digital certificate to interact with the ciphertext
  • the interactive ciphertext is generated by the first node based on an information exchange request carrying an information identification to be exchanged, and the first node is a node requesting information exchange with the second node;
  • the extraction module is used to extract the first initial ciphertext from the decrypted interactive ciphertext if the public key of the first node is used to successfully decrypt the interactive ciphertext, after the first node encrypts the information interaction request generate;
  • the second decryption module is configured to obtain the private key of the second node, and decrypt the first initial ciphertext by using the private key of the second node to obtain the information identification to be exchanged;
  • the transmission module is used to extract the interactive information indicated by the identifier of the information to be interacted, generate the information ciphertext based on the interactive information, and transmit the information ciphertext to the electronic medical record storage device.
  • a computer device including a memory, a processor, and computer-readable instructions stored in the memory and running on the processor.
  • the processor implements the first aspect or the second aspect when the processor executes the computer-readable instructions. Aspect or steps of the method of the third aspect.
  • a computer non-volatile readable storage medium stores computer readable instructions.
  • the computer readable instructions implement the first aspect or the first aspect when executed by a processor. The steps of the method of the second or third aspect.
  • the information interaction method, device, computer equipment and readable storage medium provided in this application are compared with the current way of transmitting the information to be interacted to other hospitals in the form of paper or electronic version.
  • the first node encrypts the identifier of the information to be interacted, and transmits the encrypted information identifier to be interacted to the second node that needs to interact, and the second node transmits the interactive information when the information interaction is allowed.
  • the use of multi-layer encryption ensures the security of the interactive information during the transmission process, improves the privacy in the information interaction process, and the information is not easy to leak, and the security of the information is better.
  • FIG. 1A shows a schematic flowchart of an information exchange method provided by an embodiment of the present application
  • FIG. 1B shows a schematic flowchart of an information exchange method provided by an embodiment of the present application
  • FIG. 1C shows a schematic flowchart of an information exchange method provided by an embodiment of the present application
  • FIG. 2A shows a schematic flowchart of an information exchange method provided by an embodiment of the present application
  • FIG. 2B shows a schematic flowchart of an information exchange method provided by an embodiment of the present application
  • FIG. 3A shows a schematic structural diagram of an information interaction device provided by an embodiment of the present application
  • FIG. 4A shows a schematic structural diagram of an information interaction party device provided by an embodiment of the present application
  • FIG. 5A shows a schematic structural diagram of an information interaction party device provided by an embodiment of the present application
  • Fig. 6 shows a schematic diagram of a device structure of a computer device provided by an embodiment of the present application.
  • the embodiment of the present application provides an information exchange method. As shown in FIG. 1A, the method includes:
  • the first node obtains the second digital certificate of the second node, and uses the second node public key in the second digital certificate to encrypt the identification of the interactive information to generate the An initial ciphertext.
  • the first node when the first node detects that the user requests for information interaction, in order to ensure the security of the process of requesting information interaction, the first node obtains the second digital certificate of the second node to be information interaction, The second node public key in the second digital certificate is used to encrypt the identification of the information to be interacted, thereby generating a first initial ciphertext, so as to subsequently implement information interaction based on the first initial ciphertext.
  • the first node obtains the first node private key, uses the first node private key to encrypt the first initial ciphertext, generates an interactive ciphertext, and transmits the interactive ciphertext to the electronic medical record storage device.
  • the first node in order to give the second node an opportunity to verify the credential for information exchange, and the public and private keys have the characteristics of mutual encryption or decryption, therefore, the first node obtains its own first node private key , And use the private key of the first node to encrypt the first initial ciphertext to generate an interactive ciphertext, thereby transmitting the interactive ciphertext to the electronic medical record storage device.
  • the first node receives the information ciphertext returned by the electronic medical record storage device, and uses the public key of the second node to decrypt the information ciphertext.
  • the information ciphertext is generated by the second node after receiving the interactive ciphertext transmitted by the electronic medical record storage device. Transfer to the electronic medical record storage device.
  • the second node public key is used to decrypt the information ciphertext, that is, to verify the received information ciphertext, thereby Determine whether the ciphertext of the information has been tampered with during transmission.
  • the first node successfully decrypts the information ciphertext using the public key of the second node, extract the interactive information from the second initial ciphertext obtained by decrypting the information ciphertext, and store the interactive information.
  • the two nodes are encrypted based on the interactive information.
  • the first node uses the public key of the second node to successfully decrypt the information ciphertext, it means that the information ciphertext transmitted by the second node to the first node has not been tampered with during the transmission.
  • One node can receive and store the interactive information returned by the second node.
  • the embodiment of the present application provides another information exchange method. As shown in FIG. 1B, the method includes:
  • the electronic medical record storage device determines the second node that the first node requests for information interaction, the first node and the second node are nodes for information interaction, and the interactive ciphertext is determined by The first node is generated based on an information exchange request carrying an identification of the information to be exchanged.
  • the electronic medical record storage device when the electronic medical record storage device receives the interactive ciphertext transmitted by the first node, it can determine the second node that the first node requests for information interaction, so as to subsequently transmit the interactive ciphertext to the second node .
  • the electronic medical record storage device transmits the interactive ciphertext to the second node.
  • the electronic medical record storage device transmits the received interactive ciphertext transmitted by the first node to the second node.
  • the electronic medical record storage device receives the information ciphertext returned by the second node after receiving the interactive ciphertext, it returns the information ciphertext to the first node, and the information ciphertext is indicated by the second node based on the information identification to be interacted. Interactive information generation.
  • the electronic medical record storage device receives the information ciphertext returned by the second node after receiving the interactive ciphertext, it means that the information interaction between the first node and the second node is successful, and the electronic medical record is stored The device returns the information ciphertext to the first node.
  • the embodiment of the present application provides another information exchange method. As shown in FIG. 1C, the method includes:
  • the second node When receiving the interactive ciphertext transmitted by the electronic medical record storage device, the second node obtains the first digital certificate of the first node, uses the public key of the first node in the first digital certificate to decrypt the interactive ciphertext, and the interactive encryption
  • the text is generated by the first node based on the information exchange request carrying the identification of the information to be exchanged, and the first node is the node that requests information exchange with the second node.
  • the second node when the second node receives the interactive ciphertext transmitted by the electronic medical record storage device, the second node uses the first node public key in the first digital certificate by obtaining the first digital certificate of the first node Decrypt the interactive ciphertext to verify the interactive ciphertext and determine whether the interactive ciphertext is changed during transmission.
  • the second node successfully decrypts the interactive ciphertext using the public key of the first node, extract the first initial ciphertext from the decrypted interactive ciphertext, and the first initial ciphertext is encrypted by the first node after the information interaction request generate.
  • the second node if the second node successfully decrypts the interactive ciphertext using the public key of the first node, it means that the interactive ciphertext has not been tampered with during transmission, and the second node can decrypt the interactive ciphertext after decryption. Extract the first initial ciphertext from the text.
  • the second node obtains the second node private key, and uses the second node private key to decrypt the first initial ciphertext to obtain the information identification to be exchanged.
  • the second node after the second node successfully decrypts the interactive ciphertext, it can obtain the second node private key, and use the second node private key to decrypt the first initial ciphertext to obtain the information identification to be interacted.
  • the second node extracts the interaction information indicated by the identification of the information to be interacted, generates an information ciphertext based on the interaction information, and transmits the information ciphertext to the electronic medical record storage device.
  • the second node after the second node obtains the identifier of the information to be interacted, the second node can extract the interactive information indicated by the identifier of the information to be interacted, and generate information ciphertext based on the interactive information, and transmit the information ciphertext To the electronic medical record storage device to realize information interaction with the first node.
  • the embodiment of the present application provides another information exchange method, as shown in FIG. 2A and FIG. 2B, the method includes:
  • the first node generates a certificate query request based on the second node identifier of the second node, and transmits the certificate query request to an electronic medical record storage device.
  • the electronic medical record storage device is a device that realizes the storage of electronic medical records based on the blockchain technology, and stores the electronic medical records of a large number of users.
  • the electronic medical record storage device is a device that realizes the storage of electronic medical records based on the blockchain technology, and stores the electronic medical records of a large number of users.
  • only hospitals can generate electronic medical records during user treatment. Therefore, a large number of hospitals are connected to electronic medical record storage devices in the form of nodes, and these hospitals are used as nodes to upload user electronic medical records to electronic medical record storage. In the device.
  • the electronic medical record storage device will provide registration services for the nodes connected to it, and only Only nodes that have successfully registered in the electronic medical record storage device can implement a series of operations based on the electronic medical record storage device.
  • the first node and the second node are used as an example for description of the interacting nodes. Both the first node and the second node are nodes that are successfully registered in the electronic medical record storage device.
  • the sign indicating that the node is successfully registered in the electronic medical record storage device is the digital certificate of the node stored in the electronic medical record storage device, that is, the electronic medical record storage device stores every successful registration in the electronic medical record storage device
  • the digital certificate of the node usually includes the certificate public key, which corresponds to the certificate private key retained by the node itself.
  • the information encrypted by the certificate public key can be decrypted by the certificate private key and encrypted by the certificate private key.
  • the information can be decrypted using the certificate public key. Therefore, in order to ensure the security of various information when requesting information interaction, the interactive information can be encrypted based on the characteristics of the public and private keys, and the encrypted information can be interacted.
  • the digital certificate of each node is stored in the electronic medical record storage device, in order to encrypt the information involved in the interaction process, when the first node wants to interact with the second node, it needs to request the electronic medical record storage device The second digital certificate of the second node, so as to realize the encryption of information during the interaction process based on the second certificate public key in the second digital certificate.
  • the first node requests the second digital certificate of the second node from the electronic medical record storage device, since a large number of nodes are registered in the electronic medical record storage device, a large number of digital certificates are stored in the electronic medical record storage device.
  • the first node A node generates a certificate query request based on the second node identifier of the second node, that is, generates a certificate query request including the second node identifier, and transmits the certificate query request to the electronic medical record storage device, so that the electronic medical record storage device is based on the
  • the certificate query request provides the first node with the digital certificate of the second node.
  • the electronic medical record storage device When the electronic medical record storage device receives the certificate query request transmitted by the first node, it extracts the second node identifier from the certificate query request, obtains the second digital certificate indicated by the second node identifier, and transmits the second digital certificate to the first node.
  • the electronic medical record storage device receives the certificate query request transmitted by the first node, it extracts the second node identifier from the certificate query request, obtains the second digital certificate indicated by the second node identifier, and transmits the second digital certificate to the first node.
  • the electronic medical record storage device receives the certificate query request transmitted by the first node, it extracts the second node identifier from the certificate query request, obtains the second digital certificate indicated by the second node identifier, and transmits the second digital certificate to the first node.
  • the electronic medical record storage device when it receives the certificate query request transmitted by the first node, it can obtain the second digital certificate of the second node based on the certificate query request, and provide the second digital certificate To the first node.
  • the certificate query request carries the second node identifier
  • the electronic medical record storage device extracts the second node identifier from the certificate query request; then, it performs a query based on the second node identifier to obtain the second node identifier.
  • the second digital certificate indicated by the node identifier, and the second digital certificate is transmitted to the first node.
  • the first node receives the second digital certificate returned by the electronic medical record storage device after receiving the certificate query request.
  • the first node since the electronic medical record storage device will return the acquired digital certificate of the second node to the first node, the first node will receive the return from the electronic medical record storage device after receiving the certificate query request The second digital certificate.
  • the first node detects that the user requests information interaction with the second node, it obtains the second digital certificate of the second node, and uses the second node public key in the second digital certificate to encrypt the identification of the information to be interacted, to generate a An initial ciphertext.
  • the terminal mounted on the first node may provide an information interaction portal.
  • the user triggers the information interaction portal, it is determined to be detected The user requests information interaction.
  • the interactive information input page can be displayed, and when it is detected that the user confirms the interactive information input page, obtain the information identification to be interacted in the interactive information input page filled in by the user, so as to interact with the waiting information.
  • the interactive information indicated by the interactive information identifier may be a medical record information identification, an employee information identification, an academic document identification, etc.
  • the embodiment of the present application does not limit the specific content of the interactive information identification.
  • the information identification to be exchanged is encrypted based on the second digital certificate of the second node.
  • the digital certificate of each node will include the certificate public key of the node, when the first node detects that the user requests for information interaction, it can extract the second digital certificate from the second node. The second node public key of the second node.
  • each node Since each node has a pair of certificate public key and certificate private key, and the certificate public key and certificate private key have the characteristics that the information encrypted by the certificate public key can be decrypted by the certificate private key, in order to avoid the identification of the information to be exchanged It is tampered with during transmission.
  • the first node After the first node obtains the second node public key of the second node, it can use the second node public key as the encryption public key, and use the second node public key to encrypt the interactive information identifier , Thereby generating the first initial ciphertext.
  • the first node obtains the first node private key, uses the first node private key to encrypt the first initial ciphertext, generates an interactive ciphertext, and transmits the interactive ciphertext to the electronic medical record storage device.
  • the first initial ciphertext may still be tampered with during transmission, and the first certificate included in the first digital certificate of the first node
  • the public key is public.
  • the first node can also use its own first ciphertext after generating the first initial ciphertext.
  • the node private key signs the first initial ciphertext, generates the query ciphertext, and transmits the query ciphertext to the electronic medical record storage device, so that the electronic medical record storage device transmits the query ciphertext to the second node, so that the second node
  • the node can verify the interactive ciphertext based on the first certificate public key disclosed by the second node, which not only ensures the security of the information interaction process, but also provides the second node with an opportunity to verify the interactive ciphertext, realizing double protection.
  • the first node can also use the second node ID to mark the interactive ciphertext , So that when the electronic medical record storage device receives the interactive ciphertext, it can determine to transmit the interactive ciphertext to the second node, so as to prevent the electronic medical record storage device from transmitting the interactive ciphertext error.
  • the electronic medical record storage device receives the interactive ciphertext transmitted by the first node, it determines the second node that the first node requests for information interaction, and transmits the interactive ciphertext to the second node.
  • the electronic medical record storage device when the electronic medical record storage device receives the interactive ciphertext transmitted by the first node, it can determine the second node that the first node requests for information interaction, and directly transmit the interactive ciphertext to the second node. node.
  • the first node uses the second node identifier to mark the interactive ciphertext
  • the electronic medical record storage device when the electronic medical record storage device receives the interactive ciphertext, it can determine the second node according to the second node identifier marked by the interactive ciphertext, And directly transmit the interactive ciphertext to the second node.
  • the second node receives the interactive ciphertext transmitted by the electronic medical record storage device, obtains the first digital certificate of the first node, and decrypts the interactive ciphertext using the first node public key in the first digital certificate. If the first node public key successfully decrypts the interactive ciphertext, the following steps 208 to 211 are executed; if the first node public key is used to decrypt the interactive ciphertext failed, then the following steps 215 to 216 are executed.
  • the second node since the interactive ciphertext is generated by using the first node private key of the first node for encryption, after the second node receives the interactive ciphertext, the second node can use the first node public key Decrypt the interactive ciphertext, and verify the interactive ciphertext by whether the decryption is successful, so as to determine whether the interactive ciphertext has been tampered with.
  • the public key of the second node of the first node is public and is stored in the electronic medical record storage device in the form of the first digital certificate.
  • the second node when the second node obtains the public key of the first node, it can request the electronic The medical record storage device is provided, and the specific process is consistent with the process in which the first node requests the public key of the second node from the electronic medical record storage device in steps 201 to 202 described above, and will not be repeated here.
  • the second node uses the public key of the first node to successfully decrypt the interactive ciphertext, it means that the interactive ciphertext has not been tampered with. At this time, the second node can decrypt the interactive ciphertext to obtain the interactive ciphertext.
  • the first initial ciphertext in the text, and the interactive information is provided for the first node based on the first initial ciphertext, that is, the following steps 208 to 211 are executed. If the second node fails to sign the interactive ciphertext using the public key of the first node, it means that the interactive ciphertext is likely to be tampered with during transmission, and the first node needs to re-send the interactive ciphertext before the information can be exchanged. That is, the following steps 215 to 216 are executed.
  • the second node when the second node receives the interactive ciphertext, if the second node does not want to exchange information with the first node, then the second node does not need to perform the interactive ciphertext using the public key of the first node.
  • the following steps 215 to 216 are directly executed to inform the first node that the information interaction fails.
  • the second node successfully decrypts the interactive ciphertext using the public key of the first node, extract the first initial ciphertext from the decrypted interactive ciphertext, obtain the second node private key, and use the second node private key to An initial ciphertext is decrypted to obtain the information identification to be exchanged.
  • the second node if the second node successfully signs the interactive ciphertext with the public key of the first node, it means that the interactive ciphertext has not been tampered with. At this time, the second node can decrypt the interactive ciphertext by , Extract the first initial ciphertext from the decrypted interactive ciphertext.
  • the second node can use the private key of the second node to decrypt the first initial ciphertext , Obtain the identification of the information to be queried included in the first initial ciphertext, so that the second node can subsequently determine the target information according to the identification of the information to be queried, and generate an information ciphertext based on the target information.
  • the second node performs information query according to the identifier of the information to be interacted, obtains the interactive information indicated by the identifier of the information to be interacted, uses the public key of the first node to encrypt the interactive information, generates a second initial ciphertext, and uses the private key of the second node
  • the second initial ciphertext is encrypted, the information ciphertext is generated, and the information ciphertext is transmitted to the electronic medical record storage device.
  • the second node after the second node obtains the identifier of the information to be interacted, it can perform information query based on the identifier of the information to be interacted, and obtain the interaction information indicated by the identifier of the information to be interacted.
  • the second node may encrypt the interactive information before transmitting the interactive information to the first node. Since the first node public key of the first node is public, and the second node has already obtained the first certificate public key of the first node, in order to ensure the security of the exchange information, the second node can use the first node public key. The key encrypts the interactive information to generate the second initial ciphertext.
  • the second node may provide the first node to verify the received ciphertext Opportunity, that is, the second node uses its own second node private key to encrypt the second initial ciphertext, generates the information ciphertext, and transmits the information ciphertext to the electronic medical record storage device, so that the electronic medical record storage can The ciphertext of the information is transmitted to the first node.
  • the electronic medical record storage device returns the information ciphertext to the first node.
  • the electronic medical record storage device after the electronic medical record storage device receives the information ciphertext transmitted by the second node, it can transmit the information ciphertext to the first node, so that the second node can obtain the second information based on the information ciphertext.
  • the node is the interactive information provided by the first node.
  • the first node receives the information ciphertext returned by the electronic medical record storage device, and uses the second node public key to decrypt the information ciphertext. If the second node public key is used to successfully decrypt the information ciphertext, the following step 212 is executed ; If the use of the public key of the second node to decrypt the information ciphertext fails, perform the following steps 213 to 214.
  • the first node after the first node receives the information ciphertext returned by the electronic medical record storage device, since the information ciphertext is obtained by the second node, the interactive information is first encrypted using the first node public key of the first node , And then use its own private key of the second node to generate encryption. Therefore, the first node can first use the public key of the second node to decrypt the information ciphertext to achieve verification of the information ciphertext, and only based on the second node After the public key successfully decrypts the information ciphertext, other operations can be continued. If the public key of the second node is used to decrypt the information ciphertext successfully, it means that the information ciphertext has not been tampered with during transmission.
  • the first node can decrypt the information ciphertext, and the information after decryption Extract the second initial ciphertext from the ciphertext, that is, perform the following step 212; if the first node uses the second node public key to decrypt the information ciphertext and fails, it means that the information ciphertext is likely to be tampered with during transmission Therefore, the information ciphertext cannot be used normally. At this time, the second node needs to resend the information ciphertext, that is, the following steps 213 to 214 are executed.
  • the first node successfully decrypts the information ciphertext using the second node public key, obtain the second initial ciphertext after decrypting the information ciphertext, and use the first node private key to decrypt the second initial ciphertext. Obtain interactive information and store the interactive information.
  • the first node can perform the Decryption, extracting the second initial ciphertext from the decrypted information ciphertext.
  • the second initial ciphertext is generated by the second node using the first node public key of the first node to encrypt the interactive information
  • the first node can use its own The private key of the first node decrypts the second initial ciphertext, thereby obtaining interactive information, and storing the obtained interactive information, so as to complete the information interaction with the second node.
  • the first node fails to decrypt the information ciphertext using the second node public key, it generates a first failure response, and returns the first failure response to the electronic medical record storage device.
  • the first node uses the public key of the second node to decrypt the information ciphertext and fails, it means that the content of the information ciphertext is likely to be tampered with during transmission. Therefore, the information ciphertext cannot be normal.
  • the second node is required to resend the information ciphertext.
  • the first node In order to remind the second node to resend the information ciphertext, the first node generates a first failure response and returns the second failure response to the electronic medical record storage device, so that the electronic medical record storage device transmits the first failure response to the second node.
  • the first failure response generated by the first node may carry the information identification to be exchanged, so that the second node can follow the first
  • the information identifier to be exchanged carried in the failure response resends the corresponding information ciphertext.
  • the electronic medical record storage device returns the first failure response to the second node.
  • the electronic medical record storage device after the electronic medical record storage device receives the first failure response, it can return the first failure response to the second node so that the second node can resend the information after receiving the first failure response Ciphertext.
  • the second node fails to decrypt the interactive ciphertext using the public key of the first node, a second failure response is generated, and the second failure response is transmitted to the electronic medical record storage device.
  • the second node fails to decrypt the interactive ciphertext using the public key of the first node, it means that the interactive ciphertext is likely to have been tampered with during transmission, and the first node needs to resend the interactive ciphertext. Therefore, the second node generates a second failure response and transmits the second failure response to the electronic medical record storage device, so that the electronic medical record storage device transmits the second failure response to the first node, so that the first node can restart Generate and send interactive ciphertext.
  • the electronic medical record storage device returns the second failure response to the first node.
  • the electronic medical record storage device can transmit the second failure response to the first node, so that the first node receives the second failure response You can then regenerate and send the interactive ciphertext.
  • the information interaction between the first node and the second node can be realized.
  • the data stored in the node may be stolen and connected to the node in the electronic medical record storage device. Both need to be registered, and only the successfully registered node can realize information interaction with other nodes based on the electronic medical record storage device.
  • the process of registering the first node in the electronic medical record storage device is shown in FIG. 2B, and the method includes:
  • the first node When the first node detects that the user requests registration, it transmits the identity information of the first node and the public key of the first node to the electronic medical record storage device.
  • the terminal on which the first node relies may provide a registration entry for the user.
  • the terminal detects that the user triggers the registration entry, it determines that the user requests registration and displays the registration page.
  • the electronic medical record storage device relies on the digital certificate to provide the registration service for the node, and the electronic medical record storage device generates the digital certificate for the node based on the node public key of each node, the first node is detecting
  • the first node identity information and its own first node public key are transmitted to the electronic medical record storage device, so that the electronic medical record storage device provides registration for the first node based on the first node identity information and the first node public key service.
  • the identity information of the first node may include hospital name information, hospital attribute information, etc.
  • the first node public key can be generated or obtained by the first node itself.
  • the first node can use information that can be disclosed by itself as the first node public key, for example, hospital number, hospital stock code, etc.; or it can be random Generate a string of characters and use this string as the public key of the first node.
  • the embodiment of the present application does not limit the method for the first node to obtain the public key of the first node.
  • the electronic medical record storage device receives the first node identity information and the first node public key transmitted by the first node, bind the first node identity information and the first node public key.
  • the electronic medical record storage device when the electronic medical record storage device receives the first node identity information and the first node public key transmitted by the first node, because there may be a large number of nodes requesting registration from the electronic medical record storage device at the same time , So that the electronic medical record storage device may receive a large amount of node identity information and node public key at the same time. Therefore, in order to distinguish the received node identity information and the node public key, the electronic medical record storage device will receive the first node identity information And the public key of the first node is bound, so as to subsequently register the first node based on the identity information of the first node and the public key of the first node.
  • the electronic medical record storage device uses the public key of the first node to sign the bound identity information of the first node and the public key of the first node, generates and registers the first digital certificate, and transmits the first digital certificate to the first node. And correspondingly store the identity information of the first node and the first digital certificate.
  • the electronic medical record storage device after the electronic medical record storage device binds the received identity information of the first node with the public key of the first node, in order to generate a digital certificate related to each node, it can be based on the digital
  • the certificate verifies the identity of the node, and the electronic medical record storage device uses the public key of the first node to sign the bound identity information of the first node and the public key of the first node to generate a first digital certificate, and based on the first digital certificate Realize the registration of the first node.
  • the electronic medical record storage device stores the generated first node identity information corresponding to the first digital certificate, or uses the first node identity information to compare the first The digital certificate is marked, thereby establishing a corresponding relationship between the identity information of the first node and the first digital certificate.
  • the electronic medical record storage device After completing the generation of the digital certificate for the first node, in order for the first node to know that it has completed registration in the electronic medical record storage device, the electronic medical record storage device transmits the first digital certificate to the first node.
  • the first node receives the first digital certificate returned by the electronic medical record storage device after completing registration based on the received first node identity information and the first node public key, and stores the first digital certificate.
  • the first digital certificate is generated after the electronic medical record storage device signs the identity information of the first node and the public key of the first node.
  • the first node after the first node receives the first digital certificate returned by the electronic medical record storage device, it can store the first digital certificate, thereby completing the registration in the electronic medical record storage device.
  • the first node when information interaction is required, the first node encrypts the identifier of the information to be interacted, and transmits the encrypted information identifier to be interacted to the second node that needs to interact, and the second node allows
  • the interactive information is transmitted, so that the form of multi-layer encryption ensures the security of the interactive information during the transmission process, improves the privacy of the information interaction process, and the information is not easy to leak, and the information security is better .
  • an embodiment of the present application provides an information interaction device. As shown in FIG. 3A, the device includes:
  • the first encryption module 301 is configured to, when it is detected that the user requests to exchange information with the second node, the first node obtains the second digital certificate of the second node, and uses the second node public key in the second digital certificate to treat the interactive information
  • the logo is encrypted to generate the first initial ciphertext
  • the second encryption module 302 is configured to obtain the private key of the first node, encrypt the first initial ciphertext with the private key of the first node, generate an interactive ciphertext, and transmit the interactive ciphertext to the electronic medical record storage device;
  • the decryption module 303 is used to receive the information ciphertext returned by the electronic medical record storage device, and decrypt the information ciphertext using the public key of the second node.
  • the information ciphertext is generated after the second node receives the interactive ciphertext transmitted by the electronic medical record storage device And transfer to the electronic medical record storage device;
  • the storage module 304 is configured to, if the information ciphertext is successfully decrypted using the public key of the second node, extract the interactive information from the second initial ciphertext obtained by decrypting the information ciphertext, and store the interactive information.
  • the second node is encrypted based on the interactive information.
  • the device also includes:
  • the transmission module 305 is configured to transmit the identity information of the first node and the public key of the first node to the electronic medical record storage device when it is detected that the user requests registration, and the identity information of the first node includes at least hospital name information and hospital attributes information;
  • the receiving module 306 is configured to receive the first digital certificate returned by the electronic medical record storage device and store the first digital certificate.
  • the first digital certificate is used by the electronic medical record storage device to verify the identity information of the first node.
  • the public key of the first node is generated after signing.
  • the first encryption module 301 includes:
  • the generating unit 3011 is configured to generate a certificate query request based on the second node identifier of the second node, and transmit the certificate query request to the electronic medical record storage device;
  • the receiving unit 3012 is configured to receive the second digital certificate returned by the electronic medical record storage device after receiving the certificate query request.
  • the device also includes:
  • the generating module 307 is configured to generate a first failure response if the decryption of the information ciphertext using the second node public key fails, and return the first failure response to the electronic medical record storage device.
  • the storage module 304 includes:
  • the obtaining unit 3041 is configured to obtain the second initial ciphertext after decrypting the information ciphertext if the information ciphertext is successfully decrypted by using the second node public key;
  • the decryption unit 3042 is configured to decrypt the second initial ciphertext using the first node private key to obtain the interaction information, and store the interaction information.
  • an embodiment of the present application provides an information interaction device. As shown in FIG. 4A, the device includes:
  • the determining module 401 is configured to, when receiving the interactive ciphertext transmitted by the first node, the electronic medical record storage device determines the second node that the first node requests for information interaction, and the first node and the second node are A node for information interaction, where the interaction ciphertext is generated by the first node based on an information interaction request carrying an identification of the information to be interacted;
  • the first transmission module 402 is configured to transmit the interactive ciphertext to the second node
  • the return module 403 is configured to return the information ciphertext to the first node if the information ciphertext returned by the second node after receiving the interactive ciphertext is received, and the information ciphertext is determined by The second node is generated based on the interaction information indicated by the to-be-interaction information identifier.
  • the device also includes:
  • the binding module 404 is configured to bind the first node identity information and the first node public key when the first node identity information and the first node public key transmitted by the first node are received;
  • the signature module 405 is configured to use the first node public key to sign the bound first node identity information and the first node public key, and generate and register a first digital certificate;
  • the storage module 406 is configured to transmit the first digital certificate to the first node, and correspondingly store the first node identity information and the first digital certificate.
  • the device also includes:
  • the extraction module 407 is configured to extract a second node identifier from the certificate query request when the certificate query request transmitted by the first node is received;
  • the second transmission module 408 is configured to obtain a second digital certificate indicated by the second node identifier, and transmit the second digital certificate to the first node.
  • the return module 403 is also configured to return the first failure response to the second node if the first failure response returned by the first node is received; or, if the first failure response is received If the second failure response is returned to the second node, the second failure response is returned to the first node.
  • an embodiment of the present application provides an information interaction device. As shown in FIG. 5A, the device includes:
  • the first decryption module 501 is configured to, when receiving the interactive ciphertext transmitted by the electronic medical record storage device, the second node obtains the first digital certificate of the first node, and uses the first node public key pair in the first digital certificate
  • the interactive ciphertext is decrypted, the interactive ciphertext is generated by the first node based on an information interaction request carrying an identification of the information to be interacted, and the first node is a node requesting information interaction with the second node ;
  • the extraction module 502 is configured to, if the interactive ciphertext is successfully decrypted using the first node public key, extract a first initial ciphertext from the decrypted interactive ciphertext, and the first initial ciphertext is Generated after the first node encrypts the information exchange request;
  • the second decryption module 503 is configured to obtain a second node private key, and use the second node private key to decrypt the first initial ciphertext to obtain the information identification to be interacted;
  • the transmission module 504 is configured to extract the interaction information indicated by the identification of the information to be interacted, generate an information ciphertext based on the interaction information, and transmit the information ciphertext to the electronic medical record storage device.
  • the transmission module 504 includes:
  • the query unit 5041 is configured to perform information query according to the identifier of the information to be interacted, and obtain the interactive information indicated by the identifier of the information to be interacted;
  • the first encryption unit 5042 is configured to use the first node public key to encrypt the interaction information to generate a second initial ciphertext
  • the second encryption unit 5043 is configured to use the second node private key to encrypt the second initial ciphertext to generate the information ciphertext.
  • the device also includes:
  • the generating module 505 is configured to generate a second failure response if the decryption of the interactive ciphertext using the first node public key fails, and transmit the second failure response to the electronic medical record storage device.
  • the device 600 includes a communication bus, a processor, a memory, and a communication interface, and may also include an input/output interface, and a display device, wherein one of the functional units The communication between each other can be completed through the bus.
  • the memory stores computer-readable instructions
  • the processor is used to execute programs stored in the memory and execute the information interaction method corresponding to the first node, the electronic medical record storage device, or the second node in any of the above embodiments. .
  • a computer non-volatile readable storage medium on which computer readable instructions are stored, when the computer readable instructions are executed by a processor, the first node, the electronic medical record storage device, or the first node in any of the embodiments are implemented
  • the two nodes respectively correspond to the steps of the information interaction method.
  • the software product can be stored in a non-volatile storage medium (which can be a CD-ROM, U disk, mobile hard disk, etc.), including several
  • the instructions are used to make a computer device (which may be a personal computer, a server, or a network device, etc.) execute the methods described in each implementation scenario of this application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)

Abstract

Le mode de réalisation de la présente invention peut être appliqué au domaine technique de la transmission de données. La présente invention concerne un procédé et un appareil d'interaction avec des informations, un dispositif informatique et un support de stockage lisible. Le procédé comprend les étapes consistant à : lorsqu'il est détecté qu'un utilisateur effectue une demande d'interaction avec des informations, acquérir un second certificat numérique d'un second nœud et utiliser une clé publique du second nœud dans le second certificat numérique pour chiffrer un identifiant des informations devant faire l'objet de l'interaction de façon à générer un premier texte chiffré initial ; acquérir une clé privée d'un premier nœud pour chiffrer le premier texte chiffré initial de façon à générer un texte chiffré d'interaction et transmettre le texte chiffré d'interaction à un dispositif de stockage de dossiers médicaux électroniques ; recevoir un texte chiffré d'informations et utiliser la clé publique du second nœud pour déchiffrer le texte chiffré d'informations ; puis, si le déchiffrement est réussi, extraire les informations d'interaction d'un second texte chiffré initial obtenu en déchiffrant le texte chiffré d'informations et stocker les informations d'interaction. Grâce à l'utilisation d'une forme de chiffrement à couches multiples pour assurer la sécurité des informations d'interaction pendant un processus de transmission, la confidentialité pendant un processus d'interaction avec des informations est améliorée, les fuites d'informations sont rares et la sécurité des informations accrue.
PCT/CN2019/123141 2019-05-10 2019-12-05 Procédé et appareil d'interaction avec des informations, dispositif informatique et support de stockage lisible WO2020228304A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910390295.0A CN110224989B (zh) 2019-05-10 2019-05-10 信息交互方法、装置、计算机设备及可读存储介质
CN201910390295.0 2019-05-10

Publications (1)

Publication Number Publication Date
WO2020228304A1 true WO2020228304A1 (fr) 2020-11-19

Family

ID=67820994

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/123141 WO2020228304A1 (fr) 2019-05-10 2019-12-05 Procédé et appareil d'interaction avec des informations, dispositif informatique et support de stockage lisible

Country Status (2)

Country Link
CN (1) CN110224989B (fr)
WO (1) WO2020228304A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110224989B (zh) * 2019-05-10 2022-01-28 深圳壹账通智能科技有限公司 信息交互方法、装置、计算机设备及可读存储介质
CN111526128B (zh) * 2020-03-31 2022-07-19 中国建设银行股份有限公司 一种加密管理的方法和装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277374A1 (en) * 2011-10-31 2016-09-22 Reid Consulting Group System and method for securely storing and sharing information
WO2016180264A1 (fr) * 2015-05-13 2016-11-17 阿里巴巴集团控股有限公司 Procédé et appareil d'acquisition de fichier électronique
CN106295393A (zh) * 2015-06-26 2017-01-04 阿里巴巴集团控股有限公司 电子处方操作方法、装置及系统
CN109544331A (zh) * 2018-10-12 2019-03-29 深圳壹账通智能科技有限公司 基于区块链的供应链金融应用方法、装置及终端设备
CN110049016A (zh) * 2019-03-21 2019-07-23 深圳壹账通智能科技有限公司 区块链的数据查询方法、装置、系统、设备及存储介质
CN110224989A (zh) * 2019-05-10 2019-09-10 深圳壹账通智能科技有限公司 信息交互方法、装置、计算机设备及可读存储介质

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103220295A (zh) * 2013-04-26 2013-07-24 福建伊时代信息科技股份有限公司 一种文档加密及解密的方法、装置和系统
CN104022883B (zh) * 2014-06-17 2017-03-15 烟台大学 一种基于物流网络的个人信息保护网络购物技术
CN105471826B (zh) * 2014-09-04 2019-08-20 中电长城网际系统应用有限公司 密文数据查询方法、装置和密文查询服务器
CN106533665B (zh) * 2016-10-31 2018-08-07 北京百度网讯科技有限公司 用于存储网站私钥明文的方法、系统和装置
CN106789008B (zh) * 2016-12-16 2020-02-28 北京瑞卓喜投科技发展有限公司 对可共享的加密数据进行解密的方法、装置及系统
CN106713338A (zh) * 2017-01-03 2017-05-24 上海金融云服务集团安全技术有限公司 一种基于服务器硬件信息的长连接隧道建立方法
CN107896213B (zh) * 2017-11-16 2021-07-20 重庆顺利科技有限公司 电子处方数据存储方法
CN109299149B (zh) * 2018-10-09 2020-07-14 北京腾云天下科技有限公司 数据查询方法、计算设备以及系统
CN109587132B (zh) * 2018-11-29 2021-03-26 南京苏宁软件技术有限公司 一种基于联盟链的数据传递方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160277374A1 (en) * 2011-10-31 2016-09-22 Reid Consulting Group System and method for securely storing and sharing information
WO2016180264A1 (fr) * 2015-05-13 2016-11-17 阿里巴巴集团控股有限公司 Procédé et appareil d'acquisition de fichier électronique
CN106295393A (zh) * 2015-06-26 2017-01-04 阿里巴巴集团控股有限公司 电子处方操作方法、装置及系统
CN109544331A (zh) * 2018-10-12 2019-03-29 深圳壹账通智能科技有限公司 基于区块链的供应链金融应用方法、装置及终端设备
CN110049016A (zh) * 2019-03-21 2019-07-23 深圳壹账通智能科技有限公司 区块链的数据查询方法、装置、系统、设备及存储介质
CN110224989A (zh) * 2019-05-10 2019-09-10 深圳壹账通智能科技有限公司 信息交互方法、装置、计算机设备及可读存储介质

Also Published As

Publication number Publication date
CN110224989B (zh) 2022-01-28
CN110224989A (zh) 2019-09-10

Similar Documents

Publication Publication Date Title
CN110086608B (zh) 用户认证方法、装置、计算机设备及计算机可读存储介质
WO2020192773A1 (fr) Procédé, dispositif, appareil et système d'authentification d'identité numérique, et support de stockage
US10003582B2 (en) Technologies for synchronizing and restoring reference templates
WO2018050081A1 (fr) Procédé et appareil d'authentification d'identité de dispositif, et support de stockage
Jiang et al. A privacy enhanced authentication scheme for telecare medical information systems
CN110049016B (zh) 区块链的数据查询方法、装置、系统、设备及存储介质
Li et al. A secure chaotic maps and smart cards based password authentication and key agreement scheme with user anonymity for telecare medicine information systems
CN103595703B (zh) 一种基于OpenSSL的Linux安全文件传输系统及方法
US11134069B2 (en) Method for authorizing access and apparatus using the method
WO2020186822A1 (fr) Procédé, dispositif et appareil d'interrogation de données fondées sur une chaîne de blocs et support d'informations lisible
WO2020168772A1 (fr) Procédé, système, appareil et dispositif de stockage de dossiers médicaux électroniques et support
US7480939B1 (en) Enhancement to authentication protocol that uses a key lease
WO2016202207A1 (fr) Procédé et dispositif pour obtenir un document électronique
US20110167263A1 (en) Wireless connections to a wireless access point
JP2001186122A (ja) 認証システム及び認証方法
WO2020228304A1 (fr) Procédé et appareil d'interaction avec des informations, dispositif informatique et support de stockage lisible
EP4096160A1 (fr) Mise en uvre par secret partagé de clés cryptographiques obtenues par procuration
Sethia et al. Smart health record management with secure NFC-enabled mobile devices
CN102143190B (zh) 一种安全登陆方法和装置
CN111225001A (zh) 区块链去中心化通讯方法、电子设备及系统
CN113545004A (zh) 具有减少攻击面的认证系统
US8312277B2 (en) Method and system for secure communication between computers
CN112637128B (zh) 一种数据中心主机的身份互信方法及系统
KR100993333B1 (ko) 인터넷 접속 도구를 고려한 사용자 인증 방법 및 시스템
JP2005086428A (ja) 認証を得て暗号通信を行う方法、認証システムおよび方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19928895

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205 DATED 01/03/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19928895

Country of ref document: EP

Kind code of ref document: A1