WO2020079629A1 - Procédé et système mis en œuvre par ordinateur pour sécuriser des données capturées dans une page web ou une application s'exécutant sur un dispositif informatique mobile à distance - Google Patents
Procédé et système mis en œuvre par ordinateur pour sécuriser des données capturées dans une page web ou une application s'exécutant sur un dispositif informatique mobile à distance Download PDFInfo
- Publication number
- WO2020079629A1 WO2020079629A1 PCT/IB2019/058852 IB2019058852W WO2020079629A1 WO 2020079629 A1 WO2020079629 A1 WO 2020079629A1 IB 2019058852 W IB2019058852 W IB 2019058852W WO 2020079629 A1 WO2020079629 A1 WO 2020079629A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- mobile communications
- communications device
- key
- data
- web page
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/045—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply hybrid encryption, i.e. combination of symmetric and asymmetric encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0478—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying multiple layers of encryption, e.g. nested tunnels or encrypting the content with a first key and then with at least a second key
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0838—Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
- H04L9/0897—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage involving additional devices, e.g. trusted platform module [TPM], smartcard or USB
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/80—Wireless
Definitions
- the present application relates to a computer implemented method and system for securitisation of data captured in a web page displayed on a mobile computing device or in an application executing on a mobile computing device.
- Messaging platforms between applications executing on two different mobile communications devices are well-known and a number of these messaging platforms are in use.
- An example application is a messaging application such as WhatsAppTM or an SMS messaging application.
- SSL Secure Sockets Layer
- One example would be to provide end to end encryption of data such as for a PIN/Password even inside the server application back end components, with the PIN/Password encrypted at all times.
- Web Browsers are also used on mobile phones to enter data and this data also often needs to be secured.
- the present invention seeks to address this by providing a computer implemented method and system for securitisation of a messaging platform.
- a computer implemented method for securitisation of data captured in a web page displayed on a remote mobile communications device or in an application executing on the remote mobile communications device including a non- transitory data-storage device, a communications module and a processor, the method including: generating a public/private key pair; storing the private key securely in the non-transitory data-storage device; transmitting the public key to a web page or application executing on a mobile communications device, the public key being transmitted as part of an initial payload data bundle without having been requested by the mobile communications device; receiving from the web page or application executing on the mobile communications device a public key; using the received public key and the saved private key to generate a shared secret; deriving an encryption key using the shared secret; generating a symmetric key; encrypting the symmetric key using the derived shared secret using an encryption algorithm; sending the encrypted symmetric key to the web page or application executing on the mobile communications device; receiving encrypted data from the web page or application executing on the mobile communications device; receiving encrypted data from
- the encryption key derived using the shared secret may be derived using a SHA hash.
- the application executing on the mobile communications device is one of a messaging application such as SMS or instant messaging application, for example.
- the encrypted data received from the mobile communications device is typically a user pin/password entered into the displayed web page or application executing on the mobile communications device.
- a system for securitisation of data captured in a web page or application executing on a remote mobile computing device including: a non-transitory data-storage device for storing data therein; a communications module; and a processor to control the system to: generate a public/private key pair; store the private key securely in the non-transitory data storage device; transmit the public key via the communications module to a web page or application executing on a remote mobile communications device, the public key being transmitted as part of an initial payload data bundle without having been requested by the mobile communications device; receive a public key from the mobile communications device via the communications module; use the received public key and the saved private key to generate a shared secret; derive an encryption key using the shared secret; generate a symmetric key; encrypt the symmetric key using the derived shared secret using an encryption algorithm; send the encrypted symmetric key to the web page or application executing on the mobile communications device; receive encrypted data from the web page or application executing on the mobile communications device; and decrypt the
- a computer implemented method for securitisation of data captured in a web page displayed on a mobile communications device or in an application executing on the mobile communications device including: executing a web browser displaying a web page or a messaging application on a mobile communications device; receiving a user input requesting an authentication; transmitting a request to an external server; receiving from the server a user interface and a server public key, the user interface including a request for data to be secured; receiving the data to be secured; requesting an encrypted symmetric key from the server; receiving the encrypted symmetric key from the server generating a public/private key pair; using the private key together with the server public key to generate a shared secret; deriving an asymmetric key using the shared secret; using the derived asymmetric key to decrypt a symmetric key received from the server; using the symmetric key to encrypt the data to be secured; using the encrypted data and re-encrypting this using the derived shared secret; transmitting the re-encrypted data to the
- a mobile communications device including: a communications module; a display; a user interface; and a processor to control the mobile communications device to secure data captured in a web page displayed on the display or in an application executing on the mobile communications device by performing the following method steps: displaying a web page on the display or executing a messaging application on the mobile communications device; receiving a user input via the user interface requesting an authentication; transmitting a request to an external server via the communications module; receiving from the server via the communications module a user interface and a server public key, the user interface including a request for data to be secured; receiving via the user interface the data to be secured; requesting an encrypted symmetric key from the server via the communications module; receiving via the communications module the encrypted symmetric key from the server; generating a public/private key pair; using the private key together with the server public key to generate a shared secret; deriving an asymmetric key using the shared secret; using the derived asymmetric key to decrypt a symmetric key received from the server; using the following method steps: displaying
- FIG. 1 is a block diagram illustrating an example system to implement the methodologies described herein;
- Figure 2 is a block diagram illustrating an example server of Figure 1 in more detail
- Figure 3 is a block diagram illustrating an example mobile communications device of Figure 1 in more detail.
- Figure 4 is a flow diagram illustrating an example process flow according to the present invention.
- the present invention relates to a computer implemented method and system for securitisation of data captured in a web page displayed on a mobile computing device or in an application executing on a mobile communications device.
- FIG. 1 an example system 10 for implementing the methodologies described below is illustrated.
- Two mobile communications devices 14 are also illustrated. It will be appreciated that while only two devices are illustrated, the system will typically be implemented with a very large number of mobile communications devices 14.
- the mobile communications devices 14 communicate with one another via a mobile communications network 16 or any other data communications network. ln any event, each mobile communications device 14 will have a messaging application executing thereon which allows either traditional SMS messaging or so-called instant messages to be sent from one mobile communications device to another.
- a user of mobile communications device 14a can send messages to a user of mobile communications device 14b, for example, and vis-versa.
- a user of mobile communications device 14a can send messages to the server 10 or another suitable computer executing software which allows communications with the messaging application executing on mobile communications device 14a.
- system 10 in this illustrated example embodiment takes the form of a central server.
- system 10 could be any kind of appropriate computing device including but not limited to a desktop computer, a laptop computer, a tablet computer or any other suitable computing device.
- the server 10 is either connected to the mobile communications network 16 or is embedded in and forms part of the structure of the mobile communications network 16.
- the server 10 implements the functionality of the messaging platform allowing messages to pass between the mobile communications devices 14, or the server is separate from but connected to another server that implements the functionality of the messaging platform.
- the server 10 typically includes a non-transitory data storage device in the form of a memory 12.
- the server 10 also includes a communications module 18 which allows the server to communicate over various communication networks including the mobile communications network 16.
- Processor 20 is connected to the other modules of the server 10 and controls the operation of the system.
- Figure 3 shows a block diagram of an example mobile communications device 14.
- the mobile communications device 14 includes a processor 24 which controls the operation of the mobile communications device 14.
- a communications module 26 allows the mobile communications device to transmit and receive data.
- Camera 28 allows the mobile communications device to take pictures.
- a user interface 30 allows the user to input commands into the mobile communications device.
- the user interface 30 could be one or more of a key pad, external buttons or a touchscreen through which a user can input commands to the mobile communications device 14.
- a display 32 is used to display information to the user.
- a memory 34 is used to store data such that the memory 34 is secure against malicious tampering of data.
- One example implementation of the securitisation of data will now be described.
- a user using one of the mobile communications devices 14 executes an instant messaging application on the mobile communications device 14 or opens and displays a web page using a web browser of the mobile communications devices 14.
- the mobile communications device 14 will be referred to as a so-called smart phone 14.
- this will entail the user touching a messaging application icon or web browser icon displayed to the user via the display 32 which is a touchscreen display meaning that the user interface 30 and display 32 are incorporated into the touchscreen display.
- the processor 24 executes program instructions to execute and open the messaging application.
- the messaging application or web browser is initialized with a 32-byte pre shared key, this key will be stored securely in the server memory 12 and must not be shared, this enables the server 10 to push a message to the given messaging application client (server side initiated).
- the public key is transmitted as part of an initial payload data bundle without having been requested by the mobile communications device 14.
- the processor 20 generates a public/private key pair, stores a private key in the secure memory 12 and transmits the public key to the instant messaging application executing on the mobile communications device 14.
- the messaging application also needs to be initialized with a token for all webhook requests.
- a webhook is a direct request from a mobile communications device 14 to a server, bypassing the instant messaging platform infrastructure.
- This token is used to generate a Secure Hash Algorithm 1 (SHA1 hash) using the token and JavaScript Object Notation (JSON) body for each and every request submitted to the server 10.
- SHA1 hash Secure Hash Algorithm 1
- JSON JavaScript Object Notation
- a SHA1 will be generated on the server side using the same token and received JSON body request, if the hash matches the webhook request is valid.
- a user of the device 14 starts the process by the inputting via the user interface 30 a request for authentication and which will be received by processor 24.
- this is implemented by the user entering a word “PIN” which is then transmitted to a predetermined number or destination by the messaging application, and in the illustrated embodiment this is a request for a keypad which is transmitted as (step 1 ) in the Figure.
- the server 10 receives a request from a mobile communications device 14 (step 1 ) to display a keypad.
- the server 10 application then fetches the Pre-shared key from a secure memory 22 in Figure 2 (steps 2 and 3).
- the secure memory 22 is referred to in Figure 4 as KeyStore/Hardware Security Module (HSM).
- HSM KeyStore/Hardware Security Module
- secure memory 22 is illustrated separately from database 12, the secure memory 22 could also form part of the database 12.
- the server 10 generates a SHA from the JSON body request received from the mobile communications device 14 (step 4), and compares the received SHA and generated SHA (step 5).
- the server 10 generates an Eliptic Curve Deffie-Helaman key pair (Public and Private) (step 6).
- the server 10 will then store the private key in the secure memory 22 (step 7).
- the server 10 public key will then be used as a parameter in the rendering of the keypad (step 8).
- the processor 24 on the mobile communications device 14 will receive the encrypted asymmetric key from the server 10 and in response thereto generate a public/private key pair (step 9).
- the processor 24 will then use the private key together with the server public key to generate a shared secret (step 10).
- the processor 24 will then derive a symmetric key (step 1 1 ) using the shared secret (using SHA hash).
- the processor 24 of the mobile communications device 14 will in (step 12) transmit a request for an encrypted symmetric key to the external server 10 via the communications module 26 and communications network 16.
- the server processor 20 will receive the request and in response thereto, use the received public key and the saved private key and generate a shared secret (step 17).
- Steps 14-16 are executed in response to the mobile communications device 14 request for an encryption key from the server 14, with the server application 14 then generating or fetching a symmetric encryption key from memory 22 (steps 13 and 14.
- the server application 14 then requests and receives the Private key from memory 22 (steps 15 and 16)
- the server processor 20 will derive an encryption key (step 18) using the shared secret (using SHA hash) and will generate a symmetric key (from HSM).
- the server processor 20 will then encrypt the symmetric key (step 19) using the derived shared secret using an encryption algorithm and send (step 20) the encrypted symmetric key to the instant messaging application executing on the mobile communications device 14 via the communications network.
- the user will now be prompted to input their user pin or password to the mobile communications device 14 using the user interface 30 and this will be received by the processor (step 21 ).
- the processor 24 of the communications device 14 will use the derived symmetric key to decrypt a symmetric key (step 22) received from the server.
- the processor 20 will use the symmetric key (step 23) to encrypt data, in this example being the user entered PIN or password.
- the processor 20 will then use the encrypted data and re-encrypt (step 24) this using the derived shared secret.
- the processor 24 of the server 10 Upon receipt of the encrypted data at the server 10 from the instant messaging application executing on the mobile communications device 14, the processor 24 of the server 10 will decrypt the encrypted data (step 27) using the previously generated derived encryption key.
- the server processor 20 will translate the data to a client key (step 28) and send the translated data a response to a web service request initiated to invoke the secure keypad (step 29).
- the user goes into the messaging application and selects the required chat, for example“WIZZIT International”.
- the user types a message“Hi” into the chat application.
- the application comes back with the requirement to Authenticate and enter sensitive data.
- an“Enter ID number” button is displayed to the user.
- the Web hook containing the encryption capability is displayed in the form of a pin pad which is a numerical pad.
- the pin pad allows the user to enter sensitive data, and encrypt it as per the process described above.
- the information is sent it can then be verified.
- the encrypted data is verified and the application is redirected back to the chat environment.
- the transaction can now continue. This allows the sensitive information to be transmitted securely in an encrypted format and then decrypted and stored securely. This is specifically useful for ID numbers and other sensitive personal information.
- the user typically using a web browser on their mobile communications device 14, open a web page and selects a button that says “Enter Pin”.
- the Web hook containing the encryption capability is displayed in the form of a pin pad which is a numerical pad.
- the pin pad allows the user to enter sensitive data and encrypt it as per the process described above.
- the user can continue with for example a banking transaction such as a purchase or money transfer.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Power Engineering (AREA)
- Information Transfer Between Computers (AREA)
Abstract
L'invention concerne un procédé mis en œuvre par ordinateur pour sécuriser des données capturées dans une page web affichée ou dans une application s'exécutant sur un dispositif de communication mobile à distance. Une paire de clés publique/privée est générée et la clé privée est stockée de manière sécurisée. La clé publique est transmise à la page web ou à l'application en tant que partie d'un faisceau de données de charge utile initiale sans avoir été demandée par le dispositif de communication mobile. Une clé publique est reçue en provenance du dispositif de communication mobile et utilisée avec la clé privée sauvegardée pour générer un secret partagé. Une clé de chiffrement est dérivée à l'aide du secret partagé. Une clé symétrique est générée et chiffrée à l'aide du secret partagé dérivé à l'aide d'un algorithme de chiffrement. La clé symétrique chiffrée est envoyée au dispositif de communication mobile. Des données chiffrées sont reçues en retour du dispositif de communication mobile et ceci est déchiffré à l'aide de la clé de chiffrement dérivée précédemment générée.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| ZA201806942 | 2018-10-18 | ||
| ZA2018/06942 | 2018-10-18 |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2020079629A1 true WO2020079629A1 (fr) | 2020-04-23 |
Family
ID=68296597
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/IB2019/058852 Ceased WO2020079629A1 (fr) | 2018-10-18 | 2019-10-17 | Procédé et système mis en œuvre par ordinateur pour sécuriser des données capturées dans une page web ou une application s'exécutant sur un dispositif informatique mobile à distance |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2020079629A1 (fr) |
Cited By (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116055207A (zh) * | 2023-01-31 | 2023-05-02 | 深圳市圣驼储能技术有限公司 | 一种物联网通讯数据的加密方法及系统 |
| GB2635234A (en) * | 2023-11-06 | 2025-05-07 | Nchain Licensing Ag | Key derivation & communication protocols |
Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140188734A1 (en) * | 2012-12-31 | 2014-07-03 | Volker Neuwirth | Securely Receiving Data Input At A Computing Device Without Storing The Data Locally |
| US20170118301A1 (en) * | 2015-10-22 | 2017-04-27 | The Western Union Company | Integration framework and user interface for embedding transfer services into applications |
-
2019
- 2019-10-17 WO PCT/IB2019/058852 patent/WO2020079629A1/fr not_active Ceased
Patent Citations (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20140188734A1 (en) * | 2012-12-31 | 2014-07-03 | Volker Neuwirth | Securely Receiving Data Input At A Computing Device Without Storing The Data Locally |
| US20170118301A1 (en) * | 2015-10-22 | 2017-04-27 | The Western Union Company | Integration framework and user interface for embedding transfer services into applications |
Non-Patent Citations (1)
| Title |
|---|
| ANONYMOUS: "RFC 5246 - The Transport Layer Security (TLS) Protocol Version 1.2", 31 August 2008 (2008-08-31), XP055469140, Retrieved from the Internet <URL:https://tools.ietf.org/html/rfc5246> [retrieved on 20180420] * |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN116055207A (zh) * | 2023-01-31 | 2023-05-02 | 深圳市圣驼储能技术有限公司 | 一种物联网通讯数据的加密方法及系统 |
| CN116055207B (zh) * | 2023-01-31 | 2023-10-03 | 深圳市圣驼储能技术有限公司 | 一种物联网通讯数据的加密方法及系统 |
| GB2635234A (en) * | 2023-11-06 | 2025-05-07 | Nchain Licensing Ag | Key derivation & communication protocols |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12074864B2 (en) | Non-custodial tool for building decentralized computer applications | |
| CN110492990B (zh) | 区块链场景下的私钥管理方法、装置及系统 | |
| US10129240B2 (en) | Distributing security codes through a restricted communications channel | |
| US8832783B2 (en) | System and method for performing secure communications | |
| US10938792B2 (en) | Layered encryption for end to end communication | |
| US9832183B2 (en) | Key management using quasi out of band authentication architecture | |
| CN112425114B (zh) | 受公钥-私钥对保护的密码管理器 | |
| JP6399382B2 (ja) | 認証システム | |
| EP2777212B1 (fr) | Messagerie sécurisée | |
| US20110302410A1 (en) | Secure document delivery | |
| CN108616352B (zh) | 基于安全元件的动态口令生成方法和系统 | |
| US20180091487A1 (en) | Electronic device, server and communication system for securely transmitting information | |
| US20160321459A1 (en) | Method for accessing a data memory of a cloud computer system | |
| KR20180117715A (ko) | 개선된 보안성을 갖는 사용자 인증을 위한 방법 및 시스템 | |
| US10423798B2 (en) | Mobile device authenticated print | |
| CN204360381U (zh) | 移动设备 | |
| US20180025332A1 (en) | Transaction facilitation | |
| JP2023532976A (ja) | ユーザの身元の検証のための方法およびシステム | |
| AU2018309432A1 (en) | System and method for authenticating a transaction | |
| KR102171377B1 (ko) | 로그인 제어 방법 | |
| CN107707562A (zh) | 一种非对称动态令牌加、解密算法的方法、装置 | |
| WO2020079629A1 (fr) | Procédé et système mis en œuvre par ordinateur pour sécuriser des données capturées dans une page web ou une application s'exécutant sur un dispositif informatique mobile à distance | |
| US20220171844A1 (en) | Secure password storage system and method | |
| CN106330897A (zh) | 一种信息存储方法及系统 | |
| CN114329510B (zh) | 一种数字授权方法、装置、终端设备及存储介质 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 19790851 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 19790851 Country of ref document: EP Kind code of ref document: A1 |