The present disclosure refers to a method and a system for increasing privacy of user data of a plurality of users within a dataset. Further, a computer program product is disclosed.
Various entities such as companies, hospitals, security enforcement units, or websites collect sensitive data from individuals such as customers, patients, employees, criminals or users. Such data regularly includes private data such as name, age, diseases, address, and personal accounts. However, to be able to perform statistical analyses on the collected data for future prediction and for future developments, researchers need certain fundamental information embedded in the data. For instance, determining whether a certain disease affects females more than males—or elderly more than younger people—may help to better protect the more vulnerable group. Similarly, companies can employ the data collected by various websites in order to make predictions about buying tendencies of potential customers. Furthermore, any distributed machine learning (ML) method such as federated learning (FL) exchanges private (ML model parameter) information, which may be used in membership inference attacks.
The main problem with such data to be shared publicly is that the data generally also leak information about individuals (e.g., a home address is in general sufficient to uniquely define an individual). For instance, in a setting of a dataset comprising the respective body weight of K individuals, when an adversary queries the mean function for K individuals, the average weight of the K individuals is provided. After the first query, an additional query for K−1 individuals will automatically leak the weight of the left-out person. Especially due to data protection regulations such as European Union's General Data Protection Regulation (GDPR), any device that is integrated with, e.g., eye trackers or sensors that collect personal data will be forced to limit information leakage about individuals.
Therefore, differential privacy (DP) mechanisms have been proposed to preserve the fundamental information embedded in the data, while still ensuring that the identities of the contributing individuals remain inaccessible. DP mechanisms mainly distort or randomize the collected data in a controllable manner so that the fundamental information is retained, but the concrete information associated with an individual is hidden. Using DP, independent noise is generally added to the outcome of a function so that the outcome does not significantly change based on whether or not a random individual participated in the dataset.
DP uses a metric for estimating the privacy risk of an individual participating in a database. The main problem with the definition of the DP metric and currently available DP mechanisms is that the data points (i.e., samples of each individual) that constitute inputs of the DP mechanisms are assumed to be mutually independent. This assumption simplifies calculations, however, a potential attacker who knows the correlations or dependencies between different samples (different individuals' data points), called the inter-user correlations, may apply various filtering or inference methods to obtain more information about the identity of the individuals than what the DP metric promises. For instance, a person and his/her partner are likely to share the same home address, two siblings may have common diseases due to genetic factors, or people with similar educational/national/cultural backgrounds will likely have more overlapping interests. An attacker who knows that there are partners or siblings taking part in the same dataset can use such extra information to infer more information about these individuals than DP mechanisms estimate since these mechanisms assume that there is no dependency between the individuals' data or that the dependencies are unknown to the attacker. Furthermore, the dependency can be in any probabilistic form (not necessarily in deterministically representable forms), which makes the DP mechanisms even more vulnerable to filtering attacks.
To this end, a new notion called dependent differential privacy (DDP) with a new metric was proposed (Liu et al., NDDS Symp. 16, 2016) and formalized (Zhao et al., IEEE Globecom Workshops, 2017), which replaces the originally proposed DP metric by a metric that additionally involves the inter-user correlations. It was shown that a mechanism that is known to be ε′-DP is also ε-DDP with ε′+εC=ε, where εC is larger for higher correlations. Furthermore, since the DDP metric recovers the DP metric, being ε-DDP implies being ε-DP. Since a larger ε implies less privacy, it was proven by Zhao et al. that inter-user correlations reduce “actual” privacy if an attacker can apply inference or filtering attacks. Since however the DDP mechanisms have to perfectly match the correlation in the dataset, the complexity of such DDP mechanisms can be very large.
In the DP literature, a transform coding idea has been developed (Rastogi and Nath, ACM SIGMOD Int. Conf. on Management of Data, 2010), where data points that belong to the same user are correlated. For instance, when using a virtual reality (VR) device and watching a video for 10 minutes while the VR device captures a photo of the user's iris every 30 seconds, every photo taken will be highly correlated with (i.e., very similar to) the previous and later photos since video frames (that affect where a user looks at) are also dependent on previous and later frames. It was shown that if an orthogonal transform is applied to each user's data “separately” and if a DP mechanism distorts the samples in the transformed domain, then an attacker who has access to the correlations between different samples cannot learn much information by using filtering methods.
It is an object of the present disclosure to provide an improved method for increasing privacy of user data of a plurality of users which are stored within a dataset while preserving or increasing underlying fundamental information embedded in the dataset.
For solving the problem, a method for increasing privacy of user data of a plurality of users within a dataset according to independent claim 1 is provided. Further, a system for increasing privacy of user data according to independent claim 14 is provided. Moreover, a computer program product according to claim 15 is provided.
Further embodiments are disclosed in dependent claims.
According to one aspect, a method for increasing privacy of user data of a plurality of users within a dataset is provided. The method comprises, in one or more data processing devices, the following steps: providing a dataset comprising a plurality of data points of a plurality of users and comprising inter-user correlations within the plurality of data points; determining a plurality of transform coefficients by applying a transform on the plurality of data points; determining a plurality of private transform coefficients from the plurality of transform coefficients by applying an (ε, δ)-differential privacy mechanism to each non-zero transform coefficient of the plurality of transform coefficients; and determining a private dataset comprising a plurality of private data points from the plurality of private transform coefficients by applying, on the plurality of private transform coefficients, an inverse transform of the transform, wherein the (ε, δ)-differential privacy mechanism is adapted such that the plurality of private data points is (ε, δ)-differential private.
According to another aspect, a system for increasing privacy of user data of a plurality of users within a dataset is provided. The system comprises one or more data processing devices which are configured to provide a dataset comprising a plurality of data points of a plurality of users and comprising inter-user correlations within the plurality of data points; determine a plurality of transform coefficients by applying a transform on the plurality of data points; determine a plurality of private transform coefficients from the plurality of transform coefficients by applying an (ε, δ)-differential privacy mechanism to each non-zero transform coefficient of the plurality of transform coefficients; and determine a private dataset comprising a plurality of private data points from the plurality of private transform coefficients by applying, on the plurality of private transform coefficients, an inverse transform of the transform, wherein the (ε, δ)-differential privacy mechanism is adapted such that the plurality of private data points is (ε, δ)-differential private.
Further, a computer program product, comprising program code configured to perform a method for increasing privacy of user data of a plurality of users within a dataset is provided.
With the proposed method, protection of user data from inference attacks may be increased. In particular, the dataset is decorrelated by applying a transform on the dataset before applying a differential privacy mechanism. On the other hand, the user data may be less distorted in order to ensure privacy such that the quality of underlying fundamental information in the dataset may be increased. The method may be particularly useful for information privacy products, e.g., in the context of Internet of Things or RFID device privacy.
Within the context of the present disclosure, a randomized mechanism is an (ε, δ)-differential privacy mechanism ((ε, δ)-DP) if for all databases D and D′ that differ at most in one element (i.e., the data point of one user), for every S⊆g Range(M), the following inequality holds:
Pr[M(D)∈S]≤eεPr[M(D′)∈S]+δ,
wherein ε, δ≥0 are real-valued numbers. A probability is denoted by Pr. In case of δ=0, the (ε, δ=0)-differential privacy mechanism is also called ε-differential private. In order to provide (ε, δ)-DP for a dataset, a corresponding (ε, δ)-DP mechanism can be applied within the proposed method. Applying the (ε, δ)-DP mechanism may correspond to adding noise distributed according to at least one distribution parameter, which may comprise a query sensitivity of the dataset, a dataset size, and a number of non-zero transform coefficients. Within the method, in principle any parameter set of a DP mechanism, including mechanisms that are not based on adding independent noise, can be adapted to provide (ε, δ)-DP.
The privacy mechanism that is applied in the proposed method in particular allows for decorrelating the samples of multiple users, each of which has one sample. In contrast, in Günlü-Bozkir et al., Differential Privacy for Eye Tracking with Temporal Correlations, arXiv, 2020, employed datasets, to which a discrete Fourier transform was applied, comprised only correlated data samples of a single user. The privacy mechanisms used in Günlü-Bozkir et al. and the proposed method in particular result in different privacy guarantees. Unlike the DFT in Günlü-Bozkir et al. that is applied by each individual/user/party/node independently and locally, within the proposed method, DP mechanisms can be applied by a data curator who has access to data of multiple users after decorrelating the inter-user decorrelations. Local and global applications of a transform are to be distinguished since a local model is not a subset of a global model. Namely, if a user secures his/her data via local transforms and privacy mechanisms, then a server should not observe the raw data, and if a server secures all users' data via one general transform, then a user should not be securing his/her data himself/herself locally. Therefore, as opposed to existing approaches where the data protection is provided by local operations, in that the users handle/own/observe/secure their own data themselves, the proposed method particularly allows for using a global model, where an aggregator or a server handle/own/observe/secure all users' data in a centralized manner.
The transform may be selected from a set of transforms such that, when applying the transform on the plurality of data points, a decorrelation efficiency metric value of the plurality of transform coefficients is maximized.
The decorrelation efficiency metric value may be a function of an autocovariance matrix of the plurality of transform coefficients and an autocovariance matrix of the plurality of data points.
In particular, the decorrelation efficiency metric value may be determined by the following formula:
The autocovariance matrix of the plurality of transform coefficients is denoted by CTT, a further autocovariance matrix of the plurality of data points is denoted by CXX, and an indicator function taking the value 1 if k≠l and 0 otherwise is denoted by {k≠l}.
It may be provided that the decorrelation efficiency metric value is determined from the dataset and the resulting transform coefficients for each transform of the set of transforms.
The set of transforms may comprise a set of orthogonal transforms, for example a discrete cosine transform (DCT), a discrete Fourier Transform (DFT), a discrete Walsh-Hadamard transform (DWHT), and a discrete Haar transform (DHT). The set of transforms may also comprise a Karhunen-Loève transform (KLT).
The set of transforms may also comprise decorrelation matrices that are generated as follows: Providing an initial matrix, which is orthogonal, and determining the decorrelation matrix from the initial matrix by at least once selecting and applying at least one of a plurality of matrix extension mappings on the initial matrix. Each of the plurality of matrix extension mappings generates, from an input orthogonal matrix, a further orthogonal matrix with higher matrix dimension than the input orthogonal matrix.
The plurality of matrix extension mappings may comprise at least one of: A[A,A;A,−A], A[A,A;−A,A], A[A,−A;A,A], A[−A,A;A,A], A−[A,A;A,−A], A−[A,A;−A,A], A−[A,−A;A,A], and A−[−A,A;A,A], wherein the input orthogonal matrix is denoted by A. Each right hand side corresponds a block matrix comprising the input orthogonal matrix A assigned with varying signs as matrix blocks. Thus, each of the decorrelation matrices may be a 2n×2n matrix with n being a positive integer. The initial matrix may be composed of matrix entries being 1 or −1. Alternatively, the initial matrix may also comprise further real-valued matrix entries. The initial matrix may be one of [1,1;1,−1], [1,1;−1,1], [1,−1;1,1], [−1,1;1,1], −[1,1;1,−1], −[1,1;−1,1], −[1,−1;1,1], and −[−1,1;1,1].
The set of transforms may further comprise nonlinear invertible transforms.
Instead of selecting the transform, the transform may also have been fixed at the onset of the method.
The decorrelation efficiency metric value of the plurality of transform coefficients may be determined by determining an autocovariance matrix of the plurality of transform coefficients.
The method may comprise discarding each transform of the set of transforms having a computational complexity value above a complexity threshold.
The discarding may be preferably carried out before selecting the transform.
The method may also comprise discarding each transform of the set of transforms which has a hardware implementation complexity value above the complexity threshold. Further, the method may comprise discarding each transform of the set of transforms whose inverse transform has a hardware implementation complexity value and/or computational complexity value above the complexity threshold.
The complexity value may for example be determined by the total hardware area (including, e.g., the required amount of random access memory (RAM) and read-only memory (ROM) in a Field Programmable Gate Array (FPGA) in order to implement the transform and its inverse.
The method may comprise discarding each transform of the set of transforms yielding a utility metric value of the plurality of transform coefficients below a utility threshold.
The further discarding may be preferably carried out before selecting the transform.
The utility metric value of the plurality of transform coefficients for one transform of the set of transforms is determined by applying the transform on the plurality of data points and computing the utility metric value of the resulting plurality of transform coefficients.
The utility metric value may be determined from a normalized mean square error of the dataset and the private dataset, preferably from an inverse value of the normalized mean square error of the dataset and the private dataset. In particular, the utility metric may be determined by the formula
with
and
The transform may be a data-dependent transform. Notably, the transform may depend on the plurality of data points. In particular, the transform may be the Karhunen-Loève transform/KLT.
Alternatively, the transform may be independent from a concrete realization of the plurality of data points.
The transform may be an orthogonal transform. In particular, the transform may be one of DCT, DFT, DHT, DWHT, and one of the decorrelation matrices as described above.
Alternatively, the transform may be a nonlinear invertible transform.
For at least one of the transform coefficients, a variance value may be determined from a probabilistic model assigned to the at least one of the transform coefficients.
A corresponding probabilistic model may be assigned to each one of the plurality of transform coefficients. Each of the corresponding probabilistic models may be determined by applying the transform to each of a plurality of test datasets and fitting the respective probabilistic model to each of resulting multiple samples of test transform coefficients.
From each probabilistic model corresponding to one of the transform coefficients, a variance value of the one of the transform coefficients can be determined.
The probabilistic model may for example comprise any of Laplace, Cauchy, Gaussian or generalized Gaussian distributions.
The method may further comprise setting at least one of the transform coefficients to zero such that a total sum of variance values of each of the plurality of transform coefficients is larger than a variance threshold.
The variance threshold may be a ratio of a first total sum of variance (power) values of the plurality of transform coefficients before setting any of the plurality of transform coefficients to zero.
The variance threshold may correspond to preserving a value between 90% and 99.9%, in particular 95% of the total sum of variance values (total power).
In the method, the following step may be repeated as long as the total sum of variance values of the plurality of transform coefficients is larger than the variance threshold: determining a low-variance transform coefficient of the plurality of transform coefficients which comprises a lowest nonzero variance value; and/or setting the low-variance transform coefficient to zero.
Alternatively, the plurality of transform coefficients may be ordered according to their assigned variance value and the transform coefficients are successively set to zero until the variance threshold is reached. To this end, a permutation operation may be applied to the transform coefficients.
Determining the plurality of private transform coefficients may comprise adding independent noise to each non-zero transform coefficient of the plurality of transform coefficients.
In particular, independent and identically distributed (i.i.d.) noise may be added.
The noise may be distributed with a distribution parameter dependent on at least one of the number of users, the number of non-zero transform coefficients, a query sensitivity, and an (ε, δ) pair, preferably dependent on the number of users, the number of non-zero transform coefficients, the query sensitivity, and the (ε, δ) pair.
Alternatively, the plurality of private transform coefficients may be determined by randomly changing the transform coefficients in a non-additive manner by applying a non-additive DP mechanism.
In case the plurality of transform coefficients were ordered according to their assigned variance value, the inverse operation of the employed permutation operation may be applied to the plurality of private transform coefficients. In case the transform coefficients were iteratively thresholded, the plurality of private transform coefficients may also be reordered correspondingly.
The noise may be Laplace distributed.
In particular, the noise may be distributed according to a continuous Laplace distribution with distribution parameter=√{square root over (n)}·√{square root over (j)}·Δw(Xn)/ε.
The noise may also be distributed according to a discretized Laplace distribution. Further, the noise may be distributed according to a continuous or a discretized Gaussian distribution. Moreover, the noise may be distributed according to a continuous or a discretized truncated Gaussian distribution.
The (ε,δ)-differential privacy mechanism may be adapted by adapting a noise distribution parameter associated with the (ε,δ)-differential privacy mechanism.
The value of ε may be any real value between 0 and 1, i.e., it may take values from the set (0, 1). Especially, the values 0.01, 0.02, . . . , 0.1, 0.11, . . . , 0.99 may be chosen. The value of δ may be any real value between 0 and 0.1, i.e., it may take values from the set (0, 0.1). Especially, the values 0.001, 0.002, . . . , 0.01, 0.011, . . . , 0.099 may be chosen.
The dataset may comprise one data point per user of the plurality of users and correlations in the dataset may consist of the inter-user correlations within the plurality of users.
The aforementioned embodiments related to the method for increasing privacy of user data of a plurality of users within a dataset can be provided correspondingly for the system for increasing privacy of user data.
In the following, embodiments, by way of example, are described with reference to figures.
In a second step 11, a transform, preferably an orthogonal transform, to be applied to the plurality of data points is selected from a set of transforms.
In a third step 12, a plurality of transform coefficients is determined by applying the transform on the plurality of data points.
In a fourth step 13, the transform coefficients are thresholded by discarding the transform coefficients with lowest variance. Namely, at least one of the transform coefficients is set to zero while ensuring that a total sum of variance values of each of the plurality of transform coefficients is larger than a variance threshold. In order to carry out the thresholding, the transform coefficients may be reordered (permuted) according to their respective variance/power value.
In a fifth step 14, a plurality of private transform coefficients is determined from the plurality of transform coefficients by applying an (ε, δ)-differential privacy mechanism to each non-zero transform coefficient of the plurality of transform coefficients.
In a sixth step 15, the private transform coefficients are permuted back to the index ordering of the raw dataset by applying the inverse of the (power) ordering operation applied in the fourth step 13. Subsequently, a private dataset comprising a plurality of private data points is determined from the plurality of private transform coefficients by applying an inverse transform of the transform on the plurality of private transform coefficients.
Corresponding to the first step 10 of the method, the dataset Xn={X1,X2, . . . ,Xn} which contains the data of n users is provided. The number n is an integer value, which can in principle be arbitrarily large as long as permitted by the provided data processing device. The dataset Xn may comprise any type of correlations (probabilistic dependencies) between the users. These inter-correlations may be known to the dataset owner (e.g., a server or an aggregator) and may also be known to a potential attacker. Such a case has not been treated in detail in differential privacy and information privacy literature since the correlations between the users are assumed to be unknown by an attacker. This assumption is not necessarily justified, especially in case the attacker has access to another dataset of the same data type with similar correlations.
The dataset Xn may specifically contain one data point Xk (also called data sample) per user k. Thus, the correlations between different data points in the dataset Xn consist of the inter-user correlations between the n users.
It is important to reduce existing inter-user correlations, which can be carried out by transforming the n data points {X1,X2, . . . ,Xn} into another domain, namely by applying a transform
F on the dataset Xn and obtaining transform coefficients Yn={Y1,Y2, . . . ,Yn}={F(X1,X2, . . . ,Xn)} as outputs.
Thereto (second step 11), consider a transform F to decorrelate the dataset Xn. There exists an optimal transform in the sense that it may completely decorrelate the dataset Xn, which is the Karhunen-Loève transform/KLT. The KLT depends on the dataset at hand, i.e., the KLT is a data-dependent transform. Hence, in this case a specific transform is applied for each dataset Xn with different statistical properties. Still, the method itself to determine the KLT is the same.
Transforming the dataset Xn via KLT may require substantial computational resources. In case the server or aggregator does not have enough computational power or if there is a delay constraint for the computations, alternative transforms may have to be selected. A close approximation of the KLT is the discrete cosine transform/DCT, which does not depend on the dataset Xn. When employing DCT as transform, the computation time is decreased, allowing for more design flexibility with regard to the method. Further possible transforms comprise discrete Fourier Transform/DFT, discrete Walsh-Hadamard transform/DWHT, discrete Haar transform/DHT, and the decorrelation matrices as described above. In principle, most orthogonal transforms may provide suitable candidates for satisfactory decorrelation efficiency results.
The correlations between the output coefficients {Y1,Y2, . . . ,Yn} are smaller than the correlations between the data points {X1,X2, . . . ,Xn}. How well a transform decorrelates a given dataset Xn is quantified by a decorrelation efficiency metric ηc given by the by the following formula:
wherein the autocovariance matrix of the plurality of transform coefficients is denoted by CTT, a further autocovariance matrix of the plurality of data points is denoted by CXX, and an indicator function taking the value 1 if k≠l and 0 otherwise is denoted by {k≠l}.
Higher decorrelation efficiency and low computational complexity are preferred in choosing the orthogonal transform to be used by the dataset owner.
A specific selection procedure may be carried out to provide an optimal trade-off between computational effort, utility, and decorrelation efficiency.
All available orthogonal transforms in the literature can be considered. In principle, invertible nonlinear transforms can also be considered. With such a nonlinear transform, nonlinear inter-user correlations could also be eliminated. On the other hand, hardware complexity might be further increased.
A complexity threshold with respect to the computational and hardware implementation complexities of the transform (and also its inverse transform) is determined so that the method can be carried out efficiently. Further, a utility threshold is determined.
Subsequently, all considered orthogonal transforms that have a complexity below the complexity threshold are applied to the dataset Xn. Those orthogonal transforms that result in a lower utility metric value than required by the utility threshold are also discarded. The utility metric U may be determined by
wherein a normalized mean square error NMSE is defined as
with
and
Subsequently, the decorrelation efficiency metric ηc is determined for all remaining transforms applied to the dataset Xn. The transform that provides the highest decorrelation efficiency metric value and is below the complexity threshold is selected as the transform F to be employed for the further steps of the method.
Employing the selected transform F, the transform coefficients Yn={Y1, Y2, . . . , Yn}={F(X1,X2, . . . ,Xn)} are determined (third step 12).
In the fourth step 13, a thresholding procedure is carried out on the transform coefficients Yn. This way, less relevant transform coefficients are eliminated, which increases the utility of the resulting private dataset {tilde over (X)}n for the same privacy parameter. For all noise-infusing privacy mechanisms, if privacy level increases, then the utility of the data decreases (“No Free Lunch Theorem”). In any case, the method can be applied to all differential privacy mechanisms, including the ones that do not infuse noise.
The relevance of one of the transform coefficients Yk is connected to its power. The power which may be derived from a probabilistic model fitted to a transform coefficient is equal to the variance of the fitted probabilistic model. If the probabilistic model is unknown, it can in principle be determined by considering multiple (test) datasets Xn. By applying the same transform F to each of the multiple datasets Xn, multiple samples for each transform coefficient Yk are provided. These multiple samples may be employed to fit the probabilistic model to each transform coefficient Yk separately.
After determining the power/variance for each transform coefficient Yk, the transform coefficients Yn are reordered according to their power values by applying a reordering operation R(·), for example, in ascending order (or descending order), yielding a plurality of reordered transform coefficients (
In case, e.g., 95% of the total power is still preserved, the second transform coefficient is removed/set to zero. If not, the previously removed transform coefficient is restored (set to its original value) and the thresholding procedure is stopped. This step is sequentially repeated until j transform coefficients
Alternatively, no thresholding takes place.
With regard to the fifth step 14, a suitable DP mechanism that adds independent noise to the remaining j transform coefficients
For example, in case of employing a DP mechanism which adds independent Laplace distributed noise to the transform parameters, the Laplace distribution parameter λ should be set to
λ=√{square root over (n)}·√{square root over (j)}·Δw(Xn)/ε
if ε-differential privacy is to be satisfied.
The minimum power/variance of the added noise required to satisfy (ε, δ)-DP depends on the query sensitivity, which is a metric that quantifies the difference between the maximum and minimum data values. The query sensitivity Δw(Xn) of Xn is the smallest number for all databases D and D′ that differ at most in one element such that
||Xn(D)−Xn(D′)||w≤Δw(Xn),
where the Lw-distance is defined as
In particular, w can be 1 or 2, respectively corresponding to L1 or L2 query sensitivity. Since different transforms F will result in different sensitivities Δw, the utilities U for each transform F will in general be different for each application and dataset. Therefore, considering the resulting utility U of a transform F as laid out above can increase the usability of the method.
By respectively adding noise values Nn−j+1, . . . ,Nn to the transform coefficients
With regard to the sixth step 15, the inverse operation R−1 of the reordering operation R may be applied to the private transform coefficients 0, . . . , 0,{tilde over (Y)}n−j+1, . . . ,{tilde over (Y)}n, yielding the (unpermuted) private transform coefficients {tilde over (Y)}′1, . . . ,{tilde over (Y)}′n. Subsequently, the inverse transform F−1 of the employed transform F is applied, yielding a private dataset {tilde over (X)}n={{tilde over (X)}1, . . . ,{tilde over (X)}n}. The private dataset {tilde over (X)}n is provided with guarantees against attackers who are informed about inter-user correlations, in particular, the private dataset {tilde over (X)}n is (ε, δ)-differential private (if δ=0, it is also ε-differential private). This is, e.g., the case when employing the DP mechanism with Laplace distribution adjusted as indicated above.
Applying the inverse transform F−1 ensures that the private data is in the same raw data domain as the dataset Xn so that anyone (e.g., a researcher) who merely wants to obtain the fundamental information in the dataset Xn does not have to apply an inverse transform and, thus, does not have to change his/her algorithm.
The features disclosed in this specification, the figures and/or the claims may be material for the realization of various embodiments, taken in isolation or in various combinations thereof.
Number | Date | Country | Kind |
---|---|---|---|
21160035.8 | Mar 2021 | EP | regional |
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/EP2022/054540 | 2/23/2022 | WO |