CN117240439A - Data processing method based on quantum network cloud host - Google Patents
Data processing method based on quantum network cloud host Download PDFInfo
- Publication number
- CN117240439A CN117240439A CN202211184425.3A CN202211184425A CN117240439A CN 117240439 A CN117240439 A CN 117240439A CN 202211184425 A CN202211184425 A CN 202211184425A CN 117240439 A CN117240439 A CN 117240439A
- Authority
- CN
- China
- Prior art keywords
- data
- sub
- array
- key
- disordered
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 17
- 230000000295 complement effect Effects 0.000 claims description 30
- 238000003491 array Methods 0.000 claims description 12
- 238000012545 processing Methods 0.000 claims description 6
- 238000004364 calculation method Methods 0.000 claims description 3
- 238000000034 method Methods 0.000 description 8
- 238000004891 communication Methods 0.000 description 4
- 238000013500 data storage Methods 0.000 description 2
- 230000007547 defect Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012163 sequencing technique Methods 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The invention discloses a data processing method based on a quantum network cloud host, wherein a client transmitting end encrypts an disordered sub-key array onto the disordered sub-data array by adopting an AES encryption algorithm to obtain encrypted data SavaData and transmits the encrypted data SavaData to the cloud host after obtaining an disordered sub-data array and a disordered sub-key array by adopting a shuffle shuffling algorithm; the client receiving end obtains encrypted data SavaData from the cloud host and carries out AES decryption according to the disordered sub-key array to obtain the disordered sub-data array; and the disordered child data array is restored and sequenced by adopting a shuffle restoration algorithm to obtain N pieces of child data. According to the invention, after the data to be encrypted and the random key distributed by the quantum equipment are arranged in an out-of-order manner through the shuffle shuffling algorithm, the data is encrypted by adopting the AES encryption algorithm and transmitted to the cloud host, so that the difficulty in data leakage is increased, and the data security of the cloud host is improved.
Description
Technical Field
The invention relates to the technical field of quantum cryptography clouds and data protection, in particular to a data processing method based on a quantum network cloud host.
Background
Quantum cryptography cloud and data protection technology are important application directions for the development of the data economy industry. The cloud host has the characteristics of high expandability, high reliability, low cost and the like in the aspect of data storage. At present, a data security protection mode of a cloud host is generally to adopt a mode of installing corresponding protection software in an operating system of a virtual machine for protection, and the protection mode is seriously dependent on whether the protection software is stable or not, when the protection software is vulnerable or is maliciously closed, the protection function is lost, and at the moment, the risk of leakage of data stored in the cloud host is easy to occur.
I.e. security and privacy guarantee of data information will depend on the trusted cloud facilitator. In this case there may be the following potential risks: the cloud service provider has the risks that internal staff can illegally view personal data of users or operation data of unauthorized users are revealed and the like; it is serious that when a cloud host is hacked, data will be revealed.
Therefore, to improve the defects of the prior art, a data processing method based on a quantum network cloud host is provided.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provide a data processing method based on a quantum network cloud host to solve the problem of data security.
The method is realized by the following technical scheme:
a data processing method based on a quantum network cloud host includes the following steps:
step 1: the client transmitting terminal reads the Data and equally divides the Data into N parts according to the size of the Data capacity to obtain N parts of sub Data;
step 2: the quantum Key distribution device QKD generates a random Key Key and equally divides the number of the random Key Key into N parts to obtain N parts of sub keys;
step 3: the client transmitting end respectively generates and obtains an disordered sub-data array and an disordered sub-key array by processing the N sub-data and the N sub-keys obtained in the step 1 and the step 2 through a shuffle shuffling algorithm;
step 4: encrypting the disordered sub-key arrays on the disordered sub-data arrays in a one-to-one correspondence manner by the client transmitting end through an AES encryption algorithm to obtain encrypted data SavaData, and transmitting the encrypted data SavaData to a cloud host;
step 5: the client receiving end acquires encrypted data SavaData from the cloud host and equally divides the encrypted data SavaData into N parts of sub-encrypted data;
step 6: the client receiving end carries out AES decryption on the N parts of sub-encrypted data according to the disordered sub-key array to obtain the disordered sub-data array;
step 7: the client receiving end restores and sorts the disordered child data arrays according to a shuffle restoration algorithm to obtain N pieces of child data;
step 8: the client receiving end judges whether the Data remainder of the N pieces of sub Data is 0, and if the Data remainder is 0, the Data is obtained; and if the Data remainder is not 0, deleting the complementary bit to obtain the Data.
The calculation formula for judging the remainder of the data is as follows:
DataRemainder=data%N;
wherein, dataremainders are data remainder, data are data capacity size, and N is average number of copies.
Further, the number of parts N is within the range of 20-200, and the acquisition rule of N is as follows:
n=size of Data capacity or random Key capacity size/10 MB.
Further, the step of equally dividing the Data in the step 1 into N parts is as follows:
the client transmitting end judges whether the Data remainder of the Data is 0 through modulo arithmetic, and divides the Data into N parts if the Data remainder is 0; when the remainder of the Data is not 0, the number of complementary bits is added to the Data to ensure that the Data can be divided by N, and the Data is divided into N sub-Data.
Further, the step of equally dividing the random Key in the step 2 into N shares is as follows:
the client transmitting end judges whether the Key remainder of the random Key Key is 0 through modulo arithmetic, and divides the random Key Key into N parts when the Key remainder is 0; when the remainder of the Key is not 0, the number of complementary bits is added to the random Key to ensure that the number of the random Key can be divided by N, and the random Key is divided into N sub-keys.
Further, the number of the added complementary bits of the Data and the random Key Key is as follows:
step A: and calculating the number of the complementary bits, wherein the formula is as follows:
ZoreSize=N-amount%N;
wherein ZoreSize is the number of complementary bits, N is the number of parts, and amounts is the number;
and (B) step (B): and adding the Data and the tail of the random Key Key according to the calculated Data complement number ZoreSize.
Further, the step of the shuffle shuffling algorithm in the step 3 is as follows:
step 3-1: defining a random array, an disordered sub-data array and an disordered sub-key array with the length of N;
step 3-2: generating a random array arranged in an out-of-order manner from 0 to N-1 by using a random function rand ();
step 3-3: setting the elements of the random array in the step 3-2 as the array elements of the random array in the step 3-1 in a one-to-one correspondence in sequence;
step 3-4: the disordered sub-data array takes array elements of the disordered array as subscripts and sequentially stores N parts of sub-data;
step 3-5: and (3) sequentially repeating the step (3-2) and the step (3-3), wherein the disordered sub-key array sequentially stores N sub-keys by taking array elements of the disordered array as subscripts.
Further, the step of the shuffle restoration algorithm in the step 7 is as follows:
step 7-1: defining a reduction array;
step 7-2: the client acquires the subscript of the disordered child data array and sequentially stores the disordered child data array into a restored array according to the subscript;
step 7-3: and outputting N parts of sub data of the restored array.
Further, the step of deleting the complementary bit in the step 8 is:
step 8-1: calculating the number of data complements, wherein the formula is as follows:
DZoreSize=N-amount%N;
wherein DZore size is the number of complementary bits, N is the number of parts, and amounts is the size of data capacity;
step 8-2: and deleting the tail number of the Data according to the calculated Data complement number DZoreSize.
The beneficial effects of the invention are as follows:
according to the data processing system and method based on the quantum network cloud host, after data to be encrypted and random keys distributed by quantum equipment are arranged in an out-of-order mode through a shuffle shuffling algorithm, an AES encryption algorithm is adopted to encrypt the out-of-order sub-key array onto the out-of-order sub-data array to obtain encrypted data and transmit the encrypted data to the cloud host, when the data is required to be acquired from the cloud host, the corresponding out-of-order sub-key is required to be obtained for decryption and the out-of-order sub-data is required to be restored, the difficulty of data leakage is increased to a certain extent, and the data security of the cloud host is improved.
Drawings
FIG. 1 is a schematic diagram of a system of the present invention;
FIG. 2 is an encryption flow chart of the present invention;
fig. 3 is a decryption flow chart of the present invention.
Detailed Description
The present invention will be further described in detail with reference to the following examples, for the purpose of making the objects, technical solutions and advantages of the present invention more apparent, but the scope of the present invention is not limited to the following specific examples.
The invention mainly comprises two parts, namely an encryption module for encrypting data by a client and storing the encrypted data into a cloud host, and a decryption module for decrypting the encrypted data read by the client from the cloud host; the process of encrypting and decrypting the data is operated in the client, and the cloud host is mainly used for storing the encrypted data.
The data processing method based on the quantum network cloud host in the embodiment is applied to a data processing system based on the quantum network cloud host, and before introducing the method, the system is introduced first, as shown in fig. 1, the data processing system based on the quantum network cloud host comprises a client transmitting end, quantum key distribution equipment QKD, a cloud host and a client receiving end, wherein:
a first equipartition module, an disordered module, an encryption module and a first communication module are arranged in the client transmitting end;
the client receiving end is internally provided with a second equipartition module, a decryption module, a restoration module and a second communication module;
the first equally dividing module is used for equally dividing the Data and the random Key Key into N parts according to the capacity size to respectively obtain N parts of sub-Data and N parts of sub-keys;
the disorder module is used for generating a disorder sub-data array and a disorder sub-key array by scrambling N parts of sub-data and N parts of sub-keys through a shuffle shuffling algorithm;
the encryption module is used for encrypting the disordered sub-key arrays to the disordered sub-data arrays in a one-to-one correspondence mode through an AES encryption algorithm to obtain encrypted data SavaData;
the first communication module is used for sending the encrypted data SavaData to the cloud host;
the second average division module is used for equally dividing the encrypted data SavaData into N parts of sub-encrypted data;
the decryption module is used for carrying out an AES decryption algorithm on the N parts of sub-encrypted data according to the disordered sub-key array to obtain the disordered sub-data array;
the restoring module is used for restoring and sequencing the disordered child data array according to a shuffle restoring algorithm to obtain N pieces of child data;
the second communication module is used for communicating with the cloud host to receive encrypted data SavaData;
the quantum Key distribution device QKD is used for generating a random Key Key and sending the random Key Key to the cloud host;
the cloud host is used for storing encrypted data SavaData.
Based on the above system, the specific method scheme of this embodiment is as follows:
as shown in fig. 2-3, the data processing method based on the quantum network cloud host is applied to the data processing system based on the quantum network cloud host, and the method comprises the following steps:
step 1: the client transmitting terminal reads the Data and equally divides the Data into N parts according to the size of the Data capacity to obtain N parts of sub Data;
wherein, the value range of N is 20-200, and the acquisition rule of N is as follows:
n=size of Data capacity or random Key capacity size/10 MB.
The data and the N parts are divided, so that the subsequent disordered ordering and encryption can be more conveniently carried out, the difficulty of data encryption or decryption is improved, and the storage safety of the data is ensured.
Specifically, the step of equally dividing the Data in the step 1 into N parts is as follows:
the client transmitting end judges whether the Data remainder of the Data is 0 through modulo arithmetic, and divides the Data into N parts if the Data remainder is 0; when the remainder of the Data is not 0, adding the number of complementary bits to the Data to ensure that the Data can be divided by N, and dividing the Data into N sub-Data;
the modulo operation is to obtain the remainder of dividing two numbers.
Step 2: the quantum Key distribution device QKD generates a random Key Key and equally divides the number of the random Key Key into N parts to obtain N parts of sub keys;
specifically, the step of equally dividing the random Key in the step 2 into N shares is as follows:
the client transmitting end judges whether the Key remainder of the random Key Key is 0 through modulo arithmetic, and divides the random Key Key into N parts when the Key remainder is 0; when the remainder of the Key is not 0, the number of complementary bits is added to the random Key to ensure that the number of the random Key can be divided by N, and the random Key is divided into N sub-keys.
Further, the number of the added complementary bits of the Data and the random Key Key is as follows:
step A: and calculating the number of the complementary bits, wherein the formula is as follows:
ZoreSize=N-amount%N;
wherein ZoreSize is the number of complementary bits, N is the number of parts, and amounts is the number;
and (B) step (B): and adding the Data and the tail of the random Key Key according to the calculated Data complement number ZoreSize.
Step 3: the client transmitting end processes the N parts of sub data and the N parts of sub keys obtained in the step 1 and the step 2 through a shuffle shuffling algorithm to respectively generate an disordered sub data array and an disordered sub key array;
the shuffle shuffling algorithm is to scatter the original array to make the probability of the occurrence of a certain number of the original array at each position in the scattered array equal, and the algorithm is used for disturbing the ordering of N pieces of sub-data and N pieces of sub-keys to obtain two out-of-order arrays ranging from 0 to N-1, wherein one is the out-of-order sub-data array and the other is the out-of-order sub-key array.
Specifically, the step of the shuffle shuffling algorithm in the step 3 is as follows:
step 3-1: defining a random array, an disordered sub-data array and an disordered sub-key array with the length of N;
step 3-2: generating a random array arranged in an out-of-order manner from 0 to N-1 by using a random function rand ();
step 3-3: setting the elements of the random array in the step 3-2 as the array elements of the random array in the step 3-1 in a one-to-one correspondence in sequence;
step 3-4: the disordered sub-data array takes array elements of the disordered array as subscripts and sequentially stores N parts of sub-data;
step 3-5: sequentially repeating the step 3-2 and the step 3-3, wherein the disordered sub-key array sequentially stores N sub-keys by taking array elements of the disordered array as subscripts;
step 4: encrypting the disordered sub-key arrays on the disordered sub-data arrays in a one-to-one correspondence manner by the client transmitting end through an AES encryption algorithm to obtain encrypted data SavaData, and transmitting the encrypted data SavaData to a cloud host;
specifically, firstly defining a circulation variable i and a plurality of groups of SavaData, and judging whether the circulation variable i is smaller than the number of times N; when i is smaller than the number of times N, the client transmitting end encrypts the disordered sub-key array into the disordered sub-data array through an AES encryption algorithm and then stores the disordered sub-key array into the array SavaData, and when i is greater than or equal to the number of times N, the sub-data array is indicated to be encrypted and stored into the array SavaData, the cycle is ended, and the client transmitting end transmits the data stored by the array SavaData to a cloud host.
Step 5: the client receiving end acquires encrypted data SavaData from the cloud host and equally divides the encrypted data SavaData into N parts of sub-encrypted data;
step 6: the client receiving end carries out AES decryption on the N parts of sub-encrypted data according to the disordered sub-key array to obtain the disordered sub-data array;
step 7: the client receiving end restores and sorts the disordered child data arrays according to a shuffle restoration algorithm to obtain N pieces of child data;
the step of the shuffle restoration algorithm in the step 7 is as follows:
step 7-1: defining a reduction array;
step 7-2: the client acquires the subscript of the disordered child data array and sequentially stores the disordered child data array into a restored array according to the subscript;
step 7-3: and outputting N parts of sub data of the restored array.
Step 8: the client receiving end judges whether the Data remainder of the N pieces of sub Data is 0, and if the Data remainder is 0, the Data is obtained; and if the Data remainder is not 0, deleting the complementary bit to obtain the Data.
The calculation formula for judging the remainder of the data is as follows:
DataRemainder=data%N;
wherein, dataremainders are data remainder, data are data capacity size, and N is average number of copies.
Specifically, the step of deleting the complementary bit in the step 8 is:
step 8-1: calculating the number of data complements, wherein the formula is as follows:
DZoreSize=N-amount%N;
wherein DZore size is the number of complementary bits, N is the number of parts, and amounts is the size of data;
step 8-2: and deleting the tail number of the Data according to the calculated Data complement number DZoreSize.
The method disclosed by the invention utilizes the quantum key distribution equipment to acquire the key to encrypt the data, so that the security of the key is improved; when the data of the cloud host is leaked, if other users do not have the secret keys generated during data storage and the disordered array information, the original data cannot be obtained, and the security of the data of the cloud host is greatly improved.
Variations and modifications to the above would be obvious to persons skilled in the art to which the invention pertains from the foregoing description and teachings. Therefore, the invention is not limited to the specific embodiments disclosed and described above, but some modifications and changes of the invention should be also included in the scope of the claims of the invention. In addition, although specific terms are used in the present specification, these terms are for convenience of description only and do not constitute any limitation on the invention.
Claims (8)
1. The data processing method based on the quantum network cloud host is characterized by comprising the following steps of:
step 1: the client transmitting end reads the Data and equally divides the Data into N parts according to the size of the Data capacity to obtain N parts of sub Data;
step 2: the quantum Key distribution device QKD generates a random Key Key and equally divides the number of the random Key Key into N parts to obtain N parts of sub keys;
step 3: the client transmitting end respectively generates and obtains an disordered sub-data array and an disordered sub-key array by processing the N sub-data and the N sub-keys obtained in the step 1 and the step 2 through a shuffle shuffling algorithm;
step 4: encrypting the disordered sub-key arrays on the disordered sub-data arrays in a one-to-one correspondence manner by the client transmitting end through an AES encryption algorithm to obtain encrypted data SavaData, and transmitting the encrypted data SavaData to a cloud host;
step 5: the client receiving end acquires encrypted data SavaData from the cloud host and equally divides the encrypted data SavaData into N parts of sub-encrypted data;
step 6: the client receiving end carries out AES decryption on the N parts of sub-encrypted data according to the disordered sub-key array to obtain the disordered sub-data array;
step 7: the client receiving end restores and sorts the disordered child data arrays according to a shuffle restoration algorithm to obtain N pieces of child data;
step 8: the client receiving end judges whether the Data remainder of the N pieces of sub Data is 0, and if the Data remainder is 0, the Data is obtained; if the remainder of the Data is not 0, deleting the complementary bit to obtain the Data;
the calculation formula for judging the remainder of the data is as follows:
DataRemainder=data%N;
wherein, dataremainders are data remainder, data are data capacity size, and N is average number of copies.
2. The data processing method based on the quantum network cloud host according to claim 1, wherein the number of N is in a range of 20-200, and the N acquisition rule is as follows:
n=size of Data capacity or random Key capacity size/10 MB.
3. The Data processing method based on the quantum network cloud host according to claim 1, wherein the step of equally dividing the Data in the step 1 into N shares is as follows:
the client transmitting end judges whether the Data remainder of the Data is 0 through modulo arithmetic, and divides the Data into N parts if the Data remainder is 0; when the remainder of the Data is not 0, the number of complementary bits is added to the Data to ensure that the Data can be divided by N, and the Data is divided into N sub-Data.
4. The data processing method based on the quantum network cloud host according to claim 1, wherein the step of equally dividing the random Key in the step 2 into N shares is as follows:
the client transmitting end judges whether the Key remainder of the random Key Key is 0 through modulo arithmetic, and divides the random Key Key into N parts when the Key remainder is 0; when the remainder of the Key is not 0, the number of complementary bits is added to the random Key to ensure that the number of the random Key can be divided by N, and the random Key is divided into N sub-keys.
5. The Data processing method based on the quantum network cloud host according to claim 3 or claim 4, wherein the number of added complementary bits of the Data and the random Key is as follows:
step A: and calculating the number of the complementary bits, wherein the formula is as follows:
ZoreSize=N-amount%N;
wherein ZoreSize is the number of complementary bits, N is the number of parts, and amounts is the number;
and (B) step (B): and adding the Data and the tail of the random Key Key according to the calculated Data complement number ZoreSize.
6. The data processing method based on the quantum network cloud host according to claim 1, wherein the step of the shuffle shuffling algorithm in the step 3 is as follows:
step 3-1: defining a random array, an disordered sub-data array and an disordered sub-key array with the length of N;
step 3-2: generating a random array arranged in an out-of-order manner from 0 to N-1 by using a random function rand ();
step 3-3: setting the elements of the random array in the step 3-2 as the array elements of the random array in the step 3-1 in a one-to-one correspondence in sequence;
step 3-4: the disordered sub-data array takes array elements of the disordered array as subscripts and sequentially stores N parts of sub-data;
step 3-5: and (3) sequentially repeating the step (3-2) and the step (3-3), wherein the disordered sub-key array sequentially stores N sub-keys by taking array elements of the disordered array as subscripts.
7. The data processing method based on the quantum network cloud host according to claim 1, wherein the step of the shuffle restoration algorithm in the step 7 is as follows:
step 7-1: defining a reduction array;
step 7-2: the client acquires the subscript of the disordered child data array and sequentially stores the disordered child data array into a restored array according to the subscript;
step 7-3: and outputting N parts of sub data of the restored array.
8. The data processing method based on the quantum network cloud host according to claim 1, wherein the step of deleting the complementary bit in the step 8 is:
step 8-1: calculating the number of data complements, wherein the formula is as follows:
DZoreSize=N-amount%N;
wherein DZore size is the number of complementary bits, N is the number of parts, and amounts is the size of data capacity;
step 8-2: and deleting the tail number of the Data according to the calculated Data complement number DZoreSize.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211184425.3A CN117240439A (en) | 2022-09-27 | 2022-09-27 | Data processing method based on quantum network cloud host |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211184425.3A CN117240439A (en) | 2022-09-27 | 2022-09-27 | Data processing method based on quantum network cloud host |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117240439A true CN117240439A (en) | 2023-12-15 |
Family
ID=89091762
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211184425.3A Pending CN117240439A (en) | 2022-09-27 | 2022-09-27 | Data processing method based on quantum network cloud host |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117240439A (en) |
-
2022
- 2022-09-27 CN CN202211184425.3A patent/CN117240439A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111448779B (en) | System, apparatus and method for hybrid secret sharing | |
US8681975B2 (en) | Encryption method and apparatus using composition of ciphers | |
WO2018104412A1 (en) | Method of rsa signature or decryption protected using a homomorphic encryption | |
CN101262341A (en) | A Hybrid Encryption Method in Conference System | |
CN113098675B (en) | Binary data encryption system and method based on polynomial complete homomorphism | |
US20220417000A1 (en) | Random position cipher encryption using scrambled ascii strings | |
US7894608B2 (en) | Secure approach to send data from one system to another | |
CN112084525B (en) | Distributed key encryption method and device, electronic equipment and storage medium | |
US12124594B2 (en) | Enhanced security systems and methods using a hybrid security solution | |
WO2021114850A1 (en) | Method and apparatus for encrypting and decrypting and reading and writing messages, computer device, and storage medium | |
CN116866029B (en) | Random number encryption data transmission method, device, computer equipment and storage medium | |
CN113408013A (en) | Encryption and decryption chip framework with multiple algorithm rules mixed | |
CN111131158A (en) | Single byte symmetric encryption and decryption method, device and readable medium | |
Shirole et al. | Review paper on data security in cloud computing environment | |
CN117221878B (en) | Information security control method and device based on wireless network equipment | |
JP5489115B2 (en) | Originality assurance device, originality assurance program, and recording medium for recording the program | |
CN117240439A (en) | Data processing method based on quantum network cloud host | |
WO2018011825A1 (en) | Encryption and decryption of messages | |
CN117240440A (en) | Data processing system based on quantum network cloud host | |
CN114430549A (en) | White box encryption and decryption method and device suitable for wireless communication | |
CN113923029B (en) | Internet of things information encryption method based on ECC (error correction code) hybrid algorithm | |
CN118158021B (en) | A data transmission processing method and system based on Glink bus protocol | |
CN115549987B (en) | Mixed encryption method based on data security privacy protection | |
CN119071089B (en) | Secret sharing-based careless transmission method, system, equipment and medium | |
Dodmane | A new hybrid symmetric-key technique to enhance data security of textual information using random number generator |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |