CN111930831A - Block chain light node implementation method based on to-be-uplink data alarm - Google Patents
Block chain light node implementation method based on to-be-uplink data alarm Download PDFInfo
- Publication number
- CN111930831A CN111930831A CN202010597197.7A CN202010597197A CN111930831A CN 111930831 A CN111930831 A CN 111930831A CN 202010597197 A CN202010597197 A CN 202010597197A CN 111930831 A CN111930831 A CN 111930831A
- Authority
- CN
- China
- Prior art keywords
- data
- alarm
- uplink
- light node
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 43
- 230000008569 process Effects 0.000 claims description 9
- 238000012795 verification Methods 0.000 claims description 5
- 238000012423 maintenance Methods 0.000 abstract description 5
- 241000733943 Hapalogaster mertensii Species 0.000 description 7
- 230000007613 environmental effect Effects 0.000 description 6
- 238000010586 diagram Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000009471 action Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Development Economics (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The application discloses a block chain light node implementation method based on to-be-linked data alarm, which is used for solving the problem that the block chain light node in the prior art can not participate in maintenance of the network environment safety of a block chain. The method comprises the following steps: the block chain network comprises a light node and a full node, wherein the light node receives a to-be-uplink data alarm sent by other nodes in the block chain network; after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm; the light node verifies the data original.
Description
Technical Field
The application relates to the technical field of block chains, in particular to a block chain light node implementation method based on to-be-linked data alarm.
Background
With the development of the blockchain technology, people pay more attention to further guarantee the environmental security of the blockchain network under the limited storage space.
In some block chain networks, nodes are divided into a full node and a light node according to the difference of data stored in the nodes, the full node stores the full data and occupies a large storage space, and the light node only stores block head data of a block but does not store other specific data in the block and occupies a small storage space.
In these blockchain networks, only a full number of nodes participate in the maintenance of the environmental security of the blockchain network, and light nodes do not participate in the maintenance of the environmental security of the blockchain network.
However, the number of the light nodes is often much greater than that of the full-quantity nodes, in this case, only a part of the full-quantity nodes can be controlled by a malicious user, and the environmental security of the blockchain network can be threatened, and the proportion of the part of the full-quantity nodes to the total number of the nodes is very small, so that the malicious cost is reduced, and the environmental security of the blockchain network is not facilitated.
Disclosure of Invention
The embodiment of the application provides a block chain light node implementation method based on a to-be-linked data alarm, which is used for solving the problem that the block chain light node in the prior art cannot participate in maintaining the network environment safety of a block chain.
The embodiment of the application provides a block chain light node implementation method based on a to-be-uplink data alarm, which is characterized by comprising the following steps:
the light node receives data alarm to be uplink sent by other nodes in the block chain network;
after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm;
the light node verifies the data original.
The light node can receive the data alarm to be uplink-linked and can acquire the data original text corresponding to the data alarm to be uplink-linked, so that the light node can verify the data original text and participate in the safety maintenance of the block chain network environment.
Optionally, after the light node receives the alarm of the data to be uplink sent by the other node in the blockchain network, the method further includes:
the light node judges whether the number of different nodes sending the alarm of the data to be uplink exceeds a preset value;
and if so, forwarding the alarm of the data to be uplink to other nodes.
Optionally, the receiving, by the light node, the to-be-uplink data alarm sent by another node in the block chain network specifically includes:
and the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full-scale node after the corresponding data original text is verified to be failed.
Optionally, the receiving, by the light node, the to-be-uplink data alarm sent by another node in the block chain network specifically includes:
and the light node receives the data alarm to be uplink forwarded by other light nodes.
The light nodes can receive the data alarm to be uplink forwarded by other light nodes, so the pressure of sending the data alarm to be uplink to the light nodes by the total number of nodes is reduced, and the network burden is reduced.
Optionally, the obtaining of the data original text corresponding to the to-be-uplink data alarm specifically includes:
the light node acquires a data text corresponding to the data alarm to be uplink from the full node; alternatively, the first and second electrodes may be,
the light node obtains the data original text from other light nodes.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text is verified not to pass, the light node stores the data original text.
Optionally, after the light node stores the data original text and forwards the data original text to other nodes, the method further includes:
and the light node releases the storage space for storing the data original text.
The light node releases the storage space for storing the data original text, and the storage space of the light node is saved.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text passes the verification, judging other nodes sending the data original text as malicious nodes by the light node.
Optionally, after the light node determines, as a malicious node, another node that sends the original data text, the method further includes:
if the alarm of the data to be uplink sent again by the malicious node is received, refusing to respond to the alarm of the data to be uplink; alternatively, the first and second electrodes may be,
and refusing to receive the alarm of the data to be uplink sent again by the malicious node.
Optionally, after the light node verifies the data original text, the method further includes:
and if the data original text is verified not to pass, the light node participates in a consensus process corresponding to the data original text.
According to the embodiment of the application, through at least one technical scheme, the light node can participate in the maintenance of the block chain network environment safety, and can acquire the data original text corresponding to the to-be-uplink data alarm based on the to-be-uplink data alarm and verify the data original text. The problems in the prior art are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a process diagram of a block chain light node implementation method based on a to-be-uplink data alarm according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the specific embodiments and accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the examples given in the present application without any inventive step, are within the scope of the present application.
Aiming at the problems in the background art, the application provides a block chain light node implementation method based on a to-be-uplink data alarm.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
Fig. 1 is a process diagram of a block chain light node implementation method based on a to-be-uplink data alarm according to an embodiment of the present application, and the method may include the following steps:
s101: and the light node receives the alarm of the data to be uplink sent by other nodes in the block chain network.
In the embodiment of the application, the blockchain network comprises light nodes and full nodes, and the number of the light nodes is more than that of the full nodes. There are two ways for the light node to receive the pending uplink data alarm:
first, the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full number of nodes after the corresponding data original text is verified. In a block chain network, a full node verifies a data original text corresponding to data to be uplink, and if the full node finds that the data original text is false data by tracing the data original text at the moment, the full node sends an alarm of the data to be uplink to surrounding light nodes. For example, in bitcoin transactions, a malicious node swarms transaction data and wants to chain up the transaction data, such as 20 bitcoins in the account balance of a malicious node, after one transaction is paid by using 2 bit coins, 18 bit coins remain in the account balance, but the malicious node changes the remaining 18 bit coins in the account balance after the transaction into 20 bit coins before the transaction, and wants to write the changed data into the blockchain network to perform two transactions, meanwhile, after verifying the transaction information, a large number of other malicious nodes agree to the request for writing the changed data into the blockchain, however, when there are other nodes in the total amount that fail to verify the transaction data, the transaction data is considered to be erroneous and is not supposed to be written into the blockchain network, and at this time, and the other full nodes which verify that the transaction data is wrong send the uplink data waiting alarm of the transaction data to the light node. And the light node receives the alarm of the data to be uplink sent by the full node.
After step S101, the light node determines whether the number of different nodes sending the to-be-uplink data alarm to itself exceeds a preset value, and if so, forwards the to-be-uplink data alarm to other nodes.
In this embodiment, if the light node receives the to-be-uplink data alarm, and the number of the to-be-uplink data alarms is sent by a certain number of different nodes and exceeds a preset value of the blockchain network, the preset value may be a specific number, for example, 5 different nodes, 10 different nodes, and is not limited herein. The different nodes at this time may be different full nodes, or different light nodes, or different full nodes and light nodes. When the light node receives the data alarm to be uplink sent by different nodes with the number exceeding the preset value, the light node also participates in the process of sending the data alarm to be uplink, and continuously forwards the data alarm to be uplink. For example, in a blockchain network, the preset value for forwarding the to-be-uplink data alarm by the light node is 5 different nodes, and if the light node receives the to-be-uplink data alarm sent by 2 different full-volume nodes, in addition to that, no to-be-uplink data alarm is received, the light node does not participate in forwarding the to-be-uplink data alarm. If the light node receives the data alarm to be uplink sent by 5 or more different total nodes, the light node forwards the data alarm to be uplink. If the light node receives the to-be-uplink data alarm sent by 5 or more different other light nodes, or the to-be-uplink data alarm sent by 2 different total nodes and 3 different other light nodes, the light node forwards the to-be-uplink data alarm.
Secondly, the light node receives the alarm of the data to be uplink forwarded by other light nodes. In a blockchain network, in order to reduce the network pressure of sending a to-be-uplink data alarm to other nodes by a total number of nodes, a light node can forward the to-be-uplink data alarm and also can receive the to-be-uplink data alarm forwarded by other light nodes. For example, in a block chain network, after a light node determines that a to-be-uplink data alarm sent by other nodes exceeding a preset value is received, the to-be-uplink data alarm is forwarded to the other nodes, and the other light nodes receive the to-be-uplink data alarm sent by the light node, and at this time, the other light nodes may have already received the to-be-uplink data alarm sent by the other nodes, and whether the to-be-uplink data alarm is forwarded or not can be determined according to the preset value set in the block chain network, so that the propagation speed of the to-be-uplink data alarm is increased, and the network pressure of the full-scale nodes sending the to-be-uplink data alarm to the other nodes.
S102: and after receiving the to-be-uplink data alarm, the light node acquires a data text corresponding to the to-be-uplink data alarm.
In this embodiment of the application, the light node obtains the data original text corresponding to the to-be-uplink data alarm from the full node, or the light node obtains the data original text from other light nodes.
For example, in a blockchain network, for example, in a blockchain network for tracing the source of a hairy crab, a hairy crab is from a great lake, a malicious node identifies the hairy crab as being from a Yangcheng lake and sends an uplink request, and most malicious nodes agree to uplink, at this time, other total nodes verify that the data original text corresponding to the data to be uplink fails, the hairy crab is considered to be from the great lake, and an alarm for identifying the hairy crab in the great lake as the Yangcheng lake hairy crab is sent to the other nodes, after receiving the alarm, a light node acquires the data original text corresponding to the hairy crab identification in the great lake from the total nodes, and at this time, the other light nodes can acquire the corresponding data original text from the light nodes acquiring the corresponding data original text without acquiring the corresponding data original text from the total nodes.
S103: the light node verifies the data original.
In the embodiment of the application, after the light node acquires the data original text corresponding to the to-be-uplink data alarm, the data original text is verified. For example, in a bit currency transaction system, after a transaction, a malicious node tampers and modifies transaction information, 30 bit currencies which should remain in an account balance are changed, the malicious node changes the remaining 32 bit currencies in the account balance in series and sends a chaining request, the full node fails in data verification, the 32 bit currencies which should remain in the account balance after the transaction are considered to have sent a data alarm to be chained, and after a light node obtains a data original text corresponding to the data alarm to be chained, the transaction information is traced back, and the data original text corresponding to the obtained data alarm to be chained is verified.
And if the data original text is verified not to pass, the light node stores the data original text. In this embodiment of the present application, the light node verifies the data original text corresponding to the acquired to-be-linked data alarm, if the data original text is still considered to be incorrect, the account balance should be 30 bit coins instead of 32 bit coins after the transaction, and the light node stores the data original text instead of only storing the block header of the block chain. If the light node does not determine that the data original text is correct or wrong after the light node verifies the data original text, the light node can also verify the data original text again until an exact result is verified, and whether the data original text is stored is judged according to the verification result.
And after the light node stores the data original text and forwards the data original text to other nodes, the light node releases the storage space for storing the data original text.
In the embodiment of the application, the light node verifies that the data original text does not pass, the data original text is forwarded to other nodes after the data original text is stored, at the moment, the light node stores the data original text and occupies a storage space, but the data original text has no use for the light node, the light node can release the storage space for storing the data original text, the storage space of the light node is saved, and the storage load of a block chain network is reduced.
After the light node verifies the data original text, if the data original text passes the verification, the light node judges other nodes sending the data original text as malicious nodes.
In the embodiment of the application, the light node verifies the data original text received from other nodes, if the data original text passes the verification, the other nodes sending the data original text are proved to be malicious alarm nodes, and the light node identifies the data original text as a malicious node.
And after judging other nodes sending the data original text as malicious nodes, if the malicious nodes send the to-be-uplink data alarm again, the light nodes refuse to respond to the to-be-uplink data alarm or refuse to receive the to-be-uplink data alarm sent again by the malicious nodes.
In the embodiment of the application, if the light node receives the alarm of the data to be uplink sent again by the malicious node, the light node may not make any action on the alarm, or the malicious node is blacked out, and the light node refuses to receive the alarm of the data to be uplink sent again by the malicious node. The block chain network congestion caused by the fact that a malicious node intentionally sends a warning of data to be linked up is avoided.
After the light node verifies the data original text, if the data original text is not verified to be passed, the light node participates in a consensus process corresponding to the data original text.
In the embodiment of the application, the light node verifies that the data original text does not pass through, and then participates in a consensus process corresponding to the data original text, the consensus process can be a workload proving mechanism, and because the number of the light nodes in the block chain network is greatly increased by most of all nodes, after the light nodes participate in the consensus process corresponding to the data original text, the workload of the malicious node hardly exceeds the sum of the workloads of the light nodes and part of all nodes, so that the environmental security of the block chain network is more powerfully guaranteed.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A block chain light node implementation method based on a to-be-uplink data alarm is characterized in that a block chain network comprises a light node and a full node, and the method comprises the following steps:
the light node receives data alarm to be uplink sent by other nodes in the block chain network;
after receiving the to-be-uplink data alarm, the light node acquires a data original text corresponding to the to-be-uplink data alarm;
the light node verifies the data original.
2. The method of claim 1, wherein after the light node receives the pending uplink data alarm sent by other nodes in the blockchain network, the method further comprises:
the light node judges whether the number of different nodes sending the alarm of the data to be uplink exceeds a preset value;
and if so, forwarding the alarm of the data to be uplink to other nodes.
3. The method of claim 1, wherein the receiving, by the light node, the pending uplink data alarm sent by the other node in the blockchain network comprises:
and the light node receives a data alarm to be uplink, wherein the data alarm to be uplink is sent by the full-scale node after the corresponding data original text is verified to be failed.
4. The method of claim 1, wherein the receiving, by the light node, the pending uplink data alarm sent by the other node in the blockchain network comprises:
and the light node receives the data alarm to be uplink forwarded by other light nodes.
5. The method according to claim 1, wherein the obtaining the data original corresponding to the to-be-uplink-data alarm specifically includes:
the light node acquires a data text corresponding to the data alarm to be uplink from the full node; alternatively, the first and second electrodes may be,
the light node obtains the data original text from other light nodes.
6. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text is verified not to pass, the light node stores the data original text.
7. The method of claim 6, wherein after the light node stores the data original and forwards the data original to other nodes, the method further comprises:
and the light node releases the storage space for storing the data original text.
8. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text passes the verification, judging other nodes sending the data original text as malicious nodes by the light node.
9. The method of claim 8, wherein after the light node determines other nodes sending the data original text as malicious nodes, the method further comprises:
if the alarm of the data to be uplink sent again by the malicious node is received, refusing to respond to the alarm of the data to be uplink; alternatively, the first and second electrodes may be,
and refusing to receive the alarm of the data to be uplink sent again by the malicious node.
10. The method of claim 1, wherein after the light node verifies the data original, the method further comprises:
and if the data original text is verified not to pass, the light node participates in a consensus process corresponding to the data original text.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010597197.7A CN111930831A (en) | 2020-06-28 | 2020-06-28 | Block chain light node implementation method based on to-be-uplink data alarm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010597197.7A CN111930831A (en) | 2020-06-28 | 2020-06-28 | Block chain light node implementation method based on to-be-uplink data alarm |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111930831A true CN111930831A (en) | 2020-11-13 |
Family
ID=73317796
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010597197.7A Pending CN111930831A (en) | 2020-06-28 | 2020-06-28 | Block chain light node implementation method based on to-be-uplink data alarm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111930831A (en) |
-
2020
- 2020-06-28 CN CN202010597197.7A patent/CN111930831A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11568372B2 (en) | Deterministic java virtual machine | |
CN110442652B (en) | Cross-chain data processing method and device based on block chain | |
WO2018051305A1 (en) | Systems and methods for interception of smart contracts | |
CN104519018A (en) | Method, device and system for preventing malicious requests for server | |
US20240062214A1 (en) | Controlling Transactions on a Network | |
CN111767578A (en) | Data inspection method, device and equipment | |
CN114255031A (en) | System for executing cross block chain of transaction, cross chain transaction method and equipment | |
US10958780B1 (en) | Decentralized automatic phone fraud risk management | |
CN108494557A (en) | Social security digital certificate management method, computer readable storage medium and terminal device | |
CN109218311B (en) | Block chain agglomeration method, block chain node and block chain | |
Wijaya et al. | On the unforkability of monero | |
CN110309160A (en) | Data enter chain transaction methods, device, computer equipment and storage medium | |
CN109493054A (en) | Multichain approaches to IM, device, storage medium and block chain identity resolution device | |
KR102440878B1 (en) | Learning method for learning detection model for fraud detection of virtual asset, detecting method of fraud detection of virtual asset using the detection model, apparatus and computer program for performing the learning method and the detecting method | |
CN111930831A (en) | Block chain light node implementation method based on to-be-uplink data alarm | |
CN111367934A (en) | Data consistency checking method, device, server and medium | |
CN111784359B (en) | Multi-mode wind control grading disaster recovery method and device | |
CN112104701B (en) | Method, device, network node and storage medium for cross-link communication | |
CN111444270B (en) | Method and system for controlling harmful information based on block chain | |
CN113179273A (en) | Block chain side chain-based block header verification method and device and computer-readable storage medium | |
CN112104607B (en) | Method, device, network node and storage medium for cross-link communication | |
CN112950183A (en) | Cross-link data interchange method, system, device and electronic equipment | |
CN113987574A (en) | Block chain private transaction method, device, equipment and readable storage medium | |
AU2016357267A8 (en) | Network bridge for local transaction authorization | |
US20210042295A1 (en) | Blockchain-based data management method and related system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |