CN113538140A - Data transaction method based on trusted execution environment and threshold signature - Google Patents
Data transaction method based on trusted execution environment and threshold signature Download PDFInfo
- Publication number
- CN113538140A CN113538140A CN202110756383.5A CN202110756383A CN113538140A CN 113538140 A CN113538140 A CN 113538140A CN 202110756383 A CN202110756383 A CN 202110756383A CN 113538140 A CN113538140 A CN 113538140A
- Authority
- CN
- China
- Prior art keywords
- data
- transaction
- buyer
- seller
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2457—Query processing with adaptation to user needs
- G06F16/24573—Query processing with adaptation to user needs using data annotations, e.g. user-defined metadata
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
- G06Q20/023—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP] the neutral party being a clearing house
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/085—Payment architectures involving remote charge determination or related payment systems
- G06Q20/0855—Payment architectures involving remote charge determination or related payment systems involving a third party
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Accounting & Taxation (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Health & Medical Sciences (AREA)
- Library & Information Science (AREA)
- Computational Linguistics (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a data transaction method based on a trusted execution environment and a threshold signature, wherein a data buyer checks seller data, selects target data and initiates a transaction through a metadata market, a public key address and a private key address of the transaction are generated through the trusted execution environment, key fragmentation is carried out, the key fragmentation is sent to a platform service provider, the data buyer and a data seller through a trusted channel, the target data is sent to the data buyer, the data buyer and the data seller carry out signature check and confirmation, and after the signatures are aggregated, the data seller receives a token transferred by a bank account to complete the transaction. Compared with the traditional method for generating transaction information by a trusted third party, the method disclosed by the invention is combined with the block chain technology, adopts a mode of combining the threshold signature with the trusted execution environment, and has the advantages that the condition of revealing the private key of the threshold signature is avoided, and the anonymity is better.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a data transaction method based on a trusted execution environment and a threshold signature.
Background
Data is an important production factor of digital economy, and the value of the data can be fully exerted only by effective configuration and circulation. There are two main approaches to entity trading (data sharing) on data markets: one scheme is multiple sign, when a buyer purchases data, a multiple sign address (2-of-3 multiple sign address) is generated according to public keys of a platform, the buyer and a seller, the buyer sends the price (token) of the data to the multiple sign address according to agreement, the seller sends the data to the buyer, the buyer checks the received data, after confirming the receipt, the buyer and the seller can respectively sign the transfer from the multiple sign address to the seller address, and the seller receives the data sharing income. The advantage of multiple signatures is that the income of the buyer and the seller can be guaranteed when disputes occur, but the multiple signatures reveal who signs the multiple-signature address. In another scheme, a threshold signature mode is adopted, participated users cooperate with each other or generate a pair of public and private keys in a trusted third party mode, and meanwhile, a secret key fragment (t-of-n) is sent to each operation participator, when data transaction occurs, a buyer, a seller and a platform can sign account transfer related to the transaction, and when transaction disputes occur, the platform can be used as an arbitrator to resolve the disputes. Based on the data transaction of the multi-sign mode, the specific person who signs the transaction can be obtained from the signature, the anonymity is not good, and when a multi-sign address is generated, all parties need to be ensured to be online; the threshold signature is adopted, but a trusted execution environment is not utilized to generate a public key and a private key and fragment the private key, so that the possibility of revealing the private key and the private key fragment exists.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a data transaction method based on a trusted execution environment and a threshold signature combined with a block chain technology.
The purpose of the invention is realized by the following technical scheme: a data transaction method based on a trusted execution environment and a threshold signature specifically comprises the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by data providers such as data sellers and data buyers; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform service provider generates a blockchain account address and a private key address related to the transaction by using a blockchain through a trusted execution environment, and records a transaction user, transaction time and target data selected in the step (1);
(3) 2-of-3 key fragmentation is carried out on a private key address of a transaction in a trusted execution environment;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); checking the hash of the target data and whether the data content of the target data is consistent with the metadata market;
(8) if the step (7) checks that the target data has no problem, the data buyer signs the transfer transaction from the block chain account address generated in the step (2) to the account address of the data seller through the intelligent contract by using the key fragment obtained in the step (3), the key fragment of the data seller signs the transfer transaction through the intelligent contract, and the seller receives the transfer token after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
Further, in the step (3), it is preferable that the shamir method is used for key fragmentation.
Further, the platform intervention in step (8) performs arbitration, specifically:
if the platform finds no data problem after arbitration, the platform generates an initiated transfer of the blockchain account address to the seller address by using the key fragment obtained in the step (4) and signs the transaction in the intelligent contract; the data seller signs the transaction in the intelligent contract by using the key fragment obtained in the step (4); after the signatures of the two are aggregated, the data seller receives the transfer token;
if the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the transaction address in the step (2) to the buyer address in the intelligent contract by using the key fragment obtained in the step (4) and carries out signature; and (4) the data is sliced by the key obtained in the step (4), the transaction is signed in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
The invention has the beneficial effects that:
(1) compared with the traditional method for generating transaction information by a trusted third party, the method has the advantage that the condition of revealing the private key of the threshold signature is avoided.
(2) The invention adopts a threshold signature mode, does not reveal a signing party for signing the transaction, and has better anonymity.
(3) According to the invention, after the key fragment of the transaction is transmitted through the trusted channel of the trusted execution environment, the key fragment keeps an encryption state when each participant falls off the disk, and thus, the risk of collusion does not exist. In addition, the signature is carried out in a trusted execution environment through the intelligent contract, so that the key fragment has no leakage risk and has good data security.
Drawings
FIG. 1 is a flow chart of the present invention;
fig. 2 is a block schematic of the present invention.
Detailed Description
The main purpose of the invention is to adopt a way of combining a trusted execution environment and a threshold signature. When a transaction occurs, a public key and a private key and an address of the transaction are generated in the trusted execution environment, and each participant acquires the private key fragment by establishing trusted connection with the trusted execution environment. Therefore, the public and private keys related to the transaction can be prevented from being acquired by the platform service provider, and the safety of private key fragmentation can be ensured. The invention is plaintext in the trusted execution environment, and the other is ciphertext, so as to prevent the key fragmentation from leaking and colluding.
As shown in fig. 1, which is a flowchart of the present invention, a data transaction method based on a trusted execution environment and a threshold signature specifically includes the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by various data providers such as a data buyer and the like, such as data information of data description, data number, data hash value and the like; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform facilitator generates a blockchain account and a private key address related to the transaction by using the blockchain through the trusted execution environment, for example, the private key and the account address are generated through the BIP32, the private key is generally generated randomly, and the account address is generated after hash processing of the public key. Recording the transaction user, the transaction time and the target data selected by the data buyer in the step (1);
(3) in the embodiment, a 2-of-3 key fragmentation mode is adopted, a 1(t-1) order polynomial is constructed, three parties related to the transaction, a platform service provider, a data seller and a data buyer are involved, and any two parties can perform account transfer operation on a transaction account after the 2-of-3 key fragmentation;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); such as checking whether the hash of the target data is consistent with the metadata market offer, the number of pieces of the target data, the existence of the defect and the obvious error of the target data;
(8) if the step (7) checks that the target data has no problem, the data buyer initiates the transfer transaction from the account address generated in the step (2) to the transaction address of the data seller, the transaction is signed by using the key fragment obtained in the step (4) in the intelligent contract, the data seller also signs the transfer transaction by using the key fragment obtained in the step (4) through the intelligent contract, and the seller receives the token for transfer after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
If the platform finds no data problem after arbitration, the platform initiates the transfer transaction from the account generated in the step (2) to the address of the seller by using the key fragment of the platform and signs the transaction in the intelligent contract; the data seller also signs the transaction within the intelligent contract using its own key shard; after aggregating the signatures, the data seller receives the transfer token.
If the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the account generated in the step (2) to the buyer address in the intelligent contract by using the secret key fragment of the platform, and carries out signature; and (4) the data buyer obtains the key fragment by using the step (4), signs the transaction in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
The invention adopts the mode of combining the threshold signature and the trusted execution environment, the private key generated by the transaction is a plaintext only in the trusted execution environment, and the other private keys are in a ciphertext form, so that the condition of revealing the private key of the threshold signature does not exist. The invention is also in the trusted execution environment when signing through the intelligent contract, so that the key fragment has no leakage risk and has good data security.
Claims (3)
1. A data transaction method based on a trusted execution environment and a threshold signature is characterized by specifically comprising the following steps:
(1) the data buyer looks at the data of the data seller through the metadata market, selects the target data and initiates a transaction; the metadata market is a metadata information set uploaded by data providers such as data sellers and data buyers; the target data is selected data viewed by a data buyer through a metadata trading market;
(2) the platform service provider generates a blockchain account address and a private key address related to the transaction by using a blockchain through a trusted execution environment, and records a transaction user, transaction time and target data selected in the step (1);
(3) 2-of-3 key fragmentation is carried out on a private key address of a transaction in a trusted execution environment;
(4) sending the key fragments obtained in the step (3) to a platform service provider, a data buyer and a data seller through a trusted channel;
(5) transferring accounts of the transaction account generated in the step (2) to the data buyer;
(6) the data seller sends the target data selected in the step (1) to the data buyer;
(7) the data buyer checks and confirms the target data after receiving the target data sent in the step (6); checking the hash of the target data and whether the data content of the target data is consistent with the metadata market;
(8) if the step (7) checks that the target data has no problem, the data buyer signs the transfer transaction from the block chain account address generated in the step (2) to the account address of the data seller through the intelligent contract by using the key fragment obtained in the step (3), the key fragment of the data seller signs the transfer transaction through the intelligent contract, and the seller receives the transfer token after the signatures of the two are aggregated; if the buyer finds data problems while reviewing the target data, the platform intervenes to arbitrate.
2. The data transaction method based on the trusted execution environment and the threshold signature as claimed in claim 1, wherein in the step (3), a shamir method is preferably used for key fragmentation.
3. The data transaction method based on the trusted execution environment and the threshold signature as claimed in claim 1, wherein the platform intervention in step (8) performs arbitration, specifically:
if the platform finds no data problem after arbitration, the platform generates an initiated transfer of the blockchain account address to the seller address by using the key fragment obtained in the step (4) and signs the transaction in the intelligent contract; the data seller signs the transaction in the intelligent contract by using the key fragment obtained in the step (4); after the signatures of the two are aggregated, the data seller receives the transfer token;
if the platform finds that the data is in a problem after arbitration, the platform initiates the transaction from the transaction address in the step (2) to the buyer address in the intelligent contract by using the key fragment obtained in the step (4) and carries out signature; and (4) the data is sliced by the key obtained in the step (4), the transaction is signed in the intelligent contract, and after the signatures of the two are aggregated, the data buyer receives the returned token.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110756383.5A CN113538140A (en) | 2021-07-05 | 2021-07-05 | Data transaction method based on trusted execution environment and threshold signature |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110756383.5A CN113538140A (en) | 2021-07-05 | 2021-07-05 | Data transaction method based on trusted execution environment and threshold signature |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113538140A true CN113538140A (en) | 2021-10-22 |
Family
ID=78097754
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110756383.5A Pending CN113538140A (en) | 2021-07-05 | 2021-07-05 | Data transaction method based on trusted execution environment and threshold signature |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113538140A (en) |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
CN110135819A (en) * | 2019-05-21 | 2019-08-16 | 福建航誉大数据服务有限公司 | A kind of third party's trust data transaction system and method based on block chain |
CN110720102A (en) * | 2017-06-09 | 2020-01-21 | 区块链控股有限公司 | Block chains for general purpose computing |
CN110880972A (en) * | 2019-11-26 | 2020-03-13 | 复旦大学 | Block chain key management system based on safe multiparty calculation |
CN110993044A (en) * | 2019-11-28 | 2020-04-10 | 周口师范学院 | Lightweight dynamic autonomous cross-link interaction method for medical alliance link |
CN111178880A (en) * | 2019-12-07 | 2020-05-19 | 江苏通付盾数字化技术有限公司 | Secure data circulation method for zero trust and protecting data privacy |
CN111737724A (en) * | 2020-08-26 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Data processing method and device, intelligent equipment and storage medium |
CN112288431A (en) * | 2020-11-03 | 2021-01-29 | 上海阿吉必信息技术有限公司 | Transaction method and device based on threshold signature |
CN112560073A (en) * | 2021-02-19 | 2021-03-26 | 支付宝(杭州)信息技术有限公司 | Method, device and system for verifying data source reliability |
CN112711774A (en) * | 2021-03-25 | 2021-04-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and storage medium |
US20210158342A1 (en) * | 2017-12-15 | 2021-05-27 | nChain Holdings Limited | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
-
2021
- 2021-07-05 CN CN202110756383.5A patent/CN113538140A/en active Pending
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107038578A (en) * | 2017-04-19 | 2017-08-11 | 浙江数秦科技有限公司 | Multi-signature exchange information processing method in data trade platform based on block chain |
CN110720102A (en) * | 2017-06-09 | 2020-01-21 | 区块链控股有限公司 | Block chains for general purpose computing |
US20210158342A1 (en) * | 2017-12-15 | 2021-05-27 | nChain Holdings Limited | Computer-implemented systems and methods for authorising blockchain transactions with low-entropy passwords |
CN110135819A (en) * | 2019-05-21 | 2019-08-16 | 福建航誉大数据服务有限公司 | A kind of third party's trust data transaction system and method based on block chain |
CN110880972A (en) * | 2019-11-26 | 2020-03-13 | 复旦大学 | Block chain key management system based on safe multiparty calculation |
CN110993044A (en) * | 2019-11-28 | 2020-04-10 | 周口师范学院 | Lightweight dynamic autonomous cross-link interaction method for medical alliance link |
CN111178880A (en) * | 2019-12-07 | 2020-05-19 | 江苏通付盾数字化技术有限公司 | Secure data circulation method for zero trust and protecting data privacy |
CN111737724A (en) * | 2020-08-26 | 2020-10-02 | 腾讯科技(深圳)有限公司 | Data processing method and device, intelligent equipment and storage medium |
CN112288431A (en) * | 2020-11-03 | 2021-01-29 | 上海阿吉必信息技术有限公司 | Transaction method and device based on threshold signature |
CN112560073A (en) * | 2021-02-19 | 2021-03-26 | 支付宝(杭州)信息技术有限公司 | Method, device and system for verifying data source reliability |
CN112711774A (en) * | 2021-03-25 | 2021-04-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and storage medium |
Non-Patent Citations (2)
Title |
---|
张亮;刘百祥;张如意;江斌鑫;刘一江;: "区块链技术综述", 计算机工程, no. 05, pages 7 - 18 * |
汤敏;: "汤敏:物联网+区块链助力供应链金融智能化", 中国储运, no. 06, pages 34 - 36 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111095332B (en) | Method and system for protecting private social media advertisements | |
TWI701623B (en) | Logistics information transmission method, system and device based on blockchain | |
CN107180350B (en) | Method, device and system for multi-party sharing transaction metadata based on block chain | |
US10609010B2 (en) | System, methods and software application for sending secured messages on decentralized networks | |
CN110135819B (en) | Block chain-based third-party trusted data transaction system and method | |
US11481375B2 (en) | Point-to-point distributed decentralized system | |
US11483161B2 (en) | Method for information processing and non-transitory computer readable storage medium | |
EP3928276A1 (en) | Trusted tokenized transactions in a blockchain system | |
CN107666388A (en) | Block chain information encryption method based on complete homomorphic cryptography method | |
CN110020543B (en) | Data processing method and device based on block chain | |
CN116204912B (en) | Data processing method and device based on isomorphic encryption | |
CN110336779B (en) | Block chain construction method and device and electronic equipment | |
Ray et al. | A fair-exchange e-commerce protocol with automated dispute resolution | |
WO2023098294A1 (en) | Heterogeneous data processing method and apparatus, and electronic device | |
WO2020221292A1 (en) | Network transaction verification method based on plurality of nodes, and system therefor and storage medium | |
CN109377220B (en) | Block chain-based media data transaction method and system and computer storage medium | |
CN110599342A (en) | Block chain-based identity information authorization method and device | |
CN112801778A (en) | Federated bad asset blockchain | |
WO2021134897A1 (en) | Blockchain supply chain transaction hidden dynamic supervision system and method | |
CN115203749A (en) | Data transaction method and system based on block chain | |
CN116545773A (en) | Method, medium and electronic equipment for processing privacy data | |
CN116743376A (en) | Multiparty secret sharing data privacy comparison method based on efficient ciphertext confusion technology | |
CN110519045B (en) | Anti-quantum computing alliance chain transaction method and system based on group asymmetric key pool | |
CN113746621B (en) | Multi-chain architecture information sharing system based on block chain technology | |
CN113538140A (en) | Data transaction method based on trusted execution environment and threshold signature |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |