CN113946738A - Webpage data crawling method and system based on safety control - Google Patents
Webpage data crawling method and system based on safety control Download PDFInfo
- Publication number
- CN113946738A CN113946738A CN202010682820.9A CN202010682820A CN113946738A CN 113946738 A CN113946738 A CN 113946738A CN 202010682820 A CN202010682820 A CN 202010682820A CN 113946738 A CN113946738 A CN 113946738A
- Authority
- CN
- China
- Prior art keywords
- configuration file
- webpage
- data
- task configuration
- crawled
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/953—Querying, e.g. by the use of web search engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Data Mining & Analysis (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Automation & Control Theory (AREA)
- Information Transfer Between Computers (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the invention provides a webpage data crawling method and system based on safety control. The method comprises the following steps: establishing a task configuration file based on a webpage to be crawled, and acquiring a preset query instruction set; performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file; the access authority of the webpage to be crawled is obtained based on the reconstructed task configuration file, and the target data of the webpage to be crawled is downloaded based on the preset query instruction set.
Description
Technical Field
The invention relates to the technical field of security control, in particular to a webpage data crawling method and system based on security control.
Background
With the development of digitalization, companies establish a series of application systems, such as project management, crm, operation and maintenance monitoring, operation and maintenance management, property management and the like, and establish a safety management and control system for unified authentication management and control. Each system is built by different manufacturers, and due to the fact that independent database storage and chimney type construction are adopted, data of each system cannot be analyzed and checked in a unified mode.
And the application system is accessed by logging in the safety management and control system, so that the multi-system crawling is realized by logging in at one time. The tedious work of login is reduced, even a part of systems are not allowed to be directly logged in, and other systems are required to be accessed again after logging in through a safety control system, for example, downloading and analyzing the data of each system manually is very difficult.
Therefore, a new method for crawling network data is needed to solve the above problems.
Disclosure of Invention
The embodiment of the invention provides a webpage data crawling method and system based on safety control, which are used for solving the problems in the prior art.
In a first aspect, an embodiment of the present invention provides a method for crawling web page data based on security control, including:
establishing a task configuration file based on a webpage to be crawled, and acquiring a preset query instruction set;
performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file;
and acquiring the access right of the webpage to be crawled based on the reconstructed task configuration file, and downloading target data of the webpage to be crawled based on the preset query instruction set.
Further, the preset query instruction set includes an account number, a password, a data query condition, a file naming rule, a data cleaning rule, database information of data warehousing, temporary base table information and formal base table information of security control.
Further, the obtaining of the access right of the web page to be crawled based on the reconstructed task configuration file and the downloading of the target data of the web page to be crawled based on the preset query set further include:
and carrying out automatic data flow processing on the target data, and storing the processed target data into a target database.
Further, the performing security reconfiguration on the task configuration file based on a preset security management and control policy to obtain a reconfigured task configuration file specifically includes:
setting a safety control login interface;
selecting a corresponding service system on the safety control login interface, and acquiring a preset webpage parameter set;
and reconstructing the URL of the webpage to be crawled, and adding the preset webpage parameter set in the task configuration file to obtain the reconstructed task configuration file.
Further, the acquiring the access right of the web page to be crawled based on the reconstructed task configuration file and downloading the target data of the web page to be crawled based on the preset query instruction set specifically include:
setting a preset query condition set based on the reconstructed task configuration file;
mapping the preset query condition set to the preset query instruction set to acquire the access authority;
and downloading the target data after the access authority passes.
Further, after the access right passes, downloading the target data, and then further comprising:
renaming the target data according to predefined file information.
Further, the performing automatic data flow processing on the target data and storing the processed target data in a target database specifically includes:
setting a timing task execution time interval;
automatically loading the target data to a temporary database based on the timed task execution time interval, and performing data cleaning on the target data;
and synchronously storing the cleaned target data into a formal database.
In a second aspect, an embodiment of the present invention provides a security control-based web page data crawling system, including:
the establishment module is used for establishing a task configuration file based on a webpage to be crawled and acquiring a preset query instruction set;
the processing module is used for carrying out safety reconstruction on the task configuration file based on a preset safety control strategy to obtain a reconstructed task configuration file;
and the downloading module is used for acquiring the access authority of the webpage to be crawled based on the reconstructed task configuration file and downloading the target data of the webpage to be crawled based on the preset query instruction set.
In a third aspect, an embodiment of the present invention provides an electronic device, including:
the system comprises a memory, a processor and a computer program stored on the memory and capable of running on the processor, wherein the processor realizes the steps of any one of the safety control-based webpage data crawling methods when executing the program.
In a fourth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of any one of the security control-based web page data crawling methods.
According to the webpage data crawling method and system based on the safety control, provided by the embodiment of the invention, the data access and downloading scheme with the safety control system is provided, the unified authentication is carried out through the safety control, the timed task is automatically executed, the workload of manual access is saved, and the timeliness of data acquisition is also improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a flowchart of a method for crawling web page data based on security control according to an embodiment of the present invention;
fig. 2 is a structural diagram of a web page data crawling system based on security control according to an embodiment of the present invention;
fig. 3 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Aiming at the defects in the prior art, the embodiment of the invention provides a webpage data crawling method based on safety control, and webpage data with access authority based on Cookie, token and sessionid can be quickly and effectively crawled in the data acquisition process through the method.
Fig. 1 is a flowchart of a method for crawling web page data based on security control according to an embodiment of the present invention, as shown in fig. 1, including:
s1, establishing a task configuration file based on the webpage to be crawled, and acquiring a preset query instruction set;
establishing a corresponding task configuration file for a target crawling webpage, acquiring a preset query instruction set and recording; here, the preset query instruction set includes an account number, a password, a data query condition, a file naming rule, a data cleaning rule, database information of data warehousing, temporary base table information, and formal base table information required by the security management and control process.
S2, performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file;
further, a security management and control strategy is set, and the task configuration file established in the previous step is subjected to security reconstruction based on the preset security management and control strategy, so that a new safer task configuration file after reconstruction is obtained.
And S3, acquiring the access right of the webpage to be crawled based on the reconstructed task configuration file, and downloading the target data of the webpage to be crawled based on the preset query instruction set.
And after the new task configuration file is acquired, acquiring the access authority of the webpage to be crawled, wherein the access authority is generated by a mapping relation between a preset query instruction set and an input query condition set, and after the access authority passes, target data of the webpage to be crawled can be downloaded.
The embodiment of the invention provides a data access and download scheme with a safety control system, performs unified authentication through safety control, automatically executes the timing task, saves the workload of manual access, and simultaneously improves the timeliness of data acquisition.
Based on the above embodiment, the preset query set includes an account number, a password, a data query condition, a file naming rule, a data cleaning rule, database information of data warehousing, temporary base table information, and formal base table information of security control.
Based on any of the above embodiments, step S2 in the method specifically includes:
setting a safety control login interface;
selecting a corresponding service system on the safety control login interface, and acquiring a preset webpage parameter set;
and reconstructing the URL of the webpage to be crawled, and adding the preset webpage parameter set in the task configuration file to obtain the reconstructed task configuration file.
Specifically, login security management and control: opening a browser based on the selenium, inputting a security control webpage, inputting a user name, a password and a picture verification code, and logging in a system;
here, the Selenium is a Web test tool, and is a complete set of Web application test system, which includes recording (Selenium IDE), writing and running (Selenium Remote Control) of the test, and parallel processing (Selenium Grid) of the test. The Core of Selenium Core is based on JsUnit, written entirely in JavaScript, and therefore can run on any JavaScript-enabled browser. The Selenium Core is driven by an HTML file in a specified format, and the readability of the Test Suite (Test Suite) is enhanced to a certain extent. The Selenium Remote Control allows a tester to write test codes by using common languages (including C # and other NET languages naturally), and supports various mainstream browsers under different operating systems;
then selecting a corresponding service system, clicking to log in, entering the corresponding service system, and acquiring cookies, tokens, sessionids and the like, namely a preset webpage parameter set;
reconstructing a target webpage URl, and adding cookies, tokens and sessionids to enable the target webpage to be normally accessed, namely obtaining a new reconstructed task configuration file.
Based on any of the above embodiments, step S3 in the method specifically includes:
setting a preset query condition set based on the reconstructed task configuration file;
mapping the preset query condition set to the preset query instruction set to acquire the access authority;
and downloading the target data after the access authority passes.
Specifically, inputting conditions such as a city company, a region to which the city company belongs, a time region and the like aiming at a target webpage, namely, clicking a preset query condition set, querying, and after the query is finished, performing data downloading by clicking an excel data downloading button; here, there is a mapping corresponding relationship from the preset query condition set to the aforementioned preset query instruction set, the system determines whether the current visitor has a corresponding access right according to the corresponding relationship, and the corresponding target data can be downloaded based on the access right.
Based on any of the above embodiments, after the access right passes, downloading the target data, and then further including:
renaming the target data according to predefined file information.
Specifically, renaming a downloaded file name according to a predefined file name and date aiming at downloaded target data;
based on any embodiment, the method further includes, after step S3: and carrying out automatic data flow processing on the target data, and storing the processed target data into a target database.
The automatic data flow processing of the target data and the storage of the processed target data in a target database specifically include:
setting a timing task execution time interval;
automatically loading the target data to a temporary database based on the timed task execution time interval, and performing data cleaning on the target data;
and synchronously storing the cleaned target data into a formal database.
Specifically, setting a time interval for executing tasks at regular time, automatically loading a downloaded target data file into a temporary database, adding insert _ date to each service table, and recording the file date; cleaning the modified target data, and clearing abnormal data according to a predefined rule; and finally, synchronizing the cleaned target data into a formal database.
The embodiment of the invention realizes the automation of the whole process from login security control to target data downloading and data entering into a temporary library, data cleaning and data entering into a formal library without human intervention.
Fig. 2 is a structural diagram of a security control-based web page data crawling system according to an embodiment of the present invention, as shown in fig. 2, including: the device comprises an establishing module 21, a processing module 22 and a downloading module 23; wherein:
the establishing module 21 is configured to establish a task configuration file based on a web page to be crawled, and acquire a preset query instruction set; the processing module 22 is configured to perform security reconfiguration on the task configuration file based on a preset security management and control policy to obtain a reconfigured task configuration file; the downloading module 23 is configured to obtain the access right of the web page to be crawled based on the reconstructed task configuration file, and download the target data of the web page to be crawled based on the preset query instruction set.
The system provided by the embodiment of the present invention is used for executing the corresponding method, the specific implementation manner of the system is consistent with the implementation manner of the method, and the related algorithm flow is the same as the algorithm flow of the corresponding method, which is not described herein again.
The embodiment of the invention provides a data access and download scheme with a safety control system, performs unified authentication through safety control, automatically executes the timing task, saves the workload of manual access, and simultaneously improves the timeliness of data acquisition.
Fig. 3 illustrates a physical structure diagram of an electronic device, which may include, as shown in fig. 3: a processor (processor)310, a communication Interface (communication Interface)320, a memory (memory)330 and a communication bus 340, wherein the processor 310, the communication Interface 320 and the memory 330 communicate with each other via the communication bus 340. The processor 310 may call logic instructions in the memory 330 to perform the following method: establishing a task configuration file based on a webpage to be crawled, and acquiring a preset query instruction set; performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file; and acquiring the access right of the webpage to be crawled based on the reconstructed task configuration file, and downloading target data of the webpage to be crawled based on the preset query instruction set.
In addition, the logic instructions in the memory 330 may be implemented in the form of software functional units and stored in a computer readable storage medium when the software functional units are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In another aspect, an embodiment of the present invention further provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program is implemented to perform the transmission method provided in the foregoing embodiments when executed by a processor, and for example, the method includes: establishing a task configuration file based on a webpage to be crawled, and acquiring a preset query instruction set; performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file; and acquiring the access right of the webpage to be crawled based on the reconstructed task configuration file, and downloading target data of the webpage to be crawled based on the preset query instruction set.
The above-described embodiments of the apparatus are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
Through the above description of the embodiments, those skilled in the art will clearly understand that each embodiment can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware. With this understanding in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the methods described in the embodiments or some parts of the embodiments.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.
Claims (10)
1. A webpage data crawling method based on security control is characterized by comprising the following steps:
establishing a task configuration file based on a webpage to be crawled, and acquiring a preset query instruction set;
performing security reconstruction on the task configuration file based on a preset security management and control strategy to obtain a reconstructed task configuration file;
and acquiring the access right of the webpage to be crawled based on the reconstructed task configuration file, and downloading target data of the webpage to be crawled based on the preset query instruction set.
2. The security control-based webpage data crawling method according to claim 1, wherein the preset query instruction set includes security control account numbers, passwords, data query conditions, file naming rules, data cleaning rules, database information of data warehousing, temporary base table information and formal base table information.
3. The security control-based web page data crawling method according to claim 1, wherein the method includes obtaining access rights of the web page to be crawled based on the reconstructed task configuration file, downloading target data of the web page to be crawled based on the preset query set, and then:
and carrying out automatic data flow processing on the target data, and storing the processed target data into a target database.
4. The security control-based webpage data crawling method according to claim 1, wherein the security reconfiguration is performed on the task configuration file based on a preset security control policy to obtain a reconfigured task configuration file, and specifically includes:
setting a safety control login interface;
selecting a corresponding service system on the safety control login interface, and acquiring a preset webpage parameter set;
and reconstructing the URL of the webpage to be crawled, and adding the preset webpage parameter set in the task configuration file to obtain the reconstructed task configuration file.
5. The security control-based web page data crawling method according to claim 1, wherein the acquiring of the access right of the web page to be crawled based on the reconstructed task configuration file and the downloading of the target data of the web page to be crawled based on the preset query instruction set specifically include:
setting a preset query condition set based on the reconstructed task configuration file;
mapping the preset query condition set to the preset query instruction set to acquire the access authority;
and downloading the target data after the access authority passes.
6. The web page data crawling method based on security management and control according to claim 5, wherein the target data is downloaded after the access right passes, and then further comprising:
renaming the target data according to predefined file information.
7. The security control-based webpage data crawling method according to claim 3, wherein the automatic data flow processing is performed on the target data, and the processed target data is stored in a target database, and specifically includes:
setting a timing task execution time interval;
automatically loading the target data to a temporary database based on the timed task execution time interval, and performing data cleaning on the target data;
and synchronously storing the cleaned target data into a formal database.
8. The utility model provides a webpage data system of crawling based on safety control which characterized in that includes:
the establishment module is used for establishing a task configuration file based on a webpage to be crawled and acquiring a preset query instruction set;
the processing module is used for carrying out safety reconstruction on the task configuration file based on a preset safety control strategy to obtain a reconstructed task configuration file;
and the downloading module is used for acquiring the access authority of the webpage to be crawled based on the reconstructed task configuration file and downloading the target data of the webpage to be crawled based on the preset query instruction set.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the security management based web page data crawling method according to any one of claims 1 to 7 when executing the program.
10. A non-transitory computer readable storage medium, storing thereon a computer program, wherein the computer program, when executed by a processor, implements the steps of the security control-based web page data crawling method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682820.9A CN113946738A (en) | 2020-07-15 | 2020-07-15 | Webpage data crawling method and system based on safety control |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010682820.9A CN113946738A (en) | 2020-07-15 | 2020-07-15 | Webpage data crawling method and system based on safety control |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113946738A true CN113946738A (en) | 2022-01-18 |
Family
ID=79326159
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010682820.9A Pending CN113946738A (en) | 2020-07-15 | 2020-07-15 | Webpage data crawling method and system based on safety control |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113946738A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116252305A (en) * | 2023-05-05 | 2023-06-13 | 苏州视通医疗科技有限公司 | Control system reconstruction method, control system, electronic equipment and storage medium |
-
2020
- 2020-07-15 CN CN202010682820.9A patent/CN113946738A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116252305A (en) * | 2023-05-05 | 2023-06-13 | 苏州视通医疗科技有限公司 | Control system reconstruction method, control system, electronic equipment and storage medium |
CN116252305B (en) * | 2023-05-05 | 2024-02-20 | 苏州视通医疗科技有限公司 | Control system reconstruction method, control system, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10467316B2 (en) | Systems and methods for web analytics testing and web development | |
CN103023710B (en) | A kind of safety test system and method | |
CN106897215A (en) | A kind of method gathered based on WebView webpages loading performance and user behavior flow data | |
CN109687991A (en) | User behavior recognition method, apparatus, equipment and storage medium | |
CN105577475B (en) | Automated performance testing system and method | |
CN106960143B (en) | User account identification method and device, storage medium and electronic equipment | |
US10728348B2 (en) | Systems and methods for analyzing application usage on a user device | |
CN111191097A (en) | Method, device and system for automatically acquiring webpage information by web crawler | |
CN109040073A (en) | A kind of detection method, device, medium and the equipment of the access of WWW abnormal behaviour | |
CN105389263A (en) | Method, system and equipment for monitoring application software permissions | |
CN112380255A (en) | Service processing method, device, equipment and storage medium | |
CN104765592A (en) | Plugin management method and device facing web page acquisition task | |
CN106506471A (en) | Application control method and device | |
CN113946738A (en) | Webpage data crawling method and system based on safety control | |
DE112018002954T5 (en) | PROVIDING A CONFIGURATION-RELATED WORKFLOW | |
CN105516337A (en) | Web site docking analysis method based on dynamic loading mechanism | |
CN111414348A (en) | Method and device for modifying database instance parameters | |
CN109446441A (en) | A kind of credible distributed capture storage system of general Web Community | |
CN117493188A (en) | Interface testing method and device, electronic equipment and storage medium | |
CN112433953A (en) | Embedded automatic testing method, device, equipment and medium based on network game client | |
CN108256106B (en) | Simulation access website adapter system | |
CN116402325A (en) | Automatic business process processing method and device | |
CN110210192A (en) | Approaches to IM, device, equipment and readable storage medium storing program for executing | |
CN113031995B (en) | Rule updating method and device, storage medium and electronic equipment | |
CN114546857A (en) | Interface test case generation method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |