CN115603946A - Persistent identity identification method, medium and equipment based on browser icon cache - Google Patents

Persistent identity identification method, medium and equipment based on browser icon cache Download PDF

Info

Publication number
CN115603946A
CN115603946A CN202211119457.5A CN202211119457A CN115603946A CN 115603946 A CN115603946 A CN 115603946A CN 202211119457 A CN202211119457 A CN 202211119457A CN 115603946 A CN115603946 A CN 115603946A
Authority
CN
China
Prior art keywords
cache
user
browser
icon
website
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211119457.5A
Other languages
Chinese (zh)
Inventor
龙海霞
王佳
陈孜豪
徐新黎
肖杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang University of Technology ZJUT
Original Assignee
Zhejiang University of Technology ZJUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang University of Technology ZJUT filed Critical Zhejiang University of Technology ZJUT
Priority to CN202211119457.5A priority Critical patent/CN115603946A/en
Publication of CN115603946A publication Critical patent/CN115603946A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9574Browsing optimisation, e.g. caching or content distillation of access to content, e.g. by caching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/36User authentication by graphic or iconic representation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Power Engineering (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The invention relates to a persistent identity identification method, medium and equipment based on browser icon cache, which are used for allocating unique identification of each access user and binding the unique identification with the browser icon cache; when any user accesses the website, the identity of the user is identified by using a URL-cache matching mechanism; and a computer-readable storage medium, a computer device are realized based on the method. The invention provides a privacy tracking model capable of tracking the identity of a user persistently, combines an icon cache loophole of a browser with a URL-cache matching mechanism, discloses hidden potential safety hazards in icon cache of a modern browser, and is beneficial to improvement and perfection of the modern browser in the aspect of safety.

Description

Persistent identity identification method, medium and equipment based on browser icon cache
Technical Field
The present invention relates to computing; calculating; the technical field of counting, in particular to a persistent identity identification method, medium and equipment based on browser icon caching in the technical field of information security.
Background
In a modern website, tracking of anonymous user identity is an important part, in order to prevent or track malicious behaviors, the website often needs to be capable of tracking the user identity by means other than means based on IP and cookies, and meanwhile, due to continuous perfect development of a modern browser, various novel tracking means continuously appear.
In fact, in order to improve indexes such as website performance and accessibility, modern browsers provide various cache ways, such as localstorage, index DB, etc., and such caches can be easily cleared through browser settings, and therefore are within the control range of users.
In addition to the above common Cache, there is also a favicon Cache (F-Cache, i.e., a Cache for storing website icons) in the browser. In the beginning of 2021, konstatinos Solomos et al, university of Illinois, chicago, realized persistent fingerprints for accessed users by means of a browser icon caching mechanism, which realized persistent fingerprints for accessed users based on F-Cache. However, the method can only provide a basis for whether the user accesses a certain website, and persistent fingerprints based on the F-Cache are realized, but the detection and identification of the specific identity of the user cannot be realized.
Disclosure of Invention
The invention solves the problems in the prior art, provides a persistent identity identification method, medium and equipment based on browser icon caching, and realizes the identification of specific user identity by further exploring the F-Cache and utilizing a URL-Cache matching mechanism in the F-Cache.
The invention adopts the technical scheme that a persistent identity identification method based on browser icon caching is characterized in that a unique identifier of each access user is distributed and bound with the browser icon caching; when any user accesses the website, the identity of the user is identified by using a URL-cache matching mechanism.
Modern browsers offer a number of functions to improve and optimize the customer experience. One such function is favicon, which is a small (typically 16 x 16 or 32 x 32 pixels) mark that we can use to easily identify a web site. Most browsers display favicons next to the page name in the address bar and bookmark list. Developers can provide a favicon on their web site by including a < link rel > attribute in the web page header. If the label exists, the browser requests the icon from the set address, and if the server normally responds to the icon, the icon can be normally rendered and displayed. If there is no normal return, a blank favicon is displayed.
The existing information persistence process is that a website server obtains information whether a browser loads favicon, when the browser initiates a request of a webpage, if the favicon is not in a local F-Cache, the request is requested again, and if the favicon already exists in the F-Cache, the request is not sent again; in this way, the website server can know whether the user has visited the website, that is, through the browser icon caching mechanism, the website server can determine whether the user has visited a specific page of the website by checking the cache retrieval request in addition to the website itself, and a website often includes any number of pages, so that any number of persistent flag bits can be left in the browser through a single website. In such a way, a unique identifier can be allocated to the client by combining the state that whether the browser requests favicon to a specific URL or not, and when the website is reloaded, the Web server can analyze the relationship between the unique identifier and the request which is sent by the client and lacks favicon, so as to identify a specific browser fingerprint.
Preferably, the method comprises the steps of:
step 1: judging whether a current user accesses a website for the first time; if so, randomly generating a unique identifier for the user at the server side, and carrying out the next step, otherwise, directly carrying out the step 3;
and 2, step: binding the unique identifier with a browser icon cache to enable a current user to permanently fix user information in a current website; carrying out step 4;
and 3, step 3: reading identity information of an accessed user;
and 4, step 4: and the current user browses at the current website by using the unique identifier.
Preferably, in step 1, for any user, whether the user accesses the website for the first time is determined according to whether the initial page of the accessed webpage returns to the corresponding home icon request, and if so, the user accesses the website for the first time.
If the server side does not receive the request for the icon resource, the user has visited the website and the browser of the user already contains the persistent icon cache fingerprint, and the step 3 is directly skipped to for reading and identifying the identity information of the user; and if the server receives the request of the browser for the icon resource, the server accesses the website for the first time on behalf of the user and continues the next ID information writing.
Here, the home icon request refers to a request that each user first obtain an icon from a home page, e.g., a.com, when accessing a current website, regardless of the number of levels of addresses of the website.
Preferably, the unique identification is a binary ID.
Preferably, in the step 2, different URLs are allocated to the unique identifiers, the unique identifiers correspond to bits in the unique identifiers one to one, and the server stores the unique identifiers in the browser and redirects the user to all currently adopted URLs in sequence; and caching the home page icon request of the accessed website to the server of the user.
Different URLs are distributed to each bit of the random unique identifier, the unique identifier is stored, and meanwhile, the user is sequentially redirected to the URLs, namely, the bit value fixed by the ordered URLs is obtained, and the unique identifier of the user is further stored.
And detecting whether the corresponding browser icon cache exists or not by continuously accessing a series of URLs and detecting whether a corresponding request is received by the back end or not through the access icon, wherein the numerical value of each bit is 0 or 1.
Preferably, in step 2, only the icon cache of the URL corresponding to the bit with the median of 1 is stored in the browser.
Because the server itself returns 404 codes representing that the resource does not exist for the part with the corresponding bit of 0 in all the URLs, in the process of writing in the icon cache, all the URLs do not need to be traversed, and only the part with the corresponding bit of 1 needs to be processed, in such a way, because the probability that each bit is 1 or 0 is equal, the average acting time of the model can be shortened to 50% of the original time, and the optimization in time is realized.
These URLs with corresponding bit 0 will simply return 404 the code, and these URLs will still be directed to the user in order.
Preferably, in step 3, the status code is returned 404 for all the requests of the icon resource, and for all the bit positions 0 corresponding to the URLs receiving the icon caching request and other pages are set to 1, the unique identifier of the user is restored in sequence.
After the unique identifier is written, the cache of the browser of the user contains cache information which can be used for recovering the record of the unique identifier, when the user accesses the website again, because the browser already contains the icon resource of the first page of the website, a request for obtaining the icon resource cannot be sent to the server, so that the website can judge whether the user accesses the website for the first time, and if not, the unique identifier information is recovered (read) in the step 3; in order to rebuild an identifier of a user, the front end of the website must access all available routes, and the server records icon resources of which pages are requested by the browser (at this time, the icon resources requested by the browser are all resources which do not exist in the F-Cache of the browser), so that the Cache of icons corresponding to which URLs exist in the F-Cache can be deduced reversely, and the Cache information is converted into corresponding user IDs through the information, so that the website recovers the identity ID information of the accessed user through the F-Cache information of the browser.
Preferably, the data entry of the F-Cache in the server comprises an accessed URL, favicon ID and time to live TTL, and further comprises icon Cache information corresponding to the URL; the URL includes subdomain, domain, route, URL parameters. The design is to let website developers divide different parts of the same website by using different icons, for example, different routes or different sub-domain names may use different icons, which also makes the possibility that users are tracked.
A computer readable storage medium having stored thereon a browser icon cache-based persistent identity recognition program, which when executed by a processor implements the above-described browser icon cache-based persistent identity recognition method.
A computer device comprises a memory, a processor and a computer program which is stored on the memory and can run on the processor, wherein when the processor executes the program, the persistent identity identification method based on browser icon caching is realized.
The invention relates to a persistent identity identification method, medium and equipment based on browser icon caching, which are used for distributing unique identification of each access user and binding the unique identification with the browser icon caching; when any user accesses the website, the identity of the user is identified by using a URL-cache matching mechanism; and a computer-readable storage medium, a computer apparatus, based on the method.
The technical idea of the invention is that on the basis of the research of Konstatinos Solomos and the like, a set of identity tracking mechanism which can lead the number of tracking users to be continuously and incrementally expanded is designed by combining the icon cache loophole of the browser and the URL-cache matching mechanism (icon matching mechanism) structure of the modern browser, and the identity tracking mechanism is not limited to checking whether a specific user has accessed a certain website.
The method has the advantages that the privacy tracking model capable of persistently tracking the identity of the user is provided, the icon cache loophole of the browser is combined with the URL-cache matching mechanism, hidden potential safety hazards in the icon cache of the modern browser are revealed, and the improvement and the perfection of the modern browser in the aspect of safety are facilitated.
Drawings
FIG. 1 is a flow chart of a method of the present invention;
FIG. 2 is a flow chart of writing a persistent fingerprint of the present invention;
FIG. 3 is a flow chart of reading a persistent fingerprint according to the present invention.
Detailed Description
The present invention is described in further detail with reference to the following examples, but the scope of the present invention is not limited thereto.
As shown in FIG. 1, the invention relates to a persistent identity identification method based on browser icon cache, which allocates unique identification of each access user and binds with the browser icon cache; when any user accesses the website, the identity of the user is identified by using a URL-cache matching mechanism.
The method comprises the following steps:
step 1: judging whether a current user accesses a website for the first time; if so, randomly generating a unique identifier for the user at the server side, and carrying out the next step, otherwise, directly carrying out the step 3;
in the step 1, for any user, whether the user accesses the website for the first time is judged according to whether the initial page of the accessed webpage returns the corresponding home page icon request, and if the initial page returns, the user accesses the website for the first time.
The unique identification is a binary ID.
Step 2: binding the unique identifier with a browser icon cache to enable a current user to permanently fix user information in a current website; carrying out step 4;
in the step 2, different URLs are allocated to the unique identifier and are in one-to-one correspondence with bit positions in the unique identifier, and the server stores the unique identifier in a browser and redirects a user to all currently adopted URLs in sequence; and caching the home page icon request of the accessed website to the server of the user.
In the step 2, only the icon cache of the URL corresponding to the bit with the median of 1 of the unique identifier is stored in the browser.
And step 3: reading identity information of an accessed user;
in the step 3, the status code 404 is returned for all the requests of the icon resource, and for all the bit positions 0 corresponding to the URLs receiving the icon cache request and other pages are set to 1, the unique identifier of the user is restored in sequence.
The data entry of the F-Cache in the server comprises an accessed URL, a favicon ID and a time to live TTL, and further comprises icon Cache information corresponding to the URL; the URL includes subdomain, domain, route, URL parameters.
And 4, step 4: and the current user browses at the current website with the unique identifier.
The writing of the persistent icon cache in the tracking model is further described with reference to fig. 2 and 3.
As shown in fig. 2, the unique identifier generated for the user, that is, the ID is 1010, and the information of each bit in the ID needs to be stored by means of a URL, so that each bit corresponds to the URL of a, b, c, and d in sequence, the server stores the ID in the browser, and then the user will be redirected to all paths of the website in sequence, starting from/a, navigating to/b, going to/c, and finally going to/d;
when the user accesses the web pages, the browser requests a favicon for each path; in the same manner from/a/favicon. Ico, to/b/favicon. Ico, to/c/favicon. Ico, and finally to/d/favicon. Ico;
the server storing the generated random ID responds only to the icon request of the URL in which the ID corresponds to bit 1, in the above example, the server returns the corresponding icon resource only to both/a/favicon. Ico and/c/favicon. Ico, and the other icon resource requests all return 404 codes representing that the resource cannot be found;
after the above process, the browser stores the icon caches corresponding to the two URLs a and c; by buffering detection, the corresponding buffering case can be decoded into the corresponding ID-1010.
As shown in fig. 3, a status code is returned 404 for all icon requests; the aim of the stage is to identify the identity information of a non-initial access user according to the Cache content of the existing F-Cache, the front end of the website still traverses URLs corresponding to different bits in all corresponding identity IDs, but the difference with the writing step is that the server always responds to the request of the icon resource by 404 state codes, but normally responds to all other requests, because in the reading step, the icon resource request identifier sent by each browser indicates that no corresponding icon resource Cache exists in the browser, and if the server normally responds to the request at the moment, the Cache information in the browser is changed, namely the identity ID information stored in the writing process is changed;
the back end records all received icon requests and restores and stores the ID information; for all the pages receiving the icon caching request, the corresponding bit is 0, and the other pages are 1, so that the ID generated by the browser user at the initial back end can be restored.
To achieve the above, the present invention also relates to a computer-readable storage medium characterized in that: the persistent identity recognition program based on the browser icon cache is stored on the browser icon cache, and when being executed by a processor, the persistent identity recognition program based on the browser icon cache realizes the persistent identity recognition method based on the browser icon cache.
In order to achieve the above object, the present invention further provides a computer device including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein: when the processor executes the program, the persistent identity recognition method based on the browser icon cache is realized.
Through a computer readable storage medium and computer equipment, the identification of specific user identities is realized by using a URL-Cache matching mechanism in the F-Cache.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A persistent identity identification method based on browser icon caching is characterized in that: the method allocates unique identification of each access user and binds with the browser icon cache; when any user accesses the website, the identity of the user is identified by using a URL-cache matching mechanism.
2. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 1, wherein: the method comprises the following steps:
step 1: judging whether a current user accesses a website for the first time; if so, randomly generating a unique identifier for the user at the server side, and carrying out the next step, otherwise, directly carrying out the step 3;
step 2: binding the unique identifier with a browser icon cache to enable a current user to permanently fix user information in a current website; carrying out step 4;
and step 3: reading identity information of an accessed user;
and 4, step 4: and the current user browses at the current website by using the unique identifier.
3. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 2, wherein: in the step 1, for any user, whether the user accesses the website for the first time is judged according to whether the initial page of the accessed webpage returns the corresponding home page icon request, and if the initial page returns, the user accesses the website for the first time.
4. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 2, wherein: the unique identification is a binary ID.
5. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 4, wherein the method comprises the following steps: in the step 2, different URLs are allocated to the unique identifier and are in one-to-one correspondence with bit positions in the unique identifier, and the server stores the unique identifier in a browser and redirects a user to all currently adopted URLs in sequence; and caching the home page icon request of the accessed website to the server of the user.
6. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 5, wherein: in the step 2, only the icon cache of the URL corresponding to the bit with the median of 1 of the unique identifier is stored in the browser.
7. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 1, wherein: in the step 3, the status code 404 is returned for all the requests of the icon resource, and for all the bit positions 0 corresponding to the URLs receiving the icon cache request and other pages are set to 1, the unique identifier of the user is restored in sequence.
8. The method for identifying the persistent identity based on the browser icon cache as claimed in claim 1, wherein: the data entry of the F-Cache in the server comprises an accessed URL, a favicon ID and a time to live TTL, and further comprises icon Cache information corresponding to the URL; the URL includes subdomain, domain, route, URL parameters.
9. A computer-readable storage medium characterized by: the persistent identity recognition program based on the browser icon cache is stored on the browser icon cache, and when being executed by a processor, the persistent identity recognition program based on the browser icon cache realizes the persistent identity recognition method based on the browser icon cache.
10. A computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein: when the processor executes the program, the persistent identity recognition method based on the browser icon cache is realized.
CN202211119457.5A 2022-09-14 2022-09-14 Persistent identity identification method, medium and equipment based on browser icon cache Pending CN115603946A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211119457.5A CN115603946A (en) 2022-09-14 2022-09-14 Persistent identity identification method, medium and equipment based on browser icon cache

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211119457.5A CN115603946A (en) 2022-09-14 2022-09-14 Persistent identity identification method, medium and equipment based on browser icon cache

Publications (1)

Publication Number Publication Date
CN115603946A true CN115603946A (en) 2023-01-13

Family

ID=84842567

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211119457.5A Pending CN115603946A (en) 2022-09-14 2022-09-14 Persistent identity identification method, medium and equipment based on browser icon cache

Country Status (1)

Country Link
CN (1) CN115603946A (en)

Similar Documents

Publication Publication Date Title
JP6122199B2 (en) System, method and storage medium for improving access to search results
US10165072B2 (en) Unified tracking data management
JP5826266B2 (en) Method and apparatus for handling nested fragment caching of web pages
US9426200B2 (en) Updating dynamic content in cached resources
CN104516920B (en) Data query method and data query system
US7698347B2 (en) System and method for shortening click URLS
US20120233199A1 (en) Intelligent Web Caching
CN103747072A (en) Data reading and writing method and application server
CN110321325A (en) File inode lookup method, terminal, server, system and storage medium
JP2015511347A5 (en)
EP2304595A1 (en) Tracking implicit trajectory of content sharing
CN109634753B (en) Data processing method, device, terminal and storage medium for switching browser kernels
CN114610951A (en) Data processing method and device, electronic equipment and readable storage medium
CN110008197A (en) A kind of data processing method, system and electronic equipment and storage medium
CN105005567A (en) Interest point query method and system
US8825740B2 (en) Smart, search-enabled web error pages
CN113330432A (en) Asynchronous predictive caching of content listed in search results
CN106959975B (en) Transcoding resource cache processing method, device and equipment
US20060064406A1 (en) Method and computer program product for accessing an alternative web page when a desired web page is unavailable
CN115603946A (en) Persistent identity identification method, medium and equipment based on browser icon cache
CN116009983A (en) Preloading method and device based on request path and electronic equipment
US11716405B1 (en) System and method for identifying cache miss in backend application
CN105190598A (en) Resource reference classification
CN110825986B (en) Method, system, storage medium and electronic device for client to request data
CN115766167A (en) Illegal website identification method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination