CN116017434A - Hierarchical processing, encrypting and checking method and system for rail transit data - Google Patents

Hierarchical processing, encrypting and checking method and system for rail transit data Download PDF

Info

Publication number
CN116017434A
CN116017434A CN202211677665.7A CN202211677665A CN116017434A CN 116017434 A CN116017434 A CN 116017434A CN 202211677665 A CN202211677665 A CN 202211677665A CN 116017434 A CN116017434 A CN 116017434A
Authority
CN
China
Prior art keywords
configuration file
encrypted
plaintext
file
wireless modem
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211677665.7A
Other languages
Chinese (zh)
Inventor
黄辉
华晟
王美茜
韩熠
季庆华
周学兵
苏阿峰
马钰昕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Casco Signal Ltd
Original Assignee
Casco Signal Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Casco Signal Ltd filed Critical Casco Signal Ltd
Priority to CN202211677665.7A priority Critical patent/CN116017434A/en
Publication of CN116017434A publication Critical patent/CN116017434A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Mobile Radio Communication Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a hierarchical processing, encrypting and checking method and system for rail transit data, wherein the method comprises the following steps: converting the original configuration file into a basic seed file; performing data classification and classification treatment on the basic seed files through a classification module to form seed files and plaintext seed files to be encrypted; the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted, and respectively generates a plaintext configuration file and a configuration file to be encrypted; the encryption module encrypts the configuration file to be encrypted to generate an encrypted configuration file; and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, wherein the wireless modem equipment can respectively carry out integrity check on the plaintext configuration file and the encrypted configuration file after the configuration uploading, and receive uploading after the check is successful. The advantages are that: according to the method, the protection capability and the security of important data of the system are improved through a selection mechanism for classifying and grading the data.

Description

Hierarchical processing, encrypting and checking method and system for rail transit data
Technical Field
The invention relates to the field of track traffic data processing, in particular to a method for grading processing, encrypting and checking the integrity of configuration file data of a wireless modem device of a track traffic signal system, and particularly relates to a method for grading processing, encrypting sensitive data, generating a plaintext configuration file and an encrypted configuration file, and generating the configuration files in batches.
Background
The wireless network of the signal system in urban rail transit relates to that wireless modem equipment is deployed along the line to obtain good wireless coverage, data in a used configuration file is not classified and managed, a certain unauthorized access risk exists, and sensitive parameters of the configuration file are peeped, intercepted and even tampered. The configuration file of the current wireless modem device only adopts a digest algorithm of MD5 to issue data to the site for use, no encryption algorithm is adopted, the storage and updating of the secret key also lack a corresponding mechanism, and great potential safety hazards exist. Therefore, improvements are needed to improve the security of data.
It is to be understood that the foregoing is merely illustrative of the background art to which the present invention pertains and is not necessarily a representation of the prior art.
Disclosure of Invention
The invention aims to provide a hierarchical processing, encrypting and integrity checking method and system for rail transit data, wherein the method enables the use of different data protection methods in the same original configuration file to be possible through a selection mechanism for classifying and grading the data, so that the protection capability of important data of the system is improved; meanwhile, when the line is implemented, a configuration file providing method is generated in a batch processing mode, so that convenience in project data production is improved; and finally, the validity of the secret key is enhanced by flexibly setting a storage updating mechanism of the secret key, so that the security of important configuration data of the system is protected, the important influence on the system caused by data leakage, interception and tampering is prevented, and the high security and high reliability of the configuration data of the wireless equipment of the signal system are realized.
In order to achieve the above purpose, the present invention is realized by the following technical scheme:
a hierarchical processing, encryption and integrity verification method for rail transit data, comprising:
converting the original configuration file into a basic seed file applicable to all wireless modem devices;
carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file;
the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted to respectively generate a plaintext configuration file and a configuration file to be encrypted of each wireless modem device, and the encryption module carries out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file;
and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration uploading, the wireless modem equipment respectively performs integrity check on the plaintext configuration file and the encrypted configuration file, and receives and uploads after the check is successful.
Optionally, the values of the data applicable to the corresponding items in the original configuration file are replaced by wild cards to generate the basic seed file.
Optionally, the general parameters include one or more of a transmission power, a handover threshold, and a device name;
the sensitive parameters comprise one or more of access passwords of wireless modem equipment, login passwords of http, authentication and encryption passwords of SNMP and authentication server sharing secret keys of 802.1 x.
Optionally, before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file is uploaded to the wireless modem device, the wireless modem device needs to use a digest calculation module to perform digest calculation respectively, and the wireless modem device performs integrity check on the configuration file of the plaintext and the configuration file of the encrypted configuration file after the digest processing respectively, and can load the configuration file on the device after the verification is correct.
Optionally, the SHA384 algorithm of the hash algorithm performs digest calculation on the plaintext configuration file to obtain the hash value thereof.
Optionally, the seed file to be encrypted is subjected to digest calculation while being encrypted;
the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm, and meanwhile, a key http password is subjected to ciphertext storage through a hash algorithm with salt;
and/or the encryption algorithm adopted by the seed file to be encrypted is an AES256 algorithm, and a one-time pad mechanism is adopted.
Optionally, when the wireless modem device performs integrity check on the encrypted configuration file, the wireless modem device needs to input a key to decrypt the encrypted configuration file, and then performs integrity check;
the wireless modem device directly performs integrity check on the plaintext configuration file.
Optionally, the plaintext configuration file is in a modifiable state, and the plaintext configuration file is modified by performing batch processing, abstract processing, configuration uploading and integrity checking again.
Optionally, a system for performing the aforementioned hierarchical processing, encryption and integrity checking methods of rail traffic data comprises:
the hierarchical classification module is used for dividing the basic seed file into a plaintext seed file and a seed file to be encrypted;
the batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device;
the encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file; and the wireless modem device performs integrity check on the clear text configuration file and the encrypted configuration file respectively, and receives and uploads the clear text configuration file and the encrypted configuration file after the verification is successful.
Optionally, the method further comprises:
and the digest calculation module is connected with the batch processing module and is used for performing digest calculation on the plaintext configuration file and the configuration file to be encrypted, and the wireless modem equipment performs integrity check when uploading configuration, and the loading of data is completed after the check is successful.
Optionally, after the plaintext configuration file and the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device decrypts the encrypted configuration file first and then passes through the integrity check; the wireless modem device directly performs integrity check on the plaintext configuration file; after verification, the wireless modem device can be loaded.
Compared with the prior art, the invention has the following advantages:
in the method and the system for classifying, encrypting and checking the integrity of the rail transit data, the security management of important data is realized by classifying and classifying all parameters in the configuration file of the wireless modulation and demodulation equipment of the signal system and encrypting the sensitive parameters which are not commonly used, and the other parameters are set as general parameters, so that the method is convenient for debugging and modification; then, carrying out abstract calculation on the plaintext configuration file and the encrypted configuration file to realize the integrity protection of important data; meanwhile, the function of batch generation of configuration files of the wireless modem equipment can be realized.
Furthermore, the method has high flexibility, and different processing methods can be adopted for different levels of configuration data to meet different engineering requirements.
Furthermore, the method has good robustness, and the influence on the configuration of important equipment of the signal system is avoided by carrying out high-strength encryption algorithm and integrity hash check on the configuration file of the wireless modem equipment.
Furthermore, the method is good in timeliness, and the difficulty of outside malicious decoding is increased through a key updating mechanism.
Drawings
FIG. 1 is a hierarchical processing, encryption and integrity verification method of rail transit data of the present invention;
FIG. 2 is a schematic diagram of a system framework for performing hierarchical processing, encryption and integrity verification of rail transit data in accordance with the present invention;
fig. 3 is a schematic diagram of a system function relationship for executing the hierarchical processing, encryption and integrity verification method of the rail transit data according to the present invention.
Detailed Description
The following description of the embodiments of the present invention will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the invention. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
Fig. 1 shows a hierarchical processing, encrypting and integrity checking method of rail traffic data according to the present invention, which comprises:
s1, converting the original configuration file into a basic seed file applicable to all wireless modem devices, namely wireless modem devices. The original configuration file is an unprocessed configuration file in the signal system wireless network device.
Specifically, in this embodiment, the values of the data applicable to the corresponding item, i.e., the present item, in the original configuration file are replaced with wild cards to generate the base seed file for subsequent data processing.
S2, carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file.
Optionally, the general parameters include one or more of a transmit power, a handover threshold, and a device name. Further, the sensitive parameters include one or more of access passwords of the wireless modem device, login passwords of http, authentication and encryption passwords of SNMP, and authentication server sharing keys of 802.1 x. It will be appreciated that the general and sensitive parameters include data types not limited to the above, but in other embodiments may include other data types, as the invention is not limited in this regard.
S3, the batch processing module respectively performs batch processing on the plaintext seed files and the seed files to be encrypted, and generates configuration files of a plurality of wireless modem devices in batches, wherein each device generates two configuration files, namely the plaintext configuration files and the configuration files to be encrypted. The encryption and the digest calculation of the configuration file to be encrypted are completed at the same time in this step, that is, the seed file to be encrypted is subjected to the digest calculation at the same time of encryption processing. Specifically, the configuration file to be encrypted is subjected to digest calculation through a digest calculation module, and the configuration file to be encrypted is subjected to encryption processing through an encryption module to generate an encrypted configuration file. In this embodiment, the encryption algorithm adopted by the seed file to be encrypted is AES256 algorithm, encryption is performed according to the set key, the function is set such that different keys must be set for each encryption, i.e. one-time encryption mechanism, and the debugger does not have the right to use the encryption module. Meanwhile, the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm to obtain a hash value, and meanwhile, a hash algorithm with salt is adopted to store the key http password in a ciphertext mode.
S4, uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration is uploaded, the wireless modem equipment performs integrity check on the plaintext configuration file and the encrypted configuration file respectively, and loads the configuration file on the wireless modem equipment after the verification is successful.
In this embodiment, before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device needs to perform digest calculation respectively by using a digest calculation module, and the wireless modem device performs integrity check (may input hash values respectively for checking) on the configuration file of the plaintext and the configuration file of the encrypted configuration file after the digest processing, and may be loaded on the wireless modem device after the check is correct. In this embodiment, the SHA384 algorithm of the hash algorithm performs digest calculation on the plaintext configuration file to obtain the hash value thereof. Digest computation of encrypted configuration files has been computed at the time of the foregoing encryption.
Further, in this embodiment, when the wireless modem device performs integrity check on the encrypted configuration file, it is necessary to input a key (encryption password) to decrypt the encrypted configuration file, and then perform integrity check. The wireless modem device directly performs integrity check on the plaintext configuration file. And then the wireless modem equipment loads each configuration file which is checked to be correct, and the configuration uploading is completed.
In this embodiment, the plaintext configuration file is in a modifiable state, and a debugger can modify the plaintext configuration file according to the debug condition. And after the plaintext configuration file is modified, batch processing, abstract processing, configuration uploading and integrity checking processes are needed to be carried out again so as to complete the configuration uploading of the configuration file. In view of data sensitivity, the debugger does not have the right to modify the encrypted configuration file.
Compared with the prior art, the method for grading processing, encrypting and integrity checking of the rail transit data has the advantages of wide application range, high confidentiality degree, convenience in use and the like, and prevents important parameters of wireless equipment from leaking or being cracked, so that the safe operation of the rail transit is better ensured.
Based on the same inventive concept, the invention also provides a system capable of executing the grading processing, encryption and integrity checking methods of the rail transit data, as shown in fig. 2, the system can be regarded as a data processing tool, and the basic seed file can be uploaded to the wireless modem device after being processed by the data processing tool.
Specifically, as shown in fig. 2 and 3 in combination, the system comprises: the system comprises a hierarchical classification module, a batch processing module and an encryption module. The classification module is used for dividing the basic seed feed file into a plaintext feed file and a feed file to be encrypted. The batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device. The encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file. When the plaintext configuration file and the encrypted configuration file are uploaded and configured, the wireless modem device performs integrity verification on the plaintext configuration file and the encrypted configuration file respectively, and the data loading is completed after the verification is successful.
Further, the system also comprises a digest calculation module, wherein the digest calculation module is connected with the batch processing module and is used for respectively carrying out digest calculation on the plaintext configuration file and the configuration file to be encrypted. Before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem equipment, the wireless modem equipment needs to respectively carry out abstract calculation by using an abstract calculation module, and the wireless modem equipment respectively carries out integrity check on the configuration file of the plaintext and the configuration file of the encrypted after the abstract treatment, and can be loaded on the wireless modem equipment after the check is correct.
In summary, in the method and system for hierarchical processing, encryption and integrity verification of rail transit data, the method mainly aims at the configuration file of the wireless modem equipment of the signal system, and the security management of important data is realized by encrypting the sensitive parameters which are not used frequently in a manner of classifying and grading the parameters in the configuration file, and the parameters which are required to be modified frequently in project debugging are divided into general parameters without encryption processing, so that the debugging and modification are convenient; and then, carrying out abstract calculation on the plaintext configuration file and the encrypted configuration file, and realizing the integrity protection of important data. Meanwhile, the method can realize the batch generation function of the configuration files of the wireless modem equipment, and is greatly convenient for the data making process in the project implementation process.
While the present invention has been described in detail through the foregoing description of the preferred embodiment, it should be understood that the foregoing description is not to be considered as limiting the invention. Many modifications and substitutions of the present invention will become apparent to those of ordinary skill in the art upon reading the foregoing. Accordingly, the scope of the invention should be limited only by the attached claims.

Claims (11)

1. A hierarchical processing, encryption and integrity verification method for rail transit data, comprising:
converting the original configuration file into a basic seed file applicable to all wireless modem devices;
carrying out data classification and classification processing on the data in the basic seed file through a classification module, and dividing the data into sensitive parameters and general parameters, wherein the sensitive parameters form a seed file to be encrypted, and the general parameters form a plaintext seed file;
the batch processing module respectively carries out batch processing on the plaintext seed file and the seed file to be encrypted to respectively generate a plaintext configuration file and a configuration file to be encrypted of each wireless modem device, and the encryption module carries out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file;
and uploading the configuration of the plaintext configuration file and the encrypted configuration file to the wireless modem equipment, and after the configuration uploading, the wireless modem equipment respectively performs integrity check on the plaintext configuration file and the encrypted configuration file, and receives and uploads after the check is successful.
2. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
and substituting the value of the data suitable for the corresponding item in the original configuration file by a wild card to generate a basic seed file.
3. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
the general parameters comprise one or more of transmission power, a switching threshold and equipment names;
the sensitive parameters comprise one or more of access passwords of wireless modem equipment, login passwords of http, authentication and encryption passwords of SNMP and authentication server sharing secret keys of 802.1 x.
4. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
before the configuration of the plaintext configuration file and the configuration of the encrypted configuration file are uploaded to the wireless modem equipment, the wireless modem equipment needs to respectively carry out digest calculation by using a digest calculation module, and the wireless modem equipment respectively carries out integrity check on the configuration file of the plaintext and the configuration file of the encrypted after the digest processing, and can be loaded on the equipment after the check is correct.
5. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 4, wherein,
and carrying out abstract calculation on the plaintext configuration file through an SHA384 algorithm of the hash algorithm to obtain a hash value of the plaintext configuration file.
6. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 4, wherein,
the seed file to be encrypted is subjected to digest calculation while being encrypted;
the seed file to be encrypted is subjected to abstract calculation through an SHA384 algorithm of a hash algorithm, and meanwhile, a key http password is subjected to ciphertext storage through a hash algorithm with salt;
and/or the encryption algorithm adopted by the seed file to be encrypted is an AES256 algorithm, and a one-time pad mechanism is adopted.
7. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
when the wireless modem equipment performs integrity check on the encrypted configuration file, a key is required to be input first for decryption, and then the integrity check is performed;
the wireless modem device directly performs integrity check on the plaintext configuration file.
8. The hierarchical processing, encryption and integrity verification method of rail transit data of claim 1, wherein,
the plaintext configuration file is in a modifiable state, and the plaintext configuration file is modified and then needs to be subjected to batch processing, abstract processing, configuration uploading and integrity checking processes.
9. A system for performing the hierarchical processing, encryption and integrity verification method of rail transit data according to any one of claims 1 to 8, comprising:
the hierarchical classification module is used for dividing the basic seed file into a plaintext seed file and a seed file to be encrypted;
the batch processing module is connected with the hierarchical classification module and is used for respectively carrying out batch processing on the plaintext seed files and the seed files to be encrypted and respectively generating plaintext configuration files and configuration files to be encrypted of each wireless modem device;
the encryption module is connected with the batch processing module and is used for carrying out encryption processing on the configuration file to be encrypted to generate an encrypted configuration file; and the wireless modem device performs integrity check on the clear text configuration file and the encrypted configuration file respectively, and receives and uploads the clear text configuration file and the encrypted configuration file after the verification is successful.
10. The system for performing the hierarchical processing, encryption and integrity verification method of rail transit data as set forth in claim 9, further comprising:
and the digest calculation module is connected with the batch processing module and is used for performing digest calculation on the plaintext configuration file and the configuration file to be encrypted, and the wireless modem equipment performs integrity check when uploading configuration, and the loading of data is completed after the check is successful.
11. The system for performing the hierarchical processing, encryption and integrity verification method of rail transit data as set forth in claim 9, wherein,
after the plaintext configuration file and the encrypted configuration file are uploaded to the wireless modem device, the wireless modem device decrypts the encrypted configuration file firstly and then carries out integrity check; the wireless modem device directly performs integrity check on the plaintext configuration file; after verification, the wireless modem device can be loaded.
CN202211677665.7A 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data Pending CN116017434A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211677665.7A CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211677665.7A CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data

Publications (1)

Publication Number Publication Date
CN116017434A true CN116017434A (en) 2023-04-25

Family

ID=86027669

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211677665.7A Pending CN116017434A (en) 2022-12-26 2022-12-26 Hierarchical processing, encrypting and checking method and system for rail transit data

Country Status (1)

Country Link
CN (1) CN116017434A (en)

Similar Documents

Publication Publication Date Title
CN111222155A (en) Method and system for combining re-encryption and block link
US7681033B2 (en) Device authentication system
US20110246433A1 (en) Random number based data integrity verification method and system for distributed cloud storage
CN113111364A (en) Block chain data privacy protection system and protection method thereof
CN103220295A (en) Document encryption and decryption method, device and system
CN112311865A (en) File encryption transmission method and device
CN105812146A (en) MD5-based two-way encryption data protection method
CN112653719A (en) Automobile information safety storage method and device, electronic equipment and storage medium
CN100334519C (en) Method for establishing credible input-output channels
Kim et al. A study on the decryption methods of telegram X and BBM-Enterprise databases in mobile and PC
CN114942729A (en) Data safety storage and reading method for computer system
CN116455572B (en) Data encryption method, device and equipment
Jain et al. A novel data logging framework to enhance security of cloud computing
CN105022651B (en) A kind of method for preventing piracy in equipment production process and firmware programming device
US20080104396A1 (en) Authentication Method
CN116017434A (en) Hierarchical processing, encrypting and checking method and system for rail transit data
CN112291189B (en) Method, device, equipment and storage medium for sending and checking ciphertext
Rijanandi et al. Implementation of encrypt national ID card in Sinovi application use waterfall methodology
CN111343421B (en) Video sharing method and system based on white-box encryption
Neforawati et al. Message Digest 5 (MD-5) Decryption Application using Python-Based Dictionary Attack Technique
Abdullah et al. IOT Security: Data Encryption for Arduino-based IOT Devices
CN116502251B (en) Data encryption storage method, device, equipment and storage medium
Zachos Securing J1939 communications using strong encryption with FIPS 140-2
CN117077184B (en) Method, system, equipment and medium for authorizing and keeping secret of upper computer software of DCS (distributed control system)
CN110490003B (en) User trusted data generation method, user trusted data acquisition method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination