CN116318887A - Application-based data access management method and server - Google Patents

Application-based data access management method and server Download PDF

Info

Publication number
CN116318887A
CN116318887A CN202310142685.2A CN202310142685A CN116318887A CN 116318887 A CN116318887 A CN 116318887A CN 202310142685 A CN202310142685 A CN 202310142685A CN 116318887 A CN116318887 A CN 116318887A
Authority
CN
China
Prior art keywords
authorization
data
application
application program
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310142685.2A
Other languages
Chinese (zh)
Inventor
林大甲
黄宗荣
程永红
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinqianmao Technology Co ltd
Original Assignee
Jinqianmao Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinqianmao Technology Co ltd filed Critical Jinqianmao Technology Co ltd
Priority to CN202310142685.2A priority Critical patent/CN116318887A/en
Publication of CN116318887A publication Critical patent/CN116318887A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/60Scheduling or organising the servicing of application requests, e.g. requests for application data transmissions using the analysis and optimisation of the required network resources
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of data access management, in particular to a method and a server for data access management based on application, wherein an authorization center receives application information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information; each time the data center receives an access request, the data center acquires the requested target data contained in the access request and the authorization code of the access application program, and sends the target data and the authorization code to the authorization center for verification; the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result; the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing; on the basis of traditional data access management, a data access management method is newly added, and the data security of the whole data center is enhanced.

Description

Application-based data access management method and server
Technical Field
The present invention relates to the field of data access management technologies, and in particular, to a method and a server for application-based data access management.
Background
In recent years, with rapid development of internet technology, access across data centers has become more frequent, and demand for data sharing access has become more vigorous.
To prevent unauthorized access to the information system, there should be a regular program to control the allocation of access rights to the information system and services, a process of restricting the user's access to certain information items by the user's identity and some defined group to which it belongs, or restricting the use of certain control functions, is called access management.
The access management for the data is an important technology, so that the data of the data center can be ensured to be safely and reliably accessed, and the leakage of key data is avoided. Currently, the primary access management for data is authenticated by user identity or host identity, however, this approach has a potential problem in that if the user identity is compromised, it is at risk of critical data leakage.
Therefore, how to increase the access management method of data different from user and host identity verification to improve the data security of the whole data center is a technical problem to be solved at present.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: the method and the server for data access management based on the application are provided, and authentication authorization of an application program is increased so as to improve data security of the whole data center.
In order to solve the technical problems, the invention adopts the following technical scheme:
a method of application-based data access management, comprising the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
s2, each time the data center receives an access request, acquiring the requested target data and the authorization code of the access application program contained in the access request, and sending the target data and the authorization code to the authorization center for verification;
s3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
and S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
In order to solve the technical problems, the invention adopts another technical scheme that:
a server for application-based data access management, comprising a processor, a memory and a computer program stored in the memory and executable on the processor, the processor implementing an authorization center and a data center when executing the computer program, and the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
s2, each time the data center receives an access request, acquiring the requested target data and the authorization code of the access application program contained in the access request, and sending the target data and the authorization code to the authorization center for verification;
s3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
and S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
The invention has the beneficial effects that: in the method and the server for data access management based on the application, the method for data access management is newly added on the basis of traditional data access management, the specific application is authorized according to different applications instead of traditional modes such as IP, user ID and the like, the application needs to be registered in advance with an authorization center, an authorization code is taken, the application is accessed through the authorization code, and the specific data can be accessed only through the authenticated application, so that the data security of the whole data center is enhanced.
Drawings
FIG. 1 is a flow chart of a method of application-based data access management in accordance with an embodiment of the present invention;
FIG. 2 is a block diagram of a server for application-based data access management according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating an example of authorization verification for a method of application-based data access management according to an embodiment of the invention;
description of the reference numerals:
1. a server for application-based data access management; 2. a processor; 3. a memory.
Detailed Description
In order to describe the technical contents, the achieved objects and effects of the present invention in detail, the following description will be made with reference to the embodiments in conjunction with the accompanying drawings.
Referring to fig. 1, a method for managing data access based on an application includes the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
s2, each time the data center receives an access request, acquiring the requested target data and the authorization code of the access application program contained in the access request, and sending the target data and the authorization code to the authorization center for verification;
s3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
and S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
From the above description, the beneficial effects of the invention are as follows: in the method for managing the data access based on the application, the authority of the data is controlled, the specific application is authorized according to different applications instead of traditional modes such as IP, user ID and the like, the application needs to be registered with an authorization center in advance, an authorization code is taken, the data is accessed through the authorization code, and the specific data can be accessed only through the authenticated application, so that the data security of the whole data center is enhanced.
Further, the authorization verification in step S3 includes:
and matching the current application program with the authorization code according to the registered application program and the associated authorization code, and if the matching fails, confirming that the authorization code is invalid and the authorization fails.
As can be seen from the above description, by matching with the registered application program and the associated authorization code, whether the authorization code is valid is determined.
Further, the step S1 specifically includes:
the authorization center receives application program information of the application program, generates a unique identifier for the application program which completes registration, and configures the validity period of access;
generating an authorization code according to the unique identifier and the validity period, and configuring access right information;
the authorization verification in step S3 includes:
and verifying whether the authorization code exceeds the valid period according to the current time, if so, determining that the authorization code is invalid, and failing to authorize.
As can be seen from the above description, the server controls the effective time of the application authorization code, and when the application accesses through the authorization code, the data can be accessed only by effective authentication of the server.
Further, the authorization center maintains blacklist information of the application;
the authorization verification in step S3 includes:
and judging whether the application program is positioned in the blacklist information, and if so, judging that the authorization fails.
As can be seen from the above description, the system further includes a blacklist control, and for the application program that is blacklisted, whether or not registration has been performed before, the authorization code is determined to be invalid, and data access is denied.
Further, the unique identifier is specifically program fingerprint information;
the generation of the unique identifier for the application program which completes registration is specifically as follows:
program fingerprint information is extracted for the application program that completes registration.
It can be seen from the above description that by intercepting the application program, fingerprint information of the application program is generated, the application authenticates to the authorization center through the fingerprint information, and an authorization code is obtained, so that unique binding identification of the application and the authorization code is ensured.
Referring to fig. 2, a server for application-based data access management includes a processor, a memory, and a computer program stored in the memory and executable on the processor, wherein the processor implements an authorization center and a data center when executing the computer program, and the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
s2, each time the data center receives an access request, acquiring the requested target data and the authorization code of the access application program contained in the access request, and sending the target data and the authorization code to the authorization center for verification;
s3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
and S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
From the above description, the beneficial effects of the invention are as follows: in the server side based on the data access management of the application, the authority control of the data is performed on specific applications according to different applications instead of traditional modes such as IP, user ID and the like, the application needs to be registered with an authorization center in advance, an authorization code is taken, the specific data can be accessed only by the authenticated application, and therefore the data security of the whole data center is enhanced.
Further, the authorization verification in step S3 includes:
and matching the current application program with the authorization code according to the registered application program and the associated authorization code, and if the matching fails, confirming that the authorization code is invalid and the authorization fails.
As can be seen from the above description, by matching with the registered application program and the associated authorization code, whether the authorization code is valid is determined.
Further, the step S1 specifically includes:
the authorization center receives application program information of the application program, generates a unique identifier for the application program which completes registration, and configures the validity period of access;
generating an authorization code according to the unique identifier and the validity period, and configuring access right information;
the authorization verification in step S3 includes:
and verifying whether the authorization code exceeds the valid period according to the current time, if so, determining that the authorization code is invalid, and failing to authorize.
As can be seen from the above description, the server controls the effective time of the application authorization code, and when the application accesses through the authorization code, the data can be accessed only by effective authentication of the server.
Further, the authorization center maintains blacklist information of the application;
the authorization verification in step S3 includes:
and judging whether the application program is positioned in the blacklist information, and if so, judging that the authorization fails.
As can be seen from the above description, the system further includes a blacklist control, and for the application program that is blacklisted, whether or not registration has been performed before, the authorization code is determined to be invalid, and data access is denied.
Further, the unique identifier is specifically program fingerprint information;
the generation of the unique identifier for the application program which completes registration is specifically as follows:
program fingerprint information is extracted for the application program that completes registration.
It can be seen from the above description that by intercepting the application program, fingerprint information of the application program is generated, the application authenticates to the authorization center through the fingerprint information, and an authorization code is obtained, so that unique binding identification of the application and the authorization code is ensured.
The method and the server for data access management based on the application are suitable for data access management of application programs across data centers in a wide area network environment.
Referring to fig. 1 and 3, a first embodiment of the present invention is as follows:
a method of application-based data access management, comprising the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
the step S1 specifically comprises the following steps:
the authorization center receives application program information of the application program, generates a unique identifier for the application program which completes registration, and configures the validity period of access;
and generating an authorization code according to the unique identification and the validity period, and configuring access right information.
The unique identifier is specifically program fingerprint information;
the generation of the unique identifier for the application program which completes registration is specifically as follows:
program fingerprint information is extracted for the application program that completes registration.
In this embodiment, the application program needs to register application program information in advance with the authorization center, and the authorization center binds a unique authorization code to the application program that completes registration. Specifically, the authorization center generates a unique identifier of the application program by extracting a fingerprint of the application program, thereby generating a specific authorization code. The authorization code information includes application program fingerprint information, access validity period and other information.
S2, each time the data center receives an access request, the requested target data and the authorization code of the access application program contained in the access request are obtained, and the authorization code is sent to the authorization center for verification.
In this embodiment, when the application program sends a data access request to the data center, the data center first authenticates to the authorization center using the obtained authorization code.
S3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
the authorization verification in step S3 includes:
the authorization center matches the current application program with the authorization code according to the registered application program and the associated authorization code, and if the matching fails, the authorization code is determined to be invalid, and the authorization fails;
the authorization center verifies whether the authorization code exceeds the valid period according to the current time, if so, the authorization code is invalid, and the authorization fails;
the authorization center maintains blacklist information of the application;
and the authorization center judges whether the application program is positioned in the blacklist information, and if so, the authorization center judges that the authorization fails.
Referring to fig. 3, in this embodiment, the authorization center verifies the authorization information of the application, and first verifies whether the authorization code is valid, including matching verification and validity period verification. If yes, carrying out the next step; if not, returning authorization failure.
The authorization center verifies the authorization information of the application and judges whether the application is in a blacklist or not. If yes, returning failure; if not, the next step is carried out.
The authorization center maintains access authority list information of the application and the data, and the list information can be set by an administrator according to actual requirements.
The authorization center further verifies whether the application can access the requested data, and judges whether the application has the authority to access the requested data by comparing the access authority list information. If yes, allowing the application to open the access to the request data; if not, returning failure information.
And S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
In this embodiment, the authorization center is divided by functional modules, including the following 5 modules, which are respectively:
and (3) applying a fingerprint extraction module: by fingerprint extraction of the application, a unique identification of the application is generated.
An authorization code generation module: authorized access information (authorization code) to the application is generated from the program fingerprint information, and the information includes the program fingerprint information, validity period, and the like.
A data access list control module: containing a list of datasets and which applications the datasets can be accessed by.
An application authorization management module: including whitelist and blacklist information for the application.
And (3) a verification module: whether the application authorization code is valid and whether the application has data of the permission access request are judged.
The second embodiment of the invention is as follows:
a method for managing data access based on application is different from the first embodiment in that when an application program registers with an authorization center, access rights of which data is needed by the application program need to be provided, and the application program is audited by the authorization center.
In this embodiment, the authorization center divides the data content of the data center into public information, common information and private information according to the public program.
Taking a data center of social software as an example, public information can be any modifiable information such as head portraits and nicknames, and common information can be information which has a certain real association with the user, but can not directly lock the user and has certain generalization, such as constellation, birthdays, cities and the like, for all users. The private information is information of the mobile phone number, the real name and the like of the user, which are bound with the user in a strong association way.
In this embodiment, when registering an application program, the authorization center determines whether the access authority required by the application program only relates to public information, if yes, the authorization center automatically approves the access authority, otherwise, the authorization center notifies an administrator to perform verification. The method can effectively reduce the workload of the administrator.
The third embodiment of the invention is as follows:
a method of application-based data access management is different from the first or second embodiment in that whether or not an interference program of a blacklist application is enabled is confirmed to a user in advance. For the application program in the blacklist of the authorization center, after confirming that the received data access request belongs to the application program in the blacklist, the authorization center returns authorization failure information, randomly generates virtual data conforming to a target data format according to target data requested by the application program, sends the virtual data to the data center, and the data center authorizes the application program to access the virtual data.
In actual use, the virtual data corresponding to the data center blacklist application program can be set as null or predefined by a user.
And carrying out validity check on the virtual data which are randomly generated and the virtual data which are predefined by the user. When the user sets the virtual data or the authorization center randomly generates the virtual data, the content of the virtual data is extracted and matched with the existing user information, whether the user with the same information exists or not is judged, if the user with the same information exists, verification is confirmed to be failed, regeneration/user redefinition is needed, and otherwise verification is passed.
Through validity verification, the situation that the user maliciously imports information of other people can be effectively avoided when the user self-defines virtual data. Meanwhile, the coincidence condition that randomly generated virtual data is real data of a certain user is avoided.
Referring to fig. 2, a fourth embodiment of the present invention is as follows:
the server 1 for application-based data access management comprises a processor 2, a memory 3 and a computer program stored in the memory 3 and executable on the processor 2, wherein the processor is implemented with an authorization center and a data center when executing the computer program, and the steps in the method for application-based data access management of the first or second embodiment are implemented.
In summary, according to the method and the server for data access management based on the application provided by the invention, based on the traditional data access management, a method for data access management is newly added, the specific application is authorized according to different applications instead of traditional modes such as IP, user ID and the like, the application needs to be registered in advance with an authorization center, an authorization code is taken, the application is accessed through the authorization code, and only the authenticated application can access specific data, so that the data security of the whole data center is enhanced.
In the server side based on the data access management of the application, the authority control of the data is performed on specific applications according to different applications instead of traditional modes such as IP, user ID and the like, the application needs to be registered with an authorization center in advance, an authorization code is taken, the specific data can be accessed only by the authenticated application, and therefore the data security of the whole data center is enhanced.
The foregoing description is only illustrative of the present invention and is not intended to limit the scope of the invention, and all equivalent changes made by the specification and drawings of the present invention, or direct or indirect application in the relevant art, are included in the scope of the present invention.

Claims (9)

1. A method of application-based data access management, comprising the steps of:
s1, an authorization center receives application program information of an application program, generates a unique identifier for the application program which completes registration, generates an authorization code according to the unique identifier, and configures access right information;
s2, each time the data center receives an access request, acquiring the requested target data and the authorization code of the access application program contained in the access request, and sending the target data and the authorization code to the authorization center for verification;
s3, the authorization center performs authorization verification according to the authorization code, verifies whether the authorization code has the access right of the target data, and returns a verification result;
and S4, the data center opens access to the target data to the access application program only when the result returned by the authorization center is verification passing.
2. A method of application-based data access management according to claim 1, wherein the authorization verification in step S3 comprises:
and matching the current application program with the authorization code according to the registered application program and the associated authorization code, and if the matching fails, confirming that the authorization code is invalid and the authorization fails.
3. The method for application-based data access management according to claim 1, wherein the step S1 is specifically:
the authorization center receives application program information of the application program, generates a unique identifier for the application program which completes registration, and configures the validity period of access;
generating an authorization code according to the unique identifier and the validity period, and configuring access right information;
the authorization verification in step S3 includes:
and verifying whether the authorization code exceeds the valid period according to the current time, if so, determining that the authorization code is invalid, and failing to authorize.
4. The method of application-based data access management of claim 1, wherein the authorization center maintains blacklist information for applications;
the authorization verification in step S3 includes:
and judging whether the application program is positioned in the blacklist information, and if so, judging that the authorization fails.
5. The method for application-based data access management as recited in claim 4, wherein if the application is located in the blacklist information, the authorization center returns authorization failure information after confirming that the authorization fails, further comprising the steps of:
judging whether the user authorizes to start the interference program, if so, randomly generating virtual data conforming to the target data format according to the target data requested by the application program, sending the virtual data to a data center, and authorizing the application program to access the virtual data by the data center.
6. The method for application-based data access management according to claim 5, wherein the virtual data may be null or preset by a user;
the method further comprises the steps of, before randomly generating the virtual data conforming to the target data format:
judging whether the virtual data are preset by a user or not, and if so, returning the virtual data.
7. The method of application-based data access management of claim 5, further comprising the step of, prior to sending the virtual data to a data center:
and extracting the content in the virtual data, matching the non-null data with the existing user information in the data center, judging whether two or more users with consistent information exist, and if so, judging that the validity check fails and regenerating the virtual data.
8. A method of application-based data access management according to claim 1, characterized in that the unique identification is in particular program fingerprint information;
the generation of the unique identifier for the application program which completes registration is specifically as follows:
program fingerprint information is extracted for the application program that completes registration.
9. A server for application-based data access management comprising a processor, a memory and a computer program stored in the memory and executable on the processor, characterized in that the processor, when executing the computer program, implements the steps of a method for application-based data access management according to any of the preceding claims 1-8.
CN202310142685.2A 2023-02-21 2023-02-21 Application-based data access management method and server Pending CN116318887A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310142685.2A CN116318887A (en) 2023-02-21 2023-02-21 Application-based data access management method and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310142685.2A CN116318887A (en) 2023-02-21 2023-02-21 Application-based data access management method and server

Publications (1)

Publication Number Publication Date
CN116318887A true CN116318887A (en) 2023-06-23

Family

ID=86812410

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310142685.2A Pending CN116318887A (en) 2023-02-21 2023-02-21 Application-based data access management method and server

Country Status (1)

Country Link
CN (1) CN116318887A (en)

Similar Documents

Publication Publication Date Title
US10489574B2 (en) Method and system for enterprise network single-sign-on by a manageability engine
RU2348070C2 (en) Methods and systems of user identification in subareas of network area
EP3014847B1 (en) Secure hybrid file-sharing system
US8131997B2 (en) Method of mutually authenticating between software mobility device and local host and a method of forming input/output (I/O) channel
US9288193B1 (en) Authenticating cloud services
US20140223178A1 (en) Securing Communication over a Network Using User Identity Verification
CN113032814B (en) Internet of things data management method and system
US20230388304A1 (en) Decentralized application authentication
CN115333840B (en) Resource access method, system, equipment and storage medium
US20190052623A1 (en) Authenticating Applications to a Network Service
CN113472820A (en) Cloud resource security isolation control method and system based on zero trust model
CN107358118B (en) SFS access control method and system, SFS and terminal equipment
CN111563279A (en) Cloud data privacy protection system based on block chain
CN104052829A (en) Adaptive name resolution
CN105812364A (en) Data transmission method and device
KR20100066907A (en) Integrated authentication and access control system and method the same
US11177958B2 (en) Protection of authentication tokens
CN110971609A (en) Anti-cloning method of DRM client certificate, storage medium and electronic equipment
KR20140043071A (en) Authentication system and method for device attempting connection
US10412097B1 (en) Method and system for providing distributed authentication
CN116318887A (en) Application-based data access management method and server
KR100639992B1 (en) Security apparatus for distributing client module and method thereof
CN114520735A (en) User identity authentication method, system and medium based on trusted execution environment
AU2021102834A4 (en) A User Authentication System and Method using Smart Cards for Cloud based IoT Applications
CN116319096B (en) Access system, method, device, equipment and medium of computing power network operation system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination