Nothing Special   »   [go: up one dir, main page]

CN113922976A - Equipment log transmission method and device, electronic equipment and storage medium - Google Patents

Equipment log transmission method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113922976A
CN113922976A CN202010966669.1A CN202010966669A CN113922976A CN 113922976 A CN113922976 A CN 113922976A CN 202010966669 A CN202010966669 A CN 202010966669A CN 113922976 A CN113922976 A CN 113922976A
Authority
CN
China
Prior art keywords
key
ciphertext
log
server
unique
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010966669.1A
Other languages
Chinese (zh)
Inventor
田镇源
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jingdong Technology Holding Co Ltd
Original Assignee
Jingdong Technology Holding Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jingdong Technology Holding Co Ltd filed Critical Jingdong Technology Holding Co Ltd
Priority to CN202010966669.1A priority Critical patent/CN113922976A/en
Publication of CN113922976A publication Critical patent/CN113922976A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/16Implementation or adaptation of Internet protocol [IP], of transmission control protocol [TCP] or of user datagram protocol [UDP]
    • H04L69/161Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields
    • H04L69/162Implementation details of TCP/IP or UDP/IP stack architecture; Specification of modified or new header fields involving adaptations of sockets based mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The disclosure provides a device log transmission method, a device, a storage medium and an electronic device; relates to the technical field of communication. The method comprises the following steps: and acquiring and verifying the equipment unique identifier of the target equipment, generating a first key after the verification is passed, and encrypting and decrypting the first key by using the equipment unique identifier so as to enhance the safety of the first key. And then, sending the first secret key after the security enhancement to the target device, encrypting the log by using the first secret key, and sending the encrypted log to a server for decryption to obtain the target device log. The method and the system can realize log encryption transmission between the server and the specified equipment through remote control.

Description

Equipment log transmission method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of communications, and in particular, to an equipment log transmission method, an equipment log transmission apparatus, a computer-readable storage medium, and an electronic device.
Background
When problems occur in computer equipment and software, log viewing is an important method for troubleshooting the problems. At present, the method for checking the log in the prior art has high requirements on test environment, increases difficulty in troubleshooting problems, or has a risk of safety information leakage.
Therefore, in order to reduce environmental restrictions and improve information security, it is necessary to provide a method for implementing log encryption transmission between a server and a specified device through a remote control to view a log.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
The purpose of the present disclosure is to provide a device log transmission method, a device log transmission apparatus, a computer-readable storage medium, and an electronic device. The method reduces the environmental limitation by remotely controlling the designated equipment, and the log can be checked without installing a new package. In addition, the log is encrypted and transmitted, so that not only can the leakage of safety information be effectively prevented, but also the dependence on a log system of a server side can be reduced.
According to a first aspect of the present disclosure, there is provided a device log transmission method, including:
acquiring a device unique identifier of a target device and verifying the device unique identifier;
generating a first key after the unique device identifier is verified;
taking the unique equipment identifier as a second key, and encrypting the first key to obtain a first ciphertext;
sending the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key;
receiving a second ciphertext sent by the target device, wherein the second ciphertext is obtained by encrypting the log through the first key;
and decrypting the second ciphertext by using the first key to obtain the log of the target device.
In an exemplary embodiment of the present disclosure, the encrypting the first key to obtain a first ciphertext by using the unique device identifier as the second key includes:
storing the first key and the second key in a column to generate a state word;
carrying out S-box nonlinear transformation operation on the state word to obtain a first operation result;
performing row shift and column mixing operation on the first operation result through a diffusion layer to obtain a second operation result;
and performing round key addition operation on the second operation result to obtain the first ciphertext.
In an exemplary embodiment of the disclosure, the causing the target device to decrypt the first ciphertext with the second key to obtain the first key includes:
carrying out inverse S-box nonlinear transformation operation on the first ciphertext to obtain a first operation result;
performing reverse row shift and reverse column mixed operation on the first operation result through a diffusion layer to obtain a second operation result;
and performing round key addition operation on the second operation result to obtain the first key.
In an exemplary embodiment of the present disclosure, the receiving the second ciphertext transmitted by the target device includes:
and receiving the second ciphertext through a WebSocket communication protocol.
In an exemplary embodiment of the disclosure, the second ciphertext is obtained by encrypting the log with the first key, including:
converting the log into an integer sequence according to a preset conversion rule;
and performing modular exponentiation operation on the integer mapping values in the integer sequence by using the first key to obtain the second ciphertext.
According to a second aspect of the present disclosure, there is provided a device log transmission method, including:
sending the device unique identification of the target device to a server so that the server can verify the device unique identification;
decrypting a first ciphertext sent by a server based on the unique equipment identifier to obtain a first key, encrypting the first ciphertext by the server by using the unique equipment identifier to obtain the first key, and generating the first key after the unique equipment identifier is verified by the server;
encrypting the log by using the first key to obtain a second ciphertext;
and sending the second ciphertext to a server.
In an exemplary embodiment of the disclosure, the encrypting the log with the first key to obtain a second ciphertext includes:
locally caching the on-off state uploaded by the log;
receiving an operation instruction, and writing the log into a log cache system if the switch state is on;
and encrypting the log in the log cache system by using the first key to obtain a second ciphertext.
According to a third aspect of the present disclosure, there is provided a device log transmission apparatus including:
the verification module is used for acquiring the unique equipment identifier of the target equipment and verifying the unique equipment identifier;
the key generation module is used for generating a first key after the unique device identifier is verified;
the encryption module is used for encrypting the first secret key to obtain a first ciphertext by taking the unique equipment identifier as a second secret key;
a sending module, configured to send the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key;
a receiving module, configured to receive a second ciphertext sent by the target device, where the second ciphertext is obtained by encrypting the log with the first key;
and the decryption module is used for decrypting the second ciphertext by using the first secret key to obtain the log of the target device.
According to a fourth aspect of the present disclosure, there is provided a device log transmission apparatus including:
the first transmission module is used for sending the device unique identifier of the target device to the server so that the server can verify the device unique identifier;
the decryption module is used for decrypting a first ciphertext sent by the server based on the unique equipment identifier to obtain a first secret key, the first ciphertext is obtained by encrypting the first secret key by the server through the unique equipment identifier, and the first secret key is generated after the unique equipment identifier is verified by the server;
the encryption module is used for encrypting the log by using the first secret key to obtain a second ciphertext;
and the second transmission module is used for transmitting the second ciphertext to the server.
According to a fifth aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method of any one of the above.
According to a sixth aspect of the present disclosure, there is provided an electronic device comprising: a processor; and a memory for storing executable instructions of the processor; wherein the processor is configured to perform the method of any one of the above via execution of the executable instructions.
Exemplary embodiments of the present disclosure may have some or all of the following benefits:
in the device log transmission method provided by the exemplary embodiment of the present disclosure, the device unique identifier of the target device is obtained and verified, the first key is generated after the verification is passed, and the first key is encrypted and decrypted by using the device unique identifier to enhance the security of the first key. And then, sending the first secret key after the security enhancement to the target device, encrypting the log by using the first secret key, and sending the encrypted log to a server for decryption to obtain the target device log. Thus, on the one hand, the environmental restriction is reduced by remotely controlling the designated device, and the log can be checked without installing a new package. On the other hand, the log is encrypted and transmitted, so that not only can the leakage of safety information be effectively prevented, but also the dependence on a log system of a server side can be reduced.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure. It is to be understood that the drawings in the following description are merely exemplary of the disclosure, and that other drawings may be derived from those drawings by one of ordinary skill in the art without the exercise of inventive faculty.
Fig. 1 is a schematic diagram illustrating an exemplary system architecture to which a device log transmission method and apparatus according to an embodiment of the present disclosure may be applied;
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use with the electronic device used to implement embodiments of the present disclosure;
FIG. 3 schematically illustrates a flow diagram of a device log transmission method according to one embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram of a device log transfer method according to another embodiment of the present disclosure;
FIG. 5 schematically shows a flow chart of steps of a device log transmission method according to one embodiment of the present disclosure;
FIG. 6 schematically shows a flow chart of steps of a device log transmission method according to one embodiment of the present disclosure;
FIG. 7 schematically illustrates a block diagram of a device log transmission apparatus according to one embodiment of the present disclosure;
fig. 8 schematically illustrates a block diagram of a device log transmission apparatus according to another embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the subject matter of the present disclosure can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and the like. In other instances, well-known technical solutions have not been shown or described in detail to avoid obscuring aspects of the present disclosure.
Furthermore, the drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. The same reference numerals in the drawings denote the same or similar parts, and thus their repetitive description will be omitted. Some of the block diagrams shown in the figures are functional entities and do not necessarily correspond to physically or logically separate entities. These functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
Fig. 1 is a schematic diagram illustrating a system architecture of an exemplary application environment to which a device log transmission method and apparatus according to an embodiment of the present disclosure may be applied.
As shown in fig. 1, the system architecture 100 may include one or more of terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The terminal devices 101, 102, 103 may be various electronic devices having a display screen, including but not limited to desktop computers, portable computers, smart phones, tablet computers, and the like. It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation. For example, server 105 may be a server cluster comprised of multiple servers, or the like.
The device log transmission method provided by the embodiment of the present disclosure is generally executed by the server 105, and accordingly, the device log transmission apparatus is generally disposed in the server 105. However, it is easily understood by those skilled in the art that the method for transmitting the device log provided in the embodiment of the present disclosure may also be executed by the terminal devices 101, 102, and 103, and accordingly, the device log transmission apparatus may also be disposed in the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment.
FIG. 2 illustrates a schematic structural diagram of a computer system suitable for use in implementing the electronic device of an embodiment of the present disclosure.
It should be noted that the computer system 200 of the electronic device shown in fig. 2 is only an example, and should not bring any limitation to the functions and the scope of the application of the embodiments of the present disclosure.
As shown in fig. 2, the computer system 200 includes a Central Processing Unit (CPU)201 that can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)202 or a program loaded from a storage section 208 into a Random Access Memory (RAM) 203. In the RAM 203, various programs and data necessary for system operation are also stored. The CPU 201, ROM 202, and RAM 203 are connected to each other via a bus 204. An input/output (I/O) interface 205 is also connected to bus 204.
The following components are connected to the I/O interface 205: an input portion 206 including a keyboard, a mouse, and the like; an output section 207 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 208 including a hard disk and the like; and a communication section 209 including a network interface card such as a LAN card, a modem, or the like. The communication section 209 performs communication processing via a network such as the internet. A drive 210 is also connected to the I/O interface 205 as needed. A removable medium 211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 210 as necessary, so that a computer program read out therefrom is mounted into the storage section 208 as necessary.
In particular, the processes described below with reference to the flowcharts may be implemented as computer software programs, according to embodiments of the present disclosure. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 209 and/or installed from the removable medium 211. The computer program, when executed by a Central Processing Unit (CPU)201, performs various functions defined in the methods and apparatus of the present application.
As another aspect, the present application also provides a computer-readable medium, which may be contained in the electronic device described in the above embodiments; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by an electronic device, cause the electronic device to implement the method as described in the embodiments below. For example, the electronic device may implement the steps shown in fig. 3 to 6, and the like.
It should be noted that the computer readable media shown in the present disclosure may be computer readable signal media or computer readable storage media or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In contrast, in the present disclosure, a computer-readable signal medium may include a propagated data signal with computer-readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wire, fiber optic cable, RF, etc., or any suitable combination of the foregoing.
The technical solution of the embodiment of the present disclosure is explained in detail below:
the current log viewing mode is generally local DEBUG for programmers, and the log is viewed through an Integrated Drive Electronics (IDE). The Log refers to network devices, systems, service programs, etc., and when operating, an event record called Log is generated, the event record is called Log, and each line of Log records descriptions of related operations such as date, time, user, and action.
vConsole (a logging tool) needs to be loaded when viewing logs with HTML5 and can only be used in a test environment. When the problem occurs in an online environment, the log can be checked only by installing a new package under normal conditions, or the problem is checked by a server background log system. For the online application program, if no online account number can not be reproduced in the test environment, the running log of the application program can not be checked, and difficulty is increased for troubleshooting.
In addition, the online published application program prohibits log printing strictly, so that the problem is difficult to be checked through the log, and if the log is printed, the risk of safety information leakage exists. Therefore, the method has high requirement on the environment, the log cannot be safely transmitted, or a new package needs to be installed to transmit and check the log. Additionally, viewing logs from server back-end log systems can increase server stress.
Based on one or more of the above problems, the present exemplary embodiment provides a device log transmission method, which may be applied to the server 105, and may also be applied to one or more of the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment. Referring to fig. 3, the device log transmission method may include the following steps S310 to S360:
and S310, acquiring the unique device identification of the target device and verifying the unique device identification.
And S320, generating a first secret key after the unique device identifier is verified.
And S330, using the unique equipment identifier as a second key, and encrypting the first key to obtain a first ciphertext.
Step s340, sending the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key.
And S350, receiving a second ciphertext sent by the target device, wherein the second ciphertext is obtained by encrypting the log through the first secret key.
And S360, decrypting the second ciphertext by using the first secret key to obtain the log of the target device.
In the device log transmission method provided by the exemplary embodiment of the present disclosure, on one hand, the environmental restriction is reduced by remotely controlling the designated device, and the log can be viewed without installing a new package. On the other hand, the log is encrypted and transmitted, so that not only can the leakage of safety information be effectively prevented, but also the dependence on a log system of a server side can be reduced.
The above steps of the present exemplary embodiment will be described in more detail below.
In step S310, a device unique identifier of the target device is obtained and verified.
In this exemplary embodiment, one device corresponds to one application account. First, the target Device may be identified by a Device Unique Identifier, where the Device Unique Identifier may be an oadid (Open addressing ID, advertisement Identifier), an ANDROID _ ID, a Serial Number (ANDROID Device hardware Serial Number), a Unique Device Identifier (UDID), a Mac (Media Access Control) address, or the like, and may also be a combination of the Device Unique identifiers, for example, for an ANDROID Device, the Device may be an ANDROID _ ID + Serial Number, which is not limited in this embodiment.
Secondly, the device unique identifier of the target device can be acquired through the server interface. For example, the OAID is an identifier for connecting all application data, and is generated immediately after the mobile intelligent terminal system is started for the first time, and meanwhile, the application may acquire the OAID when the application is started for the first time after installation. Therefore, the OAID can be obtained through the server interface, or can be obtained by downloading an SDK package (Software Development Kit) provided by the mobile security association, placing all resources in a specified location, and configuring corresponding rights. For ANDROID, when the device is started for the first time, the system randomly generates a 64-bit number and stores the number in the form of a 16-system character string, wherein the 16-system character string is the ANDROID. This value is reset when the device is factory reset or the system is reinstalled. This value can be changed arbitrarily if the device is root. Therefore, the ANDROID _ ID of the target device can be directly acquired through the server interface as well.
Finally, the server can verify the validity of the unique device identifier through the unique device identifier table. Since the device unique identifier of the target device is fixed and unique, the device unique identifier can be verified against the device unique identifier table, and the failure of verification means that the device unique identifier is failed to be obtained or the device unique identifier of the device other than the target device is obtained.
In step S320, a first key is generated after the device unique identifier is verified.
In this exemplary embodiment, the server may verify the unique device identifier through the unique device identifier table, or may perform hash mapping on the unique device identifier, and the server verifies the unique device identifier by comparing hash values. After the verification is passed, that is, when the obtained unique identifier of the device is consistent with the unique identifier of the target device, the server may generate an asymmetric encryption key or a symmetric encryption key. The asymmetric encryption key can encrypt data by using a public key and decrypt the data by using a private key.
In step S330, the device unique identifier is used as a second key, and the first key is encrypted to obtain a first ciphertext.
In this exemplary embodiment, the device unique identifier may be used as a symmetric encryption key, or may be used as an asymmetric encryption key. For example, when the device unique identifier is used as a symmetric encryption key, an asymmetric encryption key generated by the server may be encrypted. In this exemplary embodiment, the asymmetric Encryption key may be encrypted by using an AES (Advanced Encryption Standard) Encryption algorithm, or may be encrypted by using a DES (Data Encryption Standard) Encryption algorithm or a 3DES Encryption algorithm.
For example, the server generates an asymmetric encryption key, resulting in a first key. And taking the unique device identifier as a symmetric encryption key to obtain a second key. In one embodiment, encrypting the first key by using AES encryption algorithm to obtain a first ciphertext, as shown in fig. 4, may include the following steps:
and S410, storing the first key and the second key in columns to generate a state word.
And S420, carrying out S-box nonlinear transformation operation on the state word to obtain a first operation result.
And S430, performing row shift and column mixing operation on the first operation result through a diffusion layer to obtain a second operation result.
And S440, performing round key addition operation on the second operation result to obtain the first ciphertext.
The above steps of the present exemplary embodiment will be described in more detail below.
In this exemplary embodiment, the AES encryption algorithm is a block cipher, which is to block the plaintext, each group has the same length, and encrypt one group of data each time until the whole plaintext is encrypted. In the standard specification of the AES encryption algorithm, the packet length is 128 bits. The length of the key can use 128 bits, 192 bits or 256 bits, and the length of the key is different, and the recommended number of encryption rounds is also different. When the length of the key is 128 bits, the number of encryption rounds is 10 rounds, i.e. a plaintext block will be encrypted for 10 rounds.
In step S410, the first key and the second key are stored in columns to generate a status word.
In the present exemplary embodiment, the unit of processing of the AES encryption algorithm is a byte, for example, a 128-bit first key and a second key are both divided into 16 bytes, and the first key and the second key are stored in a column by byte unit to generate a state word, which is described by a square matrix in byte unit, and is referred to as a state matrix. The initial value of the first key is the initial value of the state matrix, and the value of the state matrix changes once after each round of encryption is finished. In addition, the state matrix of the second key can expand the second key into a key sequence containing 44 bytes by the key arrangement function, the first 4 bytes are the original key, and the other 40 bytes are used for 10 rounds of encryption.
In step S420, the state word is subjected to S-box nonlinear transformation operation to obtain a first operation result.
In this exemplary embodiment, before performing the S-box nonlinear transformation operation on the status word, the first key and the original key obtained from the second key may be subjected to an exclusive or encryption operation once, and the encryption principles are equal to 0 and different to 1. Then, each byte in the state word, i.e., the state matrix, may be subjected to a nonlinear transformation by an 8-bit S-box, so that each byte is mapped to a new byte, the upper 4 bits of the byte are used as a row value, the lower 4 bits are used as a column value, and the elements of the row corresponding to the S-box are taken out as outputs to obtain a first operation result.
In step S430, the first operation result is subjected to row shift and column mixing operation through a diffusion layer to obtain a second operation result.
In the present exemplary embodiment, the first operation result output from the S-box is input to the diffusion layer. Wherein, the diffusion layer comprises a row shifting operation and a column mixing operation, and the two steps of the row shifting operation and the column mixing operation provide the diffusion for the encryption system. The row shifting may be a left circular shift operation, each row being circularly shifted to the left by some offset. The row shifting may also be a right circular shifting operation, which is not limited in this embodiment. For example, when the second key length is 128 bits, row 0 of the state matrix is shifted left by 0 bytes, row 1 is shifted left by 1 byte, and row 2 is shifted left by 2 bytes. Similarly, line 3 and line 4 are shifted to the left by 3 bytes and 4 bytes, respectively. The column mixing operation may be implemented by matrix multiplication, where the state matrix after the row shifting is multiplied by a fixed matrix to obtain a confused state matrix, i.e. the second operation result.
In step S440, a round key addition operation is performed on the second operation result to obtain the first ciphertext.
In this example embodiment, the first ciphertext may be obtained by performing round key addition on the second operation result. In the encryption process, the input of each round is XOR-ed with the round key once. For example, when the length of the second key is 128 bits, the second operation result and the round key in step S410 are subjected to an exclusive or operation once, and the obtained operation result is the first ciphertext.
In step S340, the first ciphertext is sent to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key.
In this exemplary embodiment, the first ciphertext is obtained by encrypting the first key with the second key, and when the first ciphertext is sent to the client, only the target device may decrypt the first ciphertext. For example, the first cipher text is decrypted by using an AES decryption algorithm to obtain the first key. Referring to fig. 5, the process may include the steps of:
and S510, performing inverse S-box nonlinear transformation operation on the first ciphertext to obtain a first operation result.
And S520, performing reverse row shift and reverse column mixed operation on the first operation result through a diffusion layer to obtain a second operation result.
And S530, performing round key addition operation on the second operation result to obtain the first key.
Steps S510 to S530 are similar to steps S420 to S440, wherein the AES decryption algorithm is the inverse operation of the AES decryption algorithm, and therefore, the description thereof is omitted here.
In step S350, a second ciphertext sent by the target device is received, where the second ciphertext is obtained by encrypting the log with the first key.
In this example embodiment, the second ciphertext may be received via a WebSocket communication protocol. WebSocket is a Protocol for full duplex communication over a single TCP (Transmission Control Protocol) connection, so that data exchange between a client and a server is simpler, and a server is allowed to actively push data to the client. In the WebSocket API, the browser and the server only need to complete one handshake, and persistent connection can be directly established between the browser and the server, and bidirectional data transmission is carried out.
In this exemplary embodiment, the second ciphertext may be received via HTTP (Hyper Text Transfer Protocol). The second ciphertext may be received, for example, via HTTPS (Hyper Text Transfer Protocol over Secure Socket Layer). The HTTPS is an HTTP channel which takes safety as a target, and the safety of the transmission process is ensured through transmission encryption and identity authentication on the basis of the HTTP. In addition, the HTTPS adds SSL (Secure Socket Layer) based on HTTP, and adds an encryption/authentication Layer to a default port of HTTP. The HTTPS system provides authentication and encrypted communication methods that are widely used for secure and sensitive communications over the world wide web, such as transaction payments.
In this exemplary embodiment, the second ciphertext is obtained by encrypting the log with the first key, for example, the log may be encrypted by using an RSA encryption algorithm, the RSA encryption algorithm encrypts and decrypts data with a public key and a private key, where the public key is used for encryption and the private key is used for decryption. The security of the RSA encryption algorithm relies on large number factorization, where the public and private keys are functions of two large prime numbers.
In this exemplary embodiment, first, the log may be converted into an integer sequence according to a preset conversion rule. For example, a regular matching algorithm is used to analyze blank characters in front of the log character string through a regular expression to obtain an integer sequence. The logstring can also be converted to a corresponding sequence of integers using the atoi-extending function. Then, the public key in the first secret key can be used for performing modular exponentiation operation on the integer mapping values in the integer sequence to obtain the second ciphertext. In this example embodiment, the log may also be encrypted by using an ECC (Elliptic curve Cryptography) encryption algorithm, which is not limited in this embodiment.
In step S360, the second ciphertext is decrypted by using the first key to obtain the log of the target device.
In this example embodiment, the target device encrypts the log by using the first key to obtain a second ciphertext, and uploads the second ciphertext to the server through the Websocket communication protocol. The server may perform modular exponentiation on the second ciphertext using an RSA encryption algorithm to obtain all integer mapping values in the integer sequence. And then, converting the integer sequence into a corresponding character string according to a preset conversion rule, namely obtaining the log of the target equipment. For example, an itoa-extending function may be used to convert a sequence of integers into a corresponding string. In this example embodiment, the second ciphertext may also be decrypted by using an ECC encryption algorithm to obtain the log of the target device, which is not limited in this embodiment.
In another aspect, the present example embodiment provides a device log transmission method. The method may be applied to the server 105, and may also be applied to one or more of the terminal devices 101, 102, and 103, which is not particularly limited in this exemplary embodiment. Referring to fig. 6, the device log transmission method may include the following steps S610 to S640:
step S610, sending the device unique identifier of the target device to a server so that the server can verify the device unique identifier.
And S620, decrypting a first ciphertext sent by the server based on the unique equipment identifier to obtain a first secret key, encrypting the first ciphertext by the server through the unique equipment identifier, and generating the first secret key after the unique equipment identifier is verified by the server.
And S630, encrypting the log by using the first key to obtain a second ciphertext.
And step S640, sending the second ciphertext to a server.
Step S610 is similar to step S310, step S620 is similar to step S320 to step S340, and step S640 is similar to step S350, and therefore, the description thereof is omitted here.
In step S630, the log is encrypted by using the first key to obtain a second ciphertext.
In this example embodiment, after the server passes the verification of the unique device identifier, the Websocket log upload service may be started, or the log may be uploaded in a POST request manner of the HTTPS. Meanwhile, the on-off state uploaded by the log can be cached locally, and can also be sent to the target equipment through PUSH. And then, receiving an operation instruction, and writing the log into a log cache system if the switch state is on. And reading the log in the log cache system, and encrypting the log in the log cache system by using an RSA encryption algorithm to obtain a second ciphertext. The log may also be encrypted by using an ECC encryption algorithm, which is not limited in this embodiment.
A specific application example of the method in the present exemplary embodiment is an example of a device application.
Firstly, an application program is started, and the device unique identification of the target device is obtained through a server interface. And if the unique device identifier is not acquired or the unique device identifier of the non-local device is acquired, closing the log system representing the target device. The server verifies the unique device identifier in step S310, generates an asymmetric encrypted public and private key in step S320 after the verification is passed, encrypts the asymmetric encrypted public key with the unique device identifier in step S330 to obtain a first ciphertext, and sends the first ciphertext to the application program in step S340.
And then, starting a WebSocket log uploading service after the unique identifier of the equipment passes verification, locally caching the on-off state uploaded by the log, and quitting the application program to obtain the on-off state again, thereby ensuring that the operation is effective only in the current application program. After the log uploading service is started, the operation application program runs, and the log tool code can be normally executed. If the switch for uploading the Log is turned on, the Log is input into the Log caching system, at the moment, the Log code of the application program system cannot be executed, and the output of a Logcat (command line tool) is avoided. And reading the log in the log cache system, encrypting the log by the public key issued by the server in the steps S350 and S360 to obtain a second ciphertext, reporting and transmitting the second ciphertext to the server, and decrypting the second ciphertext by the server by using the asymmetric encrypted private key to realize the security verification of the log uploading link. And if the decryption is successful, the link is maintained, otherwise, the link is rejected to cause link failure, and the switch state in the local cache is set to be closed when the link is rejected, so that the purpose of log encryption transmission is achieved.
Finally, the server can output the log of the target device to an online platform, and research personnel can check the log through the online platform. When research personnel close the log system through the online platform, the server closes a switch for uploading logs, and simultaneously detects whether a link exists or not, and if so, the link is disconnected. And when the WebSocket service in the application program is disconnected by the server, the client closes the local switch to avoid continuous output.
In the device log transmission method provided by the exemplary embodiment of the present disclosure, the device unique identifier of the target device is obtained and verified, the first key is generated after the verification is passed, and the first key is encrypted and decrypted by using the device unique identifier to enhance the security of the first key. And then, sending the first secret key after the security enhancement to the target device, encrypting the log by using the first secret key, and sending the encrypted log to a server for decryption to obtain the target device log. According to the device log transmission method, on one hand, the environmental limitation is reduced by remotely controlling the designated device, and the log can be checked without installing a new package. On the other hand, the log is encrypted and transmitted, so that not only can the leakage of safety information be effectively prevented, but also the dependence on a log system of a server side can be reduced.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
Further, in this example embodiment, an apparatus for transmitting a device log is also provided. The device can be applied to a server or terminal equipment. Referring to fig. 7, the device log transmission apparatus 700 may include a verification module 710, a key generation module 720, an encryption module 730, a transmission module 740, a reception module 750, and a decryption module 760. Wherein:
the verification module 710 is configured to obtain a device unique identifier of a target device and verify the device unique identifier;
a key generation module 720, configured to generate a first key after the device unique identifier is verified;
the encryption module 730 is configured to use the unique device identifier as a second key, and encrypt the first key to obtain a first ciphertext;
a sending module 740, configured to send the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key;
a receiving module 750, configured to receive a second ciphertext sent by the target device, where the second ciphertext is obtained by encrypting the log with the first key;
the decryption module 760 is configured to decrypt the second ciphertext with the first key to obtain the log of the target device.
The specific details of each module in the device log transmission apparatus have been described in detail in the corresponding device log transmission method, and therefore are not described herein again.
In the present exemplary embodiment, an apparatus for transmitting device log is also provided. The device log transmission device can be applied to a server or terminal equipment. Referring to fig. 8, the device log transmission apparatus 800 may include a first transmission module 810, a decryption module 820, an encryption module 830, and a second transmission module 840. Wherein:
a first transmission module 810, configured to send a device unique identifier of a target device to a server, so that the server verifies the device unique identifier;
a decryption module 820, configured to decrypt a first ciphertext sent by the server based on the device unique identifier to obtain a first key, where the first ciphertext is obtained by encrypting the first key by using the device unique identifier by the server, and the first key is generated by the server after the device unique identifier is verified;
the encrypting module 830 is configured to encrypt the log with the first key to obtain a second ciphertext;
a second transmission module 840, configured to send the second ciphertext to the server.
The specific details of each module in the device log transmission apparatus have been described in detail in the corresponding device log transmission method, and therefore are not described herein again.
It should be noted that although in the above detailed description several modules or units of the device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (11)

1. A device log transmission method, comprising:
acquiring a device unique identifier of a target device and verifying the device unique identifier;
generating a first key after the unique device identifier is verified;
taking the unique equipment identifier as a second key, and encrypting the first key to obtain a first ciphertext;
sending the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key;
receiving a second ciphertext sent by the target device, wherein the second ciphertext is obtained by encrypting the log through the first key;
and decrypting the second ciphertext by using the first key to obtain the log of the target device.
2. The device log transmission method according to claim 1, wherein the encrypting the first key with the device unique identifier as a second key to obtain a first ciphertext comprises:
storing the first key and the second key in a column to generate a state word;
carrying out S-box nonlinear transformation operation on the state word to obtain a first operation result;
performing row shift and column mixing operation on the first operation result through a diffusion layer to obtain a second operation result;
and performing round key addition operation on the second operation result to obtain the first ciphertext.
3. The device log transmission method according to claim 1, wherein the causing the target device to decrypt the first ciphertext using the second key to obtain the first key comprises:
carrying out inverse S-box nonlinear transformation operation on the first ciphertext to obtain a first operation result;
performing reverse row shift and reverse column mixed operation on the first operation result through a diffusion layer to obtain a second operation result;
and performing round key addition operation on the second operation result to obtain the first key.
4. The device log transmission method according to claim 1, wherein the receiving of the second ciphertext transmitted by the target device comprises:
and receiving the second ciphertext through a WebSocket communication protocol.
5. The device log transmission method according to claim 1, wherein the second ciphertext is obtained by encrypting the log with the first key, and includes:
converting the log into an integer sequence according to a preset conversion rule;
and performing modular exponentiation operation on the integer mapping values in the integer sequence by using the first key to obtain the second ciphertext.
6. A device log transmission method, comprising:
sending the device unique identification of the target device to a server so that the server can verify the device unique identification;
decrypting a first ciphertext sent by a server based on the unique equipment identifier to obtain a first key, encrypting the first ciphertext by the server by using the unique equipment identifier to obtain the first key, and generating the first key after the unique equipment identifier is verified by the server;
encrypting the log by using the first key to obtain a second ciphertext;
and sending the second ciphertext to a server.
7. The device log transmission method according to claim 6, wherein the encrypting the log with the first key to obtain a second ciphertext comprises:
locally caching the on-off state uploaded by the log;
receiving an operation instruction, and writing the log into a log cache system if the switch state is on;
and encrypting the log in the log cache system by using the first key to obtain a second ciphertext.
8. An apparatus for transferring device logs, comprising:
the verification module is used for acquiring the unique equipment identifier of the target equipment and verifying the unique equipment identifier;
the key generation module is used for generating a first key after the unique device identifier is verified;
the encryption module is used for encrypting the first secret key to obtain a first ciphertext by taking the unique equipment identifier as a second secret key;
a sending module, configured to send the first ciphertext to the target device, so that the target device decrypts the first ciphertext by using the second key to obtain the first key;
a receiving module, configured to receive a second ciphertext sent by the target device, where the second ciphertext is obtained by encrypting the log with the first key;
and the decryption module is used for decrypting the second ciphertext by using the first secret key to obtain the log of the target device.
9. An apparatus for transferring device logs, comprising:
the first transmission module is used for sending the device unique identifier of the target device to the server so that the server can verify the device unique identifier;
the decryption module is used for decrypting a first ciphertext sent by the server based on the unique equipment identifier to obtain a first secret key, the first ciphertext is obtained by encrypting the first secret key by the server through the unique equipment identifier, and the first secret key is generated after the unique equipment identifier is verified by the server;
the encryption module is used for encrypting the log by using the first secret key to obtain a second ciphertext;
and the second transmission module is used for transmitting the second ciphertext to the server.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1 to 7.
11. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any of claims 1-7 via execution of the executable instructions.
CN202010966669.1A 2020-09-15 2020-09-15 Equipment log transmission method and device, electronic equipment and storage medium Pending CN113922976A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010966669.1A CN113922976A (en) 2020-09-15 2020-09-15 Equipment log transmission method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010966669.1A CN113922976A (en) 2020-09-15 2020-09-15 Equipment log transmission method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113922976A true CN113922976A (en) 2022-01-11

Family

ID=79232450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010966669.1A Pending CN113922976A (en) 2020-09-15 2020-09-15 Equipment log transmission method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113922976A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826579A (en) * 2022-04-25 2022-07-29 展讯通信(上海)有限公司 Log processing method, device and equipment
CN115333800A (en) * 2022-07-27 2022-11-11 中国第一汽车股份有限公司 Vehicle-mounted vehicle-cloud integrated log collecting and analyzing method, vehicle and cloud server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113235A1 (en) * 2009-08-27 2011-05-12 Craig Erickson PC Security Lock Device Using Permanent ID and Hidden Keys
CN106817346A (en) * 2015-11-30 2017-06-09 北京金山安全软件有限公司 Data transmission method and device and electronic equipment
CN107659632A (en) * 2017-09-19 2018-02-02 咪咕数字传媒有限公司 A kind of file encryption-decryption method, device and computer-readable recording medium
CN109728902A (en) * 2018-06-01 2019-05-07 平安科技(深圳)有限公司 Key management method, equipment, storage medium and device
CN110765446A (en) * 2019-10-21 2020-02-07 深圳市神飞电子科技有限公司 Electronic equipment authorization permission distribution method
FR3086090A1 (en) * 2018-09-17 2020-03-20 Commissariat A L'energie Atomique Et Aux Energies Alternatives METHOD FOR CONFIDENTIAL PROCESSING OF LOGS OF AN INFORMATION SYSTEM

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110113235A1 (en) * 2009-08-27 2011-05-12 Craig Erickson PC Security Lock Device Using Permanent ID and Hidden Keys
CN106817346A (en) * 2015-11-30 2017-06-09 北京金山安全软件有限公司 Data transmission method and device and electronic equipment
CN107659632A (en) * 2017-09-19 2018-02-02 咪咕数字传媒有限公司 A kind of file encryption-decryption method, device and computer-readable recording medium
CN109728902A (en) * 2018-06-01 2019-05-07 平安科技(深圳)有限公司 Key management method, equipment, storage medium and device
FR3086090A1 (en) * 2018-09-17 2020-03-20 Commissariat A L'energie Atomique Et Aux Energies Alternatives METHOD FOR CONFIDENTIAL PROCESSING OF LOGS OF AN INFORMATION SYSTEM
CN110765446A (en) * 2019-10-21 2020-02-07 深圳市神飞电子科技有限公司 Electronic equipment authorization permission distribution method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114826579A (en) * 2022-04-25 2022-07-29 展讯通信(上海)有限公司 Log processing method, device and equipment
CN115333800A (en) * 2022-07-27 2022-11-11 中国第一汽车股份有限公司 Vehicle-mounted vehicle-cloud integrated log collecting and analyzing method, vehicle and cloud server

Similar Documents

Publication Publication Date Title
CN108512846B (en) Bidirectional authentication method and device between terminal and server
CN109150499B (en) Method and device for dynamically encrypting data, computer equipment and storage medium
US7571320B2 (en) Circuit and method for providing secure communications between devices
CN111131278B (en) Data processing method and device, computer storage medium and electronic equipment
CN105072125B (en) A kind of http communication system and method
CN108347419A (en) Data transmission method and device
CN110188551B (en) Policy encryption transmission method and system
CN110177099B (en) Data exchange method, transmitting terminal and medium based on asymmetric encryption technology
CN101304310B (en) Method for reinforcing network SSL service
CN112689014B (en) Double-full-work communication method, device, computer equipment and storage medium
CN111181920A (en) Encryption and decryption method and device
CN113922976A (en) Equipment log transmission method and device, electronic equipment and storage medium
CN114139176A (en) Industrial internet core data protection method and system based on state secret
CN116866029B (en) Random number encryption data transmission method, device, computer equipment and storage medium
CN117097551A (en) Industrial control system communication protocol security enhancement method, system, equipment and storage medium
CN113158218B (en) Data encryption method and device and data decryption method and device
CN113422753B (en) Data processing method, device, electronic equipment and computer storage medium
CN112612499A (en) Application program upgrading method and device, electronic equipment and storage medium
CN115085949A (en) Data communication method and device based on national secret SSL transparent proxy
CN112217810A (en) Request response method, device, equipment and medium
CN118174967B (en) Information verification method and related equipment
CN118300905B (en) Ciphertext transmission method, device, equipment and medium based on secret authentication mode
CN106464684B (en) Service processing method and device
CN114915487B (en) Terminal authentication method, system, device, equipment and storage medium
CN116980128B (en) Inter-application data transmission processing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination