[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN108874864B - File recycling method and system - Google Patents

File recycling method and system Download PDF

Info

Publication number
CN108874864B
CN108874864B CN201810354519.8A CN201810354519A CN108874864B CN 108874864 B CN108874864 B CN 108874864B CN 201810354519 A CN201810354519 A CN 201810354519A CN 108874864 B CN108874864 B CN 108874864B
Authority
CN
China
Prior art keywords
file
user
recycling
forced
recovery
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810354519.8A
Other languages
Chinese (zh)
Other versions
CN108874864A (en
Inventor
张旭光
刘金波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Lanxum Computer Technology Co ltd
Original Assignee
Beijing Lanxum Computer Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Lanxum Computer Technology Co ltd filed Critical Beijing Lanxum Computer Technology Co ltd
Priority to CN201810354519.8A priority Critical patent/CN108874864B/en
Publication of CN108874864A publication Critical patent/CN108874864A/en
Application granted granted Critical
Publication of CN108874864B publication Critical patent/CN108874864B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Facsimiles In General (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides a file recycling method, which is characterized by comprising the following steps: acquiring a working mode selection instruction input by a user; selecting a corresponding working mode according to the working mode selection instruction; the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling. In the whole file recycling process, automatic guiding operation and process specification are realized, each operation has a machine account which can be checked, and secret-related body safety closed-loop management is realized; and the whole recovery process is simple to operate, prompts in place, the learning cost and the labor cost for users are reduced to the greatest extent, and economic and management benefits can be brought to the users continuously.

Description

File recycling method and system
Technical Field
The disclosure belongs to the field of security equipment, and relates to a file recycling method and system.
Background
At present, a plurality of secret-related units are monitored and managed step by step in the generation and recovery links of secret-related documents, but in the recovery and destruction links of secret-related documents, the original modes of special person guard, account book registration, manual sealing and storage according to the parts are adopted. The management mode has the problems of potential safety hazard of human factors, inconclusive recorded information, file cross disclosure and the like.
When the confidential files are recovered, the existing recovery mode needs to be specially attended, the path is complex, the whole recovery process is not strictly recorded, and therefore the recovery records are always and inestimable to check in the subsequent recovery process, and immeasurable loss is caused.
Disclosure of Invention
To overcome the problems in the related art, the present disclosure provides a file recycling method, which is characterized by comprising: acquiring a working mode selection instruction input by a user; selecting a corresponding working mode according to the working mode selection instruction; the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling.
Further, the self-service file recycling mode workflow is as follows: acquiring user identity information; judging whether the user has self-service file recovery authority according to the user identity information; when the user has the self-service file recycling right, receiving the selection of recycling parameters by the user; providing a corresponding reclamation operation based on the reclamation parameters; judging whether the recovery operation is completed or not, registering the recovery operation account information after the recovery operation is completed, and destroying the file.
Further, the judging whether the user has the self-service file recycling authority according to the user identity information comprises: uploading the user identity information to a server; and the server judges the recycling authority of the user based on a user information base stored in advance.
Further, the receiving the user selection of the reclamation parameters includes: receiving the selection of the recycling parameters by the user in a human-computer interaction interface; wherein the recovery parameters include: one or more of a reclaimed file type, a reclaimed file number, and a reclaimed file size; when the type of the recovery file selected by the user is a paper file, prompting the user to place the file at a paper file recovery port; and when the type of the recovery file selected by the user is a readable storage medium, prompting the user to place the file in a recovery port of the readable storage medium.
Further, the determining whether the reclamation operation is complete includes one or more of: judging whether all received files belong to the same job or not; judging whether all received files belong to the user or not; judging whether all the received file bar codes are complete; and judging whether all the received file bar codes are identified.
Further, the forced file reclamation mode workflow is: acquiring a forced recycling reason input by a user of an administrator, and marking the file as a forced recycling file; acquiring user identity information of an administrator; judging whether the user has mandatory file recovery authority according to the manager user identity information; when the administrator user has the mandatory file recycling right, receiving the selection of the mandatory file recycling parameter by the user; and providing corresponding recycling operation based on the forced file recycling parameters, registering the forced file recycling parameter ledger information, and destroying the file.
Further, the forced recovery reasons include one or more of the following: the bar code is broken, the bar code does not accord with the standard, the document is free from bar code, the document is lost, the attached bar code exceeds the preset thickness, the single document is oversized, and the single document is super thick.
Further, the receiving the selection of the forced file reclamation parameter by the user includes: receiving the selection of the forced file recycling parameters by the administrator user in a human-computer interaction interface; wherein the mandatory file reclamation parameters include: one or more of a forced reclaimed file type, a forced reclaimed file number, a forced reclaimed file size, and a forced reclaimed file list.
Further, the providing a corresponding reclamation operation based on the mandatory file reclamation parameters includes: and opening a corresponding temporary storage bin gate based on the forced file recycling parameters, waiting for the administrator user to put the forced recycling file.
According to another aspect of the present disclosure, there is provided a file recycling system, including: the recycling destroying cabinet is configured to acquire a working mode selection instruction input by a user; the working mode switching module is configured to select a corresponding working mode according to the working mode selection instruction; the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling; wherein the self-service document recycling mode is for performing any one of the aforementioned self-service recycling methods, and the forced document recycling mode is for performing any one of the aforementioned forced recycling methods.
The technical scheme provided by the embodiment of the disclosure can comprise the following beneficial effects: in the whole file recycling process, automatic guiding operation and process specification are realized, each operation has a machine account which can be checked, and secret-related body safety closed-loop management is realized; and the whole recovery process is simple to operate, prompts in place, the learning cost and the labor cost for users are reduced to the greatest extent, and economic and management benefits can be brought to the users continuously.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
Drawings
FIG. 1 is a flow chart of a method of file reclamation shown in an exemplary embodiment of the present disclosure;
FIG. 2 is a flow chart of a self-service document retrieval method shown in an exemplary embodiment of the present disclosure;
FIG. 3 is a flow chart of a self-service document retrieval method shown in an exemplary embodiment of the present disclosure;
FIG. 4 is a flow chart of a mandatory file reclamation method shown in an exemplary embodiment of the present disclosure;
FIG. 5 is a flow chart of a mandatory file reclamation method shown in an exemplary embodiment of the present disclosure;
FIG. 6 is a block diagram of a file reclamation system according to an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present disclosure as detailed in the accompanying claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in this disclosure to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
As shown in fig. 1, a file recycling method according to an exemplary embodiment is characterized by comprising:
step S101: acquiring a working mode selection instruction input by a user;
step S102: selecting a corresponding working mode according to the working mode selection instruction;
the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling.
According to the present embodiment, in step S101, the user needs to select a recycle mode before recycling the file, and different modes correspond to different user rights and recycle operations. The self-service file recycling mode is a primary recycling mode aiming at general users, and the forced file recycling mode needs to have administrator authority to execute.
Further, as shown in fig. 2, the workflow of the self-service file recycling mode is as follows:
step S1001: acquiring user identity information;
step S1002: judging whether the user has self-service file recovery authority according to the user identity information;
step S1003: when the user has the self-service file recycling right, receiving the selection of recycling parameters by the user;
step S1004: providing a corresponding reclamation operation based on the reclamation parameters;
step S1005: judging whether the recovery operation is completed or not, registering the recovery operation account information after the recovery operation is completed, and destroying the file.
According to this embodiment, in step S1001, when the user performs self-service file recovery, the user needs to pass the authentication of the user identity information, and the device obtains the user identity information to determine whether the user has the self-service file recovery authority.
When the user identity information is obtained, various modes can be adopted, for example, an ID card of the user can be read through a card reader, and the identity information such as the name, authority and the like of the user can be recorded in the ID card; the user identity may also be identified by biometric information of the user, such as a fingerprint, voiceprint, iris, dorsal vein, etc., which is capable of uniquely determining the user identity.
In step S1002, after the user identity information is acquired, the authority of the user may be determined based on the identity information. The work of judging the user authority can be carried out locally or on a remote server. Taking the judgment of the user authority on the server as an example: uploading the user identity information to a server; and the server judges the recycling authority of the user based on a user information base stored in advance. At the server side, a corresponding relation table of the user identity information and the recovery permission can be pre-stored, and the recovery permission of the user can be confirmed based on the corresponding relation table. If the recovery authority of the user identity information in the corresponding relation table does not contain self-service recovery authority, the server returns information of failure in judging the authority, and prompts the user to have no self-service recovery authority.
In step S1003, when the user has the self-service file recycling right, the user' S selection of the file recycling parameter is received. The user can select file recycling parameters in the man-machine interaction interface, wherein the file recycling parameters comprise recycling file types, such as paper files or storage medium files; the number of the recovered files is corresponding to different recovery operation modes of 0-500 pages, 500-1000 pages, 1000-2000 pages and the like for paper files, and different recovery measures are needed for the storage medium files, such as optical discs, U discs, hard discs and the like; the size of the recovery file, for example, the paper file can be divided into a size of B5 paper, a size of A4 paper, a size of A3 paper, etc., and for the storage medium file, recovery windows with different sizes can be customized according to the user's requirements. The parameter information is provided for the user to select after the user identity information passes verification, so that the operation time of an unauthorized user can be saved more, and the operation mode is greatly improved from the integral view of file recycling efficiency.
In step S1004, different recycling modes are provided for the user according to the different recycling parameters selected by the user, for example:
when the type of the recovery file selected by the user is a paper file, prompting the user to place the file at a paper file recovery port;
and when the type of the recovery file selected by the user is a readable storage medium, prompting the user to place the file in a recovery port of the readable storage medium.
An LED indicator lamp can be arranged at the recycling port of the files of different types, and a user is prompted to place the files at the corresponding recycling port in a lighting mode; the method of voice prompt can also be adopted, and the method is not limited in this disclosure.
In step S1005, it is determined whether the recycling operation is completed, which may be performed in any one or more of the following manners, including:
judging whether all received files belong to the same job or not;
judging whether all received files belong to the user or not;
judging whether all the received file bar codes are complete;
and judging whether all the received file bar codes are identified.
Generally, a bar code is attached or printed on the recovered file, and whether the received file belongs to the same job, whether the received file belongs to a file which can be processed by the user or not can be judged by identifying the bar code, so that the integrity and the legality of the file to be recovered are further judged. Such as whether other job contents are mixed into a job, whether the user has a handling right for the document, whether the document belongs to the user, and the like. Whether the file is complete or not can also be judged through the bar code, whether all the bar codes are identified to be complete or not, and the like. In this step, the final verification is performed on the file.
When all rights are judged and the integrity and validity of the file are checked, the recovered file information is registered in the ledger, and the file can be destroyed. The ledger is a final information record subject of all operations and is generally stored on a server for retrieval when required, while also having the advantage of preventing local tampering.
By adopting the self-service recovery method, the files which are complete, normal in bar code and complete in paper preservation and have no damage can be smoothly scanned by the equipment, and the common user can select a self-service recovery mode to recover the files in the self-service recovery authority, so that the manager is not required to participate, the operation is simple, and the time and the efficiency are saved.
The device is not identified by scanning, but the registered files can be supplemented by scanning the bar codes through a scanning gun and are automatically sent to a temporary storage bin for temporary storage. The user can take out the whole document from the temporary storage bin, select to recycle, use the bar code gun to carry out bar code supplementary scanning, after the supplementary scanning is finished, put the whole document into the paper discharge tray to recycle. Convenient and fast, also do not need the administrator to intervene.
As shown in fig. 3, before step S1001, the following steps may be further included:
step S10001: starting up a self-check of the recovery destroying cabinet, and checking whether the working state of the recovery destroying cabinet is normal;
step S10002: the server self-checks to check if the network is connected;
step S10003: if the network is communicated and the recovery destroying cabinet is normal, displaying a standby interface on a man-machine interaction interface of the recovery destroying cabinet; if the network is abnormal or the recovery destroying cabinet is abnormal, displaying an error code on a man-machine interaction interface of the recovery destroying cabinet.
Through the steps, the self-checking state of the recovery destroying cabinet after power-on can be ensured, the operation of each step can be communicated with the server in the using process of a user, the record is made on the ledger, and the confidentiality level is enhanced.
Meanwhile, in step S10003, if a network abnormality occurs or the recovery destruction cabinet is abnormal, different abnormal codes may be displayed in the man-machine interaction interface according to different contents of the abnormal situation, so that a user can conveniently judge the cause of the abnormality and solve the cause at the first time. For example, the anomaly code may indicate an anomaly status of no network connection, a PLC with paper, a scratch bin with paper, an ADF jam, etc.
Further, as shown in fig. 4, the forced file reclamation mode workflow is:
step S2001: acquiring a forced recycling reason input by a user of an administrator, and marking the file as a forced recycling file;
step S2002: acquiring user identity information of an administrator;
step S2003: judging whether the user has mandatory file recovery authority according to the manager user identity information;
step S2004: when the administrator user has the mandatory file recycling right, receiving the selection of the mandatory file recycling parameter by the user;
step S2005: and providing corresponding recycling operation based on the forced file recycling parameters, registering the forced file recycling parameter ledger information, and destroying the file.
According to this embodiment, in step S2001, when the user performs forced file recovery, the user needs to register the forced recovery reasons, which may specifically include one or more of reasons such as broken bar code, non-conforming bar code of the file, missing of the file, exceeding a preset thickness of the attached bar code, oversized single file, and super-thick single file; the recovery destroying cabinet can also mark the files to be recovered, and the files are marked as forced recovery files. The registration and labeling information is finally uploaded to the ledger, so that the recovery process is well-known.
In step S2002, when obtaining the identity information of the administrator user, various modes may be adopted, for example, the ID card of the user may be read through a card reader, and the identity information such as the name, authority, etc. of the user may be recorded in the ID card; the user identity may also be identified by biometric information of the user, such as a fingerprint, voiceprint, iris, dorsal vein, etc., which is capable of uniquely determining the user identity.
In step S2003, after acquiring the administrator identity information, the authority of the user may be determined based on the administrator identity information. The work of judging the user authority can be carried out locally or on a remote server. Taking the judgment of the user authority on the server as an example: uploading the manager identity information to a server; the server judges the recycling authority of the administrator based on a user information base stored in advance. At the server side, a corresponding relation table of the identity information of the administrator and the recovery authority can be pre-stored, and the recovery authority of the administrator user can be confirmed based on the corresponding relation table. If the recovery authority of the user identity information of the manager in the corresponding relation table does not contain the forced recovery authority, the server returns an information of failure of authority judgment, and prompts the manager user to have no forced recovery authority. Meanwhile, in the step, only the administrator user with the administrator authority can start the forced file recovery flow, and among the administrator users, the files which can be processed and recovered by different administrator users are different, in the forced file recovery process, only the administrator is allowed to forcedly recover the files which are allowed to be processed by the administrator, and for the files which exceed the processing range of the administrator, even if the administrator identity information verification is passed, the forced recovery is not allowed.
In step S2004, a user selection of mandatory file reclamation parameters is received when the administrator user has the mandatory file reclamation rights. The user can select the mandatory file recycling parameters in the man-machine interaction interface, wherein the mandatory file recycling parameters comprise: one or more of a forced reclaimed file type, a forced reclaimed file number, a forced reclaimed file size, and a forced reclaimed file list.
Including mandatory recovery file types such as paper files or storage media type files; the quantity of the forcibly recovered files is corresponding to different recovery operation modes of 0-500 pages, 500-1000 pages, 1000-2000 pages and the like for paper files, and different recovery measures are needed for the storage medium files, such as optical discs, U discs, hard discs and the like; the size of the forced recovery file, for example, the paper file can be divided into a B5 paper size, an A4 paper size, an A3 paper size and the like, and for the storage medium file, recovery windows with different sizes can be customized according to the user requirements. The forced recovery file list comprises sensitive information such as file names, file contents and the like.
In step S2005, after the related steps of authentication and registration of all the previous steps are completed, different temporary storage bins are opened correspondingly according to different parameters selected by the administrator user. For example:
when the forced recovery file type selected by the administrator user is a paper file, prompting the administrator user to place the file at the entrance of a paper file temporary storage bin;
and when the forced recovery file type selected by the administrator user is a readable storage medium, prompting the administrator user to place the file in a temporary storage bin inlet of the readable storage medium.
The LED indicator lamps can be arranged at the inlets of temporary storage bins of different types of files, and the user is prompted to place the files at the corresponding inlets of the temporary storage bins in a lighting mode; the method of voice prompt can also be adopted, and the method is not limited in this disclosure.
Generally, the bar code information of the file processed in the forced file recycling process cannot be read by the recycling and destroying cabinet in an automatic reading mode, and an administrator user is required to manually scan the bar code by adopting an external scanning gun, for example, the file is too thick and too large to read, and the bar code does not meet the standard. For the conditions of bar code loss, bar code non-conforming to the standard, bar code damage and the like, an administrator user is required to manually input file related information in a man-machine interaction interface.
When all rights are judged and the integrity and validity of the file are checked, the forced recovery file information is registered in the ledger, and the file can be destroyed. The ledger is a final information record subject of all operations and is generally stored on a server for retrieval when required, while also having the advantage of preventing local tampering.
As shown in fig. 5, after step S2005, the following steps may be further included:
step S2006: acquiring the state of a waste bin, and judging whether the waste bin is full;
step S2007: when the waste bin is in a full state, prompting a user to clean the waste bin after the task; when the waste bin is in an unfilled state, the recovery operation is normally started.
Through the steps, the user can use the waste bin without worrying about the problems of full overflow of the waste bin and the like. The crushed files are contained in the waste bin, so that a certain amount of scraps can be continuously contained when the waste bin is prompted to be full, and overflow can not occur.
Further, a cleaning process of the waste bin can be included. After the waste bin is full, the recycling and destroying cabinet prompts to clean the waste bin, after the identity information of the administrator user is authenticated by the administrator user, the authenticated administrator can open the waste bin, otherwise, prompt information is returned, and the user has no authority. Such an operation can ensure the safety of the user waste, thereby preventing the waste from being obtained by unrelated personnel.
As shown in fig. 6, a file reclamation system according to an exemplary embodiment is shown, comprising:
the recycling destruction cabinet 301 is configured to acquire a working mode selection instruction input by a user;
a working mode switching module 303, configured to select a corresponding working mode according to the working mode selection instruction; the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling; wherein the self-service document recycling mode is for performing any one of the aforementioned self-service recycling methods, and the forced document recycling mode is for performing any one of the aforementioned forced recycling methods.
Further, when the file recycling system is configured to perform the self-service file recycling mode, the file recycling system specifically includes:
a recovery destruction cabinet 301 configured to acquire user identity information;
a server 302 configured to determine whether the user has self-service file recycling authority according to the user identity information;
the recycling destruction cabinet 301 is further configured to receive a user's selection of recycling parameters when the user has the self-service file recycling right; providing a corresponding reclamation operation based on the reclamation parameters; judging whether the recovery operation is completed or not, registering the recovery operation account information after the recovery operation is completed, and destroying the file.
Further, the obtaining the user identity information includes:
reading the ID card of the user; or alternatively
And acquiring the biological identification information of the user.
Further, the server 301 is further configured to:
acquiring the uploaded user identity information;
the server 301 determines the recycling right of the user based on a user information base stored in advance.
Further, the receiving the user selection of the reclamation parameters includes:
receiving the selection of the recycling parameter by the user in a man-machine interaction interface of the recycling destruction cabinet 301;
wherein the recovery parameters include:
one or more of a reclaimed file type, a reclaimed file number, and a reclaimed file size.
Further, the recycling destruction cabinet 301 is further configured to:
when the type of the recovery file selected by the user is a paper file, prompting the user to place the file at a paper file recovery port;
and when the type of the recovery file selected by the user is a readable storage medium, prompting the user to place the file in a recovery port of the readable storage medium.
Further, the determining whether the reclamation operation is complete includes one or more of:
judging whether all received files belong to the same job or not;
judging whether all received files belong to the user or not;
judging whether all the received file bar codes are complete;
and judging whether all the received file bar codes are identified.
According to another embodiment of the present disclosure, the self-service document recycling mode may further include:
the recovery destroying cabinet self-checking module 3001 is configured to perform recovery destroying cabinet startup self-checking and check whether the working state of the recovery destroying cabinet is normal;
a server self-checking module 3002 configured to self-check the server to check whether the network is connected;
the abnormal information reminding module 3003 is configured to display a standby interface on a man-machine interaction interface of the recovery destruction cabinet if the network is communicated and the recovery destruction cabinet is normal; if the network is abnormal or the recovery destroying cabinet is abnormal, displaying an error code on a man-machine interaction interface of the recovery destroying cabinet.
Further, when the file reclamation system is configured to perform the forced file reclamation mode, the file reclamation system specifically includes:
the recycling destruction cabinet 301 is configured to acquire a forced recycling reason input by a user of the administrator, mark the file as a forced recycling file, and acquire identity information of the user of the administrator;
a server 302 configured to determine whether the user has mandatory file recycling rights according to the administrator user identity information;
the reclamation destruction cabinet 301 is further configured to receive a user selection of mandatory file reclamation parameters when the administrator user has the mandatory file reclamation rights; and providing corresponding recycling operation based on the forced file recycling parameters, registering the forced file recycling parameter ledger information, and destroying the file.
Further, the forced recovery reasons include one or more of the following:
the bar code is broken, the bar code does not accord with the standard, the document is free from bar code, the document is lost, the attached bar code exceeds the preset thickness, the single document is oversized, and the single document is super thick.
Further, the server is further configured to:
acquiring the uploaded user identity information of the administrator;
and the server judges the recycling authority of the administrator user based on a user information base stored in advance.
Further, the receiving the selection of the forced file reclamation parameter by the user includes:
receiving the selection of the forced file recycling parameters by the user in a human-computer interaction interface;
wherein the mandatory file reclamation parameters include:
one or more of a forced reclaimed file type, a forced reclaimed file number, a forced reclaimed file size, and a forced reclaimed file list.
Further, the providing a corresponding reclamation operation based on the mandatory file reclamation parameters includes:
and opening a corresponding temporary storage bin gate based on the forced file recycling parameters, waiting for the administrator user to put the forced recycling file.
According to another embodiment of the present disclosure, the mandatory file reclamation system may further include:
a waste bin determination module 4001 configured to acquire a waste bin status, and determine whether the waste bin is full;
the state prompt module 4002 prompts a user to clean the waste bin after the task when the waste bin is in a full state; when the waste bin is in an unfilled state, the recovery operation is normally started.
The specific operation mode of each unit of the above file recycling system is the same as that of the corresponding part in the file recycling method, and will not be described herein.
The foregoing description of the preferred embodiments of the present disclosure is not intended to limit the disclosure, but rather to cover all modifications, equivalents, improvements and alternatives falling within the spirit and principles of the present disclosure.

Claims (8)

1. A document recycling method, comprising:
acquiring a working mode selection instruction input by a user;
selecting a corresponding working mode according to the working mode selection instruction;
the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and manually assist in recycling;
the self-service file recycling mode workflow is as follows:
acquiring user identity information;
judging whether the user has self-service file recovery authority according to the user identity information; when the user has the self-service file recycling right, receiving the selection of recycling parameters by the user;
providing a corresponding reclamation operation based on the reclamation parameters;
judging whether the recovery operation is completed or not, registering the recovery operation ledger information after the recovery operation is completed, and destroying the file;
the working flow of the forced file recycling mode is as follows:
acquiring a forced recycling reason input by a user of an administrator, and marking the file as a forced recycling file;
acquiring user identity information of an administrator;
judging whether the user has mandatory file recovery authority according to the manager user identity information;
when the administrator user has the mandatory file recycling right, receiving the selection of the mandatory file recycling parameter by the user;
and providing corresponding recycling operation based on the forced file recycling parameters, registering the forced file recycling parameter ledger information, and destroying the file.
2. The method of claim 1, wherein the determining whether the user has self-service file recycling rights according to the user identity information comprises:
uploading the user identity information to a server;
and the server judges the recycling authority of the user based on a user information base stored in advance.
3. The method of claim 1, wherein the receiving user selection of reclamation parameters comprises:
receiving the selection of the recycling parameters by the user in a human-computer interaction interface;
wherein the recovery parameters include:
one or more of a reclaimed file type, a reclaimed file number, and a reclaimed file size;
when the type of the recovery file selected by the user is a paper file, prompting the user to place the file at a paper file recovery port;
and when the type of the recovery file selected by the user is a readable storage medium, prompting the user to place the file in a recovery port of the readable storage medium.
4. The method of claim 1, wherein the determining whether the reclamation operation is complete comprises one or more of:
judging whether all received files belong to the same job or not;
judging whether all received files belong to the user or not;
judging whether all the received file bar codes are complete; and judging whether all the received file bar codes are identified.
5. The method of claim 1, wherein the forced recovery cause comprises one or more of:
the bar code is broken, the bar code does not accord with the standard, the document is free from bar code, the document is lost, the attached bar code exceeds the preset thickness, the single document is oversized, and the single document is super thick.
6. The method of claim 1, wherein the receiving user selection of mandatory file reclamation parameters comprises:
receiving the selection of the forced file recycling parameters by the administrator user in a human-computer interaction interface;
wherein the mandatory file reclamation parameters include:
one or more of a forced reclaimed file type, a forced reclaimed file number, a forced reclaimed file size, and a forced reclaimed file list.
7. The method of claim 1, wherein the providing a corresponding reclamation operation based on the mandatory file reclamation parameters comprises:
and opening a corresponding temporary storage bin gate based on the forced file recycling parameters, and waiting for the administrator user to put in the forced recycling file.
8. A file reclamation system, comprising:
the recycling destroying cabinet is configured to acquire a working mode selection instruction input by a user;
the working mode switching module is configured to select a corresponding working mode according to the working mode selection instruction; the working modes comprise a self-service file recycling mode and a forced file recycling mode, wherein the self-service file recycling mode allows a user to automatically recycle files, and the forced file recycling mode requires the user to have administrator authority and perform manual auxiliary recycling;
wherein the self-service document recycling mode is for performing the method of any one of claims 1-7, and the forced document recycling mode is for performing the method of any one of claims 1-7.
CN201810354519.8A 2018-04-19 2018-04-19 File recycling method and system Active CN108874864B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810354519.8A CN108874864B (en) 2018-04-19 2018-04-19 File recycling method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810354519.8A CN108874864B (en) 2018-04-19 2018-04-19 File recycling method and system

Publications (2)

Publication Number Publication Date
CN108874864A CN108874864A (en) 2018-11-23
CN108874864B true CN108874864B (en) 2023-05-30

Family

ID=64327076

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810354519.8A Active CN108874864B (en) 2018-04-19 2018-04-19 File recycling method and system

Country Status (1)

Country Link
CN (1) CN108874864B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113190732B (en) * 2021-04-25 2022-04-19 北京中宏立达信创科技有限公司 Intelligent recovery management and control method and system for paper documents
CN116074450B (en) * 2022-12-27 2023-08-18 普世(南京)智能科技有限公司 Efficient secret-related file and optical disc self-service recovery method and system

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913436A (en) * 2005-08-10 2007-02-14 三星电子株式会社 Method and apparatus for supporting mode-based access control
CN101192262A (en) * 2006-11-24 2008-06-04 鸿富锦精密工业(深圳)有限公司 File permission control system and method
CN101404078A (en) * 2008-09-16 2009-04-08 鲁东大学 Cooperated electronic market based on market union
CN101815128A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Method and device for destroying terminal data
JP2011134265A (en) * 2009-12-25 2011-07-07 Hitachi Ltd System, method and program for managing document
CN102137129A (en) * 2010-01-22 2011-07-27 华为技术有限公司 Processing method, system and device for allocation file Profile
CN103345620A (en) * 2013-07-03 2013-10-09 北京立思辰计算机技术有限公司 Device and method for recycling classified files in bulk mode
CN103401886A (en) * 2013-08-20 2013-11-20 江苏君立华域信息安全技术有限公司 Implementation method of information security attack-defense confrontation
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103473510A (en) * 2013-09-13 2013-12-25 北京立思辰计算机技术有限公司 Batch destruction device and method for classified document
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
CN103870549A (en) * 2014-02-27 2014-06-18 中国石油天然气股份有限公司 method and device for cleaning petroleum geological software data
RU2013120402A (en) * 2013-04-30 2014-11-10 Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" ACCESS CONTROL SYSTEM FOR FILES BASED ON THEIR MANUAL AND AUTOMATIC MARKING
CN104573566A (en) * 2015-02-05 2015-04-29 深圳市成为信息技术有限公司 Method for setting system working mode of mobile data terminal
CN105893278A (en) * 2016-03-30 2016-08-24 北京金山安全软件有限公司 System cache garbage cleaning method and device and terminal equipment
CN106471784A (en) * 2014-08-06 2017-03-01 谷歌公司 Equipment access control
CN107392264A (en) * 2017-07-06 2017-11-24 滨州渤海活塞有限公司 Eletronic data management system and eletronic data management method

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4393247B2 (en) * 2004-03-30 2010-01-06 キヤノン株式会社 Job management apparatus and method, job management system, job management program, and storage medium
US10956371B2 (en) * 2015-12-15 2021-03-23 Hitachi Vantara Llc Team folder conversion and management

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1913436A (en) * 2005-08-10 2007-02-14 三星电子株式会社 Method and apparatus for supporting mode-based access control
CN101192262A (en) * 2006-11-24 2008-06-04 鸿富锦精密工业(深圳)有限公司 File permission control system and method
CN101404078A (en) * 2008-09-16 2009-04-08 鲁东大学 Cooperated electronic market based on market union
JP2011134265A (en) * 2009-12-25 2011-07-07 Hitachi Ltd System, method and program for managing document
CN102137129A (en) * 2010-01-22 2011-07-27 华为技术有限公司 Processing method, system and device for allocation file Profile
CN101815128A (en) * 2010-04-22 2010-08-25 中兴通讯股份有限公司 Method and device for destroying terminal data
RU2013120402A (en) * 2013-04-30 2014-11-10 Закрытое акционерное общество "Научно-производственное предприятие "Информационные технологии в бизнесе" ACCESS CONTROL SYSTEM FOR FILES BASED ON THEIR MANUAL AND AUTOMATIC MARKING
CN103345620A (en) * 2013-07-03 2013-10-09 北京立思辰计算机技术有限公司 Device and method for recycling classified files in bulk mode
CN103607273A (en) * 2013-07-18 2014-02-26 焦点科技股份有限公司 Data file encryption and decryption method based on time limit control
CN103401886A (en) * 2013-08-20 2013-11-20 江苏君立华域信息安全技术有限公司 Implementation method of information security attack-defense confrontation
CN103440140A (en) * 2013-09-11 2013-12-11 昆山富泰科电脑有限公司 System for classifying applications of intelligent device and setting use permission
CN103473510A (en) * 2013-09-13 2013-12-25 北京立思辰计算机技术有限公司 Batch destruction device and method for classified document
CN103870549A (en) * 2014-02-27 2014-06-18 中国石油天然气股份有限公司 method and device for cleaning petroleum geological software data
CN106471784A (en) * 2014-08-06 2017-03-01 谷歌公司 Equipment access control
CN104573566A (en) * 2015-02-05 2015-04-29 深圳市成为信息技术有限公司 Method for setting system working mode of mobile data terminal
CN105893278A (en) * 2016-03-30 2016-08-24 北京金山安全软件有限公司 System cache garbage cleaning method and device and terminal equipment
CN107392264A (en) * 2017-07-06 2017-11-24 滨州渤海活塞有限公司 Eletronic data management system and eletronic data management method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
利用电子信息集中管控系统实现电子文件周期管理;郝莎;《兰台世界》(第12期);52-54 *
医学实验室ISO15189质量管理体系文件的建立及文档的规范管理;刁奇志 等;《中国医药导报》;第13卷(第13期);174-176+180 *

Also Published As

Publication number Publication date
CN108874864A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
RU2249248C2 (en) Method and device for identification of voter
CN101014076B (en) Document management system and method, document disposal management system and method
CN108874864B (en) File recycling method and system
WO2010040971A1 (en) Document security feature and method for authenticating a document
JP5606382B2 (en) Personal authentication system
CN110673803A (en) Power grid planning data safety printing method and system
JP2005078222A (en) Passage management system, safety management system and management passage method
EP1624663A1 (en) Image reader
KR20140028351A (en) System and method for controling book rent/return using camera
CN110861947A (en) Secret-related paper recycling equipment
CN108776664B (en) Forced file recycling method and system
CN108874862A (en) Self-service file recovery method and system
CN114564729A (en) Seal management system and seal management client system
US20160303575A1 (en) Recordable media destruction system and method
CN108491712B (en) Method and device for safely reading and writing hospital confidential documents
CN117390686B (en) Storage medium destruction system based on foreign matter identification and alarm
US20060097089A1 (en) Method and device for destroying confidential documents
CN214067889U (en) Bill delivery box
JP5423857B2 (en) Equipment, device and program
CN116433411A (en) Nuclear power station controlled operation area foreign matter management method and system
CN117217401A (en) Safety environment management system for retired engineering machinery
JP2003263569A (en) Bond collation device and program
CN118747357A (en) Electronic signature processing method and device for distributed control system of nuclear power station
EP1748395A1 (en) Device and method for securely attributing an access right
CN112950860A (en) Bill delivery box and bill delivery method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant