CN101038658A - Method and device for destroying secret document - Google Patents
Method and device for destroying secret document Download PDFInfo
- Publication number
- CN101038658A CN101038658A CNA2006100574800A CN200610057480A CN101038658A CN 101038658 A CN101038658 A CN 101038658A CN A2006100574800 A CNA2006100574800 A CN A2006100574800A CN 200610057480 A CN200610057480 A CN 200610057480A CN 101038658 A CN101038658 A CN 101038658A
- Authority
- CN
- China
- Prior art keywords
- container
- identify label
- identity data
- electronic data
- needs
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Landscapes
- Refuse Collection And Transfer (AREA)
Abstract
A method for destroying secret documents comprises steps: a) saving one or more secret documents in a container; b) marking the container; c) storing an identity mark data related to the container in an electronic data system; d) establishing identity marks for one or more containers; e) comparing the identity marks established in the step d) with the data in the electronic data system in the step (c); and f) if the identity mark of the container established in the step d) is matched with the identity mark data of the container stored in the electronic data system in the step (c), the container is destroied.
Description
Technical field
The present invention relates to be used for the method and apparatus of destroying secret document.
Background technology
The destruction of confidential document at present realizes by following steps: collect the document of secret, afterwards collected document is placed in the container, this container is sealed subsequently.Therefore the container of sealing is sent to destruction company, carries out actual destruction afterwards, as shredding or burning.In fact, fraud appears in this storage confidential file and the system that subsequently it delivered specialized company easily.After all, if a large amount of containers is sent to destruction company, the some of them container possibility that is removed and do not destroyed exists so.Therefore may think that all confidential documents have been destroyed, but true really not so.
Summary of the invention
Therefore an object of the present invention is to provide a kind of equipment and method of destroying secret document, wherein the risk of being swindled is dropped to minimum.
Another object of the present invention provides a kind of equipment and the method that can put destroying secret document at any time, wherein confidential document is carried out so-called " tracking is traced ", therefore make can be in the process of transporting with destroying secret document the tracing machine confidential document.
Another object of the present invention provides a kind of equipment and method that is used for destroying secret document, wherein for can determine confidential document transport and the destruction process in the position in a plurality of stages, used as the electronic storage system such as computing machine.
According to the method for mentioning in the aforementioned introduction, it is characterized in that may further comprise the steps:
A) one or more confidential document is kept in the container;
B) sign container;
C) the storage identity data relevant in Electronic Data Systems with described container;
D) set up the identify label of one or more container;
E) identity data that is stored in the Electronic Data Systems in the identify label that will set up in step d) and the step c) is compared; And
F) if the identity data that is stored in the Electronic Data Systems in the identify label of the described container of setting up in the step d) and the step c) conforms to, then destroy container.
By confidential document being kept in the container that has identify label, described container is can be tracked from the process that is transported to destruction.And, the only actual destruction of the container of in identify label that described container is set up is just carried out as step f) when identify label in being stored in Electronic Data Systems conforms to, being carried.Therefore, the risk of swindle is minimized.In addition, according to the present invention, the destruction of so-called unknown container can not take place, the container that described unknown container promptly can not be followed the tracks of by Electronic Data Systems again.Therefore risk of fraud has in this case also been dropped to minimum.
In a special embodiment, wish at step c) and d) between carry out the other intermediate steps, described intermediate steps promptly:
K) tabulation of the container of generate to need collecting from Electronic Data Systems, this tabulation comprises and the relevant identify label of container that needs collection;
L) set up the identify label that needs collection container;
M) will be at step l) in the identify label of setting up and with step k) in identity data in the tabulation that generates compare;
N) if step l) in identity data and step k) in identity data conform to, then collect the container be collected.
According to a preferred embodiment of the present invention, at step n) also carry out other step o afterwards)-t), comprising:
O) identity data of collection container storing step n in Electronic Data Systems).
P) set up the identify label of one or more container that need receive;
Q) will be at step p) in the identify label and step o of setting up) in the identity data that is stored in the Electronic Data Systems compare;
R) if step p) in identify label and step o) in identity data conform to, then receive the container be collected;
S) in Electronic Data Systems, be stored in step r) in the identity data of the container that received;
T) generate the tabulation that needs decomposition container from Electronic Data Systems, this tabulation comprises and the relevant identify label of container that needs to decompose.
Reality is that the document that needs in the practical operation to be destroyed will be collected from different positions, as company or client.By the tabulation of the container generate to need collected from Electronic Data Systems, guaranteed that those containers that need be destroyed have been sent to destruction company really.Wherein said tabulation will compare with the identify label of the container of collecting subsequently.
In a special embodiment according to the present invention, for example in the step b) of distinguish containers, preferably also comprise by the content registration of weighing, modes such as x ray, supersonic sounding and metal detection are carried out,, this step is also carried out in step d) and is determined that correct container will be destroyed.
Execution in step e further preferably), promptly at execution in step f) in actual destruction before, the identify label in the Electronic Data Systems in identify label of setting up in the step d) and the step c) is carried out twice relatively.Be easy to the consideration of being swindled for reducing existing method, such duplication check is valuable especially.After all, below situation be contingent: in case set up after the identify label of described container of the identity data in the corresponding Electronic Data Systems, the container that needs to destroy is taken out from the process of destroying, thereby places the confidential document of container not destroyed.The result of the operation of identification for the second time is can not remove the container that has been identified again, thereby the container that is identified to be destroyed really.
The identify label sign indicating number that uses in this method comprises bar code, Radio Frequency ID mark, two-dimensional matrix code, three-dimensional barcode and graphic code, perhaps their combination, these identification codes comprise surface, position, department and individual's the data of color, the container of weight, the container of or more multinomial size about sequence number, date, container, container.The weight of container is one and is used for judging that container is at the important parameter that whether was opened without permission from the processing procedure that recognizes destruction.But should be appreciated that the present invention never is subject to this identification code tabulation.
The invention still further relates to a kind of equipment, this equipment comprises:
Be used for one or more confidential document is kept at a device in the container;
Be used to identify the device of container;
Be used for device in the Electronic Data Systems storage identity data relevant with described container;
Be used to set up the device of the identify label of one or more container; ,
Be used for device that the identify label of setting up is compared with the data of Electronic Data Systems;
And
Be used to destroy the device of container.
In a special embodiment, described equipment also comprises:
Be used for generating the device of the tabulation of the container that needs collection, the related identify label of container that described tabulation comprises and needs to collect from Electronic Data Systems;
Be used to set up the device of the identify label that needs the container collected;
Be used for device that the identity data of the identify label of need collection container and the identity data tabulation relevant with the need collection container is compared;
The device that is used for collection container.
Preferably, described equipment also comprises the device of the identity data that is used for the container collected in Electronic Data Systems storages, and the device that is used to produce the visual record of container.In a special embodiment, described equipment also preferably includes the device that is used to judge container weight.
In a preferred embodiment, described equipment also comprises:
Be used to set up the device that one or more needs the identify label of receiving vessel;
Be used for device that identify label is compared with the identify label of Electronic Data Systems;
The device that is used for receiving vessel;
Be used at the device of Electronic Data Systems storage with the identity data that receiving vessel is relevant;
Be used for generating from Electronic Data Systems the device of the tabulation of the container that needs decomposition, this tabulation comprises the identify label relevant with the container that need be decomposed.
In a preferred embodiment, described equipment also comprises the device that is used for to the unique identify label sign indicating number of container allocation, and wherein the identify label sign indicating number comprises bar code, Radio Frequency ID mark, two-dimensional matrix code, three-dimensional barcode and graphic code, perhaps their combination.Particularly particularly, described identification code comprises one or more about data such as sequence number, date, position, department and people.In a special embodiment, the present invention also comprises and for example being used for by the device of weighing, mode such as x ray, supersonic sounding and metal detection is registered container contents, these means are used for identifying container and distinguish containers once more before destroying subsequently beginning of handling as additional step, and measurement data compared mutually, thereby determine to relate to be one and be same container.
The device that is used to destroy container also comprises the device that is used to transmit the device of container and is used to pulverize institute's transmission container.
Embodiment
The present invention will illustrate hereinafter, but be to be understood that relation wherein, and the present invention never is limited to this special embodiment.
Confidential document is placed in the container, as a secure envelope.As described in identify label sign indicating number (as bar code) placed on the envelope.After envelope was sealed, it can not be opened and destroy this envelope not obviously.This is also referred to as " distort evidence (tamper evident) ".Subsequently, the operator is input to Electronic Data Systems to the sequence number of envelope from his/her computer.Can add the data relevant (envelope from the position of its individual's who collects name, described collection, weight, size, color etc.) there at that with document.
The data that the operator is input to system are sent to operator's PC (personal computer) subsequently.And the content of envelope can determine that these contents also are transfused to data system by carrying out some suitable analytical approachs such as x rays method.When the document gatherer determines to collect envelope (this may a day take place several times), he will be for the first time need be from the work PC handle download of information relevant to suitable device, as the bar code terminal with being collected envelope.And, can print one or more tabulation by operator's PC, these tabulations comprise all data that need be collected envelope.For example tabulation can comprise name (may also have photo), the position of described collection and the quantity of envelope that envelope is collected the people.Preferably, the information that relates to the envelope content can not be presented in the tabulation, in any case but these information and document gatherer are irrelevant.
The document gatherer can begin to collect envelope based on described tabulation now.In case the gatherer arrives the workplace, just envelope is scanned so that it is read in the terminal by the bar code terminal.After finishing described scanning, the document gatherer can be on a display device such as display screen the information (but do not relate to its content) of observation problem envelope.By finishing this processing procedure at bar code terminal input validation, the document gatherer can continue his/her new position of working then.This processing procedure constantly repeats to finish all tabulations up to the operator.
In case the document gatherer finishes the collection of envelope, envelope is taken reception place.After paying envelope, the document gatherer gets back to and receives PC, and the bar code terminal is read out.Data are by system handles now.
In reception place, the document recipient is scanned envelope by the bar code terminal by the feud and is weighed.The data of envelope and the data that receive among the PC are compared.When Data Matching, envelope can be placed in the container.As described in unique identify label sign indicating number (as bar code) placed on the container.
After the described processing, can print tabulation, and check whether all envelopes all are collected.
After the described processing, further container is transported destroy the chamber before, container can be placed in the safe storeroom or strong-room.
The keeper can select container to create a batch from the safe storage that need are differentiated.Now, discharge described batch and differentiate the chamber further to be transferred to.All batch datas all are that operator's PC can visit.
Now, the data that discharge envelope are that system is addressable, and the operator can begin to destroy.
Before the operator can begin to load storage conveyor, the lid of his at first release storage conveyor (mechanical lock), afterwards, he can uncap.Then, fan, pre-crushing machine, comminutor and travelling belt sequence starting.The operator uses the bar code terminal to scan envelope one by one and in case of necessity envelope is weighed then, and the data among envelope data and operator's the PC are compared.When Data Matching, envelope can be placed on the storage conveyor.But described placement envelope must be carried out as follows, and camera can write down the image of envelope and the bar code that bar code reader can read envelope.
If the operator scans the envelope that data in data and the system are not inconsistent (for example bar code is unrecognized or the number of envelope is not listed in the system), system will generate this result's message, and the operator need be placed on the problem envelope on one side.Second individual demand finds out why envelope can be rejected.After having only the mistake of elimination, envelope could be rescaned and is placed on the storage conveyor.Simultaneously, the operator will normally continue to scan next envelope and they will be placed on the storage conveyor, all be scanned and place storage container up to all envelopes.
Travelling belt makes envelope finally drop into pre-crushing machine, but before this, the bar code of envelope is read again.The reason that reads the envelope bar code once more is the swindle when preventing to place envelope to storage conveyor.In the beginning part of travelling belt, the possibility of situation below exist taking place: by the bar code terminal scanning operator of envelope envelope is taken or another one envelope (perhaps at all not having envelope) is put into away its position from travelling belt.By can position contacting arranging bar code reader the end of travelling belt, a no one, system can survey any swindle attempt, and generates this result's message.If this situation has taken place, system will generate an error message.
A kind of additional inspection is at the end of travelling belt each envelope to be taken a picture.In case all envelopes are all destroyed, can stop machine, shut and lock the lid of accumulator conveyor.
Subsequently, the operator can print the report of the data that comprise the process of destroying from operator's PC.Described report can comprise following data: destroy the number of envelope, be placed on the travelling belt but at the number of the envelope of system's registration with registered in system but do not have the number of the envelope of destruction with not ing.Report can also comprise many deal with data, as batch number, the date and time of destroying process, the duration of destroying process, operator's name, Security Officer's name and the general assembly (TW) that all destroy envelope etc.This report is transferred the keeper subsequently to and is used for confirming.
Claims (22)
1. method that is used for destroying secret document comprises step:
A) one or more confidential document is kept in the container;
B) identify described container;
C) the storage identity data relevant in Electronic Data Systems with described container;
D) set up the identify label of one or more container;
E) data in the Electronic Data Systems are compared in the identify label that will set up in step d) and the step c); And
F) if be stored in the identity data of the described container in the Electronic Data Systems in the identify label of the described container of setting up in the step d) and the step c) and conform to, then destroy described container.
2. method according to claim 1 is characterized in that at step c) and d) between carry out the other intermediate steps, that is:
K) generate the tabulation that needs collection container from Electronic Data Systems, this tabulation comprises and the described relevant identity data of collection container that needs;
L) set up the identify label that needs collection container;
M) will be at step l) in the identify label and step k of setting up) in identity data in the tabulation of generation compare;
N) if step l) in identity data and step k) in identity data conform to, then collect the container be collected.
3. method according to claim 2 is characterized in that at step n) also carry out other step o afterwards), this step o) be included in storing step n in the described Electronic Data Systems) in the identity data of collection container.
4. method according to claim 3 is characterized in that at step o) also carry out other step p afterwards)-t), comprising:
P) set up the identify label that one or more needs receiving vessel;
Q) will be at step p) in the identify label and step o of setting up) in the identity data that is stored in the Electronic Data Systems compare;
R) if step p) in identify label and step o) in identity data conform to, then receive the described container that is collected;
S) in Electronic Data Systems, be stored in step r) in the identity data of the container that received;
T) tabulation of the container that generate to need decomposes from Electronic Data Systems, this tabulation comprises and the relevant identity data of container that needs decomposition.
5. method according to claim 4 is characterized in that at step s) and step t) between can be in the storeroom or strong-room of safety the described container storage that has received.
6. any described method in requiring according to aforesaid right is characterized in that step d), i) and p) at least one step comprise the weight of determining described container.
7. any described method in requiring according to aforesaid right is characterized in that carrying out twice step e) before step f) begins.
8. any described method in requiring according to aforesaid right is characterized in that also comprising the visual record that generates container in step d).
9. according to any described method in the aforesaid right requirement, it is characterized in that before carrying out the destruction step f), generating the visual record of the container that will be destroyed.
10. any described method in requiring according to aforesaid right is characterized in that step a) also comprises to the unique identify label sign indicating number of container allocation.
11. method according to claim 10 is characterized in that described identify label sign indicating number comprises bar code, Radio Frequency ID mark, two-dimensional matrix code, three-dimensional barcode and graphic code, perhaps their combination.
12., it is characterized in that described identity code comprises one or more multinomial data about sequence number, date, position, department and individual according to any described method among the claim 10-11.
13. any described method in requiring according to aforesaid right is characterized in that step a) carries out as follows, promptly can not open this container under the situation of not obvious damage container.
14. an equipment that is used for destroying secret document comprises:
Be used for one or more confidential document is kept at a device in the container;
Be used to identify the device of described container;
Be used for device in the Electronic Data Systems storage identity data relevant with described container;
Be used to set up the device of the identify label of one or more container;
Be used for device that the identify label of setting up is compared with the data of Electronic Data Systems;
And
Be used to destroy the device of described container.
15. equipment according to claim 14 is characterized in that described equipment also comprises:
Be used for generating from Electronic Data Systems the device of the tabulation that needs collection container, described tabulation comprises and the described relevant identity data of collection container that needs;
Be used to set up the device of the identify label that needs the container collected;
Be used for the device that identity data that described need are collected and the identity data that the identity data relevant with described need collection container tabulated are compared;
The device that is used for collection container.
16., it is characterized in that described equipment also comprises the device that is used in the Electronic Data Systems storage identity data relevant with described collection container according to any described equipment among the claim 14-15.
17. any described equipment according among the claim 14-16 is characterized in that described equipment also comprises:
Be used to set up the device that one or more needs the identify label of receiving vessel;
Be used for device that described identify label is compared with the identity data of Electronic Data Systems;
The device that is used for receiving vessel;
Be used for device in the Electronic Data Systems storage identity data relevant with described receiving vessel;
Be used for generating from Electronic Data Systems the device of the tabulation that needs decomposition container, this tabulation comprises and the described relevant identity data of decomposition container that needs.
18., it is characterized in that described equipment also comprises the device of the visual record that is used to generate container according to any described equipment among the claim 14-17.
19., it is characterized in that described equipment also comprises the device that is used for to the unique identify label sign indicating number of container allocation according to any described equipment among the claim 14-18.
20. equipment according to claim 19 is characterized in that described identify label sign indicating number comprises bar code, Radio Frequency ID mark, two-dimensional matrix code, three-dimensional barcode and graphic code, perhaps their combination.
21., it is characterized in that described identity code comprises one or more multinomial data about sequence number, date, position, department and individual according to any described equipment among the claim 19-20.
22. according to any described equipment among the claim 14-21, the device that it is characterized in that being used to destroying container also comprises and is used to transmit the device of container and the device of the container that pulverizing is transmitted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100574800A CN101038658A (en) | 2006-03-15 | 2006-03-15 | Method and device for destroying secret document |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CNA2006100574800A CN101038658A (en) | 2006-03-15 | 2006-03-15 | Method and device for destroying secret document |
Publications (1)
Publication Number | Publication Date |
---|---|
CN101038658A true CN101038658A (en) | 2007-09-19 |
Family
ID=38889542
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CNA2006100574800A Pending CN101038658A (en) | 2006-03-15 | 2006-03-15 | Method and device for destroying secret document |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN101038658A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473510A (en) * | 2013-09-13 | 2013-12-25 | 北京立思辰计算机技术有限公司 | Batch destruction device and method for classified document |
CN110533434A (en) * | 2019-08-28 | 2019-12-03 | 上海秒针网络科技有限公司 | Determination method, apparatus, storage medium and the electronic device that article is destroyed |
CN111515003A (en) * | 2020-04-10 | 2020-08-11 | 中国民用航空局信息中心 | RFID airworthiness certificate destruction recording system and method |
-
2006
- 2006-03-15 CN CNA2006100574800A patent/CN101038658A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103473510A (en) * | 2013-09-13 | 2013-12-25 | 北京立思辰计算机技术有限公司 | Batch destruction device and method for classified document |
CN103473510B (en) * | 2013-09-13 | 2017-01-11 | 北京立思辰计算机技术有限公司 | Method applied to batch destruction device for classified document |
CN110533434A (en) * | 2019-08-28 | 2019-12-03 | 上海秒针网络科技有限公司 | Determination method, apparatus, storage medium and the electronic device that article is destroyed |
CN111515003A (en) * | 2020-04-10 | 2020-08-11 | 中国民用航空局信息中心 | RFID airworthiness certificate destruction recording system and method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10282480B2 (en) | Multimode image and spectral reader | |
US10192140B2 (en) | Database for detecting counterfeit items using digital fingerprint records | |
CN1054811C (en) | Unlaterable self-verifying articles | |
US7415130B1 (en) | Mail image profiling and handwriting matching | |
CN109261552B (en) | System, method and apparatus for item processing | |
US9177303B2 (en) | Methods for monitoring and processing batches of documents | |
US8453922B2 (en) | Method for one-step document categorization and separation using stamped machine recognizable patterns | |
US20080154751A1 (en) | Sortation and extraction system for item management systems and associated methods | |
US20030183683A1 (en) | Method and associated system for specimen and sample chain of custody tracking | |
CN1714532A (en) | System and method for biometric verification in a delivery process | |
CN101216960A (en) | An electronic guard defense system and method | |
KR20210023994A (en) | Double substance-digital anti-counterfeiting protection of goods | |
CN101038658A (en) | Method and device for destroying secret document | |
US9177281B2 (en) | Systems and methods for a secure shipping label | |
US8073782B2 (en) | Advanced crypto round dater | |
CN1482569A (en) | Off-line two-dimension bar code biological identification false-proof method | |
US7198210B2 (en) | Method and device for destroying confidential documents | |
RU2332710C2 (en) | Method and device for destroying confidential documents | |
JP2005182502A (en) | Monitoring/management system for resource, waste, or product | |
EP1835449A1 (en) | Method and device for destroying confidential documents | |
CN1645409A (en) | Mobile wireless network identifying system | |
JP2017019589A (en) | Delivery management system and delivery management method | |
Salleh et al. | Application of 2D barcode in hardcopy document verification system | |
CN1877601A (en) | Method for managing anti-false and material-circulation information of tickets, certificates, and labels | |
CN109299763B (en) | Anti-tampering and counterfeiting method of paper secret-related carrier based on RFID key chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C12 | Rejection of a patent application after its publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20070919 |