[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103473510B - Method applied to batch destruction device for classified document - Google Patents

Method applied to batch destruction device for classified document Download PDF

Info

Publication number
CN103473510B
CN103473510B CN201310418139.3A CN201310418139A CN103473510B CN 103473510 B CN103473510 B CN 103473510B CN 201310418139 A CN201310418139 A CN 201310418139A CN 103473510 B CN103473510 B CN 103473510B
Authority
CN
China
Prior art keywords
destruction
file
destroy
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201310418139.3A
Other languages
Chinese (zh)
Other versions
CN103473510A (en
Inventor
温晶
殷雄
刘罡昊
王文卿
张忠生
单飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BEIJING LANXUM COMPUTER TECHNOLOGY Co.,Ltd.
Original Assignee
BEIJING LANXUM NEW TECHNOLOGY Co Ltd
Shenyang Lisichen Technology Co Ltd
BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BEIJING LANXUM NEW TECHNOLOGY Co Ltd, Shenyang Lisichen Technology Co Ltd, BEIJING LANXUM COMPUTER TECHNOLOGY Co Ltd filed Critical BEIJING LANXUM NEW TECHNOLOGY Co Ltd
Priority to CN201310418139.3A priority Critical patent/CN103473510B/en
Publication of CN103473510A publication Critical patent/CN103473510A/en
Application granted granted Critical
Publication of CN103473510B publication Critical patent/CN103473510B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method applied to a batch destruction device for classified documents. The device comprises a scanning device (1) with application of OCR (optical character recognition) technology, a small document destruction device (2), a personal computer (3), a server (4), a control program for document distribution, recovery and destruction (41), a destruction client (31), a USB (universal serial bus)cable (5), an internal security network (6), wherein the control program for document distribution, recovery and destruction (41) is installed on the server (4), and the destruction client (31), the USB (universal serial bus)cable (5) and the internal security network (6) are mounted on the personal computer (3). The batch destruction method for classified documents has the advantages of breaking through the defect in an original document destructure device of a single function, achieving the effects of scanning a full text of a to-be-destroyed document, automatically comparing a recycling document record with the full text, and automatically checking and auditing the destroyed document. Furthermore, manpower is saved, and safety and efficiency of operations are improved.

Description

A kind of method being applied to confidential document batch destruction equipment
Technical field
The invention belongs to computer technology and information security field, particularly relate to a kind of method being applied to confidential document batch destruction equipment.
Background technology
The present invention relates to computer technology and information security field, particularly relate to a kind of method being applied to confidential document batch destruction equipment.
In enterprises and institutions, for relating to the process of the file of state secret, company secrets and employee's security information, clear and definite system is typically had to be specified.Especially in research in defense-related science and technology design organization and manufacturing enterprises such as Aeronautics and Astronautics, the management of concerning security matters carrier is had the strictest security system, such as confidential document making, receive and dispatch, transmit, use, replicate, reclaim, the links such as destruction is desirable that and wants strict implement country security management relevant regulations.After confidential document makes and distributes use, requirement have to be reclaimed, and the recovery fiel having crossed security deadline to be destroyed, and file is destroyed and to be carried out unifying to destroy according to the destruction standard of country's security management, and guarantee that secret information cannot reduce, thus realize the closed loop management of confidential document.
For a long time, inside enterprises and institutions, following flow process is typically followed in the destruction of confidential document: destruction personnel register one by one by confidential document, destroys in the case of at least two people's on-site supervisions;Conventional destruction equipment is shredder;Destruction personnel need manual tallying file quantity, check file content, and the information that registration documents is destroyed, such as holder, filename, level of confidentiality, quantity, destruction date etc.;The register of registration documents destroying information then needs to preserve for a long time, in case audit is checked.
The defect that prior art exists:
1, by hand destruction file is checked, easily occur checking the mistakes such as quantity, and this file destroys mode workload very greatly, wastes time and energy;
2, destroying in the case of needing at least two people's on-site supervisions, human cost is relatively big and easily causes mistake because of carelessness;
3, book destroyed by Handwork register file, and not only register information may have an inaccurate problem, and search, statistical information is also inconvenient for.
Patent of the present invention is based on the patent of invention " a kind of confidential document batch reclaimer and method " that our company has applied for, but this patent is applied to the final occasion needing batch to destroy after file reclaims, and has range and the superiority of uniqueness.
Summary of the invention
Goal of the invention: provide a kind of method being applied to confidential document batch destruction equipment, it is achieved the full text scanning to file to be destroyed is compared with recovery fiel record, it is achieved to destroying the inquiry automatically of file and auditing, the safety of raising operation and efficiency.
Technical scheme: a kind of confidential document batch destroys equipment, destruction client 31, USB line 5 and the internal security network 6 destroyed equipment 2, PC 3, server 4 and the file granting being installed on server 4 including the application scanning device 1 of OCR technique, small files, reclaim and destroy control program 41, be installed in PC 3, it is characterised in that:
The scanning device 1 of application OCR technique is fixedly installed in small files and destroys the top of equipment 2, the scanning device 1 of application OCR technique and small files are destroyed equipment 2 and are connected in PC 3 each via USB line 5, and PC 3 and server 4 are linked together by internal security network 6;
File granting, reclaim and destroy log file release information in control program 41 (include original text keep on file, Time Of Release, granting number, file reception people, if desired for distinguish many parts of files, bar code, whether recovery etc. can be embedded), also log file reclaims information (reclaiming people, recovery time, expired time) and file destroying information (destroy people, destroy the time), can be conducted interviews by the web site page of PC 3;
The destruction equipment size of this scheme is not more than 700 × 500 × 400mm;Because different scanning devices limits difference to the weight of paper, user can use different scanning devices to solve the disposal problems that weight is lighter than the paper of 60 grams according to needs voluntarily.
The present invention discloses a kind of method being applied to confidential document batch destruction equipment, comprise the following steps:
1) confidential document batch reclaim after, is reclaimed record be stored on server 4 file granting, reclaim and destroy in control program 41, the record of recovery fiel include recovery people, recovery time, expired time;
2), after the expired time of recovery fiel reaches, this document is set to destroy the file of operation by system;
3) file to be destroyed is placed in the scanning device 1 of application OCR technique by the personnel with destruction authority;
4) there is the destruction client 31 that the personnel of destruction authority log in PC 3, carry out destroying operation: only in file granting, reclaim and destroy the personnel being authorized in control program 41 destroy and just have permission the destruction client 31 logged in PC 3, click on destruction operational order;
5) destroy operational order and start scanning device 1 and the small files destruction equipment 2 of application OCR technique simultaneously;
6) scanning device 1 of application OCR technique is scanned by scan module therein, is identified file to be destroyed, and scan data is sent to the destruction client 31 of PC 3 through USB line 5, destroys client 31 and scan data is sent to server 4;
7) the file granting on server 4, reclaim and destroy control program 41, the scan data of file to be destroyed is obtained by internal security network 6, keep on file to carry out comparison in full with the original text of the file destroyed being stored in server 4 by it, as kept on file consistent with arbitrary original text destroying file, return then to destruction client 31 and can destroy instruction, as kept on file to be different from the original text that arbitrarily can destroy file, then return and can not destroy instruction;
8) if destruction client 31 receives can destroy instruction, then carrying out destroying operation, file to be destroyed is scanned through equipment 1 and falls in small files destruction equipment 2, destroys client 31 and records destroying information;If destruction client 31 receives can not destroy instruction, then stopping scanning file, this file is taken out by destruction personnel, proceeds the destruction operation of remaining paper;
9), after destroying successfully, small files is destroyed equipment 2, by internal security network 6, destroying informations such as destroying the quantity of file, number of pages is passed to server 4, and after server 4 processes, the web site page in PC 3 shows.
Advantages of the present invention and beneficial effect: together with PC, scanning device, small files are destroyed equipment and server combination by internal security network by this confidential document batch destroying system, and run supporting software program, form a set of confidential document batch destroying system, break through the defect that the function singleness of equipment destroyed by original file, reach the scanning of the full text to file to be destroyed and carried out automatic comparison, automatically inquiring about and the effect of audit destruction file with recovery fiel record, and save manpower, the safety that improve operation and efficiency.
Accompanying drawing explanation
Fig. 1 is that present invention batch destroys equipment schematic diagram;
Fig. 2 is present invention batch Shredding Process schematic diagram.
Detailed description of the invention
In order to make the object, technical solutions and advantages of the present invention clearer, describe the present invention with specific embodiment below in conjunction with the accompanying drawings.
Such as Fig. 1, a kind of confidential document batch destroys equipment, destruction client 31, USB line 5 and the internal security network 6 destroyed equipment 2, PC 3, server 4 and the file granting being installed on server 4 including the application scanning device 1 of OCR technique, small files, reclaim and destroy control program 41, be installed in PC 3, it is characterised in that:
The scanning device 1 of application OCR technique is fixedly installed in small files and destroys the top of equipment 2, the scanning device 1 of application OCR technique and small files are destroyed equipment 2 and are connected in PC 3 each via USB line 5, and PC 3 and server 4 are linked together by internal security network 6;
File granting, reclaim and destroy log file release information in control program 41 (include original text keep on file, Time Of Release, granting number, file reception people, if desired for distinguishing many parts of files, bar code, whether recovery etc. can be embedded), also log file reclaims information (reclaiming people, recovery time, expired time) and file destroying information (destroy people, destroy the time), can be conducted interviews by the web site page of PC 3;
The destruction equipment size of this scheme is not more than 700 × 500 × 400mm;Because different scanning devices limits difference to the weight of paper, user can use different scanning devices to solve the disposal problems that weight is lighter than the paper of 60 grams according to needs voluntarily.
The present invention discloses a kind of method being applied to confidential document batch destruction equipment, comprise the following steps:
1) confidential document batch reclaim after, is reclaimed record be stored on server 4 file granting, reclaim and destroy in control program 41, the record of recovery fiel include recovery people, recovery time, expired time;
2), after the expired time of recovery fiel reaches, this document is set to destroy the file of operation by system;
3) file granting, reclaim and destroy control program 41 and be provided with personal management module, can the destruction authority of designer;File to be destroyed is placed in the scanning device 1 of application OCR technique by the personnel with destruction authority;
4) there is the destruction client 31 that the personnel of destruction authority log in PC 3, carry out destroying operation: only in file granting, reclaim and destroy the personnel being authorized in control program 41 destroy and just have permission the destruction client 31 logged in PC 3, click on destruction operational order;
5) destroy operational order and start scanning device 1 and the small files destruction equipment 2 of application OCR technique simultaneously;
6) scanning device 1 of application OCR technique is by scan module therein, scans, identifies file to be destroyed, and scan data is sent to the destruction client 31 of PC 3 through USB line 5, destroys client 31 and scan data is sent to server 4;
7) the file granting on server 4, reclaim and destroy control program 41, the scan data of file to be destroyed is obtained by internal security network 6, keep on file to carry out comparison in full by itself and the document text destroyed being stored in server 4, as kept on file consistent with the original text of arbitrary file to be destroyed, return then to destruction client 31 and can destroy instruction, as kept on file to be different from the original text of any file to be destroyed, then return and can not destroy instruction;
8) if destruction client 31 receives can destroy instruction, then carrying out destroying operation, file to be destroyed is scanned through equipment 1 and falls in destruction equipment 2, destroys client 31 and records destroying information;If destruction client 31 receives can not destroy instruction, then stopping scanning file, this file is taken out by destruction personnel, proceeds the destruction operation of remaining paper;
9), after destroying successfully, small files is destroyed equipment 2, by internal security network 6, destroying informations such as destroying the quantity of file, number of pages is passed to server 4, and after server 4 processes, the web site page in PC 3 shows.
File Shredding Process figure of the present invention is as in figure 2 it is shown, three processes can be divided into: destroys in preparation, destruction, destroy and terminate.
Destroying and prepare: in this patent, destroying file is recovery fiel;In this patent, destroy personnel and must be authorized the personnel of destruction authority for " file granting, reclaim and destroy control program " system manager by authorization module.
In destruction: in destruction, the personnel that destroy are by destroying client terminal start-up scanning device;When destroying file scan, comparing with file of keeping on file in " file granting, reclaim and destroy control program " system, if any consistent content and cross security deadline, then carry out next step, be scanned, Destruction, file has been destroyed;As the most then terminated, file is taken out by the personnel that destroy.
Destruction terminates: file is destroyed after terminating, and destroys data from destroying client transmissions to CPU, and " file granting, reclaim and destroy control program " system website can consult destroying information.
This confidential document batch destroying system is by internal security network by PC, scanning device, small files destruction equipment and server combination together, and run supporting software program, form a set of confidential document batch destroying system, break through the defect that the function singleness of equipment destroyed by original file, reach the scanning of the full text to file to be destroyed and carried out automatic comparison, automatically inquiring about and the effect of audit destruction file with recovery fiel record, and save manpower, the safety that improve operation and efficiency.

Claims (2)

1. being applied to the method that confidential document batch destroys equipment, described equipment includes applying OCR skill The scanning device (1) of art, small files are destroyed equipment (2), PC (3), server (4) and are installed on File granting on server (4), reclaim and destroy control program (41), the pin being installed in PC (3) Ruin client (31), it is characterised in that comprise the following steps:
1), after confidential document batch reclaims, reclaimed record and be stored in the file granting on server (4), recovery And destroy in control program (41), the described record that reclaims includes the expired time of confidential document;
2) the file granting on described server (4), reclaim and destroy control program (41), in recovery fiel Expired time reach after, this document is set to destroy the file of operation;
3) file to be destroyed is placed in the scanning device (1) of application OCR technique by the personnel with destruction authority On;
4) there is the destruction client (31) that the personnel of destruction authority log in PC (3), click on and destroy behaviour Instruct;
5) destroy operational order and start the application scanning device (1) of OCR technique and small files destruction sets simultaneously Standby (2);
6) scanning device (1) of application OCR technique is scanned by scan module therein, is identified literary composition to be destroyed Part, is sent to the destruction client (31) of PC (3) by scan data through USB line (5), destroys client (31) scan data is sent to server (4);
7) the file granting on server (4), reclaim and destroy control program (41), by sweeping of file to be destroyed The original text retouching data and the file destroyed that is stored in server (4) keeps on file to carry out comparison in full, as with arbitrary can The original text destroying file is kept on file unanimously, then return to destruction client (31) and can destroy instruction, as sold with any The original text ruining file keeps on file to be different from, then return to destruction client (31) and can not destroy instruction;
8) if destruction client (31) receives can destroy instruction, then carry out destroying operation, file warp to be destroyed Overscanning equipment (1) falls into small files and destroys destruction in equipment (2), destroys client (31) record and destroys letter Breath;If destruction client (31) receives can not destroy instruction, then stop scanning file, will by the personnel of destruction After this file takes out, proceed the destruction operation of remaining paper;
9), after destroying successfully, small files destroys equipment (2) will destroy file destruction by internal security network (6) Information passes to server (4), and after server (4) processes, the web site page in PC (3) shows Show.
A kind of method being applied to confidential document batch destruction equipment, its feature Being, the described record that reclaims also includes the recovery people of confidential document, recovery time, and described destroying information includes Destroy people, destroy the time.
CN201310418139.3A 2013-09-13 2013-09-13 Method applied to batch destruction device for classified document Active CN103473510B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310418139.3A CN103473510B (en) 2013-09-13 2013-09-13 Method applied to batch destruction device for classified document

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310418139.3A CN103473510B (en) 2013-09-13 2013-09-13 Method applied to batch destruction device for classified document

Publications (2)

Publication Number Publication Date
CN103473510A CN103473510A (en) 2013-12-25
CN103473510B true CN103473510B (en) 2017-01-11

Family

ID=49798356

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310418139.3A Active CN103473510B (en) 2013-09-13 2013-09-13 Method applied to batch destruction device for classified document

Country Status (1)

Country Link
CN (1) CN103473510B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108874864B (en) * 2018-04-19 2023-05-30 北京立思辰计算机技术有限公司 File recycling method and system
CN108776664B (en) * 2018-04-19 2023-06-16 北京立思辰计算机技术有限公司 Forced file recycling method and system
CN114022893A (en) * 2021-11-08 2022-02-08 支付宝(杭州)信息技术有限公司 Paper file destroying method and device

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949254A (en) * 2005-10-12 2007-04-18 富士施乐株式会社 Document management system and document destruction apparatus
CN101038658A (en) * 2006-03-15 2007-09-19 合成技术控股有限公司 Method and device for destroying secret document

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH10207778A (en) * 1997-01-21 1998-08-07 Nec Corp Method for protecting data security and device therefor

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1949254A (en) * 2005-10-12 2007-04-18 富士施乐株式会社 Document management system and document destruction apparatus
CN101038658A (en) * 2006-03-15 2007-09-19 合成技术控股有限公司 Method and device for destroying secret document

Also Published As

Publication number Publication date
CN103473510A (en) 2013-12-25

Similar Documents

Publication Publication Date Title
JP5721860B2 (en) Method and system for document print management and control and document source tracking
CN107066844B (en) Method and device for safety control and traceability tracking of paper documents
CN101779212B (en) Authentication system and method including image forming apparatus
US20080288240A1 (en) Network-Based Translation System And Method
CN103345620B (en) A kind of confidential document batch reclaimer and method
CN103279720B (en) The monitoring of a kind of USB printer secure print and auditing system
CN1623796A (en) Sealing machine and method of controlling seal and its system
CN103473510B (en) Method applied to batch destruction device for classified document
CN106228340A (en) Construction drawing digitized auditing system
CN102227116A (en) Safe local area network management method and local area network
CN113190732B (en) Intelligent recovery management and control method and system for paper documents
CN101192262A (en) File permission control system and method
CN106776851A (en) File structure method and apparatus
CN112053025A (en) Scientific research waste liquid environment-friendly recovery method, device, system and storage medium
CN104636882A (en) Method for managing use of dangerous chemical article
Allred Recycling process for scrap composites and prepregs
CN104331259A (en) File protection based document-centralized file printing system
CN107392033B (en) Android device penetration test system and automatic penetration test method thereof
Lotz et al. Towards systematic achievement of compliance in service-oriented architectures: The MASTER approach
CN105894175A (en) Coal slurry pipeline laboratory management system
Unser Advanced composites recycling
CN1237464C (en) Door guard information security system and method
CN1387158A (en) IC card management system for requesting and approving building engineerings and its application
RU2661327C1 (en) Confidentiality ensuring method during the paper documents continuous electronic processing by operator and software for its implementation
CN116304267A (en) Comprehensive intelligent energy project archive management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
ASS Succession or assignment of patent right

Owner name: BEIJING LANXUM NEW TECHNOLOGY CO., LTD. SHENYANG L

Effective date: 20140801

C41 Transfer of patent application or patent right or utility model
C53 Correction of patent of invention or patent application
CB03 Change of inventor or designer information

Inventor after: Wen Jing

Inventor after: Yin Xiong

Inventor after: Liu Ganghao

Inventor after: Wang Wenqing

Inventor after: Zhang Zhongsheng

Inventor after: Dan Fei

Inventor before: Wen Jing

COR Change of bibliographic data

Free format text: CORRECT: INVENTOR; FROM: WEN JING TO: WEN JING YIN XIONG LIU GANGHAO WANG WENQING ZHANG ZHONGSHENG DAN FEI

TA01 Transfer of patent application right

Effective date of registration: 20140801

Address after: 102308, 3, building 2, 20, 214 Yongan Road, Shilong Economic Development Zone, Beijing, Mentougou

Applicant after: Beijing Lanxum Computer Technology Co., Ltd.

Applicant after: Beijing Lanxum New Technology Co., Ltd.

Applicant after: Shenyang Lisichen Technology Co., Ltd.

Address before: 102308, 3, building 2, 20, 214 Yongan Road, Shilong Economic Development Zone, Beijing, Mentougou

Applicant before: Beijing Lanxum Computer Technology Co., Ltd.

GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20220222

Address after: 102413 room a-5920, building 3, No. 20, Yong'an Road, Shilong Economic Development Zone, Mentougou District, Beijing

Patentee after: BEIJING LANXUM COMPUTER TECHNOLOGY Co.,Ltd.

Address before: 102308 room 214, 2 / F, building 3, 20 Yong'an Road, Shilong Economic Development Zone, Mentougou District, Beijing

Patentee before: BEIJING LANXUM COMPUTER TECHNOLOGY Co.,Ltd.

Patentee before: BEIJING LANXUM NEW TECHNOLOGY Co.,Ltd.

Patentee before: Shenyang Lisichen Technology Co.,Ltd.

TR01 Transfer of patent right