[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN118586416A - Method and system for recovering and destroying confidential carrier - Google Patents

Method and system for recovering and destroying confidential carrier Download PDF

Info

Publication number
CN118586416A
CN118586416A CN202410714494.3A CN202410714494A CN118586416A CN 118586416 A CN118586416 A CN 118586416A CN 202410714494 A CN202410714494 A CN 202410714494A CN 118586416 A CN118586416 A CN 118586416A
Authority
CN
China
Prior art keywords
carrier
destroying
target
channel
ready
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410714494.3A
Other languages
Chinese (zh)
Inventor
方金勇
李迎春
徐坚磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ningbo Hangong Osda Information Technology Co ltd
Original Assignee
Ningbo Hangong Osda Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ningbo Hangong Osda Information Technology Co ltd filed Critical Ningbo Hangong Osda Information Technology Co ltd
Priority to CN202410714494.3A priority Critical patent/CN118586416A/en
Publication of CN118586416A publication Critical patent/CN118586416A/en
Pending legal-status Critical Current

Links

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation

Landscapes

  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for recovering and destroying a confidential carrier, and relates to the technical field of information security, wherein the method comprises the following steps: acquiring a target carrier, performing code scanning marking based on an identification code of the target carrier, acquiring code scanning information and initial carrier characteristics, and preprocessing the target carrier to acquire a ready target carrier; performing perception acquisition of the ready-state target carrier, inputting a perception acquisition result and initial carrier characteristics into a rechecking discriminator, and performing pretreatment rechecking; if the pretreatment rechecking result is passed, the destroying channel distribution is carried out, the target destroying channel is obtained, final destroying is carried out, and the destroyed product is output. The invention solves the technical problems that the security monitoring is not carried out in the process of processing the confidential carrier in the prior art, the automatic and intelligent processing flow is not perfect, and achieves the technical effects of rapidly, efficiently and thoroughly destroying the confidential carrier through intelligent flow management and simultaneously ensuring the accuracy and the security of the whole process.

Description

Method and system for recovering and destroying confidential carrier
Technical Field
The invention relates to the technical field of information security, in particular to a method and a system for recovering and destroying a confidential carrier.
Background
The variety and number of confidential carriers such as storage devices, files, optical discs, etc. are increasing. If the confidential carriers are not properly processed, information leakage can be possibly caused, so that a safe and reliable recovery and destruction processing mode is needed, the intelligent degree of the confidential carrier processing is not high at present, and safety supervision is lacked in the processing process.
The prior art has the technical problems that the security monitoring is not needed in the process of processing the confidential carrier, the automatic and intelligent processing flow is not perfect enough, and the technical problem of relying on manual operation is solved.
Disclosure of Invention
The application provides a method and a system for recovering and destroying a confidential carrier, which are used for solving the technical problems that the prior art lacks safety monitoring in the process of processing the confidential carrier, the automatic and intelligent processing flow is not perfect, and the manual operation is relied on.
In view of the above problems, the application provides a method and a system for recovering and destroying confidential carriers.
In a first aspect of the present application, there is provided a method for recovering and destroying a confidential carrier, the method comprising:
And acquiring the target carrier, and performing code scanning marking based on the identification code of the target carrier to acquire code scanning information.
Analyzing the code scanning information, obtaining initial carrier characteristics, and carrying out category identification on the target carrier based on the initial carrier characteristics to generate carrier category identification.
And preprocessing the target carrier based on the carrier category identification to obtain a ready target carrier.
Activating a multimode sensing component to perform sensing collection of the ready-state target carrier, inputting a sensing collection result and initial carrier characteristics into a rechecking discriminator, and performing pretreatment rechecking of the ready-state target carrier.
If the pretreatment rechecking result of the ready-state target carrier is passed, carrying out destroying channel allocation based on the initial carrier characteristics and the carrier category identifiers, obtaining a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products.
In a second aspect of the present application, there is provided a confidential carrier recovery destruction processing system, the system comprising:
The target carrier acquisition module is used for acquiring the target carrier, and performing code scanning marking based on the identification code of the target carrier to acquire code scanning information.
The carrier category identification generation module is used for analyzing the code scanning information, acquiring initial carrier characteristics, and identifying the target carrier based on the initial carrier characteristics to generate a carrier category identification.
And the preprocessing module is used for preprocessing the target carrier based on the carrier category identification to obtain a ready target carrier.
The preprocessing rechecking module is used for activating the multimode sensing assembly to perform sensing collection of the ready-state target carrier, inputting a sensing collection result and initial carrier characteristics into the rechecking discriminator, and performing preprocessing rechecking of the ready-state target carrier.
The destroying product output module is used for distributing destroying channels based on the initial carrier characteristics and the carrier category identifiers if the preprocessing rechecking result of the ready-state target carrier is passed, acquiring a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products.
One or more technical schemes provided by the application have at least the following technical effects or advantages:
Acquiring a target carrier, and performing code scanning marking based on an identification code of the target carrier to acquire code scanning information; analyzing the code scanning information, obtaining initial carrier characteristics, and carrying out category identification on a target carrier based on the initial carrier characteristics to generate a carrier category identification; preprocessing the target carrier based on the carrier category identification to obtain a ready target carrier; activating a multimode sensing assembly to perform sensing acquisition of the ready-state target carrier, inputting a sensing acquisition result and initial carrier characteristics into a rechecking discriminator, and performing pretreatment rechecking of the ready-state target carrier; if the pretreatment rechecking result of the ready-state target carrier is passed, carrying out destroying channel allocation based on the initial carrier characteristics and the carrier category identifiers, obtaining a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products. The method achieves the technical effects of rapidly, efficiently and thoroughly destroying the confidential carrier through intelligent flow management and simultaneously ensuring the accuracy and safety of the whole process.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings required for the description of the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic flow chart of a method for recovering and destroying a confidential carrier according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a confidential carrier recovery and destruction processing system according to an embodiment of the present application.
Reference numerals illustrate: the device comprises a target carrier acquisition module 10, a carrier category identification generation module 20, a preprocessing module 30, a preprocessing rechecking module 40 and a destroying product output module 50.
Detailed Description
The application provides a method for recovering and destroying a confidential carrier, which is used for solving the technical problems that the prior art lacks safety monitoring in the process of treating the confidential carrier, the automatic and intelligent treatment flow is not perfect, and the manual operation is relied on.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are only some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or modules not expressly listed or inherent to such process, method, article, or apparatus.
Example 1
As shown in fig. 1, the application provides a method for recovering and destroying a confidential carrier, which comprises the following steps:
step S100: and acquiring the target carrier, and performing code scanning marking based on the identification code of the target carrier to acquire code scanning information.
Specifically, the target carrier is obtained, and the unique identification code is utilized to carry out code scanning marking, so that the carrier can be effectively distinguished from other carriers, code scanning information can be accurately recorded, and in secret-related carrier management, clear recording and monitoring of each secret-related carrier can be ensured, and the problems of loss or leakage and the like are prevented. The identification code of the target carrier is a unique identification code or a code special for destroying tasks, and the code scanning information is direct information of the code, such as character strings, serial numbers, links and the like.
Step S200: analyzing the code scanning information, obtaining initial carrier characteristics, and carrying out category identification on the target carrier based on the initial carrier characteristics to generate carrier category identification.
Specifically, through analysis, some key characteristics of the confidential carrier, such as the type of the carrier (such as a storage hard disk, an optical disk, a paper file and the like), a security class identifier, a generation department and the like, can be obtained, and based on the initial characteristics, the target carrier is subjected to category identification, so that an accurate carrier category identifier is generated. In the confidential environment, accurate category identification is helpful to define the importance and processing requirements of each carrier, and the carrier is strictly stored, used, recovered and destroyed according to relevant regulations, so that the security of confidential information is ensured to the greatest extent, and the confidential information leakage risk caused by inaccurate classification or improper management is prevented.
Step S300: and preprocessing the target carrier based on the carrier category identification to obtain a ready target carrier.
Specifically, after the specific carrier category identification is carried out, the target carrier can be preprocessed according to the specific carrier category identification, the target carrier can be subjected to preliminary arrangement and inspection through preprocessing, for example, paper files can be guaranteed to be complete, free of missing or damaged through preprocessing, key information can be prevented from being missed in the subsequent destroying process, meanwhile, the files can be accurately classified and counted conveniently, and for electronic storage equipment, the problems of faults or data damage and the like of the equipment can be timely found through inspection during preprocessing, so that corresponding repairing or special processing measures can be taken. The pretreatment can carry out targeted operation according to the carrier category identification, so that the target carrier meets the requirement of a subsequent destroying channel. For example, for some high-security carriers requiring special destruction methods, the pretreatment may include removing attachments or making specific marks that may affect the destruction effect, so as to ensure that the destruction process can completely and completely eliminate the security information. The preparation state target carrier is obtained by a series of pretreatment operations on the target carrier, and the target carrier reaches a specific state meeting the subsequent treatment requirements, and in the process, various specific actions such as cleaning, finishing, classifying, checking, marking and the like of the carrier may be included. For example, after the paper secret-related document is pretreated by sorting the paper secret-related document according to the page sequence, confirming no missing damage, marking and the like, the paper secret-related document becomes a ready-state target carrier, and the ready-state target carrier means that the paper secret-related document is ready for entering the next key processing step, so that the subsequent processing can be efficiently, safely and accurately carried out, and the problem that the processing process is blocked or potential safety hazard is caused because the carrier state is undefined or has a problem is avoided.
Step S400: activating a multimode sensing component to perform sensing collection of the ready-state target carrier, inputting a sensing collection result and initial carrier characteristics into a rechecking discriminator, and performing pretreatment rechecking of the ready-state target carrier.
Specifically, the multimode sensing assembly is started, comprehensive sensing and data acquisition are carried out on the target carrier in the ready state by utilizing various sensing modes such as image recognition, physical parameter detection and the like, more detailed and comprehensive information of the target carrier in the ready state such as the appearance details, the physical state and the like of the carrier can be obtained through the multimode sensing assembly, the sensing acquisition results and the initial carrier characteristics which are obtained initially are input into the rechecking discriminator, and the rechecking discriminator can carry out deep analysis and comparison on the information so as to confirm whether the pre-processing work before is accurate and in place. The method can check whether the initial carrier characteristics are consistent with the characteristics acquired by current perception, whether missing or wrong preprocessing operation exists, and if all the characteristics are consistent, the preprocessing operation is qualified; the pretreatment rechecking is to check and verify the quality of pretreatment work, so as to ensure that the pretreatment operation is accurate and has no omission or error, which can effectively avoid the problem of the subsequent treatment link caused by improper pretreatment, such as the false feeding of the carrier which should not enter the destruction channel, or the incorrect treatment of the carrier which is subjected to special treatment.
Step S500: if the pretreatment rechecking result of the ready-state target carrier is passed, carrying out destroying channel allocation based on the initial carrier characteristics and the carrier category identifiers, obtaining a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products.
Specifically, when the pretreatment rechecking result of the ready-state target carrier is passing, the carrier is indicated to have been subjected to proper pretreatment and meet the requirements, and the distribution of the destruction channels is carried out according to the initial carrier characteristics and the carrier category identification. For example, according to the characteristics of the type of the carrier (such as electronic storage device, paper file, etc.), confidentiality level, etc., the specific destroying channel to which the ready-state target carrier should be allocated is accurately determined in combination with the type and requirement of the carrier suitable for processing by different destroying channels, and once the target destroying channel is determined, the ready-state target carrier is transferred to the channel for final destroying. In the destroying process, the confidential information on the carrier is thoroughly eliminated according to the specific destroying mode and flow set by the channel, and after destroying treatment, the destroyed product is output. Illustratively, if a high security level electronic storage device is provided, it may be assigned a destruction channel with high-intensity data erasure and physical destruction capabilities; and in the case of a typical paper document, may be assigned to a destruction channel suitable for the shredding process. Through the fine distribution based on the characteristics and the identifiers, each ready-state target carrier can be safely and thoroughly destroyed in the most suitable destruction channel, and the absolute safety of confidential information is ensured.
In one possible implementation, step S200 further includes:
step S210: and analyzing the code scanning information based on the code mapping rule to obtain an identity character string.
Step S220: and traversing the carrier recovery destroying task list by the identity character string to perform object matching, and extracting initial carrier characteristics, wherein the initial carrier characteristics comprise category characteristics, standard state characteristics and destroying path characteristics.
Specifically, the code scanning information is interpreted and analyzed according to a specific code mapping rule, the identity character string is extracted from the decoded information according to the position and format of the identity character string defined in the code mapping rule, and the extracted identity character string is verified to ensure that the identity character string accords with the expected format and rule. Different digits of the code mapping rule correspond to different information, and encryption codes can be combined to ensure the safety; the identification string is an identification code or a task number in the task list.
Comparing and searching each item in the acquired identity character string and the carrier recovery destroying task list one by one, and searching the matched object by the traversing mode. Once the matching item is found, the initial carrier characteristics can be extracted from the matching item, and through the detailed object matching and characteristic extraction process, the processing of each carrier can be ensured to be accurate, safe and meet the regulations. The initial carrier characteristics comprise category characteristics, standard state characteristics and destruction path characteristics, wherein the category characteristics define the category of the carrier, such as paper, a magnetic storage hard disk and a semiconductor; standard state features are pre-processed states, or input states permitted by the corresponding processing means, such as removal of adhesive, additional protective layers, specific dimensional thicknesses, etc.; the destruction path characteristics then define the specific destruction path that the carrier should follow, i.e. the specific destruction channel or procedure it is to enter in the subsequent processing.
In one possible implementation, step S500 further includes:
Step S510: and acquiring a destroying equipment set of the target recovery destroying scene.
Step S520: based on the destroying device set, destroying performance data of a plurality of destroying devices are collected.
Step S530: according to the destroying performance data, a destroying channel judging matrix is configured, wherein the destroying channel judging matrix comprises a plurality of destroying channels, and the destroying channels have destroying capacity identifiers and destroying category identifiers.
Specifically, after the target recovery destruction scene is clarified, a set of all relevant destruction devices applicable to the scene is acquired. These destruction devices may include various types such as pulverizers, demagnetizers, incinerators, etc.
After the set of destroying devices is determined, respective destroying performance data of the destroying devices need to be collected for the devices, actual destroying operation is carried out on each destroying device, relevant performance data are recorded in the process, the destroying performance data may include, but are not limited to, destroying efficiency, destroying quality, stability, energy consumption, adaptability to different carriers and the like, and by comprehensively and accurately collecting the destroying performance data, the capability of each destroying device can be further understood, and important basis is provided for reasonable resource allocation and performance evaluation.
After detailed destroying performance data is obtained, a destroying channel judging matrix is constructed according to the data. The judgment matrix is a tool for analyzing and comparing different destroying channels, wherein a plurality of destroying channels represent various different specific destroying modes or paths, each destroying channel is provided with destroying capability identification, and the destroying capability identification is an index for quantifying and describing the specific capability level of the channel in destroying, for example, the destroying speed, the destroying thoroughly degree, the processing capability of a specific type of carrier and the like are possibly included; the destroying category mark is used for defining the category or type of the destroying channel. The matrix can intuitively show that a certain destroying channel has stronger capability when destroying a specific type of carrier, and the other channel has better performance in other aspects, so that scientific basis and guidance can be provided for the subsequent selection of a proper destroying channel to process the specific carrier, and the optimal configuration and efficient utilization of the destroying resource are realized.
In one possible implementation, step S500 further includes:
Step S540: extracting carrier quality features and carrier material features based on the initial carrier features;
Step S550: and traversing the destroying channel judging matrix to allocate destroying channels by taking the carrier quality characteristics, the carrier material characteristics and the carrier category identifiers as index information, and obtaining the target destroying channel.
In particular, the carrier quality features and carrier material features are further extracted from the initial carrier features, wherein the carrier quality features may relate to characteristics of the carrier in terms of weight, volume and the like, and have a certain influence on selecting a proper destroying mode and channel, such as a destroying channel with a specific carrying capacity for a heavier or larger volume carrier; the material characteristics of the carrier define the specific material composition of the carrier, and different materials may have different requirements and difficulties in the destroying process, for example, the destroying modes of the metal material and the paper material may be quite different.
And taking three items of carrier quality characteristics, carrier material characteristics and carrier category identification as index information. Based on the information, comprehensive traversal and analysis are carried out in the previously constructed destroying channel judging matrix, and in this way, the destroying channel which is most matched with the characteristics and is most suitable for processing the current carrier, namely the target destroying channel, is found, so that the characteristics and the requirements of different carriers are better adapted, and the efficient and safe destroying process is ensured.
In one possible implementation, step S500 further includes:
step S560: and metering and weighing the destroyed product.
Step S570: and comparing the sensing acquisition result with the metering weighing result, and carrying out destroying safety assessment based on a preset loss threshold value.
Step S580: and if the destroying safety evaluation result is safe, re-marking based on the metering and weighing result, updating the identification code of the target carrier, and packaging the destroying product.
Specifically, the product after being destroyed is weighed by special metering and weighing equipment such as an electronic scale and the like, so that accurate data about the specific weight of the destroyed product is obtained.
The result obtained through sensing acquisition and the actual metering and weighing result are subjected to comparison analysis, the sensing acquisition result possibly comprises information about the product state, the residual quantity and the like acquired through various sensors or monitoring means in the destroying process, the information is compared with the accurate metering and weighing result, the actual situation can be more comprehensively known, the preset loss threshold value is a preset standard range, and when the compared difference is in the threshold value range, the destroying process is considered to be relatively safe; if the amount is outside this range, it may mean that there are some abnormal situations such as incomplete destruction, excessive material loss, etc. For example, if the difference between the sensing and collecting results and the metering and weighing results is found to be large and exceeds the loss threshold, it may be necessary to further check whether the destroying device works normally, whether the operation flow has loopholes, etc., so as to ensure that the subsequent destroying work can be performed safely and effectively.
When the destroying safety evaluation result is determined to be safe, re-marking is carried out to accurately reflect the actual state and weight information of the current destroying product, so that the subsequent management and tracing of the product can be more accurate; updating the identification code of the target carrier ensures that the identification information accords with the actual situation, and is convenient for accurately identifying and tracking the carrier in the whole process. Meanwhile, the method packages the destroyed products, which is not only a sort of arrangement and protection for the products, but also convenient for the subsequent links of storage, transportation or further processing, etc., so that the products are easier to manage and transport, and the possible confusion or loss in the subsequent process is reduced.
In one possible implementation, step S500 further includes:
Activating a transport robot to transport the destroyed product to a waste storage area.
And recycling the destroyed product in the waste storage area, and continuously monitoring the waste storage area based on a monitoring acquisition assembly.
If the monitoring result shows that the recovery processing of the destroyed product is completed, updating the identification code of the target carrier.
In particular, first, activating the transport robot to perform the task of transporting the destroyed product to the waste storage area ensures that the destroyed product can be efficiently and accurately transferred to the designated location, reducing the cost and risk of manual handling.
The recycling process of destroyed products is performed in the waste storage area, which may include a series of operations of sorting, compressing, storing, etc., to properly manage the destroyed products. Meanwhile, the monitoring and collecting assembly is utilized to continuously monitor the waste storage area, and the state of the waste storage area, such as temperature, humidity, gas concentration and the like, is mastered in real time, so that the safety and the normal operation of the recovery treatment process are ensured.
When the monitoring result shows that the recovery processing of the destroyed product is finished, the identification code of the target carrier is updated in time, so that the condition that the destroyed product carried by the carrier has finished the whole recovery processing flow is reflected, and the most accurate and latest condition information can be obtained when the carrier or related information is inquired and managed later.
In one possible implementation, the method further includes:
and recycling the destroying scene by the interactive target to obtain a temporary storage space.
And configuring the temporary storage space by combining the historical destruction records of the target recovery destruction scene based on a preset carrier category set.
And moving the target carrier to a temporary storage space based on the initial carrier characteristics and the carrier category identification.
Specifically, interactions and communications with specific recycling destruction scenarios. By this interaction, the system is able to obtain a specific space for temporary storage of the relative item or carrier, the acquisition of which is an important pre-step for the subsequent recovery destruction operation, which provides a temporary accommodation site for the object to be treated.
According to a preset carrier category set, namely a preset classification set related to different carrier types, and then combining a historical destruction record of a target recovery destruction scene, the temporary storage space is configured in a targeted manner, so that the arrangement of the temporary storage space is more reasonable, and the method is suitable for the characteristics and the historical treatment conditions of different types of carriers.
According to the initial carrier characteristics and the carrier category identification, the target carrier can be accurately moved into the corresponding temporary storage space, so that the carriers can be correctly classified and stored, and subsequent further processing is facilitated.
In summary, the embodiment of the application has at least the following technical effects:
The application provides a method for recovering and destroying a secret-related carrier, relates to the technical field of information safety, solves the technical problems that safety monitoring is not available in the process of treating the secret-related carrier in the prior art, and an automatic and intelligent treatment process is not complete, and achieves the technical effects of rapidly, efficiently and thoroughly destroying the secret-related carrier through intelligent process management, and simultaneously ensures the accuracy and safety of the whole process.
Example two
Based on the same inventive concept as the method for recovering and destroying the confidential carrier in the foregoing embodiment, as shown in fig. 2, the present application provides a system for recovering and destroying the confidential carrier, and the system and method embodiments in the embodiments of the present application are based on the same inventive concept. Wherein the system comprises:
The target carrier acquisition module 10 is used for acquiring a target carrier, and performing code scanning marking based on the identification code of the target carrier to acquire code scanning information.
The carrier category identification generating module 20 is configured to parse the code scanning information to obtain an initial carrier feature, and identify the category of the target carrier based on the initial carrier feature to generate a carrier category identification.
The preprocessing module 30 is configured to preprocess the target carrier based on the carrier category identifier, so as to obtain a ready target carrier.
The preprocessing rechecking module 40 is used for activating the multimode sensing assembly to perform sensing collection of the ready-state target carrier, inputting a sensing collection result and initial carrier characteristics into the rechecking discriminator, and performing preprocessing rechecking of the ready-state target carrier.
The destroying product output module 50 is configured to, if the pre-processing review result of the ready-state target carrier is passed, allocate a destroying channel based on the initial carrier feature and the carrier category identifier, obtain a target destroying channel, and transmit the ready-state target carrier to the target destroying channel for final destroying, and output the destroying product.
Further, the system further comprises:
The identity character string acquisition module is used for analyzing the code scanning information based on the code mapping rule to acquire an identity character string.
The initial carrier feature extraction module is used for performing object matching by traversing the carrier recovery destruction task list through the identity character string and extracting initial carrier features, wherein the initial carrier features comprise category features, standard state features and destruction path features.
Further, the system further comprises:
the destroying device set acquisition module is used for acquiring a destroying device set of the target recovery destroying scene.
The destroying performance data acquisition module is used for acquiring destroying performance data of a plurality of destroying devices based on the destroying device set.
The destroying channel judging matrix configuration module is used for configuring a destroying channel judging matrix according to the destroying performance data, wherein the destroying channel judging matrix comprises a plurality of destroying channels, and the destroying channels have destroying capacity identifiers and destroying category identifiers.
Further, the system further comprises:
The carrier characteristic extraction module is used for extracting carrier quality characteristics and carrier material characteristics based on the initial carrier characteristics.
The target destroying channel obtaining module is used for traversing the destroying channel judging matrix to carry out destroying channel distribution by taking the carrier quality characteristics, the carrier material characteristics and the carrier category identifiers as index information, so as to obtain the target destroying channel.
Further, the system further comprises:
the destroyed product weighing module is used for weighing the destroyed product in a metering way.
The destroying safety evaluation module is used for comparing the sensing acquisition result with the metering weighing result and carrying out destroying safety evaluation based on a preset loss threshold;
And the destroying product packaging module is used for re-marking based on the metering and weighing result if the destroying safety evaluation result is safe, updating the identification code of the target carrier and packaging the destroying product.
Further, the system further comprises:
and the transport robot activation module is used for activating a transport robot and transporting the destroyed product to a waste storage area.
The waste storage area monitoring module is used for recycling the destroyed products by the waste storage area and continuously monitoring the waste storage area based on the monitoring acquisition assembly.
And the identification code updating module is used for updating the identification code of the target carrier if the monitoring result shows that the recovery processing of the destroyed product is completed.
Further, the system further comprises:
The temporary storage space acquisition module is used for recovering and destroying scenes by the interaction targets and acquiring temporary storage space.
The temporary storage space configuration module is used for configuring the temporary storage space based on a preset carrier category set and combining the historical destruction record of the target recovery destruction scene.
And the target carrier moving module is used for moving the target carrier to the temporary storage space based on the initial carrier characteristics and the carrier category identification.
It should be noted that the sequence of the embodiments of the present application is only for description, and does not represent the advantages and disadvantages of the embodiments. And the foregoing description has been directed to specific embodiments of this specification. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The foregoing description of the preferred embodiments of the application is not intended to limit the application to the precise form disclosed, and any such modifications, equivalents, and alternatives falling within the spirit and scope of the application are intended to be included within the scope of the application.
The specification and figures are merely exemplary illustrations of the present application and are considered to cover any and all modifications, variations, combinations, or equivalents that fall within the scope of the application. It will be apparent to those skilled in the art that various modifications and variations can be made to the present application without departing from the scope of the application. Thus, the present application is intended to include such modifications and alterations insofar as they come within the scope of the application or the equivalents thereof.

Claims (8)

1. The method for recovering and destroying the confidential carrier is characterized by comprising the following steps:
Acquiring a target carrier, and performing code scanning marking based on an identification code of the target carrier to acquire code scanning information;
Analyzing the code scanning information, obtaining initial carrier characteristics, and carrying out category identification on a target carrier based on the initial carrier characteristics to generate a carrier category identification;
Preprocessing the target carrier based on the carrier category identification to obtain a ready target carrier;
activating a multimode sensing assembly to perform sensing acquisition of the ready-state target carrier, inputting a sensing acquisition result and initial carrier characteristics into a rechecking discriminator, and performing pretreatment rechecking of the ready-state target carrier;
If the pretreatment rechecking result of the ready-state target carrier is passed, carrying out destroying channel allocation based on the initial carrier characteristics and the carrier category identifiers, obtaining a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products.
2. The method of claim 1, wherein resolving the scan code information to obtain initial carrier characteristics comprises:
analyzing the code scanning information based on the code mapping rule to obtain an identity character string;
And traversing the carrier recovery destroying task list by the identity character string to perform object matching, and extracting initial carrier characteristics, wherein the initial carrier characteristics comprise category characteristics, standard state characteristics and destroying path characteristics.
3. The method of claim 2, wherein assigning a destruction channel based on the initial carrier characteristics and the carrier category identification, obtaining a target destruction channel, previously comprises:
acquiring a destroying equipment set of a target recovery destroying scene;
collecting destroying performance data of a plurality of destroying devices based on the destroying device set;
according to the destroying performance data, a destroying channel judging matrix is configured, wherein the destroying channel judging matrix comprises a plurality of destroying channels, and the destroying channels have destroying capacity identifiers and destroying category identifiers.
4. A method according to claim 3, wherein assigning a destruction channel based on the initial carrier characteristics and the carrier category identification, obtaining a target destruction channel, comprises:
extracting carrier quality features and carrier material features based on the initial carrier features;
and traversing the destroying channel judging matrix to allocate destroying channels by taking the carrier quality characteristics, the carrier material characteristics and the carrier category identifiers as index information, and obtaining the target destroying channel.
5. The method of claim 4, wherein transmitting the ready-state target carrier to the target destruction channel for final destruction, outputting a destruction product, and thereafter comprising:
Metering and weighing the destroyed product;
Comparing the sensing acquisition result with the metering weighing result, and carrying out destroying safety assessment based on a preset loss threshold value;
And if the destroying safety evaluation result is safe, re-marking based on the metering and weighing result, updating the identification code of the target carrier, and packaging the destroying product.
6. The method of claim 1, wherein transmitting the ready-state target carrier to the target destruction channel for final destruction, outputting a destruction product, and thereafter further comprising:
activating a transport robot to transport the destroyed product to a waste storage area;
recycling the destroyed product in the waste storage area, and continuously monitoring the waste storage area based on a monitoring acquisition assembly;
if the monitoring result shows that the recovery processing of the destroyed product is completed, updating the identification code of the target carrier.
7. The method of claim 1, wherein the method further comprises:
The interactive target recovers and destroys the scene, and acquires a temporary storage space;
Based on a preset carrier category set, combining a historical destruction record of the target recovery destruction scene to configure the temporary storage space;
And moving the target carrier to a temporary storage space based on the initial carrier characteristics and the carrier category identification.
8. The confidential carrier recycling and destroying processing system is characterized by comprising:
The target carrier acquisition module is used for acquiring a target carrier, and performing code scanning marking based on an identification code of the target carrier to acquire code scanning information;
The carrier category identification generation module is used for analyzing the code scanning information, acquiring initial carrier characteristics, identifying the target carrier based on the initial carrier characteristics and generating a carrier category identification;
the pretreatment module is used for carrying out pretreatment on the target carrier based on the carrier category identification to obtain a ready target carrier;
the preprocessing rechecking module is used for activating the multimode sensing assembly to perform sensing acquisition of the ready-state target carrier, inputting a sensing acquisition result and initial carrier characteristics into the rechecking discriminator, and performing preprocessing rechecking of the ready-state target carrier;
the destroying product output module is used for distributing destroying channels based on the initial carrier characteristics and the carrier category identifiers if the preprocessing rechecking result of the ready-state target carrier is passed, acquiring a target destroying channel, transmitting the ready-state target carrier to the target destroying channel for final destroying, and outputting destroying products.
CN202410714494.3A 2024-06-04 2024-06-04 Method and system for recovering and destroying confidential carrier Pending CN118586416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410714494.3A CN118586416A (en) 2024-06-04 2024-06-04 Method and system for recovering and destroying confidential carrier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410714494.3A CN118586416A (en) 2024-06-04 2024-06-04 Method and system for recovering and destroying confidential carrier

Publications (1)

Publication Number Publication Date
CN118586416A true CN118586416A (en) 2024-09-03

Family

ID=92536807

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410714494.3A Pending CN118586416A (en) 2024-06-04 2024-06-04 Method and system for recovering and destroying confidential carrier

Country Status (1)

Country Link
CN (1) CN118586416A (en)

Similar Documents

Publication Publication Date Title
JP4580233B2 (en) Mail identification tag with image signature and associated mail handler
CN108108744B (en) Method and system for radiation image auxiliary analysis
CN112215542B (en) Intelligent storehouse management system
CN111444792B (en) Bill identification method, electronic equipment, storage medium and device
CN113490556A (en) Method and system for intelligent battery collection, sorting and packaging
CN116703370B (en) Electronic waste recycling method and system based on Internet
CN116383742B (en) Rule chain setting processing method, system and medium based on feature classification
CN112257740B (en) Knowledge graph-based image hidden danger identification method and system
CN114723543B (en) Financial archive big data management system and method for cross-border e-commerce
CN111831634A (en) Cloud platform processing system and method based on big data
CN118586416A (en) Method and system for recovering and destroying confidential carrier
CN113434855A (en) Security event processing method and device and readable storage medium
CN113517998B (en) Processing method, device, equipment and storage medium of early warning configuration data
CN116959015A (en) File classification and archiving system based on image recognition
CN115828243A (en) Static code flow analysis method based on scanning scheme
CN115600856A (en) Method, device, equipment and medium for automatically auditing and distributing events
CN114037395A (en) Abnormal consignment data identification method and system, electronic equipment and storage medium
US7198210B2 (en) Method and device for destroying confidential documents
CN113327023A (en) Traversal test method and device, electronic equipment and computer readable storage medium
CN113190805B (en) Code asset management system
CN101425141A (en) Image recognition apparatus, image recognition program, and image recognition method
CN114300290B (en) Misoperation-preventing operation guiding method and related equipment
CN115396238B (en) Big data based security assessment analysis system and method
CN117390686B (en) Storage medium destruction system based on foreign matter identification and alarm
CN114112958B (en) Agricultural product detection system and detection method based on big data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination