CN112757350A - Certificate damage method - Google Patents

Certificate damage method Download PDF

Info

Publication number
CN112757350A
CN112757350A CN202011624566.3A CN202011624566A CN112757350A CN 112757350 A CN112757350 A CN 112757350A CN 202011624566 A CN202011624566 A CN 202011624566A CN 112757350 A CN112757350 A CN 112757350A
Authority
CN
China
Prior art keywords
certificate
damage
damaged
document
destruction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011624566.3A
Other languages
Chinese (zh)
Inventor
王榜金
龙泉
杨西岳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Security Technology Ltd IST
IST International Security Technology Shenzhen Ltd
Shenzhen Huazhenglian Industrial Co Ltd
Original Assignee
International Security Technology Ltd IST
IST International Security Technology Shenzhen Ltd
Shenzhen Huazhenglian Industrial Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Security Technology Ltd IST, IST International Security Technology Shenzhen Ltd, Shenzhen Huazhenglian Industrial Co Ltd filed Critical International Security Technology Ltd IST
Priority to CN202011624566.3A priority Critical patent/CN112757350A/en
Publication of CN112757350A publication Critical patent/CN112757350A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26DCUTTING; DETAILS COMMON TO MACHINES FOR PERFORATING, PUNCHING, CUTTING-OUT, STAMPING-OUT OR SEVERING
    • B26D1/00Cutting through work characterised by the nature or movement of the cutting member or particular materials not otherwise provided for; Apparatus or machines therefor; Cutting members therefor
    • B26D1/01Cutting through work characterised by the nature or movement of the cutting member or particular materials not otherwise provided for; Apparatus or machines therefor; Cutting members therefor involving a cutting member which does not travel with the work
    • B26D1/04Cutting through work characterised by the nature or movement of the cutting member or particular materials not otherwise provided for; Apparatus or machines therefor; Cutting members therefor involving a cutting member which does not travel with the work having a linearly-movable cutting member
    • B26D1/06Cutting through work characterised by the nature or movement of the cutting member or particular materials not otherwise provided for; Apparatus or machines therefor; Cutting members therefor involving a cutting member which does not travel with the work having a linearly-movable cutting member wherein the cutting member reciprocates
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26DCUTTING; DETAILS COMMON TO MACHINES FOR PERFORATING, PUNCHING, CUTTING-OUT, STAMPING-OUT OR SEVERING
    • B26D7/00Details of apparatus for cutting, cutting-out, stamping-out, punching, perforating, or severing by means other than cutting
    • B26D7/01Means for holding or positioning work
    • B26D7/02Means for holding or positioning work with clamping means
    • B26D7/025Means for holding or positioning work with clamping means acting upon planar surfaces
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B26HAND CUTTING TOOLS; CUTTING; SEVERING
    • B26FPERFORATING; PUNCHING; CUTTING-OUT; STAMPING-OUT; SEVERING BY MEANS OTHER THAN CUTTING
    • B26F1/00Perforating; Punching; Cutting-out; Stamping-out; Apparatus therefor
    • B26F1/02Perforating by punching, e.g. with relatively-reciprocating punch and bed

Landscapes

  • Life Sciences & Earth Sciences (AREA)
  • Forests & Forestry (AREA)
  • Engineering & Computer Science (AREA)
  • Mechanical Engineering (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to the technical field of certificate damage, and particularly provides a certificate damage method, which is characterized in that a certificate to be damaged is directly inserted into a certificate damage position of a damage device, a certificate damage program is started, a damage structure on the damage device is aligned with an information area of the certificate to be damaged under the control of the certificate damage program, the information area of the certificate to be damaged is damaged, automatic certificate damage operation is completed, the original manual shearing or punching damage is abandoned, the operation efficiency is improved, time and labor are saved, and meanwhile, the cost input is favorably reduced.

Description

Certificate damage method
Technical Field
The invention belongs to the technical field of certificate damage, and particularly relates to a certificate damage method.
Background
Certificates are one of the main means of identity recognition and are widely used in various occasions such as life, traffic, work and the like. The general certificate has a use validity period, when the use validity period of the certificate expires, a new certificate needs to be continuously or newly added, and an old certificate needs to be damaged, namely, the certificate is damaged to have identifiable identity information.
At present, the certificate damage processing scheme mainly depends on manual shearing or manual punching, and the manual damage mode is time-consuming, labor-consuming, low in efficiency and high in cost.
Disclosure of Invention
The invention aims to provide a certificate damage method, which aims to solve the technical problems that in the prior art, a certificate damage processing scheme mainly depends on manual shearing or manual punching, and the manual damage mode is time-consuming, labor-consuming, low in efficiency and high in cost.
In order to achieve the purpose, the invention adopts the technical scheme that: the method comprises the steps of providing a damage device, wherein a certificate damage position and a damage structure are arranged on the damage device; the certificate to be destroyed is provided with an information area, wherein the information area is a storage information area stored in the certificate to be destroyed, a printing information area printed on the certificate to be destroyed or a printing information area printed on the certificate to be destroyed; the certificate damage method comprises the following steps:
inserting a certificate: inserting the certificate to be damaged to the certificate damage position;
and (3) damaging the certificate: starting a certificate damage program, aligning the damage structure to the information area of the certificate to be damaged, and damaging the information area of the certificate to be damaged;
and finishing the damage.
The certificate damage method provided by the invention has the beneficial effects that: the certificate that will treat the damage certificate is directly inserted in the certificate damage position of damage device, starts the certificate damage procedure, under certificate damage program control, damage structure on the damage device is aligned with the information area of treating the damage certificate to treat the information area of damage certificate and destroy, accomplish the automatic damage operation of certificate, abandon artifical shearing in the past or the damage of punching, improve operating efficiency, time saving and labor saving, simultaneously, still help the reduce cost to drop into.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without inventive exercise.
FIG. 1 is a perspective view of a crash device provided in accordance with an embodiment of the present invention;
FIG. 2 is a flowchart of a method for destroying documents according to an embodiment of the present invention;
FIG. 3 is another flowchart of a method for destroying documents according to an embodiment of the present invention;
FIG. 4 is a flowchart of a certificate destruction method according to a second embodiment of the present invention;
FIG. 5 is a flowchart of a certificate destruction method according to a third embodiment of the present invention.
Wherein, in the figures, the respective reference numerals:
destroying device 100 Certificate damage position 200
Destroying structure 300 To-be-destroyed certificate 1
Destroying the cutting tool 310 Pressing part 320
Waste recovery structure 400 First damage position 210
Second damage position 220
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
It will be understood that when an element is referred to as being "fixed to" or "disposed on" another element, it can be directly on the other element or it can be indirectly fixed to or disposed on the other element through a third member. When an element is referred to as being "connected to" another element, it can be directly connected to the other element or be indirectly connected to the other element through a third component.
It will be understood that the terms "length," "width," "upper," "lower," "front," "rear," "left," "right," "vertical," "horizontal," "top," "bottom," "inner," "outer," and the like, as used herein, refer to an orientation or positional relationship indicated in the drawings that is solely for the purpose of facilitating the description and simplifying the description, and do not indicate or imply that the device or element being referred to must have a particular orientation, be constructed and operated in a particular orientation, and is therefore not to be construed as limiting the invention.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include one or more of that feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The first embodiment is as follows:
referring to fig. 1 to 3, an embodiment of the present invention provides a method for destroying a document, in which a destroying device 100 is used to destroy the document, wherein a document destroying location 200 and a destroying structure 300 are disposed on the destroying device 100, and the document 1 to be destroyed has an information area (not shown in the figure), which is a storage information area stored in the document 1 to be destroyed, a printing information area printed on the document 1 to be destroyed, or a printing information area printed on the document 1 to be destroyed; when destroying the certificate, will treat that to destroy certificate 1 and insert to certificate damage position 200, insert the back, start certificate damage procedure, will destroy structure 300 and aim at the information area of treating to destroy certificate 1 to treat the information area of destroying certificate 1 and destroy, accomplish the certificate damage.
In this embodiment, will treat that damage document 1 directly inserts the document damage position 200 at damage device 100, start the document damage procedure, under the control of document damage procedure, damage structure 300 on the damage device 100 is aligned with the information area of treating damage document 1, and treat the information area of damage document 1 and destroy, accomplish the automatic damage operation of document, abandon the artifical shearing in the past or the damage of punching, improve operating efficiency, time saving and labor saving, and simultaneously, still help the reduce cost to drop into.
In this embodiment, some certificate information is stored on a chip in the certificate, and the certificate information in the chip can be read by using the RFID module; some certificate information is printed or printed on a certificate, for example, in the form of special codes such as bar codes and two-dimensional codes, or text information, etc., and the printed or printed information on the certificate can be acquired through scanning or OCR recognition, and the printed or printed information may include the certificate number, type, identity information of the holder, etc. on the certificate.
The damage device 100 is provided with a certificate damage position 200 and a damage structure 300, wherein the certificate damage position 200 can be a slot matched with the certificate 1 to be damaged, or an insertion cavity matched with the thickness of the certificate 1 to be damaged. The destroying structure 300 is provided with a destroying cutter 310 and a pressing part 320, wherein the destroying cutter 310 is used for punching or cutting an information area of the certificate 1 to be destroyed, so that the information area is destroyed and the certificate information in the information area can not be identified or read by the identifying and reading module. The pressing part 320 is matched with the certificate damage position 200 and is used for pressing the certificate 1 to be damaged, so that on one hand, the certificate 1 to be damaged can be prevented from being displaced when being punched or cut, and the damage failure can be avoided; on the other hand, the damaged certificate can be conveniently and smoothly separated from the damaged cutter 310; in yet another aspect, the noise of a crash, a rip (a broken document is detached from the crash tool 310) is reduced. The damage cutter 310 and the pressing portion 320 may be driven by the same driving structure or may be driven by independent driving structures.
The destruction device 100 is provided with a waste recycling structure 400 below the document destruction site 200 for recycling the waste material that is punched or cut. The destroying device 100 is provided with a recovery opening communicating with the waste recovery structure 400 at the certificate destroying position 200, for allowing the punched or cut waste to automatically leak out and fall into the waste recovery structure 400.
In the embodiment, the destroying device 100 can move back and forth between an original region and a destroying region by using a driving structure, wherein the original region is used for an operator to insert the document 1 to be destroyed into the operating region of the document destroying location 200, and at this time, the destroying device 100 is close to the operator. And the damage area is a safe area which is far away from an operator and is used for preventing the operator from taking away the certificate 1 to be damaged in normal damage operation. When the damage operation is performed on the document 1 to be damaged, the damage device 100 is shifted to the damage area, so as to ensure that the damage operation of the document 1 to be damaged is smoothly and safely performed.
Specifically, the damage device 100 is provided with two document damage positions 200, which are a first damage position 210 for damaging the document of this type and a second damage position 220 for damaging the card document, respectively, and the first damage position 210 and the second damage position 220 can be vertically arranged or horizontally arranged.
In order to better ensure that the certificate is destroyed smoothly and safely, an operation window for inserting and taking out the certificate 1 to be destroyed and a safety door for closing the operation window are arranged in front of the certificate destruction position 200 of the destruction device 100, and the operation window is opposite to and communicated with the certificate destruction position 200. The certificates 1 to be destroyed are classified into certificates of this type and cards type, and correspondingly, two operation windows are provided and respectively correspond to the first destruction positions 210 and the second destruction positions 220 one by one.
In this embodiment, the first damage site 210 and the second damage site 220 are disposed above and below, and two damage structures 300 are disposed and respectively corresponding to the first damage site 210 and the second damage site 220.
Referring to fig. 1 to 3, the method for destroying a document includes the following steps:
s10: and opening the safety door. And acquiring a damage instruction for damaging the certificate, and opening a safety door positioned at the operation window. The operating window is opposite to and in communication with the document damage location 200.
The to-be-damaged certificates 1 are divided into certificates of the same type and certificates of cards, the certificate damage positions 200 are two, namely a first damage position 210 for damage of the certificates of the same type and a second damage position 220 for damage of the certificates of the cards, correspondingly, the operation windows are two, and are in one-to-one correspondence with the first damage position 210 and the second damage position 220.
In step S10, the damage instruction is divided into a card type damage instruction and a present type damage instruction; when the damage instruction is the damage instruction of the same type, controlling the safety door corresponding to the first damage position 210 to open; and when the damage instruction is a card damage instruction, controlling the safety door corresponding to the second damage bit 220 to open. Thus, the operator only needs to select the damage command or operation button of the certificate or card certificate to open the corresponding safety door, and the operation window is opposite to the corresponding certificate damage position 200. The damage to different types of certificates can be realized, the types of the damaged certificates are enlarged, and the damage requirements on different types of certificates are greatly met.
S20: a document is inserted. The document 1 to be destroyed is inserted into the document destruction site 200.
The certificate 1 to be destroyed is generally inserted until it can not be inserted any more, i.e. until the insertion end abuts against the terminal surface of the certificate destruction site 200, or until the sensor position of the sensor.
In step S20, the document 1 to be destroyed is inserted into the document destruction site 200 from the operation window.
S30: and detecting the certificate. When waiting to destroy certificate 1 and insert to certificate damage position 200, whether detect and wait to destroy certificate 1 and insert to the assigned position, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the damage cutter 310 of damage structure 300 just with the position of waiting to destroy the information zone alignment of certificate 1, perhaps, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the position of waiting to destroy the complete information of certificate 1 can be acquireed to the recognition module.
If the certificate 1 to be damaged is detected to be inserted into the designated position, executing the next step; and if the certificate 1 to be damaged is detected not to be inserted into the designated position, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and re-executing the step of inserting the certificate.
In this embodiment, step S30 helps to improve the success rate of certificate destruction and ensure the effectiveness of the destruction operation.
S40: before destruction, the certificate is read. Identifying or reading the information area of the certificate 1 to be destroyed by using an identification module, if the certificate information can be obtained, indicating that the certificate 1 to be destroyed is a complete certificate, and continuing to execute the step of destroying the certificate; and if the certificate information can not be obtained after N times of reading, wherein N is a preset value and is not less than 1, sending a reading failure prompt and prompting an operator to take away the certificate 1 to be damaged, and carrying out re-operation or moving to a manual table for manual damage.
Generally, N can be set to be 3, namely 3 times of reading, if certificate information can not be obtained, the certificate 1 to be damaged can be taken away through the operation window, and the certificate can be operated again or moved to a manual station for manual damage. Therefore, the influence of one-time reading failure caused by reading errors of the reading module can be effectively avoided.
S50: displacing the damaging device 100. The destruction device 100 with the document 1 to be destroyed is moved to a destruction zone, which is a safe zone remote from the operator. Therefore, the method can prevent an operator from taking away the certificate 1 to be damaged in normal damage operation due to misoperation, and ensure that the certificate damage is safely and effectively carried out.
S60: the document is destroyed. And starting a certificate damage program, aligning the damage structure 300 to the information area of the certificate 1 to be damaged, and damaging the information area of the certificate 1 to be damaged.
After the crash program is started, step S60 includes the following steps:
s61: and (5) pressing the certificate. The pressing part 320 of the damage structure 300 relatively moves to the document damage position 200 and clamps the document 1 to be damaged together with the document damage position 200 to fix the document 1 to be damaged and prevent the displacement.
Before or after step S61, step S60 further includes the steps of:
s6 a: the document is aligned. The damage cutter 310 of the damage structure 300 is aligned to the information area of the certificate 1 to be damaged, so that alignment before damage is realized, and the damage precision is ensured.
S62: die cutting or shearing the document. After the to-be-destroyed certificate 1 is pressed tightly, the information area of the to-be-destroyed certificate 1 is punched or cut by using the destroying cutter 310 of the destroying structure 300.
In step S62, the cut scrap falls into the scrap recycling structure 400.
S63: the damaged structure 300 is reset. After the document 1 to be destroyed is destroyed, the destruction mechanism 300 is reset.
Step S63 includes the following steps:
s631: a first reset. After the certificate 1 to be destroyed is destroyed, the destroying cutter 310 is restored to the initial position, so that the destroying cutter 310 is separated from the destroyed certificate, and at the moment, the destroyed certificate is still in a pressing state. Here, the purpose of the preferential reset of the damaged cutter 310 is to facilitate the smooth detachment of the damaged document from the damaged cutter 310 and to reduce noise caused by the detachment.
S632: and a second reset. After the first reset is completed, the pressing part 320 is moved back to the initial position to release the pressing state of the damaged certificate.
S70: the certificate can be read after being destroyed. The information area of the damaged certificate is identified or read by the identification module, and if the certificate information cannot be obtained, the certificate 1 to be damaged is successfully damaged; if the certificate information can be obtained, the damage failure of the certificate 1 to be damaged is indicated, and a damage failure prompt is sent.
S80: and processing the damaged document. In step S70, if the certificate information is not obtained, a recovery procedure is started to recover the damaged certificates in the certificate damage location 200.
In step S70, the credential information can be obtained, the next steps can be continued.
S90: the damaged device 100 is reset. The destruction device 100 is moved to the original zone, which is the operating area for the operator to insert the document 1 to be destroyed into the document destruction site 200.
If the certificate 1 to be damaged fails to be damaged, the certificate is taken out from the operation window, and the operation of re-damage can be selected or the certificate is moved to a manual table to be damaged.
The destruction device 100 is provided with a pushing mechanism for pushing the certificate toward the insertion port of the certificate destruction station 200.
When the certificate 1 to be damaged (in step S30, the certificate 1 to be damaged which is not inserted into the designated position is detected; in step S40, the certificate 1 to be damaged, in which the certificate information is not read, is detected) or the damaged certificate (which is the damaged certificate which is read and is not read) needs to be sent out of the certificate damage position 200, the pushing structure is controlled to push out the certificate, and an operator takes the certificate away.
S100: it is detected whether the certificate is processed. Detecting whether the damaged certificate is still at the certificate damage position 200 by using a detection module, and if so, executing the step S80; if not, the damage is finished.
S110: the emergency gate is closed. And after the damaged certificate is taken out, controlling the safety door to seal the operation window.
S120: and finishing the damage.
In this embodiment, an operator selects a damage command or an operation button of the certificate or the card certificate to open the corresponding security gate, the operation window is opposite to and communicated with the corresponding certificate damage position 200, and the certificate 1 to be damaged is inserted into the corresponding certificate damage position 200 through the operation window according to the instruction; after the certificate 1 to be damaged is inserted, starting a detection program, detecting whether the certificate 1 to be damaged is inserted to the designated position by using a detection module, if the certificate 1 to be damaged is inserted to the designated position, continuing to execute the next step, and if the certificate 1 to be damaged is not inserted to the designated position, sending a prompt, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and operating again. When the certificate 1 to be damaged is inserted to a designated position, starting a reading program, controlling a reading module to identify or read an information area of the certificate 1 to be damaged, if certificate information can be obtained, indicating that the certificate 1 to be damaged is intact, and continuing to execute the step of damaging the certificate; and if the certificate information can not be obtained after N times of reading, sending a reading failure prompt and prompting an operator to take away the certificate 1 to be damaged. Aiming at the situation that the certificate information can not be read, the information area of the certificate 1 to be damaged is damaged possibly, and the information can not be read; or the insertion direction of the certificate 1 to be damaged is wrong, the part with the information area is not opposite to the reading module, and the like. After the operation is taken away, the operation is selected according to the sent prompt, the operation can be operated again according to the steps, and the operation can also be moved to a manual table for manual damage. When the certificate 1 to be destroyed is intact, the destroying device 100 is driven to move to the destroying area; after the certificate is in place, the damage program is started, the pressing part 320 of the damage structure 300 is moved to the certificate 1 to be damaged, the certificate 1 to be damaged is clamped by the pressing part and the certificate damage position 200 together, the certificate can be aligned before or after the certificate alignment operation, the damage cutter 310 of the damage structure 300 is aligned to the information area of the certificate 1 to be damaged, and the damage precision can be effectively improved. And then, punching or shearing the information area of the certificate 1 to be damaged by using the damage cutter 310 of the damage structure 300, wherein the punching is to perform punching operation on the information area of the certificate 1 to be damaged, and the punching shape can be optional and is determined by the selection of the damage cutter 310. And the cutting is to carry out cutting type damage on the information area of the certificate 1 to be damaged, and the integrity of the information area is damaged by cutting or punching. After the certificate 1 to be damaged is cut or punched, the damaged cutter 310 is reset, so that the damaged certificate can be quickly and smoothly taken off from the damaged cutter 310 under the action of the pressing part 320. After the damaged cutter 310 is reset, the pressing part 320 is reset to release the pressing state of the damaged certificate. After the damaged structure 300 is reset, the information area of the damaged certificate is identified or read again by using the identification and reading module, and if certificate information cannot be obtained, the damage is successful; if the certificate information can still be obtained, failure damage is indicated, and failure damage prompt is sent. When the certificate is damaged successfully, namely the reading module is utilized to fail to obtain the certificate information, a recovery program can be started to recover the damaged certificate; when the certificate information can be obtained, the certificate is taken away when the damage device 100 is reset, the damage operation can be carried out again, and the certificate can also be moved to a manual table for damage operation. After the damage device 100 is reset to the original area, detecting whether the damaged certificate is left in the certificate damage position 200, if so, starting a processing procedure which comprises sending a removal prompt or directly processing; if not, the safety door is closed, the operation window is closed, and the certificate damage operation is finished. The whole damage program provides a plurality of condition processing methods, and gives a strategy for solving abnormal conditions while finishing the automatic damage operation. Personnel can accomplish by oneself, labour saving and time saving, high efficiency, convenient.
Example two:
referring to fig. 4 and fig. 1 in the first embodiment, a second embodiment of the present invention provides a method for destroying a document, which is different from the first embodiment in that the execution sequence of the steps of reading the document before destroying is different, and when the step of reading the document before destroying is arranged after the step of shifting the destroying device 100, the method for destroying the document specifically includes the following steps:
s10: and opening the safety door. And acquiring a damage instruction for damaging the certificate, and opening a safety door positioned at the operation window. The operating window is opposite to and in communication with the document damage location 200.
The to-be-damaged certificates 1 are divided into certificates of the same type and certificates of cards, the certificate damage positions 200 are two, namely a first damage position 210 for damage of the certificates of the same type and a second damage position 220 for damage of the certificates of the cards, correspondingly, the operation windows are two, and are in one-to-one correspondence with the first damage position 210 and the second damage position 220.
In step S10, the damage instruction is divided into a card type damage instruction and a present type damage instruction; when the damage instruction is the damage instruction of the same type, controlling the safety door corresponding to the first damage position 210 to open; and when the damage instruction is a card damage instruction, controlling the safety door corresponding to the second damage bit 220 to open. Thus, the operator only needs to select the damage command or operation button of the certificate or card certificate to open the corresponding safety door, and the operation window is opposite to the corresponding certificate damage position 200. The damage to different types of certificates can be realized, the types of the damaged certificates are enlarged, and the damage requirements on different types of certificates are greatly met.
S20: a document is inserted. The document 1 to be destroyed is inserted into the document destruction site 200.
The certificate 1 to be destroyed is generally inserted until the insertion position is no longer possible, i.e. the insertion end abuts against the terminal surface of the certificate destruction position 200.
In step S20, the document 1 to be destroyed is inserted into the document destruction site 200 from the operation window.
S30: and detecting the certificate. When waiting to destroy certificate 1 and insert to certificate damage position 200, whether detect and wait to destroy certificate 1 and insert to the assigned position, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the damage cutter 310 of damage structure 300 just with the position of waiting to destroy the information zone alignment of certificate 1, perhaps, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the position of waiting to destroy the complete information of certificate 1 can be acquireed to the recognition module.
If the certificate 1 to be damaged is detected to be inserted into the designated position, executing the next step; and if the certificate 1 to be damaged is detected not to be inserted into the designated position, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and re-executing the step of inserting the certificate.
In this embodiment, step S30 helps to improve the success rate of certificate destruction and ensure the effectiveness of the destruction operation.
S40: displacing the damaging device 100. The destruction device 100 with the document 1 to be destroyed is moved to a destruction zone, which is a safe zone remote from the operator. Therefore, the method can prevent an operator from taking away the certificate 1 to be damaged in normal damage operation due to misoperation, and ensure that the certificate damage is safely and effectively carried out.
S50: before destruction, the certificate is read. Identifying or reading the information area of the certificate 1 to be destroyed by using an identification module, if the certificate information can be obtained, indicating that the certificate 1 to be destroyed is a complete certificate, and continuing to execute the step of destroying the certificate; and if the certificate information can not be obtained after N times of reading, wherein N is a preset value and is not less than 1, sending a reading failure prompt and prompting an operator to take away the certificate 1 to be damaged, and carrying out re-operation or moving to a manual table for manual damage.
Generally, N can be set to be 3, namely 3 times of reading, if certificate information can not be obtained, the certificate 1 to be damaged can be taken away through the operation window, and the certificate can be operated again or moved to a manual station for manual damage. Therefore, the influence of one-time reading failure caused by reading errors of the reading module can be effectively avoided.
If the certificate information can not be obtained after N times of recognition, the damage device 100 driving the to-be-damaged certificate 1 is moved to the original area, an operator takes away the to-be-damaged certificate 1, and after taking away, the certificate inserting step can be executed again, or the to-be-damaged certificate 1 is carried to a manual station for manual damage.
S60: the document is destroyed. And starting a certificate damage program, aligning the damage structure 300 to the information area of the certificate 1 to be damaged, and damaging the information area of the certificate 1 to be damaged.
After the crash program is started, step S60 includes the following steps:
s61: and (5) pressing the certificate. The pressing part 320 of the damage structure 300 relatively moves to the document damage position 200 and clamps the document 1 to be damaged together with the document damage position 200 to fix the document 1 to be damaged and prevent the displacement.
Before or after step S61, step S60 further includes the steps of:
s6 a: the document is aligned. The damage cutter 310 of the damage structure 300 is aligned to the information area of the certificate 1 to be damaged, so that alignment before damage is realized, and the damage precision is ensured.
S62: die cutting or shearing the document. After the to-be-destroyed certificate 1 is pressed tightly, the information area of the to-be-destroyed certificate 1 is punched or cut by using the destroying cutter 310 of the destroying structure 300.
In step S62, the cut scrap falls into the scrap recycling structure 400.
S63: the damaged structure 300 is reset. After the document 1 to be destroyed is destroyed, the destruction mechanism 300 is reset.
Step S63 includes the following steps:
s631: a first reset. After the certificate 1 to be destroyed is destroyed, the destroying cutter 310 is restored to the initial position, so that the destroying cutter 310 is separated from the destroyed certificate, and at the moment, the destroyed certificate is still in a pressing state. Here, the purpose of the preferential reset of the damaged cutter 310 is to facilitate the smooth detachment of the damaged document from the damaged cutter 310 and to reduce noise caused by the detachment.
S632: and a second reset. After the first reset is completed, the pressing part 320 is moved back to the initial position to release the pressing state of the damaged certificate.
S70: the certificate can be read after being destroyed. The information area of the damaged certificate is identified or read by the identification module, and if the certificate information cannot be obtained, the certificate 1 to be damaged is successfully damaged; if the certificate information can be obtained, the damage failure of the certificate 1 to be damaged is indicated, and a damage failure prompt is sent.
S80: and processing the damaged document. In step S70, if the certificate information is not obtained, a recovery procedure is started to recover the damaged certificates in the certificate damage location 200.
In step S70, the credential information can be obtained, the next steps can be continued.
S90: the damaged device 100 is reset. The destruction device 100 is moved to the original zone, which is the operating area for the operator to insert the document 1 to be destroyed into the document destruction site 200.
If the certificate 1 to be damaged fails to be damaged, the certificate is taken out from the operation window, and the operation of re-damage can be selected or the certificate is moved to a manual table to be damaged.
The destruction device 100 is provided with a pushing mechanism for pushing the certificate toward the insertion port of the certificate destruction station 200.
When the certificate 1 to be damaged (in step S30, the certificate 1 to be damaged which is not inserted into the designated position is detected; in step S50, the certificate 1 to be damaged, in which the certificate information is not read, is detected) or the damaged certificate (which is the damaged certificate which is read and is not read) needs to be sent out of the certificate damage position 200, the pushing structure is controlled to push out the certificate, and an operator takes the certificate away.
S100: it is detected whether the certificate is processed. Detecting whether the damaged certificate is still at the certificate damage position 200 by using a detection module, and if so, starting a processing program; if not, the damage is finished.
S110: the emergency gate is closed. And after the damaged certificate is taken out, controlling the safety door to seal the operation window.
S120: and finishing the damage.
In this embodiment, an operator selects a damage command or an operation button of the certificate or the card certificate to open the corresponding security gate, the operation window is opposite to and communicated with the corresponding certificate damage position 200, and the certificate 1 to be damaged is inserted into the corresponding certificate damage position 200 through the operation window according to the instruction; after the certificate 1 to be damaged is inserted, starting a detection program, detecting whether the certificate 1 to be damaged is inserted to the designated position by using a detection module, if the certificate 1 to be damaged is inserted to the designated position, continuing to execute the next step, and if the certificate 1 to be damaged is not inserted to the designated position, sending a prompt, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and operating again. When the certificate 1 to be damaged is inserted into the designated position, the damage device 100 is driven to move to the damage area, so that the certificate 1 to be damaged in normal damage operation is prevented from being taken away by an operator due to misoperation, and the safe and effective certificate damage is ensured. After the certificate is in place, starting a reading program, controlling a reading module to identify or read an information area of the certificate 1 to be damaged, if the certificate information can be obtained, indicating that the certificate 1 to be damaged is intact, and continuing to execute the step of damaging the certificate; if the document information is not available after N readings, the destroying device 100 driving the document 1 to be destroyed is moved to the original zone and the operator is prompted to remove the document 1 to be destroyed. Aiming at the situation that the certificate information can not be read, the information area of the certificate 1 to be damaged is damaged possibly, and the information can not be read; or the insertion direction of the certificate 1 to be damaged is wrong, the part with the information area is not opposite to the reading module, and the like. After the operation is taken away, the operation is selected according to the sent prompt, the operation can be operated again according to the steps, and the operation can also be moved to a manual table for manual damage. If the certificate 1 to be destroyed is intact, the destroying procedure is started, the pressing part 320 of the destroying structure 300 is moved to the certificate 1 to be destroyed, and the pressing part and the certificate destroying position 200 clamp the certificate 1 to be destroyed together, before or after the operation, the certificate aligning operation can be carried out, namely the destroying cutter 310 of the destroying structure 300 aligns to the information area of the certificate 1 to be destroyed, and the destroying precision can be effectively improved. And then, punching or shearing the information area of the certificate 1 to be damaged by using the damage cutter 310 of the damage structure 300, wherein the punching is to perform punching operation on the information area of the certificate 1 to be damaged, and the punching shape can be optional and is determined by the selection of the damage cutter 310. And the cutting is to carry out cutting type damage on the information area of the certificate 1 to be damaged, and the integrity of the information area is damaged by cutting or punching. After the certificate 1 to be damaged is cut or punched, the damaged cutter 310 is reset, so that the damaged certificate can be quickly and smoothly taken off from the damaged cutter 310 under the action of the pressing part 320. After the damaged cutter 310 is reset, the pressing part 320 is reset to release the pressing state of the damaged certificate. After the damaged structure 300 is reset, the information area of the damaged certificate is identified or read again by using the identification and reading module, and if certificate information cannot be obtained, the damage is successful; if the certificate information can still be obtained, failure damage is indicated, and failure damage prompt is sent. When the certificate is damaged successfully, namely the reading module is utilized to fail to obtain the certificate information, a recovery program can be started to recover the damaged certificate; when the certificate information can be obtained, the certificate is taken away when the damage device 100 is reset, the damage operation can be carried out again, and the certificate can also be moved to a manual table for damage operation. After the damage device 100 is reset to the original state, detecting whether the damaged certificate is left in the certificate damage position 200, if so, starting a processing procedure which comprises sending a removal prompt or directly processing; if not, the safety door is closed, the operation window is closed, and the certificate damage operation is finished. The whole damage program provides a plurality of condition processing methods, and gives a strategy for solving abnormal conditions while finishing the automatic damage operation. Personnel can accomplish by oneself, labour saving and time saving, high efficiency, convenient.
Example three:
referring to fig. 5 and fig. 1 in the first embodiment, a third embodiment of the present invention provides a certificate destruction method, which is different from the first or second embodiment in that the time for opening and closing the security gate is different, and the second embodiment is taken as a basic embodiment for description.
In this embodiment, the method for destroying the certificate specifically includes the following steps:
s10: and opening the safety door. And acquiring a damage instruction for damaging the certificate, and opening a safety door positioned at the operation window. The operating window is opposite to and in communication with the document damage location 200.
The to-be-damaged certificates 1 are divided into certificates of the same type and certificates of cards, the certificate damage positions 200 are two, namely a first damage position 210 for damage of the certificates of the same type and a second damage position 220 for damage of the certificates of the cards, correspondingly, the operation windows are two, and are in one-to-one correspondence with the first damage position 210 and the second damage position 220.
In step S10, the damage instruction is divided into a card type damage instruction and a present type damage instruction; when the damage instruction is the damage instruction of the same type, controlling the safety door corresponding to the first damage position 210 to open; and when the damage instruction is a card damage instruction, controlling the safety door corresponding to the second damage bit 220 to open. Thus, the operator only needs to select the damage command or operation button of the certificate or card certificate to open the corresponding safety door, and the operation window is opposite to the corresponding certificate damage position 200. The damage to different types of certificates can be realized, the types of the damaged certificates are enlarged, and the damage requirements on different types of certificates are greatly met.
S20: a document is inserted. The document 1 to be destroyed is inserted into the document destruction site 200.
The certificate 1 to be destroyed is generally inserted until the insertion position is no longer possible, i.e. the insertion end abuts against the terminal surface of the certificate destruction position 200.
In step S20, the document 1 to be destroyed is inserted into the document destruction site 200 from the operation window.
S30: and detecting the certificate. When waiting to destroy certificate 1 and insert to certificate damage position 200, whether detect and wait to destroy certificate 1 and insert to the assigned position, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the damage cutter 310 of damage structure 300 just with the position of waiting to destroy the information zone alignment of certificate 1, perhaps, the assigned position is for waiting to destroy certificate 1 and insert to certificate damage position 200 after, the position of waiting to destroy the complete information of certificate 1 can be acquireed to the recognition module.
If the certificate 1 to be damaged is detected to be inserted into the designated position, executing the next step; and if the certificate 1 to be damaged is detected not to be inserted into the designated position, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and re-executing the step of inserting the certificate.
In this embodiment, step S30 helps to improve the success rate of certificate destruction and ensure the effectiveness of the destruction operation.
S40: displacing the damaging device 100. The destruction device 100 with the document 1 to be destroyed is moved to a destruction zone, which is a safe zone remote from the operator. Therefore, the method can prevent an operator from taking away the certificate 1 to be damaged in normal damage operation due to misoperation, and ensure that the certificate damage is safely and effectively carried out.
S50: and closing the safety door. After the demolition device 100 is moved into the demolition area, the safety door is controlled to close the operating window. Thus, the safe and orderly implementation of the subsequent damage operation is ensured.
S60: before destruction, the certificate is read. Identifying or reading the information area of the certificate 1 to be destroyed by using an identification module, if the certificate information can be obtained, indicating that the certificate 1 to be destroyed is a complete certificate, and continuing to execute the step of destroying the certificate; and if the certificate information can not be obtained after N times of reading, wherein N is a preset value and is not less than 1, sending a reading failure prompt and prompting an operator to take away the certificate 1 to be damaged, and carrying out re-operation or moving to a manual table for manual damage.
Generally, N can be set to be 3, namely 3 times of reading, if certificate information can not be obtained, the certificate 1 to be damaged can be taken away through the operation window, and the certificate can be operated again or moved to a manual station for manual damage. Therefore, the influence of one-time reading failure caused by reading errors of the reading module can be effectively avoided.
If the certificate information can not be obtained after N times of recognition, a prompt is sent and the safety door is opened, the damage device 100 driving the certificate 1 to be damaged is moved to the original area, an operator takes away the certificate 1 to be damaged, and after the certificate 1 is taken away, the certificate inserting step can be executed again, or the certificate 1 to be damaged is carried to a manual desk for manual damage.
S70: the document is destroyed. And starting a certificate damage program, aligning the damage structure 300 to the information area of the certificate 1 to be damaged, and damaging the information area of the certificate 1 to be damaged.
After the crash program is started, step S70 includes the following steps:
s71: and (5) pressing the certificate. The pressing part 320 of the damage structure 300 relatively moves to the document damage position 200 and clamps the document 1 to be damaged together with the document damage position 200 to fix the document 1 to be damaged and prevent the displacement.
S72: die cutting or shearing the document. After the to-be-destroyed certificate 1 is pressed tightly, the information area of the to-be-destroyed certificate 1 is punched or cut by using the destroying cutter 310 of the destroying structure 300.
In step S72, the cut scrap falls into the scrap recycling structure 400.
S73: the damaged structure 300 is reset. After the document 1 to be destroyed is destroyed, the destruction mechanism 300 is reset.
Before or after step S71, step S70 further includes the steps of:
s7 a: the document is aligned. The damage cutter 310 of the damage structure 300 is aligned to the information area of the certificate 1 to be damaged, so that alignment before damage is realized, and the damage precision is ensured.
Step S73 includes the following steps:
s731: a first reset. After the certificate 1 to be destroyed is destroyed, the destroying cutter 310 is restored to the initial position, so that the destroying cutter 310 is separated from the destroyed certificate, and at the moment, the destroyed certificate is still in a pressing state. Here, the purpose of the preferential reset of the damaged cutter 310 is to facilitate the smooth detachment of the damaged document from the damaged cutter 310 and to reduce noise caused by the detachment.
S732: and a second reset. After the first reset is completed, the pressing part 320 is moved back to the initial position to release the pressing state of the damaged certificate.
S80: the certificate can be read after being destroyed. The information area of the damaged certificate is identified or read by the identification module, and if the certificate information cannot be obtained, the certificate 1 to be damaged is successfully damaged; if the certificate information can be obtained, the damage failure of the certificate 1 to be damaged is indicated, and a damage failure prompt is sent.
S90: and opening the safety door. When the damaged certificate needs to be sent out, the safety door is opened.
The damaged certificate can be a certificate with read certificate information or a certificate without read information.
S100: the damaged device 100 is reset. The destruction device 100 is moved to the original zone, which is the operating area for the operator to insert the document 1 to be destroyed into the document destruction site 200.
S110: and processing the damaged document. After step S100, the damaged document is removed by the document damage station 200.
The destruction device 100 is provided with a pushing mechanism for pushing the certificate toward the insertion port of the certificate destruction station 200. Therefore, the damaged certificate can be taken away quickly by personnel.
When the certificate 1 to be damaged (in step S30, the certificate 1 to be damaged which is not inserted into the designated position is detected; in step S60, the certificate 1 to be damaged, in which the certificate information is not read, is detected) or the damaged certificate (which is the damaged certificate which is read and is not read) needs to be sent out of the certificate damage position 200, the pushing structure is controlled to push out the certificate, and an operator takes the certificate away.
S120: it is detected whether the certificate is processed. Detecting whether the damaged certificate is still at the certificate damage position 200 by using a detection module, and if so, starting a processing program; if not, the damage is finished.
S130: the emergency gate is closed. And after the damaged certificate is taken out, controlling the safety door to seal the operation window.
S140: and finishing the damage.
In this embodiment, an operator selects a damage command or an operation button of the certificate or the card certificate to open the corresponding security gate, the operation window is opposite to and communicated with the corresponding certificate damage position 200, and the certificate 1 to be damaged is inserted into the corresponding certificate damage position 200 through the operation window according to the instruction; after the certificate 1 to be damaged is inserted, starting a detection program, detecting whether the certificate 1 to be damaged is inserted to the designated position by using a detection module, if the certificate 1 to be damaged is inserted to the designated position, continuing to execute the next step, and if the certificate 1 to be damaged is not inserted to the designated position, sending a prompt, adjusting the certificate 1 to be damaged, or taking out the certificate 1 to be damaged, and operating again. When the certificate 1 to be damaged is inserted into the designated position, the damage device 100 is driven to move to the damage area, so that the certificate 1 to be damaged in normal damage operation is prevented from being taken away by an operator due to misoperation, and the safe and effective certificate damage is ensured. The damage device 100 takes the certificate 1 to be damaged away from the original position, and controls the safety door to close the operation window, so as to further ensure that the certificate damage operation is carried out safely and orderly. After the damage device 100 is moved in place, starting a reading program, controlling a reading module to identify or read an information area of the certificate 1 to be damaged, if the certificate information can be obtained, indicating that the certificate 1 to be damaged is intact, and continuing to execute the step of damaging the certificate; if the certificate information can not be obtained after N times of recognition, a prompt is sent, the safety door is opened, the damage device 100 driving the certificate 1 to be damaged is driven to move to the original area, and an operator is prompted to take away the certificate 1 to be damaged. If the certificate 1 to be destroyed is intact, the destroying procedure is started, the pressing part 320 of the destroying structure 300 is moved to the certificate 1 to be destroyed, and the pressing part and the certificate destroying position 200 clamp the certificate 1 to be destroyed together, before or after the operation, the certificate aligning operation can be carried out, namely the destroying cutter 310 of the destroying structure 300 aligns to the information area of the certificate 1 to be destroyed, and the destroying precision can be effectively improved. And then, punching or shearing the information area of the certificate 1 to be damaged by using the damage cutter 310 of the damage structure 300, wherein the punching is to perform punching operation on the information area of the certificate 1 to be damaged, and the punching shape can be optional and is determined by the selection of the damage cutter 310. And the cutting is to carry out cutting type damage on the information area of the certificate 1 to be damaged, and the integrity of the information area is damaged by cutting or punching. After the certificate 1 to be damaged is cut or punched, the damaged cutter 310 is reset, so that the damaged certificate can be quickly and smoothly taken off from the damaged cutter 310 under the action of the pressing part 320. After the damaged cutter 310 is reset, the pressing part 320 is reset to release the pressing state of the damaged certificate. After the damaged structure 300 is reset, the information area of the damaged certificate is identified or read again by using the identification and reading module, and if certificate information cannot be obtained, the damage is successful; if the certificate information can still be obtained, failure damage is indicated, and failure damage prompt is sent. When the certificate is damaged successfully, the reset damage device 100 can be executed, the damaged certificate is taken away, before the damage device 100 is reset, the control program opens the safety door, and then the damage device 100 is driven to reset to the original area; when the certificate is damaged and failed, the reset damage device 100 can be executed, of course, the control program is started before reset, the safety door is opened, reset is carried out again, the damaged certificate is taken away, the damage operation can be carried out again, and the certificate can be moved to a manual table for damage operation. After the damage device 100 is reset to the original area, detecting whether the damaged certificate is left in the certificate damage position 200, if so, starting a processing procedure which comprises sending a removal prompt or directly processing; if not, the safety door is closed, the operation window is closed, and the certificate damage operation is finished. The whole damage program provides a plurality of condition processing methods, and gives a strategy for solving abnormal conditions while finishing the automatic damage operation. Personnel can accomplish by oneself, labour saving and time saving, high efficiency, convenient.
The present invention is not limited to the above preferred embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (16)

1. A certificate damage method is characterized in that a damage device is provided, and a certificate damage position and a damage structure are arranged on the damage device; the certificate to be destroyed is provided with an information area, wherein the information area is a storage information area stored in the certificate to be destroyed, a printing information area printed on the certificate to be destroyed or a printing information area printed on the certificate to be destroyed; the certificate damage method comprises the following steps:
inserting a certificate: inserting the certificate to be damaged to the certificate damage position;
and (3) damaging the certificate: starting a certificate damage program, aligning the damage structure to the information area of the certificate to be damaged, and damaging the information area of the certificate to be damaged;
and finishing the damage.
2. A method of document destruction as claimed in claim 1, wherein between the step of inserting a document and the step of destroying a document, the method of document destruction further comprises the steps of:
the shift damage device comprises: moving the damage device with the certificate to be damaged to a damage area, wherein the damage area is a safe area far away from an operator;
after the step of destroying the document, the document destroying method further comprises the steps of:
resetting the destroying device: and moving the damage device to an original area, wherein the original area is an operation area for an operator to insert the certificate to be damaged to the certificate damage position.
3. A method of document destruction as claimed in claim 2, wherein between the step of inserting a document and the step of displacing the destruction device, the method further comprises the steps of:
and (3) detecting the certificate: when the to-be-damaged certificate is inserted into the certificate damage position, detecting whether the to-be-damaged certificate is inserted to a specified position, wherein the specified position is a position where a damage cutter of the damage structure is just aligned with an information area of the to-be-damaged certificate after the to-be-damaged certificate is inserted to the certificate damage position, or the specified position is a position where a reading module can acquire complete information of the to-be-damaged certificate after the to-be-damaged certificate is inserted to the certificate damage position;
if the certificate to be damaged is detected to be inserted into the specified position, executing the next step; if the certificate to be damaged is detected not to be inserted into the designated position, the certificate to be damaged is adjusted, or the certificate to be damaged is taken out, and the step of inserting the certificate is executed again.
4. A method of destroying documents according to claim 3, wherein prior to said step of destroying documents, said method of destroying documents further comprises the steps of:
recognizing and reading the certificate before destruction: identifying or reading the information area of the certificate to be damaged by using an identification module, if the certificate information can be obtained, indicating that the certificate to be damaged is a complete certificate, and continuing to execute the step of damaging the certificate; and if the certificate information can not be obtained after N times of reading, wherein N is a preset value and is not less than 1, sending a reading failure prompt and prompting an operator to take away the certificate to be damaged, and carrying out re-operation or moving to a manual table for manual damage.
5. A certificate damage method as claimed in claim 4, characterized in that when the step of reading the certificate before damage is located after the step of displacing the damage device, if no certificate information can be obtained after N times of reading, the damage device with the certificate to be damaged is driven to move to the original area, the operator takes away the certificate to be damaged, and after taking away, the step of inserting the certificate can be executed again, or the certificate to be damaged is carried to a manual desk for manual damage.
6. A method of destroying documents according to any of the claims 1 to 5, wherein said destroying documents, after initiation of a destroying procedure, comprises the steps of:
and (3) pressing the certificate: the pressing part of the damage structure relatively moves to the certificate damage position and clamps the certificate to be damaged together with the certificate damage position;
die cutting or shearing the document: after the certificate to be damaged is pressed tightly, punching or shearing an information area of the certificate to be damaged by using a damage cutter of the damage structure;
the structure that destroys resets: and after the certificate to be damaged is damaged, the damage structure resets.
7. A method of destroying documents according to claim 6, wherein said step of retaining said documents further comprises the steps of, before or after said step of compressing said documents:
aligning the certificate: and aligning the damage cutter of the damage structure to the information area of the certificate to be damaged.
8. A document destruction method according to claim 6, wherein the reset damage structure comprises the steps of:
first reset: after the certificate to be damaged is damaged, the damaged cutter is restored to the initial position of the damaged cutter, so that the damaged cutter is separated from the damaged certificate, and the damaged certificate is still in a pressing state;
and second resetting: and after the first reset is completed, the pressing part is moved back to the initial position of the pressing part so as to release the pressing state of the damaged certificate.
9. A method of destroying documents according to claim 6, wherein in said step of die cutting or shearing said documents, the cut waste material falls into a waste recovery structure.
10. A document destruction method according to claim 6, wherein after the step of destroying the document, the document destruction method further comprises the steps of:
and (3) identifying and reading the certificate after destruction: identifying or reading the information area of the damaged certificate by using the identification module, and if certificate information cannot be obtained, indicating that the to-be-damaged certificate is successfully damaged; and if the certificate information can be obtained, indicating that the certificate to be damaged fails to be damaged, and sending a damage failure prompt.
11. A method of document destruction as claimed in claim 10, wherein after the step of post-destruction reading of the document, the method of document destruction further comprises the steps of:
processing the damaged certificate: after the step of resetting the damaged device, taking the damaged certificate away from the certificate damaged position; or in the step of reading the certificate after the certificate is destroyed, if the certificate information can not be obtained, a recovery program can be started to recover and process the destroyed certificate at the certificate destruction position.
12. A method of document destruction as claimed in claim 11, comprising, after the step of processing the destroyed document, the steps of:
detecting whether the certificate is processed: detecting whether the damaged certificate is still at the certificate damage position by using a detection module, and if so, executing the step of processing the damaged certificate; if not, the damage is finished.
13. A document damage method as recited in claim 11, wherein the damage device is provided with a pushing mechanism for pushing the document toward the insertion opening of the document damage location;
when the to-be-damaged certificate or the damaged certificate needs to be sent out from the certificate damage position, the pushing structure is controlled to push out the certificate, and an operator takes the certificate away.
14. A document damage method according to claim 11, characterized in that an operation window for the positioning insertion and removal of the document to be damaged and a safety door for closing the operation window are provided before the document damage position of the damage device, the operation window being opposite to the document damage position;
before the step of inserting the document, the document destruction method further comprises the steps of:
opening the safety door: acquiring a damage instruction for damaging the certificate, and opening a safety door positioned on the operation window;
in the step of inserting the certificate, the certificate to be damaged is inserted into the certificate damage position from the operation window;
after the step of processing the destroyed document, the document destruction method further comprises the steps of:
closing the safety door: and after the damaged certificate is taken out, controlling the safety door to seal the operation window.
15. A method of document destruction as claimed in claim 14, wherein the method further comprises the steps of:
and (3) closing the safety door: after the damage device moves to the damage area, controlling the safety door to be closed so as to seal the operation window;
opening the safety door: and when the certificate to be damaged or the damaged certificate needs to be sent out, opening the safety door before the step of resetting the damage device.
16. A certificate damage method as claimed in claim 14, wherein the certificate to be damaged is divided into a certificate of this type and a card type certificate, and there are two certificate damage positions, which are respectively a first damage position for damaging the certificate of this type and a second damage position for damaging the card type, and correspondingly, there are two operation windows, which are respectively in one-to-one correspondence with the first damage position and the second damage position;
in the step of opening the safety door, the damage instruction is divided into a card type damage instruction and a local type damage instruction; when the damage instruction is the damage instruction, controlling the safety door opposite to the first damage position to open; and when the damage instruction is a card type damage instruction, controlling the safety door corresponding to the second damage position to be opened.
CN202011624566.3A 2020-12-30 2020-12-30 Certificate damage method Pending CN112757350A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011624566.3A CN112757350A (en) 2020-12-30 2020-12-30 Certificate damage method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011624566.3A CN112757350A (en) 2020-12-30 2020-12-30 Certificate damage method

Publications (1)

Publication Number Publication Date
CN112757350A true CN112757350A (en) 2021-05-07

Family

ID=75698886

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011624566.3A Pending CN112757350A (en) 2020-12-30 2020-12-30 Certificate damage method

Country Status (1)

Country Link
CN (1) CN112757350A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115502166A (en) * 2022-08-24 2022-12-23 艾斯特国际安全技术(深圳)有限公司 Certificate automatic identification damage method, system, device and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1063797A (en) * 1996-08-26 1998-03-06 Nippon Pachinko Buhin Kk Used card destruction and recovery device
JPH11161748A (en) * 1997-11-26 1999-06-18 Nippon Signal Co Ltd:The Device for destroying ic card
US20030146276A1 (en) * 2002-02-05 2003-08-07 First Data Corporation Card destruction systems and methods
CN207037688U (en) * 2017-01-22 2018-02-23 江苏安纳金机械有限公司 Bank card destroyer
CN109434946A (en) * 2018-11-29 2019-03-08 佛山市天瞳智能科技有限公司 Old card punches apparatus for destroying
CN109731885A (en) * 2018-12-29 2019-05-10 金邦达有限公司 A kind of device and method of auto-destruct card
CN109772545A (en) * 2019-03-21 2019-05-21 深圳神盾卫民警用设备有限公司 Certificate destroys equipment
CN209599318U (en) * 2018-12-28 2019-11-08 深圳神盾卫民警用设备有限公司 Certificate guillotine
CN210304993U (en) * 2019-03-18 2020-04-14 广州明森科技股份有限公司 Automatic destruction device for smart card

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH1063797A (en) * 1996-08-26 1998-03-06 Nippon Pachinko Buhin Kk Used card destruction and recovery device
JPH11161748A (en) * 1997-11-26 1999-06-18 Nippon Signal Co Ltd:The Device for destroying ic card
US20030146276A1 (en) * 2002-02-05 2003-08-07 First Data Corporation Card destruction systems and methods
CN207037688U (en) * 2017-01-22 2018-02-23 江苏安纳金机械有限公司 Bank card destroyer
CN109434946A (en) * 2018-11-29 2019-03-08 佛山市天瞳智能科技有限公司 Old card punches apparatus for destroying
CN209599318U (en) * 2018-12-28 2019-11-08 深圳神盾卫民警用设备有限公司 Certificate guillotine
CN109731885A (en) * 2018-12-29 2019-05-10 金邦达有限公司 A kind of device and method of auto-destruct card
CN210304993U (en) * 2019-03-18 2020-04-14 广州明森科技股份有限公司 Automatic destruction device for smart card
CN109772545A (en) * 2019-03-21 2019-05-21 深圳神盾卫民警用设备有限公司 Certificate destroys equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115502166A (en) * 2022-08-24 2022-12-23 艾斯特国际安全技术(深圳)有限公司 Certificate automatic identification damage method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN112757350A (en) Certificate damage method
CA2929057C (en) Method and device for machining of a substrate
CN112809819A (en) Certificate damage method
US20200246926A1 (en) Cutting machine
CN1727547B (en) Method for mending an embroidery pattern
JP3981080B2 (en) Method and apparatus for forming through contacts on a substrate and a circuit board
US2076436A (en) Machine and method for the marginal notching of paper sheets
CN215314644U (en) Card and book mixed certificate damage device
CN216028872U (en) Single-card and double-card laser etching fool-proof control device and laser etching machine
JPH04279232A (en) Method for working sheet metal
JP2016147358A (en) Cutting machine
CN112605107A (en) Card and book mixed certificate damage device
JPH07132497A (en) Female plate structure in punching machine
KR102102878B1 (en) Method for in-line glass process
CN112638605A (en) Hole machining device and method for optical film
JP2003326409A (en) Drilling device, drilling method, and method for breaking compressor
JPH05218700A (en) Electronic component removable device
JP2006187853A6 (en) Detection method of tapping process in punch press
JP6995179B1 (en) Machine tool controller and machine tool
CN214639591U (en) Stainless steel clip progressive die
CN215698136U (en) Be used for radiator CNC bore hole tool
CN109127926A (en) A kind of expansion tube method of electric tube expander
CN216830648U (en) RFID chip extracting tool
CN104924045B (en) The processing method and processing unit of fin poling failure
CN114346328B (en) Automatic segmentation method of metal cover plate for packaging

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination