Disclosure of Invention
In view of the above analysis, the present invention aims to provide an intelligent recovery control method and system for paper documents, which are used to solve the problems that a batch of recovered documents are processed in a single way and the documents in a recovery bin need to be manually processed and destroyed.
In one aspect, an embodiment of the present invention provides an intelligent paper file recycling control method, including: acquiring and verifying user information; after the user information passes verification, receiving scanning selection information of a user, scanning at least 1 file placed in an input port based on the scanning selection information, generating an electronic scanning file, uploading the electronic scanning file to a server directory for encryption and archiving, and placing at least 1 scanned file in a temporary storage bin or an output port; the interactive interface displays file scanning records and associated information, and files in the temporary storage bin are withdrawn to an output port, stored in a recovery bin or transmitted to a crushing bin for destruction based on file processing suggestions in the associated information; and carrying out secondary destruction judgment on the files in the recovery bin based on preset conditions, and screening out the files meeting the secondary destruction conditions by the sorting mechanism and then transmitting the files to the crushing bin.
Based on the further improvement of the method, the files comprise scattered files and/or whole non-scattered files; at least 1 file placed in the input port is sequentially transmitted to the double-sided camera, the double-sided camera takes pictures of each page of scattered files on double sides to generate an electronic scanning file, takes pictures of the front cover and the back cover of the whole non-scattered files on double sides to generate the electronic scanning file, and identifies two-dimensional codes in each page of scattered files or bar codes of the front cover or the back cover of the whole non-scattered files.
Based on the further improvement of the method, the scanning selection information comprises selection information for whether the scanning exception is ignored; identifying the two-dimensional code or the bar code, and when the two-dimensional code or the bar code is identified to be in the database, transmitting scattered file pages corresponding to the two-dimensional code or the whole non-scattered file corresponding to the bar code to a temporary storage bin; when the two-dimensional code or the bar code is identified not to exist in the database, if the received scanning abnormity is ignored as 'no', the scattered file pages corresponding to the two-dimensional code or the whole non-scattered file corresponding to the bar code are transmitted to an output port, and if the received scanning abnormity is ignored as 'yes', the scattered file pages corresponding to the two-dimensional code or the whole non-scattered file corresponding to the bar code are transmitted to a temporary storage bin.
Based on the further improvement of the method, the identified two-dimensional code or bar code is analyzed, the unique file identification stored in the two-dimensional code or bar code is obtained, the unique file identification is associated with file information in a database for query, and a scanning result is counted on an interactive interface, wherein the method comprises the following steps: the total number of scanned files, the scanning abnormal constant, the scanning start time and the scanning end time, and the file scanning record and the associated information are displayed, and the method comprises the following steps: file name, total page number, scanned page number, whether scanning exception is ignored, file type, file security level, expiration date, expiration day, processing suggestion and file state; wherein, based on the preset file processing rule, the processing suggestion is displayed as crushing or recycling, and a revocation option is provided for the user to adjust; for the file obtained by ignoring the scanning abnormality, the associated information is displayed as null, and the processing suggestion is displayed as pulverization.
Based on the further improvement of the method, the storage sequence of the files in the temporary storage bin and the storage sequence of the file scanning records have a corresponding relation, and when the processing suggestion of the files is revocation, the scattered file pages or the whole non-scattered files in the temporary storage bin corresponding to the files are revoked to an output port; when the processing suggestion of the file is recovery, storing scattered file pages or whole non-scattered files in the temporary storage bin corresponding to the file into a recovery bin, and when the processing suggestion of the file is pulverization, transmitting the scattered file pages or whole non-scattered files in the temporary storage bin corresponding to the file to a pulverization bin. According to the processing suggestion, each electronic scanning file is saved to a corresponding server directory, and meanwhile, file storage records of the recycling bin are updated in the database.
Based on the further improvement of the method, a sensor is arranged in the recovery bin and used for collecting height information of files stored in the recovery bin; the preset conditions include: a sensor in the recovery bin reminds that paper is full, a database counts out that the storage amount of the files in the recovery bin reaches an alarm threshold value and reaches configured regular destruction time, or receives an operation that a user starts secondary destruction; carrying out secondary destruction judgment on the files in the recovery bin based on preset conditions, and the method comprises the following steps: and when any preset condition is met, the sorting mechanism receives the files in the recovery bin and sorts the files to obtain the files meeting the secondary destruction condition.
Based on further improvement of the method, the secondary destruction condition is preset according to one or more items of the file security level, the expiration days and the file type; the sorting mechanism screens out the files meeting the secondary destruction condition and then conveys the files to the crushing bin, and the files which do not meet the secondary destruction condition are conveyed back to the recovery bin again.
Based on the further improvement of the method, the method further comprises the following steps: receiving a printing request of a user for the file in the recycling bin, searching a storage directory of an electronic scanning piece corresponding to the file to be printed on a server in a database based on the information of the file to be printed included in the printing request after the printing request passes the authentication, and finding the electronic scanning piece in the server directory; and printing the electronic scanning piece and outputting.
On the other hand, the embodiment of the invention provides an intelligent paper file recycling management and control system, which comprises: the system comprises a server, safety certification equipment, an interactive screen, an input port, an output port, a double-sided shooting instrument, a temporary storage bin, a recovery bin, a crushing bin and a sorting mechanism; a service system and a database are deployed on the server, and the service system comprises a user management module, a rule configuration module, a scanning record management module, an electronic scanning file management module and a recovery bin file management module.
Each module provides data display and control buttons on an interactive screen, the control buttons are triggered in the steps of login, scanning, temporary storage, recovery and crushing, and after the server receives data, the server performs logic judgment of corresponding steps to control operation of hardware equipment and interaction of data information and a database.
Based on a further improvement of the above system, the logic determination comprises: when logging in, judging whether the unique identity information of the user exists in the pre-stored user information; judging whether the unique identity information of the user is consistent with the pre-stored user information or not; when scanning, analyzing the two-dimensional code or the bar code in the electronic scanning file, and judging whether the two-dimensional code or the bar code can be analyzed or not; whether the analyzed content has a file unique identifier or not; whether the file information can be associated; judging a file processing suggestion in the temporary storage bin based on a preset file processing rule; during temporary storage, identifying processing suggestions corresponding to scattered file pages or whole non-scattered files in the temporary storage bin; during recovery, judging whether any preset condition for carrying out secondary destruction on the files in the recovery bin is met; judging whether the selected file is allowed to be used again; and judging whether the files in the recovery bin meet secondary destruction conditions or not during crushing.
Compared with the prior art, the invention can realize at least one of the following beneficial effects:
1. the closed-loop control method is provided, so that scanning, temporary storage, recovery and crushing of a plurality of files can be flexibly controlled, the recovered files can be recycled, manpower and material resources are replaced by an integrated and automatic method flow, closed management is realized, and the method is safe and reliable.
2. A plurality of files of different types can be placed at the same time, double-side scanning does not need to pay attention to the positive and negative placement of the files, and the sorting of the recovered files by a user is accelerated; the electronic file is encrypted and archived, so that the electronic file can be found in certain places and is in no way suffered.
3. The file with scanning errors is flexibly processed and automatically output, a temporary storage bin does not need to be opened manually, scanning abnormity is ignored, manual re-identification is not needed, and the confidentiality is good.
4. According to a preset file processing rule, a file processing suggestion is calculated in real time, one-time setting and repeated use are realized, and meanwhile, the adjustment capability is provided, and special processing is met.
5. The corresponding relation between the scanning record and the storage sequence of the temporary storage bin files is fully utilized, and diversified processing is achieved on a batch of recovered files.
6. The method has the advantages that the method does not need to wait for the full reprocessing of the recycled paper in the recycling bin, and provides multiple modes for triggering, circulating and reprocessing the recycled files, so that the post-cleaning work is reduced.
7. According to the actual storage condition of the recovery bin, the secondary destruction condition is flexibly configured, the files in the recovery bin are emptied more effectively, and the storage capacity of the recovery bin is maximized.
8. The reuse of the recovery bin file is safely and effectively realized by utilizing the association of the paper file and the electronic scanning file.
9. The system has rich functions and covers all links of recovery operation.
10. The service logic of each link is automatically identified and judged, an intelligent processing mode is provided, and the system operation capacity is improved.
In the invention, the technical schemes can be combined with each other to realize more preferable combination schemes. Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by practice of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Detailed Description
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate preferred embodiments of the invention and together with the description, serve to explain the principles of the invention and not to limit the scope of the invention.
The specific embodiment of the invention discloses an intelligent recovery and control method for paper documents, which comprises the following steps as shown in figure 1:
s101: acquiring and verifying user information;
s102: after the user information passes verification, receiving scanning selection information of a user, scanning at least 1 file placed in an input port based on the scanning selection information, generating an electronic scanning file, uploading the electronic scanning file to a server directory for encryption and archiving, and placing at least 1 scanned file in a temporary storage bin or an output port;
s103: the interactive interface displays file scanning records and associated information, and files in the temporary storage bin are withdrawn to an output port, stored in a recovery bin or transmitted to a crushing bin for destruction based on file processing suggestions in the associated information;
s104: and carrying out secondary destruction judgment on the files in the recovery bin based on preset conditions, and screening out the files meeting the secondary destruction conditions by the sorting mechanism and then transmitting the files to the crushing bin.
In practice, there are many branches depending on the user's selection, the actual file to be collected, and the system logic judgment result, and as shown in fig. 2, the steps of fig. 1 are further subdivided.
Compared with the prior art, the paper file intelligent recovery management and control method provided by the embodiment can flexibly control the scanning, temporary storage, recovery and crushing of a plurality of files in one-time recovery operation, can also carry out recycling treatment on the recovered files, meets the multi-scene requirements of users, realizes closed management by using a complete closed-loop management and control method, reduces manpower and material resources through an integrated and automatic method flow, and improves safety and reliability.
It should be noted that, in step S101, when a user logs in, the user may choose to pass through the identification of the security authentication device, or login information may be entered, after obtaining the unique identity information of the user, the recovery management and control system first determines whether the unique identity information of the user exists in the pre-stored user information, if not, the user information is verified unsuccessfully, if so, then continues to determine whether the unique identity information of the user is consistent with the pre-stored user information, if not, the user is verified unsuccessfully, and if so, the user passes the verification, and logs in to the recovery management and control system.
The user can check the file storage condition of the current recycling bin, and can enter step S102 to start the file scanning operation, or enter step S104 to start the secondary destruction operation on the files in the recycling bin.
When the user performs a file scanning operation in step S102, a file scanning total record is generated, and user information, recovery time, and scanning selection information are stored, where the user information includes a selection of "whether scanning exception is ignored", and the user may select yes or no; after recovery begins, an input port is opened, and a user places at least 1 file, which can be a scattered file and/or a whole non-scattered file, in the input port. After the input port is closed, the files are sequentially transmitted to a double-sided camera, the double-sided camera takes pictures of each page of the scattered files on double sides to generate an electronic scanning file, takes pictures of the front cover and the back cover of the whole non-scattered files on double sides to generate an electronic scanning file, encrypts and stores the electronic scanning file in a temporary directory, and identifies two-dimensional codes in each page of the scattered files or bar codes of the front cover or the back cover of the whole non-scattered files.
The recovery management and control system analyzes the two-dimensional code or the bar code identified by the analysis, acquires the unique identifier of the file stored in the two-dimensional code or the bar code, performs correlation query on the file information in the database, can find out the correlation information of the file when identifying that the two-dimensional code or the bar code exists in the database, and simultaneously transmits scattered file pages corresponding to the two-dimensional code or the whole non-scattered file corresponding to the bar code to a temporary storage bin; when the two-dimensional code or the bar code is identified not to exist in the database, the associated information of the file is empty, if the received scanning abnormity is ignored as 'no', the scattered file pages corresponding to the two-dimensional code or the whole non-scattered files corresponding to the bar code are transmitted to an output port, and if the received scanning abnormity is ignored as 'yes', the scattered file pages corresponding to the two-dimensional code or the whole non-scattered files corresponding to the bar code are transmitted to a temporary storage bin.
After all the files are scanned once, if the files are transmitted to the output port, the input port is opened, the user can place the files at the input port again, the original file scanning general record is selected, the files are scanned again, the files can be tried repeatedly, if errors still occur in the repeated attempts, the user can automatically judge whether the files need to be recovered continuously according to actual conditions, if necessary, whether abnormal scanning is ignored to be yes can be adjusted, the files are ensured to be transmitted to the temporary storage bin, if not, the files to be recovered are all transmitted to the temporary storage bin, the user confirms that the file scanning is completed, and the input port is closed.
At this time, step S103 is entered, and in the interactive interface, the system counts the scanning result, including: the total number of scanned files, the scanning abnormal constant, the scanning starting time and the scanning ending time, and the total number of the scanned files clicked by a user can be used for checking the scanning record and the associated information of each file, and the method comprises the following steps: file name, total page number, scanned page number, whether scanning exception is ignored, file type, file security level, expiration date, expiration day, processing suggestion and file state; wherein the processing suggestion is displayed as pulverization or recovery based on a preset file processing rule, and a revocation option is provided for a user to adjust; for the file obtained by ignoring the scanning exception, the associated information is null, and the processing suggestion is displayed as pulverization.
It should be noted that the file processing rule is preset by a user, and may be configured according to multiple attributes of the file, and illustratively, the file processing rule is preset according to file security and expiration day: when the file expiration days are less than or equal to 0, the file security level is expired, the processing rule is 'shredding', when the file expiration days are greater than 0, if the file security level is 'secret', the processing rule is 'shredding', and if the file security level is other conditions, the processing rule is 'recycling'.
And after the user confirms the file processing suggestion, starting to execute the recycling operation. Because the storage sequence of the files in the temporary storage bin and the storage sequence of the file scanning records have a corresponding relation, for example, the topmost file in the temporary storage bin is scanned and entered last, and corresponds to a latest file detail record in the file scanning records, when the file scanning records are recovered, scattered file pages or a whole non-scattered file in the temporary storage bin are taken out in sequence, the file scanning records can be corresponded to according to the storage sequence of the scattered file pages or the whole non-scattered file, a processing suggestion of the file is identified, and when the processing suggestion of the file is withdrawn, the file in the temporary storage bin is withdrawn to an output port; when the processing suggestion of the file is recovery, the file in the temporary storage bin is stored in a recovery bin, and when the processing suggestion of the file is pulverization, the file in the temporary storage bin is transmitted to a pulverization bin; and simultaneously, storing the electronic scanning file corresponding to the file from the temporary directory into the directory which is withdrawn, recovered and crushed on the server, updating the file storage quantity of the recovery bin in the database, and increasing the file detail of the recovered file.
After all the files in the temporary storage bin are processed, the recovery operation of the batch of scanned files can be finished, and the user can select to quit the system, or can enter step S104 to start the secondary destruction operation of the files in the recovery bin.
In step S104, there are 4 cases that the secondary destruction reminder can be issued:
1. the sensor in the recovery bin reminds that the paper is full: the recycling bin is internally provided with a sensor for acquiring height information of files stored in the recycling bin, and when the height information reaches the height, the paper is full;
2. the database counts that the file storage in the recovery bin reaches an alarm threshold: configuring an alarm threshold and an alarm condition in the system by a user, exemplarily setting the alarm threshold to be 5000, and setting the alarm condition that the number of the recovery bin files is greater than the alarm threshold, when the system regularly detects the alarm condition, if the number of the recovery bin files is greater than 5000, a prompt is sent;
3. arrival time of scheduled destruction of configuration: the user can configure the period and time of the periodic destruction, illustratively, the period is monthly, the time is 1 per month, 3 am, and then the condition of secondary destruction is reached 3 am, 1 am;
4. receiving the operation that a user starts secondary destruction: and (4) logging in the recovery management and control system by a user, and manually clicking secondary destruction operation.
In the cases of 1 and 2, the user may set the system to send out the reminder and start the secondary destruction operation, or set the system to start the secondary destruction operation after receiving the reminder confirmation of the user within the validity period. The method comprises the following steps that the preset conditions of secondary destruction are met, secondary destruction operation is started, a recovery management and control system inquires record of files which are not smashed in a recovery bin, identification of the secondary destruction conditions is carried out after the record is arranged according to ascending sequence of recovery time, the record serial numbers of the files which are in line with the secondary destruction conditions are obtained, the files in the recovery bin are sequentially transmitted to a sorting mechanism from the lowest layer, the sorting mechanism transmits the corresponding files to the smashing bin according to the obtained record serial numbers of the files which are in line with the secondary destruction conditions, the files which are not in line with the secondary destruction conditions are transmitted back to the recovery bin again, meanwhile, the system updates the file state of the smashed files, adjusts the storage catalog of electronic scanning files, returns the recovery time of the files in the recovery bin again, and is recycled when the secondary destruction operation is started next time. It should be noted that the secondary destruction condition may be preset according to one or more of the file security level, the expiration date, and the file type, for example, the file expiration date is set to be less than or equal to 0, and the file security level is "secret", which indicates that the secondary destruction is performed on the file in the recycle bin that is not high in file security level but has expired.
In order to meet the requirement of a user on reuse of a recycled file, considering security and closure, the user can select a file to be used from file records in a recycling bin, a printing application is put forward, a recycling management and control system is associated with a database to inquire whether the selected file is allowed to be reused or not, a prompt is popped up on an interactive interface, reusable file information and file information which is not allowed to be reused are displayed, after the user confirms, the system searches a storage directory of an electronic scanning piece of the corresponding file on a server in the database, and then finds the electronic scanning piece in the server directory for printing and outputting.
In the case of the example 2, the following examples are given,
an intelligent recovery management and control system for paper documents is provided, so as to realize the intelligent recovery management and control method in the embodiment 1. The system comprises: server, safety certification equipment, mutual screen, input port, delivery outlet, two-sided appearance of shooing, temporary storage storehouse, recovery storehouse, crushing storehouse and letter sorting mechanism. The server is provided with a business system and a database, wherein the business system comprises a user management module, a rule configuration module, a scanning record management module, an electronic scanning file management module and a recovery bin file management module, and each module provides data display and control buttons on an interactive screen.
Specifically, the user management module includes: user information verification, display, query, addition, modification and deletion; the rule configuration module comprises: rule parameters, alarm threshold values, file processing rules, alarm rules of the storage quantity of the recovery bin files, regular destruction rules, reminding rules, and query, configuration, modification and deletion of secondary destruction conditions; the scan record management module comprises: inquiring, adding, modifying and deleting the scanning record, displaying the associated information of the scanning file, and starting scanning, retrying scanning, finishing scanning and starting recycling management and control operations; the electronic scanning file management module comprises: displaying and inquiring the electronic scanning file storage directories of the temporary storage bin file and the recovery bin file; the recovery bin file management module comprises: the method comprises the following steps of displaying and inquiring files in a recycling bin, counting the storage quantity of the files, and performing secondary destruction and printing application management and control operation.
When the system is implemented, a user triggers a control button in the steps of logging in, scanning, temporary storage, recovery and crushing, and after the server receives data, the server performs logic judgment of the corresponding step, controls the operation of hardware equipment and interacts data information with a database.
It should be noted that the logical judgment of each link includes:
when logging in, judging whether the unique identity information of the user exists in the pre-stored user information; judging whether the unique identity information of the user is consistent with the pre-stored user information or not;
when scanning, analyzing the two-dimensional code or the bar code in the electronic scanning file, and judging whether the two-dimensional code or the bar code can be analyzed or not; whether the analyzed content has a file unique identifier or not; whether the file information can be associated; judging a file processing suggestion in the temporary storage bin based on a preset file processing rule;
during temporary storage, identifying processing suggestions corresponding to scattered file pages or whole non-scattered files in the temporary storage bin;
during recovery, judging whether any preset condition for carrying out secondary destruction on the files in the recovery bin is met; judging whether the selected file is allowed to be used again;
and judging whether the files in the recovery bin meet secondary destruction conditions or not during crushing.
Compared with the prior art, the paper file intelligent recovery management and control system provided by the embodiment has rich functions, covers all links of recovery operation, automatically identifies and judges business logics of all links, provides an intelligent processing mode, and improves the running capacity of the system.
Those skilled in the art will appreciate that all or part of the flow of the method implementing the above embodiments may be implemented by hardware associated with computer program instructions, and the program may be stored in a computer readable storage medium. The computer readable storage medium is a magnetic disk, an optical disk, a read-only memory or a random access memory.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention.