CN114048872A - Demagnetization/destruction system and method for electronic information carrier - Google Patents

Demagnetization/destruction system and method for electronic information carrier Download PDF

Info

Publication number
CN114048872A
CN114048872A CN202111320578.1A CN202111320578A CN114048872A CN 114048872 A CN114048872 A CN 114048872A CN 202111320578 A CN202111320578 A CN 202111320578A CN 114048872 A CN114048872 A CN 114048872A
Authority
CN
China
Prior art keywords
destruction
demagnetization
electronic information
management platform
code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111320578.1A
Other languages
Chinese (zh)
Inventor
张震
朱金平
苗春华
戴欣然
黄璠凡
陈兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Asky Quantum Technology Co Ltd
Original Assignee
Anhui Asky Quantum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Asky Quantum Technology Co Ltd filed Critical Anhui Asky Quantum Technology Co Ltd
Priority to CN202111320578.1A priority Critical patent/CN114048872A/en
Publication of CN114048872A publication Critical patent/CN114048872A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/30Administration of product recycling or disposal
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C25/00Control arrangements specially adapted for crushing or disintegrating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/71Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/70Information retrieval; Database structures therefor; File system structures therefor of video data
    • G06F16/78Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually
    • G06F16/7867Retrieval characterised by using metadata, e.g. metadata not derived from the content or metadata generated manually using information manually generated, e.g. tags, keywords, comments, title and artist information, manually generated time, location and usage information, user ratings
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G11INFORMATION STORAGE
    • G11BINFORMATION STORAGE BASED ON RELATIVE MOVEMENT BETWEEN RECORD CARRIER AND TRANSDUCER
    • G11B5/00Recording by magnetisation or demagnetisation of a record carrier; Reproducing by magnetic means; Record carriers therefor
    • G11B5/02Recording, reproducing, or erasing methods; Read, write or erase circuits therefor
    • G11B5/024Erasing
    • G11B5/0245Bulk erasing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N5/00Details of television systems
    • H04N5/76Television signal recording
    • BPERFORMING OPERATIONS; TRANSPORTING
    • B02CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
    • B02CCRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
    • B02C2201/00Codes relating to disintegrating devices adapted for specific materials
    • B02C2201/06Codes relating to disintegrating devices adapted for specific materials for garbage, waste or sewage
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02WCLIMATE CHANGE MITIGATION TECHNOLOGIES RELATED TO WASTEWATER TREATMENT OR WASTE MANAGEMENT
    • Y02W90/00Enabling technologies or technologies with a potential or indirect contribution to greenhouse gas [GHG] emissions mitigation

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Multimedia (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Food Science & Technology (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Library & Information Science (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Sustainable Development (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a demagnetization/destruction system facing to an electronic information carrier, which comprises: the client is arranged on the demagnetization destroying device; the camera is arranged facing the demagnetization destroying device and is in communication connection with the client; the management platform is connected with the client through remote communication, online management, a data report, an encryption and decryption technology and a video machine account technology are combined with an automatic destruction line and a mobile destruction vehicle, the full life cycle management of demagnetization/destruction (destruction including grinding and grinding) work is realized, and more convenient management and control are brought to the demagnetization/destruction work of the electronic information carrier.

Description

Demagnetization/destruction system and method for electronic information carrier
Technical Field
The invention belongs to the technical field of information management, and particularly relates to a demagnetization/destruction system and a demagnetization/destruction method for an electronic information carrier.
Background
With the rapid development of informatization, people have to face the problem that many electronic information carriers are eliminated or stopped to be used due to technology upgrading while enjoying convenience and rapidness of informatization. How these carriers carry electronic information becomes a difficult problem.
At present, degaussing/destroying equipment on the market basically realizes simple page operation through the linkage degaussing/destroying action of an embedded touch screen. The communication protocol generally adopts a ModBus protocol, and the ModBus protocol does not have an Ethernet module, cannot be networked and cannot be controlled; in addition, the process records of degaussing/destruction cannot be collected uniformly.
Disclosure of Invention
The invention provides a demagnetization/destruction system for an electronic information carrier, and aims to record the demagnetization/destruction process in an online manner.
The invention is thus achieved, a demagnetization/destruction system for electronic information carriers, said system comprising:
the client is arranged on the demagnetization/destruction device; the camera is arranged right opposite to the degaussing/destroying device and is in communication connection with the client; a management platform in remote communication connection with the client, wherein,
the client is integrated with:
the instruction receiving unit is used for receiving a degaussing/destroying instruction sent by the management platform;
the SN code acquisition unit acquires SN codes of the electronic information carriers to be demagnetized/destroyed based on the demagnetization/destruction instruction;
the video control unit is used for controlling the starting and stopping of video recording of the camera;
the data collection unit sends a demagnetization/destruction completion instruction to the management platform, and uploads the demagnetized/destroyed video data, the demagnetizing field intensity, the demagnetization/destruction operator and the corresponding SN code to the management platform;
the management platform is integrated with:
a demagnetization/destruction application unit for receiving a demagnetization/destruction application submitted by a user, wherein the demagnetization/destruction application includes basic information and application information of an electronic information carrier to be demagnetized/destroyed, and the basic information includes: SN code, asset code, user of waiting to degausse/destroy the electronic information carrier, the application information includes: applicant information, application time;
the examination and approval unit is used for examining and approving the submitted demagnetization/destruction application, and if the examination and approval is passed, the demagnetization/destruction instruction is sent to the client;
the data storage unit is used for forming data records of the demagnetizing/destroying electronic information carrier based on the demagnetizing/destroying finishing instruction; the data records comprise: the SN code, the asset code and the user of the demagnetizing/destroying electronic information carrier, the applicant information, the application time, the demagnetizing/destroying operator, the magnetic field strength and the video data.
Furthermore, the client and the management platform are integrated with a password unit;
the client side and the management platform encrypt and decrypt the transmission data through the cryptographic unit.
Further, the electronic information carrier is a mechanical hard disk, a solid state hard disk, a hard disk plate, a hard disk circuit board, a selenium drum photosensitive drum, an optical disk, a U disk, a chip, an IC card, a magnetic card and a circuit board.
The invention is realized in such a way that a demagnetization/destruction method for electronic information carriers specifically comprises the following steps:
s1, submitting a demagnetization/destruction application to a management platform, wherein the demagnetization/destruction application comprises basic information and application information of the electronic information carrier to be demagnetized/destroyed, and the basic information comprises: SN code, asset code, user of the electronic information carrier to be demagnetized/destroyed; the application information includes: applicant information, application time;
s2, the management platform examines and approves the submitted demagnetization/destruction application, and if the examination and approval is passed, a demagnetization/destruction instruction is issued to the client;
s3, the client reads the SN code of the current electronic information carrier to be demagnetized/destroyed based on the demagnetization/destruction instruction, detects whether the SN code is consistent with the SN code in the demagnetization/destruction instruction, and if the detection result is positive, executes the step S4;
s4, starting a demagnetization/destruction device, starting a camera to start recording demagnetization/destruction working operation conditions, controlling the camera to stop recording videos when demagnetization/destruction is completed, and generating a demagnetization/destruction completion instruction;
s5, sending a demagnetization/destruction completion instruction to a management platform, and uploading recorded demagnetization/destruction video data, demagnetization strength, a demagnetization/destruction operator and a corresponding SN code to the management platform;
s6, the management platform forms data records of the degaussing/destroying electronic information carrier based on the degaussing/destroying finishing instruction, and the data records comprise: the SN code, the asset code, the user, the applicant information, the application time, the demagnetizing/destroying operator, the demagnetizing field strength and the video data of the electronic information carrier are demagnetized/destroyed.
Further, in the process of demagnetization/destruction, when the demagnetization/destruction fails due to network disconnection, power failure or equipment failure, the basic information and the application information of the demagnetization/destruction electronic information carrier are recorded in the abnormal data report.
Furthermore, the transmission data between the client and the management platform is encrypted data, and is encrypted through a quantum password or a classical password.
According to the invention, through online management, a digitalized report, an encryption and decryption technology and a video machine account technology, and by combining an automatic destruction line and a mobile destruction vehicle, the full life cycle management of demagnetization/destruction (destruction including crushing and grinding) work is realized, and more convenient management and control are brought to the demagnetization/destruction work of the electronic information carrier.
Drawings
FIG. 1 is a schematic structural diagram of an electronic information carrier oriented erasure/magnetic destruction system according to an embodiment of the present invention;
fig. 2 is a flowchart of a demagnetization/destruction method for an electronic information carrier according to an embodiment of the present invention.
Detailed Description
The following detailed description of the embodiments of the present invention will be given in order to provide those skilled in the art with a more complete, accurate and thorough understanding of the inventive concept and technical solutions of the present invention.
Fig. 1 is a schematic structural diagram of an erasure/magnetic destroying system for an electronic information carrier according to an embodiment of the present invention, and for convenience of description, only the portions related to the embodiment of the present invention are shown.
The system comprises:
the client is arranged on the demagnetization/destruction device; the camera is arranged right opposite to the degaussing/destroying device and is in communication connection with the client; a management platform in remote communication connection with the client, wherein,
the client is integrated with:
the instruction receiving unit is used for receiving a degaussing/destroying instruction sent by the management platform;
the SN code acquisition unit acquires SN codes of the electronic information carriers to be demagnetized/destroyed based on the demagnetization/destruction instruction;
the video control unit is used for controlling the starting and stopping of video recording of the camera;
the data collection unit is used for sending a demagnetization/destruction completion instruction to the management platform, wherein the demagnetization/destruction completion instruction carries demagnetization/destruction video data, demagnetization strength, a demagnetization/destruction operator and a corresponding SN code;
the management platform is integrated with:
the demagnetization/destruction application unit is used for receiving a demagnetization/destruction application submitted by a user, wherein the demagnetization/destruction application comprises basic information and application information of the electronic information carrier to be demagnetized/destroyed, and the basic information comprises an SN (serial number) code, an asset code and a user of the electronic information carrier to be demagnetized/destroyed; the application information comprises applicant information and application time;
the examination and approval unit is used for examining and approving the submitted demagnetization/destruction application, issuing a demagnetization/destruction instruction to the client if the examination and approval is passed, and returning the demagnetization/destruction application if the examination and approval is not passed, wherein the demagnetization/destruction instruction comprises an SN (serial number) code of the electronic information carrier to be demagnetized/destroyed;
returning the demagnetization/destruction application of which the basic information and the application information of the electronic information carrier do not meet the requirements, such as the non-compliance of SN, the conflict of application time, the passing of the demagnetization/destruction application approval of which the basic information and the application information of the electronic information carrier meet the requirements;
the data storage unit is used for forming data records of the demagnetizing/destroying electronic information carrier based on the magnetism/destroying finishing instruction; the data records comprise: the SN code, the asset code and the user of the demagnetizing/destroying electronic information carrier, the applicant information, the application time, the demagnetizing/destroying operator, the magnetic field strength and the video data.
In the embodiment of the invention, the client and the management platform are integrated with the password unit, and the client and the management platform encrypt and decrypt the transmission data through the password unit.
The functions of the cipher unit are not only encryption and decryption, but also tamper resistance, replay resistance, repudiation resistance and the like.
(1) Online demagnetization/destruction equipment
Through the selection of the screen, the basic requirement (provided with an Ethernet module) of online destruction equipment is realized. The demagnetization/destruction action still realizes command issuing and linkage through a ModBus protocol, but the demagnetization/destruction record can be transmitted to a management platform through a network.
Under the premise of having the networking function, the client of the management platform can realize the identity authentication function of user login and can receive the demagnetization/destruction task initiated by an applicant. The online demagnetization/destruction work is the first step in the general market, and on the basis, the full life cycle management of the demagnetization/destruction work of the electronic information carrier can be realized.
(2) Data destruction
And (4) carrying out data recording on the demagnetization/destruction actions by means of online demagnetization/destruction equipment. Each destruction record may contain the type of destruction object (i.e. electronic information carrier), SN code, asset code, applicant, executant, execution time, etc. And (4) taking the destruction object as a basic unit, strictly matching related information, and digitizing the destruction action. Even if the destroyed object is demagnetized or smashed, the data record can still be used for filing, auditing and tracing. During the use process of the demagnetizing/destroying device, the demagnetizing/destroying device needs to be logged in first. The information of the operators can be set in the management platform in advance, and after the operators log in, the system can record the next destruction work and associate the operators.
(3) Data encryption protection
The demagnetization/destruction work is oriented to business confidential or sensitive data and important data, and the demagnetization/destruction work of the electronic information carrier is relatively sensitive. In order to ensure that data is not stolen and the safety of the relative consistency of the demagnetization/destruction work, the password technology (comprising a classical password mode and a quantum password mode) is combined with a demagnetization destruction management system to realize the encryption and decryption functions of the transmission data.
After the data of the destroying action is converted into data, the generated data records need to be uploaded to a management platform, and the demagnetization/destroying task of the management platform also needs to be issued to the demagnetization/destroying device by a matching operator to execute the task. The process relates to the uploading and the issuing of data, and the data comprise the information of the electronic information carrier to be destroyed, and comprise the contents of an applicant, a user, an equipment serial number and the like. In combination with the video technology, the video information such as the field environment, the equipment running state and the like can be uploaded to the management platform. In order to ensure that data is not stolen and the safety of relatively consistent destruction work is ensured, the cryptographic technology (two modes of classical password and quantum password) is combined with a degaussing management system to realize the encryption and decryption functions of the transmission data.
(4) Data encryption protection
The encryption and decryption functions of the degaussing/destroying system can be realized by classical passwords or quantum passwords; classical cryptographic protection has two modes, namely link encryption and traffic encryption.
Firstly, a link is encrypted, that is, by respectively deploying security gateway devices (VPN devices) on a management platform and a destruction terminal, data can be transmitted through an IPSec VPN tunnel or an SSL VPN tunnel negotiated by security gateways (VPN devices) at both ends. And the other is to encrypt the service data. The scheme needs to combine functions of classical password distribution, acquisition, encryption, decryption and the like with an application system. The terminal demagnetization/destruction equipment can acquire a classic password through an encryption card, and the management platform can acquire a secret key and negotiate the secret key through connection with a server password machine or a password management system.
The quantum cryptography encryption protection is also divided into link encryption and service encryption;
firstly, a link is encrypted, namely, a quantum network cipher machine is respectively deployed on a management platform and a destruction terminal, and data can be transmitted through IPSec VPN or SSL VPN tunnels negotiated by quantum security gateways at two ends. And secondly, encrypting the service data. The functions of quantum key distribution, acquisition, encryption, decryption and the like are combined with an application system. The terminal demagnetizing/destroying device can acquire a quantum key through a quantum security U shield, and the management platform can acquire the key and negotiate the key through connection with the quantum key distribution device.
(5) Video standing book
And (4) adopting a video machine account technology, recording the destruction action and associating a corresponding destruction object on the basis of destroying the working datamation record. Firstly, can replace manpower to supervise and sell, reduce personnel's cost. And secondly, the system can be played back and viewed at any time, and the traceability is enhanced. And thirdly, in a destruction area without manual operation, if a personal shadow or a picture appears, timely alarming and recording the picture through a camera.
The video machine account is one of the important functions of the degaussing destruction management system. And recording the destruction action and associating the corresponding destruction object on the basis of destroying the working datamation record. Firstly, can replace manpower to supervise and sell, reduce personnel's cost. And secondly, the system can be played back and viewed at any time, and the traceability is enhanced. And thirdly, in a destruction area without manual operation, if a personal shadow or a picture appears, timely alarming and recording the picture through a camera.
The electronic information carrier can carry out SN code scanning in the processes of degaussing and destroying, and can take a picture while scanning. The SN code and destruction time of the medium are automatically recorded. And intercepting the video corresponding to the time period by taking the time as a reference, performing matching association on the destruction record of the medium, and uploading the video to the system. In addition, the two actions of starting to execute degaussing/destroying and successfully degaussing/destroying can be matched for starting to record and ending to record the video, so that a video record is formed and matched and associated with the corresponding degaussing/destroying record.
(6) SN code acquisition
The combination of the automatic destruction line and the management system effectively solves the efficiency problem and the management and control problem, but various detailed problems can be met in the task dismantling process. Including how to efficiently collect SN codes.
In the actual destruction work (taking a hard disk as an example), the electronic information carriers of multiple brands (such as Seagate, West, Toshiba, Samsung and the like) and multiple specifications (3.5 inches, 2.5 inches, 1.8 inches and the like) are faced. The bar code rules of the serial numbers are not uniform, and the positions of the SN (serial number) codes of the electronic information carriers are all consistent because the positions of the scanners are fixed but cannot be limited. Complex field conditions make SN code acquisition difficult.
Before demagnetizing/destroying, the electronic information carrier passes through the links of application, examination and approval, transportation, storage and the like. When applying for destroying work, SN codes of the electronic information carriers are recorded into the system one by one. On this basis, all the barcodes on each electronic information carrier will be scanned in sequence when the degaussing/destruction work is performed. Each electronic information carrier has relatively independent time in each link (scanning, photographing, degaussing, destroying and the like), in the time period, the scanner scans the bar codes of the electronic information carriers, and the scanned bar code data is compared with the SN (serial number) applied by the system in advance. And if the system comparison is successful, taking a picture and continuing the next operation. If the comparison is unsuccessful, all the bar codes on the electronic information carrier are considered to be not recorded and belong to abnormal media. At this time, the degaussing destruction management system will generate a warning (the warning can notify the relevant personnel by mail at the first time and flash the warning on the system interface), and the equipment will pop up the distributor on the conveyor belt to convey the electronic information carrier to the abnormal area.
(7) Abnormal situation handling
The automatic destruction line effectively reduces personnel cost, but each link of the destruction work becomes stricter. Abnormal conditions such as network disconnection, power failure and the like are difficult to avoid in the actual operation process. In order to ensure that the electronic information carrier is strictly controlled and stored information is not leaked and stolen, exhaustion of abnormal emergencies is required, and a corresponding solution is perfected.
It is worth noting that under abnormal conditions, the system is more dependent on full-time and all-around recording of on-site monitoring. The monitoring data in abnormal situations will also become of particular importance, and the protection of the data is ubiquitous in the destruction work.
(8) Power down handling
And (6) power-off processing. As the name implies, a sudden power failure when the device is operating normally results in the device ceasing to operate. There are two problems to be faced here. Firstly, when the power is off, the electronic information carrier is exposed on the conveyor belt and cannot be controlled; and secondly, when the power failure is recovered, each link is operated again, or data is recorded repeatedly or actions are executed repeatedly.
In response to the first problem, the electronic information carriers can be isolated by means of conveyor belt isolation. In addition, a UPS and other devices can be used for providing power for the field monitoring equipment and monitoring the field destruction environment in real time. If the conditions allow, the UPS can also supply power to the destroying equipment, so that the power utilization environment is guaranteed.
Aiming at the second problem, in order to prevent data omission, the device execution instruction is issued again. Repeated data can be screened and processed through the system platform.
(9) Web break handling
The network disconnection means that the destruction equipment and the management and control platform network are not reachable. The reason for the network disconnection can be the problem of a bottom-layer physical link, and also can be the network disconnection and the power outage of a management platform, and the network disconnection and the power outage are uniformly considered as the network disconnection. The network of the destruction site can be roughly divided into two areas, one is a business network required for performing destruction, and the other is an office network (including mail, intranet OA, etc.) required for administrative offices. Here we analyze through two scenarios.
The management platform is normal, and the equipment is disconnected
In this case, the management platform can know that the equipment is not on line by means of detection and the like, generate an alarm, and simultaneously perform mail notification and interface flicker notification, so that the equipment also stops running. When the network is disconnected, if the equipment still runs, the data generated in the destroying process cannot be uploaded in real time, and the whole destroying work has blank spaces. The plant operating state will be synchronized with the plant online state.
② management platform broken network
In this case, the management platform cannot obtain the abnormal state notification. The device cannot access the management platform and the device stops running. When the management platform network is recovered, the device can access the management platform, and the state of the device is recovered to be normal.
(10) Fault handling
The equipment cutter has a certain service life, and when the equipment is operated, the cutter is used for a long time to reach the service life, or other faults are met to cause the equipment to stop operating suddenly. At this time, the SN code of the medium is matched and recorded, but the destroying work is performed to half, and how to continue the subsequent work is performed.
Firstly, if the equipment is repaired after the fault, the equipment continues to operate, and the destruction work continues to be carried out;
if the cutter or other parts need to be replaced, the operation can be continued, and half of the electronic information carriers which are destroyed cannot be continuously executed. A destroying device can be additionally arranged for destroying abnormal conditions. In addition, the management system can check the running state and the maintenance attribute of the equipment in real time. When the service life of each component reaches 70%, the alarm can be used for timely informing.
(11) Execution failure handling
When the electronic information carrier encounters strong vibration or other reasons in the transportation process to cause the situations of unclear SN codes, breakage and the like, the equipment cannot acquire correct SN codes and cannot identify the SN codes. At this time, execution failure is defined. This case is already described in the SN code acquisition section, and is not described here again.
Another case is unsuccessful demagnetization. The system can be set for the actual operating parameters of the device. When the degaussing field strength fails to reach the specified standard, the degaussing is considered to be unsuccessful. The destroying work only comprises a degaussing function, and other links are still running. In order to ensure that the whole operation line can continuously run, the demagnetization destruction management system can give an alarm for unsuccessful demagnetization (the system alarm can notify related personnel by a mail at the first time and give a flash prompt on a system interface), and the equipment can pop up a distributor on the conveyor belt and convey the electronic information carrier to an abnormal area.
(12) Exception handling
And a degaussing/destroying device is prepared on site and is used for processing the abnormal electronic information carrier. Such as the electronic information carrier which is destroyed to half caused by unmatched bar codes, unsuccessful degaussing and extreme abnormal conditions, etc. For these abnormal electronic information carriers, in combination with the abnormal alarm of the system, we will set the abnormal single processing in the system separately.
(13) Mobile destruction
The destruction work is relatively centralized, and one destruction center can provide the destruction service for a fixed radiation range. In practice, however, there is no guarantee that the destruction center can cover each service point. However, when the destruction center is unable to operate normally in the face of epidemic situations, disasters and the like, the mobile destruction is more flexible and maneuverable. But the mobile destruction cannot be compared with an automatic system with a relatively perfect destruction center, and the destruction work cannot be managed and controlled.
Under the condition, online management and control of the destroying vehicle can be realized through binding of the demagnetization destroying management system and the mobile destroying vehicle. The method comprises the steps of moving tracks of vehicles, destroying records of media, on-site operation pictures and the like. Different from a destruction center, mobile destruction or public network environment is needed, and transmission protection of data (destruction records, vehicle tracks, field pictures and the like) needs to be enhanced. The omnibearing encryption protection of the destruction work is realized by combining the demagnetization destruction management system with the quantum communication technology. The mobile destruction can adopt modes such as 4G/5G/WiFi and the like to be connected with the control end, and the control can still be realized in the remote area or in the emergency state.
(14) Safe transportation
Each destruction center can provide destruction services for service objects within a certain radiation range. The relatively centralized execution is destroyed, and the advantages of reasonably integrating resources and improving efficiency are achieved. However, there are still many risks in transporting the electronic information carrier from place to the destruction center. The purpose of establishing the destruction center is to reasonably integrate resources and reduce cost. However, when the destruction task is performed for all places, a great deal of manpower is required to be invested to ensure the safety of transportation and handover.
In this case, the problem is considered to be solved by two ways.
Firstly, transportation and storage are carried out through a safe and confidential transport box
In an automated degaussing destruction line, standardized trays are mentioned. Through the adjustment structure, the material tray can be in one-to-one correspondence with the buckles layer by layer, and the uppermost cover plate completes the locking and unlocking actions. Therefore, the automatic feeding problem of the automatic degaussing and destroying work can be solved, and the safety problem in the transportation and storage processes can be ensured. And subsequently, the system can be combined to realize the alarm of the conditions of violent unpacking and the like, and the functions of online encryption and decryption, key replacement and the like of the transport box are realized.
② transportation is carried out by a safety destroying vehicle
On the basis of mobile destruction, the operation state of the destruction vehicle can be simplified, and strict control in the transmission process of the electronic information carrier is realized. And uploading the transportation track, the transportation state and the field picture in real time and protecting the data uploading through quantum security encryption. The whole process supervision from application, approval, transmission, storage, destruction and recording is really realized.
Fig. 2 is a flowchart of a demagnetization/destruction method for an electronic information carrier according to an embodiment of the present invention, where the method specifically includes the following steps:
s1, submitting a demagnetization/destruction application to a management platform, wherein the demagnetization/destruction application comprises basic information and application information of the electronic information carrier to be demagnetized/destroyed, and the basic information comprises: SN code, asset code, user of waiting to degausse/destroy the electronic information carrier, the application information includes: applicant information, application time;
the electronic information carrier comprises a mechanical hard disk, a solid state hard disk, a hard disk plate, a hard disk circuit board, a selenium drum photosensitive drum, an optical disk, a U disk, a chip, an IC card, a magnetic card and a circuit board.
S2, the management platform examines and approves the submitted demagnetization/destruction application, and if the examination and approval is passed, a demagnetization/destruction instruction is issued to the client;
s3, the client reads the SN code of the current electronic information carrier to be demagnetized/destroyed based on the demagnetization/destruction instruction, detects whether the SN code is consistent with the SN code in the demagnetization/destruction instruction, if the detection result is yes, the step S4 is executed, and if the detection result is no, a message that the SN code is not matched and the demagnetization/destruction fails is returned;
s4, starting a demagnetization/destruction device, starting a camera to start recording demagnetization/destruction working operation conditions, controlling the camera to stop recording videos when demagnetization/destruction is completed, and generating a demagnetization/destruction completion instruction;
s5, sending a demagnetization/destruction completion instruction to a management platform, and uploading recorded demagnetization/destruction video data, demagnetization strength, a demagnetization/destruction operator and a corresponding SN code to the management platform;
s6, the management platform forms data records of the degaussing/destroying electronic information carrier based on the degaussing/destroying finishing instruction, and the data records comprise: SN code of degaussing/destroying electronic information carrier, asset code, user, applicant information, application time, degaussing/destroying operator, degaussing field strength and video data.
In the embodiment of the invention, if the degaussing/destroying fails due to the network breaking, the power failure or the equipment failure in the degaussing/destroying process, the basic information and the application information of the degaussing/destroying electronic information carrier are recorded in the abnormal data report.
In the embodiment of the invention, the transmission data between the client and the management platform is encrypted data, and is encrypted by a quantum password or a classical password.
The implementation is not limited by the above-mentioned manner, and it is within the protection scope of the present invention as long as various insubstantial modifications are made by using the method concept and technical scheme of the present invention, or the concept and technical scheme of the present invention is directly applied to other occasions without modification.

Claims (6)

1. An electronic information carrier oriented demagnetization/destruction system, characterized in that the system comprises:
the client is arranged on the demagnetization/destruction device; the camera is arranged right opposite to the degaussing/destroying device and is in communication connection with the client; a management platform in remote communication connection with the client, wherein,
the client is integrated with:
the instruction receiving unit is used for receiving a degaussing/destroying instruction sent by the management platform;
the SN code acquisition unit acquires SN codes of the electronic information carriers to be demagnetized/destroyed based on the demagnetization/destruction instruction;
the video control unit is used for controlling the starting and stopping of video recording of the camera;
the data collection unit sends a demagnetization/destruction completion instruction to the management platform, and uploads the demagnetized/destroyed video data, the demagnetizing field intensity, the demagnetization/destruction operator and the corresponding SN code to the management platform;
the management platform is integrated with:
a demagnetization/destruction application unit for receiving a demagnetization/destruction application submitted by a user, wherein the demagnetization/destruction application includes basic information and application information of an electronic information carrier to be demagnetized/destroyed, and the basic information includes: SN code, asset code, user of waiting to degausse/destroy the electronic information carrier, the application information includes: applicant information, application time;
the examination and approval unit is used for examining and approving the submitted demagnetization/destruction application, and if the examination and approval is passed, the demagnetization/destruction instruction is sent to the client;
the data storage unit is used for forming data records of the demagnetizing/destroying electronic information carrier based on the demagnetizing/destroying finishing instruction; the data records comprise: the SN code, the asset code and the user of the demagnetizing/destroying electronic information carrier, the applicant information, the application time, the demagnetizing/destroying operator, the magnetic field strength and the video data.
2. The demagnetization/destruction system for electronic information carriers according to claim 1 wherein the client and the management platform are integrated with a cryptographic unit;
the client side and the management platform encrypt and decrypt the transmission data through the cryptographic unit.
3. A degaussing/destruction system towards electronic information carriers as claimed in claim 1 or 2, characterized in that the electronic information carriers are mechanical hard disks, solid state hard disks, hard disk platters, hard disk circuit boards, selenium drum photosensitive drums, optical disks, flash disks, chips, IC cards, magnetic cards, circuit boards.
4. A demagnetization/destruction method for an electronic information carrier is characterized by specifically comprising the following steps:
s1, submitting a demagnetization/destruction application to a management platform, wherein the demagnetization/destruction application comprises basic information and application information of the electronic information carrier to be demagnetized/destroyed, and the basic information comprises: SN code, asset code, user of the electronic information carrier to be demagnetized/destroyed; the application information includes: applicant information, application time;
s2, the management platform examines and approves the submitted demagnetization/destruction application, and if the examination and approval is passed, a demagnetization/destruction instruction is issued to the client;
s3, the client reads the SN code of the current electronic information carrier to be demagnetized/destroyed based on the demagnetization/destruction instruction, detects whether the SN code is consistent with the SN code in the demagnetization/destruction instruction, and if the detection result is positive, executes the step S4;
s4, starting a demagnetization/destruction device, starting a camera to start recording demagnetization/destruction working operation conditions, controlling the camera to stop recording videos when demagnetization/destruction is completed, and generating a demagnetization/destruction completion instruction;
s5, sending a demagnetization/destruction completion instruction to a management platform, and uploading recorded demagnetization/destruction video data, demagnetization strength, a demagnetization/destruction operator and a corresponding SN code to the management platform;
s6, the management platform forms data records of the degaussing/destroying electronic information carrier based on the degaussing/destroying finishing instruction, and the data records comprise: the SN code, the asset code, the user, the applicant information, the application time, the demagnetizing/destroying operator, the demagnetizing field strength and the video data of the electronic information carrier are demagnetized/destroyed.
5. A demagnetization/destroy method oriented to electronic information carriers as in claim 4, characterized in that in the demagnetization/destroy process, when the demagnetization/destroy is failed due to the network being disconnected, the power being cut off or the equipment failure, the basic information and the application information of the demagnetization/destroy electronic information carrier are recorded in the abnormal data report.
6. The method for degaussing/destroying electronic information carriers according to claim 4, wherein the data transmitted between the client and the management platform is encrypted data, and the encrypted data is encrypted by a quantum password or a classical password.
CN202111320578.1A 2021-11-09 2021-11-09 Demagnetization/destruction system and method for electronic information carrier Pending CN114048872A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111320578.1A CN114048872A (en) 2021-11-09 2021-11-09 Demagnetization/destruction system and method for electronic information carrier

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111320578.1A CN114048872A (en) 2021-11-09 2021-11-09 Demagnetization/destruction system and method for electronic information carrier

Publications (1)

Publication Number Publication Date
CN114048872A true CN114048872A (en) 2022-02-15

Family

ID=80207667

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111320578.1A Pending CN114048872A (en) 2021-11-09 2021-11-09 Demagnetization/destruction system and method for electronic information carrier

Country Status (1)

Country Link
CN (1) CN114048872A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070147776A1 (en) * 2004-03-31 2007-06-28 Orient Instrument Computer Co., Ltd. Recording medium destruction apparatus, recording medium destruction system, electronic equipment supervising apparatus, and computer program
WO2018214646A1 (en) * 2017-05-24 2018-11-29 中国银联股份有限公司 Method and apparatus for configuring security carrier
US20200051413A1 (en) * 2018-08-08 2020-02-13 Digital Ally, Inc. Remote video triggering and tagging
JP6734498B1 (en) * 2020-06-16 2020-08-05 神田 智一 Management method of destruction device for information recording medium
CN113414136A (en) * 2021-08-25 2021-09-21 阿里云计算有限公司 Storage medium destroying method, device and system and storage medium
CN113610256A (en) * 2021-08-09 2021-11-05 广东智修互联大数据有限公司 Storage information carrier destroying system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070147776A1 (en) * 2004-03-31 2007-06-28 Orient Instrument Computer Co., Ltd. Recording medium destruction apparatus, recording medium destruction system, electronic equipment supervising apparatus, and computer program
WO2018214646A1 (en) * 2017-05-24 2018-11-29 中国银联股份有限公司 Method and apparatus for configuring security carrier
US20200051413A1 (en) * 2018-08-08 2020-02-13 Digital Ally, Inc. Remote video triggering and tagging
JP6734498B1 (en) * 2020-06-16 2020-08-05 神田 智一 Management method of destruction device for information recording medium
CN113610256A (en) * 2021-08-09 2021-11-05 广东智修互联大数据有限公司 Storage information carrier destroying system
CN113414136A (en) * 2021-08-25 2021-09-21 阿里云计算有限公司 Storage medium destroying method, device and system and storage medium

Similar Documents

Publication Publication Date Title
CN103413088B (en) A kind of computer document operation safety auditing system
US20110302629A1 (en) Systems And Methods For Secure Network Interoperability and Management
CN108173964A (en) A kind of client information management center based on cloud storage
CN113495920B (en) Content auditing system, method and device based on blockchain and storage medium
CN103941652A (en) Method and device suitable for security protection and security audit of various DCS production control systems
CN101611391A (en) The protection cross platform auditing
CN102006186A (en) System for monitoring illegal external connection of intranet equipment and method thereof
CN111431896A (en) Data sharing method and system
CN108390857B (en) Method and device for exporting file from high-sensitivity network to low-sensitivity network
CN104462995A (en) Digital processing safety protection system
CN115174157A (en) Relay protection remote operation and maintenance network security multistage blocking method and system
CN102880101B (en) A kind of duplicating safety monitoring device of closed-loop and method
Gill et al. Automation of security and privacy controls for efficient information security management
CN114254269A (en) System and method for determining rights of biological digital assets based on block chain technology
CN114048872A (en) Demagnetization/destruction system and method for electronic information carrier
CN110674538B (en) Optical disk safety burning monitoring and warning method
CN112637172A (en) Novel data security and confidentiality method
CN116170143A (en) Intelligent community data safe transmission, storage and fusion use system based on national encryption algorithm
CN101826964A (en) Outgoing document security management system supporting collaboration
CN108270601B (en) Mobile terminal, alarm information acquisition method and device and alarm information sending method and device
CN213122985U (en) PIS authentication system
CN115022044A (en) Storage method and system based on multi-cloud architecture
CN114429279A (en) Method and system for tracing vaccine based on encryption technology
CN108769012B (en) Method for independently authenticating bank electronic credit archive
CN113407931A (en) Password management method and device and input terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination