CN117390686B - Storage medium destruction system based on foreign matter identification and alarm - Google Patents
Storage medium destruction system based on foreign matter identification and alarm Download PDFInfo
- Publication number
- CN117390686B CN117390686B CN202311683869.6A CN202311683869A CN117390686B CN 117390686 B CN117390686 B CN 117390686B CN 202311683869 A CN202311683869 A CN 202311683869A CN 117390686 B CN117390686 B CN 117390686B
- Authority
- CN
- China
- Prior art keywords
- foreign matter
- early warning
- storage medium
- foreign
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000006378 damage Effects 0.000 title claims abstract description 46
- 238000000034 method Methods 0.000 claims abstract description 47
- 238000011156 evaluation Methods 0.000 claims abstract description 30
- 238000004458 analytical method Methods 0.000 claims description 5
- 238000004806 packaging method and process Methods 0.000 claims description 4
- 230000001360 synchronised effect Effects 0.000 claims description 4
- 238000001514 detection method Methods 0.000 abstract 2
- 238000005516 engineering process Methods 0.000 description 5
- 238000013500 data storage Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 239000002184 metal Substances 0.000 description 3
- 238000013135 deep learning Methods 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004445 quantitative analysis Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 239000003990 capacitor Substances 0.000 description 1
- 238000013136 deep learning model Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000012854 evaluation process Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 230000002427 irreversible effect Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000000123 paper Substances 0.000 description 1
- 239000004033 plastic Substances 0.000 description 1
- 239000002985 plastic film Substances 0.000 description 1
- 238000011084 recovery Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/78—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure storage of data
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/764—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using classification, e.g. of video objects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V10/00—Arrangements for image or video recognition or understanding
- G06V10/70—Arrangements for image or video recognition or understanding using pattern recognition or machine learning
- G06V10/82—Arrangements for image or video recognition or understanding using pattern recognition or machine learning using neural networks
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06V—IMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
- G06V20/00—Scenes; Scene-specific elements
- G06V20/60—Type of objects
- G06V20/64—Three-dimensional objects
-
- G—PHYSICS
- G08—SIGNALLING
- G08B—SIGNALLING OR CALLING SYSTEMS; ORDER TELEGRAPHS; ALARM SYSTEMS
- G08B21/00—Alarms responsive to a single specified undesired or abnormal condition and not otherwise provided for
- G08B21/18—Status alarms
- G08B21/182—Level alarms, e.g. alarms responsive to variables exceeding a threshold
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Software Systems (AREA)
- Computer Security & Cryptography (AREA)
- Multimedia (AREA)
- Computer Hardware Design (AREA)
- Evolutionary Computation (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Computer Vision & Pattern Recognition (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Medical Informatics (AREA)
- Bioethics (AREA)
- Business, Economics & Management (AREA)
- Emergency Management (AREA)
- Storage Device Security (AREA)
Abstract
The application discloses a storage medium destruction system based on foreign matter identification and alarm, and relates to the technical field of storage medium treatment; the system comprises a foreign matter identification module, a foreign matter detection module and a foreign matter detection module, wherein the foreign matter identification module is used for identifying and analyzing a storage medium to be destroyed and in the destruction process and judging whether foreign matters exist or not; the safety evaluation module is used for evaluating the identified foreign matters; the safety evaluation module is preset with a safety evaluation index and a grade value corresponding to the index, wherein the safety evaluation index and the grade value corresponding to the index are used for judging an influence value of foreign matters on a storage medium; the early warning module gives early warning grades based on the influence values, and adopts different treatment measures according to different early warning grades, such as immediately stopping destroying operation, continuing destroying operation and tracking foreign matters, continuing destroying operation and not needing to track foreign matters and the like, so as to ensure safe destroying of the storage medium and normal operation of the equipment, improve the destroying efficiency and quality of the storage medium, and reduce human intervention and misoperation.
Description
Technical Field
The application relates to the technical field of storage medium treatment, in particular to a storage medium destruction system based on foreign matter identification and alarm.
Background
In the batch hard destruction process of the storage medium, foreign matters such as metal sheets, plastic sheets or paper sheets may be mixed in the storage medium, and the existence of the foreign matters may affect the destruction process of the storage medium, for example, the metal sheets or nails may scratch destruction equipment; some foreign objects, such as batteries, capacitors, etc., may cause sparks during destruction; on the other hand, it is also a more interesting aspect that for some storage media storing important or sensitive information, some foreign objects may affect the security of the stored content in the storage media, such as pinhole cameras mixed into paper media may read the stored content.
The patent with publication number CN116561809A discloses a destroying method based on point cloud identification of a security medium, which records whether foreign matters exist in a storage medium or not by acquiring characteristic data of the storage medium in real time, converting acquired results into point cloud data and analyzing the point cloud data in the process of physically destroying the storage medium. If yes, the point cloud data of the foreign matters are stored independently; transmitting the point cloud data of the foreign matters to a terminal in real time; and activates the terminal alert.
However, in the above-mentioned technical solution, the terminal alarm is started regardless of the type of the identified foreign matter, and the operator is required to continuously determine the degree of influence of the foreign matter on the storage medium. The influence of the foreign matters such as hair or greasy dirt and the like existing in the destroying process of the storage medium on the destroying process of the storage medium and the content safety of the storage medium is extremely small, and the intervention of operators clearly increases the working strength of the storage medium.
Disclosure of Invention
The technical scheme of the application mainly provides a storage medium destroying system based on foreign matter identification and alarm, wherein the foreign matter possibly existing is identified through a foreign matter identification module in the process of destroying the storage medium, and further the influence value of the foreign matter on the storage medium destroying process and the storage medium safety is evaluated through a safety evaluation module, and the subsequent operation of stopping destroying or tracking the foreign matter or continuing destroying is performed based on the influence value.
In order to achieve the above purpose, the present application provides the following technical solutions:
A storage medium destruction system based on foreign object identification and alarm, comprising:
the foreign matter identification module is used for identifying and analyzing the storage medium to be destroyed and in the destruction process and judging whether foreign matters exist or not;
The safety evaluation module is used for evaluating the identified foreign matters; the safety evaluation module is preset with a safety evaluation index and a grade value corresponding to the index, wherein the safety evaluation index and the grade value are used for judging an influence value of the foreign matter on the storage medium;
The early warning module gives out early warning grades based on the influence values, and gives out early warning display and early warning prompt according to the early warning grades:
if the early warning level is a first-level early warning, prompting a user to immediately stop destroying operation and taking out the foreign matters;
If the early warning level is the secondary early warning, the destroying operation is continued and the foreign matter is tracked;
if the early warning level is three-level early warning, the destroying operation is continued without tracking the foreign matters.
Preferably, the safety evaluation index includes:
A risk indicator determined based on a likelihood of identifying a foreign object causing leakage to the storage medium;
The risk indicator is determined based on the severity of the content of the storage medium, such as the consequences of a leak.
Preferably, the method further comprises:
the display module is used for displaying the surface image of the storage medium to be destroyed in the destruction process:
When the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is primary early warning, the position of the foreign matter is shown through a red mark frame;
when the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is a secondary early warning, the position of the foreign matter is shown through a yellow marking frame.
Preferably, the method further comprises:
And the control module is electrically connected with the early warning module, and when the early warning level of the foreign matters is primary early warning or secondary early warning, the corresponding early warning can be released through the control module.
Preferably, the method further comprises:
The storage module is used for storing foreign matter information; and when the early warning level of the identified foreign matters is primary early warning or secondary early warning, the foreign matter information is encrypted and then uploaded to the storage module.
Preferably, the step of encrypting the foreign matter information and uploading the encrypted foreign matter information to the storage module includes the following steps:
Encrypting the foreign matter information to obtain a hash value;
Packaging the foreign matter information and the hash value corresponding to the foreign matter information into a data block, and attaching a time stamp; and the data block comprises a hash value in the last data block to form a data chain;
broadcasting the data block to all nodes in the network;
data blocks are added to the data chain and synchronized to all nodes in the network.
Preferably, for a foreign object with a secondary early warning grade, acquiring two-dimensional image data of the foreign object in the tracking process of the foreign object;
if the plurality of two-dimensional image data can generate a three-dimensional model corresponding to the foreign matters, generating a corresponding three-dimensional model and displaying the three-dimensional model through a display module;
if the plurality of two-dimensional image data cannot generate the three-dimensional model corresponding to the foreign object, continuing to acquire the two-dimensional image of the foreign object until the three-dimensional model of the foreign object can be generated or stopping the destroying operation.
Preferably, in the process of tracking the foreign matter, if the foreign matter is evaluated as three-level early warning in the subsequent identification and analysis process, the foreign matter is still tracked until the destruction operation is stopped.
Preferably, the destroying operation stop includes:
The destruction of the storage medium is completed;
The foreign matter with the early warning grade being the secondary early warning is evaluated as the primary early warning in the subsequent recognition and analysis process.
Preferably, after the storage medium is destroyed, identifying and analyzing residues after the destruction is completed, and judging whether foreign matters exist in the residues; if so, giving an early warning level of the foreign matter and storing the result separately.
Compared with the known public technology, the technical scheme provided by the application has the following beneficial effects: the storage medium destroying system based on the foreign matter identification and the alarm can identify the possible foreign matters in the storage medium through the foreign matter identification module, judge the influence value of the foreign matters on the storage medium through the safety evaluation module, and take different treatment measures according to different early warning grades, such as immediately stopping destroying operation, continuing destroying operation and tracking the foreign matters, continuing destroying operation without tracking the foreign matters and the like, so as to ensure the safe destroying of the storage medium and the normal operation of equipment. The method can improve the efficiency and quality of destroying the storage medium, reduce the human intervention and misoperation, and reduce the risk of data leakage and the cost of equipment maintenance.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It is evident that the drawings in the following description are only some embodiments of the present application and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art.
FIG. 1 is a flowchart of a system for destroying a storage medium based on foreign object identification and alarm according to an embodiment of the present application;
fig. 2 is a control schematic diagram of a storage medium destruction system based on foreign matter identification and alarm according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application. It will be apparent that the described embodiments are some, but not all, embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The technical scheme of the embodiment of the application records a storage medium destruction system based on foreign matter identification and alarm, wherein the storage medium destruction means that data in storage equipment are thoroughly deleted, and recovery or leakage by unauthorized users is avoided. The method for destroying the storage medium can be divided into software destroying and hardware destroying, wherein the software destroying erases data in a data coverage mode and the like, and the hardware destroying destroys the storage device in a physical destroying mode or a chemical corroding mode and the like.
The technical scheme of the embodiment of the application mainly considers that foreign matters such as metal, plastic or paper and the like possibly exist in the process of destroying the storage medium, and the foreign matters possibly have a certain influence on the process of destroying the storage medium; however, the problem of information leakage that may be caused by foreign objects present during the destruction of the storage medium, particularly in important data storage media, is a more interesting aspect.
Therefore, the storage medium destruction system based on foreign matter identification and alarm described in the embodiment of the application comprises a foreign matter identification module, a security evaluation module and an early warning module; the foreign matter identification module is mainly used for identifying and analyzing the storage medium before and during the destruction process and judging whether foreign matters exist or not. The working principle of the foreign matter identification module is mainly to utilize image processing and computer deep learning technology to detect, classify and position the foreign matters on the surface of the storage medium.
In the technical scheme of the embodiment of the application, the foreign matter identification module is mainly implemented by adopting the point cloud network technology described in the citation document in the background technology, and the technology is a deep learning model specially used for point cloud data processing. Specifically, the main working steps of the foreign matter identification module include the following:
Before and during the destruction of the storage medium, a high-resolution camera is used for shooting in real time to acquire image data on the surface of the storage medium;
inputting the obtained image data on the surface of the storage medium into a foreign matter recognition module, wherein the foreign matter recognition module can preprocess the image, such as denoising, enhancing contrast, adjusting brightness and the like, so as to improve the image quality;
the foreign matter identification module is used for carrying out feature extraction and classification on the image based on deep learning, and identifying whether the foreign matter exists in the image or not and the information such as the category, the position and the size of the foreign matter.
When the foreign matter identification module identifies the foreign matter in the storage medium, the next step needs to evaluate whether the foreign matter will affect the destruction process of the storage medium and the security of the storage medium, and what degree the foreign matter affects the storage medium. The foreign matter information is required to be transmitted to a security evaluation module, and a security evaluation index and a grade value corresponding to each index are preset in the security evaluation module and are used for judging the influence value of the identified foreign matter on the storage medium.
The safety evaluation indexes comprise at least two types, and the two types of safety evaluation indexes recorded in the embodiment of the application are risk indexes and dangerous indexes.
The risk index is determined based on the recognition of the possibility of leakage of the storage medium by the foreign matter, and the index is related to factors such as the type, size, position, number and the like of the foreign matter. For example, a small pinhole camera may read and store information recorded on a storage medium such as paper during destruction of the storage medium, resulting in loss or leakage of data, and thus its risk index is high; and one hair does not affect the destruction process of the storage medium or the integrity of the data of the storage medium, so that the risk index is low.
The risk indicator is determined based on the severity of the content of the storage medium, such as the consequences of a leak, and is related to factors such as the type, use, and importance of the storage medium. For example, an optical disc storing important national data may cause serious safety problems if damaged or leaked, so that its risk index is high; however, if a usb disk storing personal photos is damaged or revealed, only some privacy problems may be caused, so that the risk index of the usb disk is low.
The above two factors are needed to be combined in the process of safety evaluation of the foreign matter, and the influence of the foreign matter on the storage medium is evaluated. The foregoing effects may be scored or ranked according to risk indicators and risk indicators using quantitative or qualitative methods.
In the embodiment of the application, the influence of the foreign matters on the storage medium is scored by using a quantitative method, so that the risk index and the grade value corresponding to the risk index are required to be given, and the grade value is determined according to the specific storage medium to be destroyed and the common foreign matters.
For example, in one embodiment of the present application, the risk indicator of the foreign object and the risk indicator may be each represented by a 1-3 scale, wherein 1 represents the lowest and 3 represents the highest. The method for scoring the influence of the foreign matters on the storage medium by using the quantitative method based on the scheme is specifically as follows:
risk index (D) =category coefficient x size coefficient x position coefficient x number coefficient;
risk index (H) =type coefficient×usage coefficient×importance coefficient;
Wherein each coefficient is a level of 1-3 (the level value is one of 1, 2 and 3), and the assignment can be carried out according to actual conditions. For example:
Category coefficients: the pinhole camera is 3, and the hair is 1;
Size coefficient: 3 is more than 10mm, and 1 is less than 1 mm;
Position coefficient: the key area of data storage in the storage medium is 3, and the area of the edge or the area without stored content is 1;
number coefficient: more than 3 are 3, less than 1 are 1;
type coefficient: the paper medium is 3, and the U disk is 1;
the application coefficient is as follows: the national important data is 3, and the personal photo is 1;
importance coefficient: not alternative to 3, there are other forms of backups of 1.
According to this method, it is possible to calculate the risk index and the risk index of the foreign matter on the storage medium, and determine the influence value of the foreign matter on the storage medium based on these values. For example:
If the storage medium is a paper medium storing national important data, the storage medium needs to be thoroughly destroyed due to the specificity of the storage medium, so that no other forms of backup exist; while the foreign object is a pinhole camera, risk indicator (D) = 3 x 1 = 27, risk indicator (H) =3×3×3=27. In this case, the risk index of the foreign matter is high.
If the storage medium is a usb disk storing personal photos, and the foreign matter is a hair, risk indicator (D) = 1 x 1 = 1, risk indicator (H) =1×1×1=1. In this case, the risk index of the foreign matter is low.
The influence value is determined based on the risk index (D) and the risk index (H), and in the actual evaluation process, the influence value (R) may be defined as a product of the risk index and the risk index, and the influence value is divided into 3 ranges according to the magnitude of the product: r is defined as a high influence value when R is more than or equal to 243; r.ltoreq.27 is defined as low and 27 < R < 243 is defined as medium.
In the embodiment of the application, the division of the influence value is determined based on the logic operation relation between the risk index and the risk index, the influence value is divided into 3 ranges, and when D is more than or equal to 18 and H is more than or equal to 6, the influence value is defined as a high influence value; when D is less than or equal to 6 and H is less than or equal to 3, defining the impact value as a low impact value; the remaining ranges are defined as the median impact values.
As shown in fig. 1 and fig. 2, the early warning module is electrically connected with the safety evaluation module, and gives an early warning level based on the impact value, specifically gives an early warning level according to the range of the impact value described above, and gives an early warning display and an early warning prompt according to the early warning level:
if the influence value is high, the early warning grade is a first early warning, and the user is prompted to immediately stop destroying operation and take out the foreign matters;
if the influence value is a middle influence value, the early warning grade is a secondary early warning, and the destroying operation is continued and the foreign matter is tracked;
if the impact value is low, the early warning level is three-level early warning, and the destroying operation is continued without tracking the foreign matters.
By the technical scheme, possible foreign matters in the storage medium destroying process can be identified in real time, the possible influences of the foreign matters on the storage medium destroying process and the storage medium safety can be judged pertinently according to the identification result, and corresponding measures are taken timely according to the existence of the influences and the sizes of the influences.
In a better scheme, the storage medium destroying system based on foreign matter identification and alarm further comprises a display module, wherein the display module is arranged to display the surface image of the storage medium to be destroyed and in the destroying process in real time, and can show the identified foreign matter and the position of the foreign matter in the storage medium, specifically:
When the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is primary early warning, the position of the foreign matter is shown through a red mark frame;
when the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is a secondary early warning, the position of the foreign matter is shown through a yellow marking frame.
Through the technical scheme, on one hand, operators can conveniently know the condition of the foreign matters in the process of destroying the storage medium in time through the display module, and on the other hand, the influence of the foreign matters on the storage medium can be intuitively judged, and the first-level early warning or the second-level early warning of the foreign matters is relieved through the control module.
Specifically, the control module is electrically connected with the early warning module, and in some technical schemes, the control module can be a touch control module embedded in the display module, namely under the technical scheme, the display module is a touch display screen, when the touch display screen marks the foreign matter with a red mark frame or a yellow mark frame, when an operator thinks that the safety evaluation module erroneously evaluates the influence value of the foreign matter, the first-stage early warning or the second-stage early warning corresponding to the foreign matter can be released by clicking the touch display screen.
In some technical schemes, as shown in fig. 2 again, the storage medium destruction system based on foreign matter identification and alarm further comprises a storage module, wherein the storage module is electrically connected with the safety evaluation module, the early warning module and the display module, and is used for storing foreign matter information, more specifically, the storage module is mainly used for storing foreign matter information with early warning grades of primary early warning and secondary early warning; when the early warning level of the identified foreign matters is primary early warning or secondary early warning, the foreign matter information is encrypted and then uploaded to the storage module, and the purpose of encryption is to ensure the safety and the authenticity of the foreign matter information.
It can be understood that when the foreign object is first-level warning and second-level warning, and the operator considers that the safety evaluation module erroneously evaluates the impact value of the foreign object based on the display of the display module and then releases the warning level corresponding to the foreign object, the storage module still stores the information corresponding to the foreign object and the original warning level, stores the release information of the operator, and stores the information after encryption.
The specific scheme is that the foreign matter information is encrypted and then uploaded to the storage module, and the method comprises the following steps of:
Encrypting the foreign matter information to obtain a hash value;
Packaging the foreign matter information and the hash value corresponding to the foreign matter information into a data block, and attaching a time stamp; and the data block comprises a hash value in the last data block to form a data chain;
broadcasting the data block to all nodes in the network;
data blocks are added to the data chain and synchronized to all nodes in the network.
Specifically, in this scheme, the foreign object identification module acts as a node in the blockchain, when it identifies a region of information, it is considered that it creates a transaction, and when the transaction is created and digitally signed, it will broadcast the transaction to the blockchain network, letting other nodes know the existence of the transaction.
After receiving the transaction, other nodes verify the transaction, check whether the transaction meets the requirements of a preset format, a signature, logic and the like, and if the transaction passes the verification, the transaction is put into a transaction pool of the other nodes and waits for packaging; if the verification fails, the transaction is refused to be accepted and discarded.
One or more nodes are selected as billing personnel in the network according to a consensus algorithm within a certain time interval (such as 10 minutes), and are responsible for selecting a batch of transactions (such as 2000) from own transaction pools and forming a block candidate according to a certain sequence.
The billing party also needs to calculate the block candidate, find a value satisfying the requirements of the consensus algorithm as a proof of the block, and append the proof to the block candidate to form a complete block.
The biller broadcasts the block into the blockchain network, lets other nodes know the existence of the block, and requests other nodes to acknowledge it.
After receiving the block, other nodes verify the block, check whether the block meets the requirements of format, certification, logic and the like, and if the block passes the verification, link the block to the own block chain and update the state of the account book of the own; if the verification fails, the block is refused to be accepted and discarded.
When more than a certain percentage (e.g., 51%) of the nodes in the network accept the block, the block is considered to have reached consensus and is irreversible. Thus, all transactions (e.g., foreign object information) contained in the block are identified and recorded on the blockchain.
In this way, foreign object information is stored on the blockchain and can be synchronized and verified by the full network. As the blockchain has the characteristics of decentralization, non-tampering, traceability and the like, any person cannot unilaterally modify or delete the foreign matter information, thereby realizing the purpose of tamper resistance and ensuring the safety and traceability of the foreign matter information and the foreign matter early warning release information of an operator. This approach is particularly applicable to destruction of important data storage media.
According to the technical scheme, the two-dimensional image data of the foreign matter is acquired every time (such as 1 minute) in the tracking process, and after the two-dimensional image data are acquired, the two-dimensional image data of the foreign matter acquired and stored before are combined to try to generate a three-dimensional model of the foreign matter, if the three-dimensional model of the foreign matter can be generated, the three-dimensional model is displayed through a display module so that an operator can more intuitively and clearly know the type of the foreign matter; if the two-dimensional image data of the foreign object acquired and stored before being combined cannot generate the three-dimensional model corresponding to the foreign object, the two-dimensional image of the foreign object is continuously acquired until the three-dimensional model of the foreign object can be generated or the destroying operation is stopped.
In this technical solution, after each time of obtaining the two-dimensional graphic data of the corresponding foreign object, an attempt is made to reconstruct the three-dimensional model of the foreign object, so as to more intuitively determine the type of the foreign object and its influence on the security of the storage medium by the three-dimensional model.
Of course, in the above-described embodiments, even if a three-dimensional model is obtained based on the two-dimensional image data of the foreign object, the tracking of the foreign object is not stopped.
It should be noted that the above-mentioned destruction operation stop includes two cases:
One is that the whole storage medium destroying program is finished, if the three-dimensional model of the foreign matter cannot be obtained based on the two-dimensional image data of the foreign matter until the destroying medium destroying program is finished, the opportunity of continuously obtaining the two-dimensional image data of the foreign matter is lost later.
And secondly, the foreign matter with the early warning grade of the second grade early warning is evaluated as the first grade early warning in the subsequent recognition and analysis process, and the early warning module reminds a user to stop operation and take out the foreign matter at the moment because the foreign matter is evaluated as the first grade early warning, so that the basis of acquiring the two-dimensional graphic data of the foreign matter is not obtained.
Based on the foregoing, it can be appreciated that, for a certain foreign object, the corresponding early warning level is not constant in the whole process of destroying the storage medium, for example, if the storage medium is a paper medium storing important national information, the storage medium needs to be thoroughly destroyed because of important record information, and no other backup is provided; the foreign matter is a pinhole camera, if the foreign matter is located in a critical area of data storage of the storage medium during security evaluation, based on the foregoing statement, the risk index (D) =27 and the risk index (H) =27, and based on the rule of dividing the impact value in the embodiment of the present application, D is greater than or equal to 18 and H is greater than or equal to 6, the impact value is defined as a high impact value, and the corresponding early warning level is a first-level early warning.
However, it is also possible that the foreign matter is located in a non-critical area of the storage medium during a certain security evaluation, for example, when the storage medium is a paper medium, if the foreign matter is located in an edge area of the paper or on a side of the paper where there is no text information during the security evaluation, the risk indicator (H) is still 27, but the risk indicator (D) =3×3×1×1=9. The corresponding influence value is the middle influence value, and the corresponding early warning level is the secondary early warning.
Thus, as shown in fig. 1 again, in one embodiment of the present application, the possible presence of a foreign object during the destruction of the storage medium is taken into account by the change in the alert level:
For a certain foreign matter with a first-level early warning grade, the destroying operation is stopped and the foreign matter is taken out; if the operator removes the early warning level of the foreign matter, the foreign matter still needs to be tracked in the subsequent destroying process until the destroying operation is stopped, and even if the early warning level of the foreign matter may be evaluated as the secondary early warning or even the tertiary early warning in the subsequent destroying process.
And for a certain foreign matter with the early warning grade of the second-level early warning, in the process of tracking the foreign matter, if the foreign matter is evaluated as the third-level early warning in the subsequent identification and analysis process, the foreign matter is still tracked until the destruction operation is stopped.
It should be noted that, stopping the destruction operation as referred to herein still means that the entire destruction process is completed or the corresponding foreign object is evaluated as a first-level warning and taken out from the destruction device by the operator.
It can be understood that after the storage medium is destroyed, the residue after the destruction is required to be identified and analyzed by a foreign matter identification module, and whether the residue contains foreign matters is judged; if so, giving an early warning level of the foreign matter and storing the result separately.
The scheme considers that the foreign matters possibly existing in the storage medium before the storage medium is destroyed, the foreign matters are destroyed by the destruction equipment and still can be identified by the foreign matter identification module after the destruction operation of the storage medium, the foreign matter information needs to be stored separately, and staff is needed to intervene to judge the properties of the foreign matters if necessary.
The above embodiments are only for illustrating the technical solution of the present application, and are not limiting; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; these modifications or substitutions do not depart from the essence of the corresponding technical solutions from the protection scope of the technical solutions of the embodiments of the present application.
Claims (8)
1. The storage medium destruction system based on foreign matter identification and alarm is characterized by comprising:
the foreign matter identification module is used for identifying and analyzing the storage medium to be destroyed and in the destruction process and judging whether foreign matters exist or not;
The safety evaluation module is used for evaluating the identified foreign matters; the safety evaluation module is preset with a safety evaluation index and a grade value corresponding to the index, wherein the safety evaluation index and the grade value are used for judging an influence value of the foreign matter on the storage medium;
the early warning module gives an early warning grade based on the influence value, and gives an early warning prompt according to the early warning grade:
if the early warning level is a first-level early warning, prompting a user to immediately stop destroying operation and taking out the foreign matters;
if the early warning level is the second early warning, the destroying operation is continued and the foreign matter is tracked, and in the process of tracking the foreign matter, if the foreign matter is evaluated as the third early warning in the subsequent identifying and analyzing process, the foreign matter is still tracked until the destroying operation is stopped;
If the early warning level is three-level early warning, the destroying operation is continued without tracking the foreign matters;
wherein the safety evaluation index comprises:
a risk indicator determined based on a likelihood of identifying a foreign object causing leakage to the storage medium content;
The risk indicator is determined based on the severity of the content of the storage medium, such as the consequences of a leak.
2. The foreign object identification and alarm-based storage medium destruction system of claim 1, further comprising:
the display module is used for displaying the surface image of the storage medium to be destroyed in the destruction process:
When the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is primary early warning, the position of the foreign matter is shown through a red mark frame;
when the foreign matter identification module identifies that the foreign matter exists on the surface of the storage medium and the early warning level of the foreign matter is a secondary early warning, the position of the foreign matter is shown through a yellow marking frame.
3. The foreign object identification and alarm-based storage medium destruction system of claim 2, further comprising:
And the control module is electrically connected with the early warning module, and when the early warning level of the foreign matters is primary early warning or secondary early warning, the corresponding early warning can be released through the control module.
4. The foreign object identification and alarm-based storage medium destruction system of claim 1, further comprising:
The storage module is used for storing foreign matter information; and when the early warning level of the identified foreign matters is primary early warning or secondary early warning, the foreign matter information is encrypted and then uploaded to the storage module.
5. The system for destroying storage media based on foreign object identification and alarm according to claim 4, wherein said encrypting and uploading the foreign object information to the storage module comprises the steps of:
Encrypting the foreign matter information to obtain a hash value;
Packaging the foreign matter information and the hash value corresponding to the foreign matter information into a data block, and attaching a time stamp; and the data block comprises a hash value in the last data block to form a data chain;
broadcasting the data block to all nodes in the network;
data blocks are added to the data chain and synchronized to all nodes in the network.
6. The system for destroying storage media based on foreign matter identification and alarm according to claim 2, wherein, for a foreign matter whose early warning level is a secondary early warning, two-dimensional image data of the foreign matter is acquired during the tracking of the foreign matter;
if the plurality of two-dimensional image data can generate a three-dimensional model corresponding to the foreign matters, generating a corresponding three-dimensional model and displaying the three-dimensional model through a display module;
if the plurality of two-dimensional image data cannot generate the three-dimensional model corresponding to the foreign object, continuing to acquire the two-dimensional image of the foreign object until the three-dimensional model of the foreign object can be generated or stopping the destroying operation.
7. The foreign object identification and alarm-based storage medium destruction system of claim 1 or 6, wherein the destruction operation stop includes:
The destruction of the storage medium is completed;
The foreign matter with the early warning grade of the second early warning is evaluated as the first early warning in the subsequent recognition and analysis process, and is taken out from the destroying device.
8. The system for destroying storage medium based on foreign matter identification and alarm according to claim 1, wherein after the storage medium is destroyed, the residue after the destruction is identified and analyzed to determine whether the foreign matter exists in the residue; if so, giving an early warning level of the foreign matter and storing the result separately.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311683869.6A CN117390686B (en) | 2023-12-11 | 2023-12-11 | Storage medium destruction system based on foreign matter identification and alarm |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311683869.6A CN117390686B (en) | 2023-12-11 | 2023-12-11 | Storage medium destruction system based on foreign matter identification and alarm |
Publications (2)
Publication Number | Publication Date |
---|---|
CN117390686A CN117390686A (en) | 2024-01-12 |
CN117390686B true CN117390686B (en) | 2024-05-14 |
Family
ID=89437699
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311683869.6A Active CN117390686B (en) | 2023-12-11 | 2023-12-11 | Storage medium destruction system based on foreign matter identification and alarm |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117390686B (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9633494B1 (en) * | 2015-12-01 | 2017-04-25 | Amazon Technologies, Inc. | Secure destruction of storage devices |
CN112776856A (en) * | 2021-01-15 | 2021-05-11 | 中国神华能源股份有限公司神朔铁路分公司 | Track foreign matter intrusion monitoring method, device and system and monitoring host equipment |
CN112948823A (en) * | 2021-03-19 | 2021-06-11 | 中国人民解放军国防科技大学 | Data leakage risk assessment method |
CN114419616A (en) * | 2022-01-19 | 2022-04-29 | 北京全路通信信号研究设计院集团有限公司 | Foreign matter identification method, device, equipment and storage medium |
CN115311534A (en) * | 2022-08-26 | 2022-11-08 | 中国铁道科学研究院集团有限公司 | Laser radar-based railway perimeter intrusion identification method and device and storage medium |
CN116561809A (en) * | 2023-07-10 | 2023-08-08 | 北京中超伟业信息安全技术股份有限公司 | Destroying method for identifying security medium based on point cloud |
-
2023
- 2023-12-11 CN CN202311683869.6A patent/CN117390686B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9633494B1 (en) * | 2015-12-01 | 2017-04-25 | Amazon Technologies, Inc. | Secure destruction of storage devices |
CN112776856A (en) * | 2021-01-15 | 2021-05-11 | 中国神华能源股份有限公司神朔铁路分公司 | Track foreign matter intrusion monitoring method, device and system and monitoring host equipment |
CN112948823A (en) * | 2021-03-19 | 2021-06-11 | 中国人民解放军国防科技大学 | Data leakage risk assessment method |
CN114419616A (en) * | 2022-01-19 | 2022-04-29 | 北京全路通信信号研究设计院集团有限公司 | Foreign matter identification method, device, equipment and storage medium |
CN115311534A (en) * | 2022-08-26 | 2022-11-08 | 中国铁道科学研究院集团有限公司 | Laser radar-based railway perimeter intrusion identification method and device and storage medium |
CN116561809A (en) * | 2023-07-10 | 2023-08-08 | 北京中超伟业信息安全技术股份有限公司 | Destroying method for identifying security medium based on point cloud |
Also Published As
Publication number | Publication date |
---|---|
CN117390686A (en) | 2024-01-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10142833B2 (en) | Methods, systems and apparatus for recognizing genuine products | |
CN111709603B (en) | Service request processing method, device and system based on wind control | |
CN114444105B (en) | Intelligent audit data reporting safety method | |
CN117270785B (en) | Data security storage method and system based on big data platform | |
CN105005904A (en) | RFID-coding-based artwork tracing method | |
CN116561809B (en) | Destroying method for identifying security medium based on point cloud | |
CN112464030B (en) | Suspicious person determination method and suspicious person determination device | |
CN105117302B (en) | A kind of method of calibration for storage medium data destroying | |
CN117390686B (en) | Storage medium destruction system based on foreign matter identification and alarm | |
CN110598397A (en) | Deep learning-based Unix system user malicious operation detection method | |
CN111008902B (en) | Nuclear protection data processing method, device, equipment and medium | |
CN105117917A (en) | Artwork safety identification method based on RFID coding | |
CN115392938B (en) | Electronic commerce platform counterfeit commodity big data identification method based on blockchain | |
CN116248406B (en) | Information security storage method and information security device thereof | |
CN113723071B (en) | Electronic archive verification method, system, storage medium and equipment | |
CN116389148A (en) | Network security situation prediction system based on artificial intelligence | |
CN111611459B (en) | File data protection method based on block chain | |
CN103729593B (en) | File security identification method and system | |
CN111582633A (en) | Financial security risk supervision method, device and medium based on block chain | |
CN113032744A (en) | Digital watermark all-in-one system | |
CN114112958B (en) | Agricultural product detection system and detection method based on big data | |
CN117875989B (en) | 3D asset right determining and maintaining platform and method | |
CN111144183B (en) | Risk detection method, device and system based on face concave-convex degree | |
CN116542818A (en) | Trademark monitoring and analyzing method based on big data technology | |
CN117573489A (en) | Operation monitoring and early warning system, operation monitoring and early warning method and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |