EP4061549A1 - Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte - Google Patents
Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecteInfo
- Publication number
- EP4061549A1 EP4061549A1 EP20806984.9A EP20806984A EP4061549A1 EP 4061549 A1 EP4061549 A1 EP 4061549A1 EP 20806984 A EP20806984 A EP 20806984A EP 4061549 A1 EP4061549 A1 EP 4061549A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- destruction
- data carriers
- control device
- security level
- client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 230000006378 damage Effects 0.000 title claims abstract description 169
- 238000000034 method Methods 0.000 title claims abstract description 160
- 239000000969 carrier Substances 0.000 title claims abstract description 93
- 230000008569 process Effects 0.000 claims abstract description 78
- 239000007788 liquid Substances 0.000 claims description 40
- 238000004891 communication Methods 0.000 claims description 23
- 230000006835 compression Effects 0.000 claims description 15
- 238000007906 compression Methods 0.000 claims description 15
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 claims description 6
- 230000008859 change Effects 0.000 claims description 4
- 238000005259 measurement Methods 0.000 claims 1
- 239000000463 material Substances 0.000 description 19
- 239000012876 carrier material Substances 0.000 description 15
- 238000004064 recycling Methods 0.000 description 7
- 239000010893 paper waste Substances 0.000 description 5
- 239000002245 particle Substances 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 238000007873 sieving Methods 0.000 description 5
- 238000005520 cutting process Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 238000005056 compaction Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- 239000007921 spray Substances 0.000 description 3
- 238000003860 storage Methods 0.000 description 3
- 239000000428 dust Substances 0.000 description 2
- 230000007613 environmental effect Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 239000011521 glass Substances 0.000 description 2
- 238000000227 grinding Methods 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 238000011068 loading method Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 238000003825 pressing Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 239000000725 suspension Substances 0.000 description 2
- 238000005303 weighing Methods 0.000 description 2
- 238000013459 approach Methods 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000002485 combustion reaction Methods 0.000 description 1
- 238000012790 confirmation Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 239000000835 fiber Substances 0.000 description 1
- 238000011049 filling Methods 0.000 description 1
- 239000012530 fluid Substances 0.000 description 1
- 239000011888 foil Substances 0.000 description 1
- 230000005484 gravity Effects 0.000 description 1
- 230000036541 health Effects 0.000 description 1
- 229910052739 hydrogen Inorganic materials 0.000 description 1
- 238000007885 magnetic separation Methods 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000003801 milling Methods 0.000 description 1
- 238000002156 mixing Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000007639 printing Methods 0.000 description 1
- 238000004537 pulping Methods 0.000 description 1
- 238000001454 recorded image Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 238000000926 separation method Methods 0.000 description 1
- 230000006641 stabilisation Effects 0.000 description 1
- 238000011105 stabilization Methods 0.000 description 1
- 238000009736 wetting Methods 0.000 description 1
Classifications
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B02—CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
- B02C—CRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
- B02C18/00—Disintegrating by knives or other cutting or tearing members which chop material into fragments
- B02C18/0007—Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B02—CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
- B02C—CRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
- B02C21/00—Disintegrating plant with or without drying of the material
- B02C21/02—Transportable disintegrating plant
- B02C21/026—Transportable disintegrating plant self-propelled
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B02—CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
- B02C—CRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
- B02C23/00—Auxiliary methods or auxiliary devices or accessories specially adapted for crushing or disintegrating not provided for in preceding groups or not specially adapted to apparatus covered by a single preceding group
- B02C23/18—Adding fluid, other than for crushing or disintegrating by fluid energy
- B02C23/20—Adding fluid, other than for crushing or disintegrating by fluid energy after crushing or disintegrating
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B09—DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
- B09B—DISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
- B09B3/00—Destroying solid waste or transforming solid waste into something useful or harmless
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B09—DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
- B09B—DISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
- B09B3/00—Destroying solid waste or transforming solid waste into something useful or harmless
- B09B3/20—Agglomeration, binding or encapsulation of solid waste
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B09—DISPOSAL OF SOLID WASTE; RECLAMATION OF CONTAMINATED SOIL
- B09B—DISPOSAL OF SOLID WASTE NOT OTHERWISE PROVIDED FOR
- B09B5/00—Operations not covered by a single other subclass or by a single other group in this subclass
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B30—PRESSES
- B30B—PRESSES IN GENERAL
- B30B9/00—Presses specially adapted for particular purposes
- B30B9/30—Presses specially adapted for particular purposes for baling; Compression boxes therefor
- B30B9/3003—Details
- B30B9/3007—Control arrangements
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B30—PRESSES
- B30B—PRESSES IN GENERAL
- B30B9/00—Presses specially adapted for particular purposes
- B30B9/30—Presses specially adapted for particular purposes for baling; Compression boxes therefor
- B30B9/3003—Details
- B30B9/3035—Means for conditioning the material to be pressed, e.g. paper shredding means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B02—CRUSHING, PULVERISING, OR DISINTEGRATING; PREPARATORY TREATMENT OF GRAIN FOR MILLING
- B02C—CRUSHING, PULVERISING, OR DISINTEGRATING IN GENERAL; MILLING GRAIN
- B02C18/00—Disintegrating by knives or other cutting or tearing members which chop material into fragments
- B02C18/0007—Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents
- B02C2018/0061—Disintegrating by knives or other cutting or tearing members which chop material into fragments specially adapted for disintegrating documents with compacting devices for the disintegrated material
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65F—GATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
- B65F2210/00—Equipment of refuse receptacles
- B65F2210/128—Data transmitting means
-
- B—PERFORMING OPERATIONS; TRANSPORTING
- B65—CONVEYING; PACKING; STORING; HANDLING THIN OR FILAMENTARY MATERIAL
- B65F—GATHERING OR REMOVAL OF DOMESTIC OR LIKE REFUSE
- B65F2210/00—Equipment of refuse receptacles
- B65F2210/148—Locking means
Definitions
- the invention relates to a method for the needs-based and mobile destruction of data carriers in collection vehicles according to the preamble of claim 1 and systems of lockable individual containers for throwing in and receiving data carriers with confidential content and a mobile collection vehicle with a collection container according to the preamble of claim 13.
- Such methods and systems are used for the reliable and confidential destruction of data carriers and such methods and systems are regularly used in the provision of destruction services.
- Such destruction services are regularly used by clients who produce data on data carriers that are not destroyed by the client himself, but by a service company commissioned to do so.
- Recyclable containers for glass, paper and plastic are decentralized in order to achieve a high usage rate. Since the reusable materials are recycled centrally, the contents of the container must be transported to a collection point. This is usually done with trucks that are equipped with collecting bins into which the contents of the individual recycling containers can be emptied.
- the situation is different when disposing of confidential business papers or other data carriers with confidential content, which is the subject of the present invention.
- data carrier primarily refers to paper-based data carriers or, more generally, to fiber-based data carriers, but basically also includes other data carriers, especially since data is increasingly being stored, processed and sent digitally. In this respect, it is also about the destruction of data carriers which data is stored in digital form. Nevertheless, the invention is explained and described in more detail below and in the exemplary embodiments primarily with regard to paper-based data carriers, but this is not intended to restrict the invention.
- Paper-based data carriers are to be considered as an example of data carriers only, albeit as a preferred example.
- security levels e.g. P4 or PI
- Such data carriers especially paper-based data carriers, occur in companies, medical practices, law offices, freelancers, etc. (hereinafter generally referred to as clients) e.g. at certain times in larger quantities, for example when the retention period for certain documents has expired.
- clients Such data carriers are also used in daily work.
- the data carriers must be reliably destroyed to prevent unauthorized third parties from looking at them and to protect the confidentiality of information.
- the client does not normally carry out the destruction themselves, but instead instructs specialized companies, hereinafter referred to as destruction service providers.
- the client expects his data carriers to be destroyed while maintaining the necessary confidentiality.
- the destruction service providers can guarantee confidentiality within their company.
- the service relationship between the client and the destruction service provider of the data carrier destruction usually looks like that the client receives locked individual containers from the destruction service provider into which he can insert his data carriers. For logistical reasons, the contents of these individual containers are transferred to large collecting containers and then, according to the state of the art, brought to a central destruction site, for example. When emptying the individual containers into the collecting container, there is a risk that unauthorized third parties can inspect the papers to be destroyed, that papers are stolen or lost.
- WO 01/96215 A1 This is where WO 01/96215 A1 comes in. From this WO 01/96215 A1 a system consisting of lockable individual containers and a collecting container for emptying such individual containers is known.
- the lockable individual containers are usually part of a destruction service and are available from a client so that he can throw confidential papers or other data carriers into the individual containers, because disposal via other, general recycling systems with regard to confidentiality is out of the question.
- These lockable individual containers are emptied by the destruction service provider as part of the service relationship and for this purpose the destruction service provider operates collection vehicles with collection containers arranged on them.
- WO 01/962151 A1 describes such a system consisting of lockable individual containers and a mobile collecting container for emptying such individual containers. The mobile collection containers only have a collecting function and the collected goods with confidential data are then brought to a place where the collected goods are destroyed.
- WO 01/96215 A1 deals with how the lockable individual containers can be emptied into the mobile collecting container without the possibility of external access, in particular by unauthorized third parties, to the contents of the lockable individual containers during emptying into the collecting container.
- each individual container can only be opened if it is completely enclosed by the collecting container.
- the emptying takes place in a lock of the collecting container. This represents a significant improvement over systems in which filled, lockable individual containers are exchanged for empty, lockable individual containers and then the replaced filled individual containers are brought to the location where the collected goods with confidential data are reliably destroyed.
- a mobile device for the destruction of data carriers is disclosed, for example, in DE 600 24 912 T2.
- the mobile device shown there consists of a cutting device in which, for example, the paper fed to the cutting device via a funnel is shredded. This shredded paper arrives in a screw arranged below the cutting device and is mixed there and pressed into a collecting compartment which is separated by a wall and at a distance from the cutting device and the funnel.
- DE 30 25 631 A1 describes a stationary system and a stationary method for the destruction of data carriers.
- the data carriers to be destroyed are to be fed to several processing stages of the system, namely one after the other to a mechanical coarse crushing stage, a magnetic separation stage, a fine crushing stage and a grinding stage.
- the data carriers should come out of the system in micro-granulated form.
- No. 6,491,245 B1 shows a mobile shredding device for the mobile destruction of data carriers.
- the destruction takes place via a shredder, a sieve device and a screw compactor.
- the data carriers destroyed in this way are then placed in a collection compartment.
- spray nozzles are arranged on the roof side in order to be able to spray dust-binding liquid down from the ceiling for the purpose of binding dust.
- DE 22 14 786 B2 shows methods and devices for the stationary destruction of data carriers.
- the data carriers to be destroyed are first mechanically shredded and then pressed to reduce their volume.
- the scaled-down data carriers are moistened, for example by adding water in a liquid or vapor state. By moistening the material, a particularly good compression, an improved rendering of the data illegible and a stabilization of the resulting compacts should be achieved.
- EP 0289 015 A1 discloses a screw press and method for converting waste paper into manageable compacts, this waste paper not being a data carrier with confidential content but, for example, conventional paper, i.e. a conventional material that is recycled.
- the screw press has a nozzle in the area of the screw for the supply of liquid. A good and uniform wetting of the waste paper with the liquid should be ensured so that the waste paper can be well bonded during the pressing process in the screw press when it is formed into compacts.
- WO 2014/131593 A1 describes a mobile device by means of which a mobile data carrier destruction method can be carried out.
- the data carriers are to be destroyed on the collection vehicle used, whereby the data carriers are not shredded. Rather, these should be mixed in a hydromechanical pulper to form a suspension of fiberized data carriers and pulping fluid. This resulting suspension should then be fed to a paper recycling plant.
- WO 2016/070948 A1 describes a stationary system for the destruction of data carriers.
- the data carriers are crushed in a crushing step by a hammer mechanism and then water is added to the particles that are formed. A crumbly residue is no longer legible. It is proposed that the water be added before the comminution or during the comminution in the hammer mechanism, since this allows the friction values in the hammer mechanism to be reduced.
- JP 2014/018715 A shows a mobile device and a mobile method for the destruction of data carriers. Packets are manually entered into the destruction device. The packets are subjected to a shredding step and then ground up. Liquid is added in the milling step.
- the destruction method which is applied to the collected data carriers is carried out in a controlled manner by a control device according to a first method sequence.
- the collected data carriers are to be destroyed in the collection vehicle after a first security level.
- the control device can switch from this first method sequence to a second method sequence. This is done as required and in this second process sequence, the collected data carriers are to be destroyed according to a second security level that is higher than the first security level.
- security level is used in this application, this term refers to DIN 66399, which has replaced the previous DIN 32759.
- This DIN 66399 standard deals with various data carriers, for example those with information displayed in original size, for example paper, films, printing plates.
- This type of data carrier is abbreviated with the letter "P”.
- Data carriers with reduced information display, for example microfilms, foil are abbreviated with the letter “F”.
- Optical data carriers, for example CDs / DVDs are abbreviated with the letter “O”.
- Magnetic data carriers, for example ID cards, floppy disks are abbreviated with the letter "T”
- hard drives with magnetic data carriers are abbreviated with the letter "H”
- Electronic data carriers, for example memory sticks, chip cards are abbreviated with the letter "E”.
- Protection classes are defined in this DIN 66399 and security levels 1-7 are assigned to these protection classes. The following table shows a comparison of the protection classes with the security levels. This table is taken from the said DIN.
- This DIN 66399 also contains specific information on when and with respect to which material the security level shown above is reached.
- Several tables are given in Part 2 of this DIN, one for each of the material classes P, F, O, T, H, E.
- the table for material class P is shown below.
- security level P1 has been achieved, which is recommended for data carriers with general data that are to be made illegible if a material particle area of ⁇ 2000 mm 2 or a strip width of ⁇ 12 mm is achieved in the context of the destruction of the data carrier.
- the security levels P2 to P7 are referred to as higher security levels and the requirements for the destruction process increase in order to achieve destruction according to these higher security levels.
- DIN 66399 specifies for security level P4 that this is recommended for data carriers with particularly sensitive and confidential data and is achieved when the material particle area is ⁇ 160 mm 2 and for regular particles a strip width of ⁇ 6 mm and for Example a particle size of ⁇ 4 mm c 40 mm is achieved.
- the highest security level is P7, which is recommended, for example, for data carriers with data that are to be kept strictly confidential, i.e. when the highest security precautions must be observed.
- DIN 66399 also provides specifications for this. After this highest security level, the destruction of the data carriers takes place in such a way that the reproduction of the data reproduced on them is impossible according to the state of the art in science and technology.
- the prior art would require that a destruction process according to security level P7 be carried out in the collection vehicle in order to use such collection vehicles to carry out both orders for destruction according to security level P4 and orders for destruction with security level P7 on the same vehicle to be able to.
- Such a procedure would be economically disadvantageous for customer orders that provide for destruction according to security level P4 and for which only a service fee for such a security level can be agreed.
- the present invention brings about an improvement, because with the method according to the invention and with the system according to the invention it is possible to change from a first method sequence of destruction to a second method sequence of destruction, for example from a first method sequence, which is controlled by a control device leads to destruction according to security level P4, to a second process sequence which, for example, leads to destruction according to security level P7.
- orders for destruction can be carried out reliably and economically according to different security levels, without an additional post-destruction process, for example, as described above, and without any precautionary measures Orders for destruction with a lower security level must be carried out according to a procedure with a higher security level, without this being economically burdensome for the client.
- the destruction method has at least one comminution step.
- comminution steps can also be provided, for example a first coarse comminution and a subsequent fine comminution.
- the destruction process includes further procedural steps.
- a sieving step or several sieving steps could be provided with one or more sieves with a predefined sieve hole size.
- the destruction device is activated by a control device to work in a first operating mode. In this first operating mode, the emptied data carriers are destroyed after one first destruction method and after a first security level, as explained above, for example using the destruction method according to the invention.
- control device can operate the destruction device in a second operating mode, namely when destruction is to take place according to a different security level than in the first operating mode.
- the destruction method comprises at least one further treatment step in addition to the comminution step, this treatment step meaning a treatment of the collected data carriers.
- This further treatment step should preferably be carried out in the second method sequence or in the second operating mode and not be carried out in the first operating mode or in the first method sequence.
- this further treatment step means that destruction does not take place after the first security level, but rather after the second, higher security level.
- This second treatment step could, for example, be a screening step and / or a mixing or swirling step and / or a further comminution step and / or a material compression step.
- this further treatment step can also be designed differently.
- the further treatment step could be a swirling step, for example in a fall section, while for material of material classification H this second treatment step could be a further comminution step or a grinding step.
- the application of a liquid to the emptied data carriers is regarded as a preferred further treatment step.
- This application should preferably take place after the disintegration of the data carrier.
- a corresponding charge device would be to be arranged behind the shredding device in the conveying direction of the data carrier.
- This application could preferably take place from suitably arranged nozzles and in atomized form.
- the application liquid used is preferably water, which is preferred over other liquids in terms of handling, health and environmental compatibility.
- a liquid tank is advantageously arranged in the collecting vehicle, from which the liquid is withdrawn in order to act on the emptied data carrier. Such a liquid tank can be arranged, for example, in a manner that is favorable for the vehicle's center of gravity.
- an indicator can be added to the liquid, for example a dye, so that the exposure of the data carrier to the liquid can be detected using the indicator.
- the indicator could easily be used to recognize that a destruction process is being carried out according to a higher security level, while if the indicator does not work, a destruction process according to the lower security level can be recognized.
- the amount of liquid to be discharged can be made dependent, for example, in a controlled manner on the amount of data carrier material being destroyed. The amount of liquid should be measured in such a way that the impacted data carriers are reliably made illegible, as required by the security level to be achieved.
- control device has a wireless communication device.
- the control device can exchange (send and / or receive) data via this wireless communication device, and on the basis of received data it is advantageously selected which destruction method is to be used on the emptied data carriers. In this way, the destruction method to be used can be selected automatically, without an operator having to make an entry, for example on the collection vehicle or on the collection container.
- the wireless communication device can communicate wirelessly with the electronically actuated lock and it could be stored in the electronically actuated lock, for example, according to which security level the data carriers inserted there should be destroyed.
- the wireless communication device could read out this stored information and then let the control device run the appropriate destruction process provided for this security level.
- the wireless communication device could communicate wirelessly with a stationary central control device.
- this central control device can be used, for example, to control and manage the services provided and to be provided by the destruction service provider, e.g. contain information on the clients and their security level requirements, and, for example, control and manage the collection vehicles of the fleet.
- the central control device could be stored in a memory of this central control device or in a memory that the central control device can access, with which client and / or which individual container which destruction process is to be carried out according to which security level.
- the wireless communication device could therefore receive information from the central control device that a specific security level is stored for a specific and clearly identifiable electronic lock and thus a destruction process is to be carried out according to a specific security level.
- the advantage of such a central storage of this information would be that central data maintenance is possible.
- the wireless communication device can communicate wirelessly with a device that is operated by the Client is served.
- a device that is operated by the Client could be a mobile telecommunication device, for example a common smartphone.
- a device can also be a remote control device which, for example, can have been made available to the client by the service provider.
- Such a device can, however, also be a computer device of the usual type, for example a tablet, a laptop or a PC, via which the client can communicate with the wireless communication device.
- the wireless communication device of the control device is used to transmit information on the destruction process to the devices operated by the client.
- This can be, for example, status reports on the process sequence, for example that the process is starting, that certain intermediate steps have been completed and / or that the process has been ended.
- the transmitted information can also be, for example, images or video recordings, for example images or video recordings recorded by suitably positioned cameras, for example to record the emptying of the container in the image and / or the crushing of the emptied data carriers and / or images or video recordings further processing steps. If, for example, a liquid is applied to the emptied data carrier, a message could be issued about this, for example.
- a picture or video recording of the final state of the destroyed data carrier at the end of the destruction process could be transmitted.
- the client has the opportunity to observe and / or understand the destruction process.
- a destruction certificate could also be transmitted and / or information about the security level after which destruction is to be carried out could be transmitted before the destruction process is started.
- Another or alternative advantageous possibility is that, for example, the destruction process is only carried out when the client has previously given a release signal via the device operated by him. In this way, the client retains control over whether a destruction procedure or that a destruction procedure is carried out.
- the destruction process is aborted or changed if the client gives an abort signal or a change signal via the device operated by him. This is how it is, for example It is possible that the client will first be notified that a destruction procedure should be carried out according to a certain security level. He can then, for example, enter the destruction according to a different security level and the control device would then carry out the destruction according to this changed security level by running a destruction process corresponding to this security level. It is also conceivable that the client cancels the destruction process by sending an interruption signal.
- the destruction process comprises a compaction step, this compaction being carried out, for example, by means of compaction screws. It is considered advantageous here that the liquid is added before and / or during the compression step. This opens up the possibility, on the one hand, of achieving particularly good compression and, on the other hand, of distributing the liquid well over the already reduced data carriers.
- FIG. 1 shows a basic representation of a system according to the invention and a method according to the invention
- 2a shows a schematic flow diagram of various process steps in the collection and emptying of individual containers in a collection container of a collection vehicle
- FIG. 2b shows a schematic flow diagram for a destruction method according to the invention according to a first method sequence and a second method sequence with additional method steps compared to the first method sequence;
- 3a, 3b, 3c different perspective representations of a collection vehicle with a collection container and with destruction devices for carrying out the method according to the invention according to an embodiment
- 4 a basic representation of possible control processes and possible information exchange between communication and control devices according to a method according to the invention and in a system according to the invention.
- FIG. 1 shows a customary sequence of a destruction service.
- the destruction service provider operates collection vehicles 10 which are equipped with a collection container 12.
- devices (not shown in FIG. 1) are to be provided in the collecting vehicle 10 which enable the collected data carriers 14 to be destroyed. Details of these destruction facilities and details of such destruction methods are explained in connection with later figures.
- the collection vehicle 10 works together with individual containers 16 which are designed to be lockable, for example preferably with electronic locks. These individual containers 16 are, for example, with a client A, and with this client A these individual containers 16 are filled with data carriers 14, for example with paper or paper-based documents.
- a collection vehicle 10 is sent to client A at regular intervals or on request.
- the filled individual containers 16 located at the client A are brought to the collecting vehicle 10, emptied into the collecting container 12 on or in the collecting vehicle 10, subjected to destruction as will be explained and the emptied individual containers 16 then returned to the client A so that he can dispose of the individual containers 16 can be used again for the purpose of filling with data carriers 14 that arise at client A.
- the collection vehicle 10 is equipped with a maximum storage capacity due to its space and design, ie the storage volume of emptied data carriers 12 and shredded or destroyed data carriers 14 is limited by the available loading volume.
- the collection vehicle 10 must therefore regularly drive to a central collection point 18, for example when the loading limit is reached or at the end of the planned collection route.
- This can be a recycling system, for example, in order to feed the destroyed data carriers 14 to a recycling process there.
- this can also be a central station of the destruction service provider in order to remove the collected and destroyed data carrier 14 initially to receive centrally, if necessary to be subjected to further processing, for example to enable a subsequent recycling of the collected data carrier material.
- the emptied collection vehicle 10 can then approach customer A again and pick up individual containers 16 for the purpose of emptying them.
- FIG. 2a explains in a schematic flow diagram which method steps are generally carried out on the collecting vehicle 10 in order to empty an individual container 16 into the collecting vehicle 10 and into the collecting container 12 arranged in the collecting vehicle.
- the individual container 16 collected by a client A is first brought to the collection vehicle 10.
- the collection vehicle 10 is equipped with a lifting and emptying device 22.
- the still closed individual container 16 is placed in this lifting device 22.
- the individual container 16 is regularly fixed there so that it is securely held when it is lifted and emptied.
- the access to the individual container 16 can be blocked 24 (lock 24), for example.
- the lifting device 22 starts moving 26 and lifts the individual container 16 that has been picked up into an emptying position.
- the closing device of the individual container 16 is opened 28. If this closing device is, for example, an electronically actuated lock, an opening actuation signal can be emitted at this point in time. In the case of mechanical locks as the locking device, mechanical unlocking can take place, for example.
- the contents of the individual container 16 are emptied 28, for example into a funnel 34 of the collecting container 12.
- the cover of the individual container 16 can, for example, pivot open.
- an opening container bottom is provided. Opening lids are more common.
- the collected contents of the individual container 16 are emptied into the opening provided for this purpose, for example a funnel 34 of a collecting container 12.
- the individual container 16 After complete emptying 28, the individual container 16 is moved back from the emptying position into a removal position or into its starting position 30.
- the locking device or the lock is closed again and the Closed and emptied individual containers 16 can then be removed from the collecting vehicle 10, if necessary after the blocking of the access 24 has been removed.
- the first step of the destruction process 32 can be carried out in the collecting vehicle 10.
- this first method step of the destruction method 32 is only carried out when the individual container 16 has been removed from the lock 24, for example.
- this first method step of the destruction method 32 is only carried out when the individual container 16 has been removed from the lock 24, for example.
- the destruction process starts during the emptying process in order to process the emptied data carrier material immediately.
- FIG. 2b shows a schematic flow chart of a method 32 according to the invention for mobile destruction of data carriers 14 as required and which is carried out, for example, by the system according to the invention and with the system according to the invention.
- the actual destruction process 32 begins after an individual container 16 has been emptied 28 into the collecting container 12, for example into the funnel 34 of such a collecting container 12, i.e. the steps for emptying an individual container explained above for FIG. 2a are not regarded as part of the destruction process.
- the data carrier material recorded in this way is first subjected to a shredding step 36.
- This first shredding step 36 can be, for example, a pre-shredding step in order to first roughly shred the data carriers 14.
- This first reduction step 36 can be followed, for example, by a sieving step 38a, and depending on the data carrier material also a separation step, for example a step in which metallic fractions are removed. If a multi-stage comminution is provided, a further comminution can take place, for example a fine comminution 36a, and this fine comminution 36a can be followed, for example, by a further sieving step 38b. In this optionally provided first and second screening step 38a, 38b, screens with different hole diameters are used, for example.
- a further method step of the example shown for a destruction method 32 consists of a so-called compression 40.
- compression 40 This is to be understood as meaning that the data carrier material arriving at the compression step 40 is compressed under an external pressure.
- one or more compression screws 42 can be used, which are also fundamentally known in the prior art. These compression screws 42 can, for example, at the same time Arrange for the transport of the data carrier material to a collecting compartment 44, where the destroyed data carrier material is stored in the collecting container 12, in order to then be emptied, for example, at a recycling plant 18 or on the premises of the destruction service provider.
- the destruction process 32 described above could, for example, be the first destruction process performed in the collection container 12. However, this first destruction process does not have to include all of the process steps described above. It is only necessary that at least one comminution step 36 take place. This first destruction process leads to the destruction of the data carriers 14 after a first security level. Depending on the data carrier material, this first security level could be level P4 or other levels of security level 4 (04, H4, etc.).
- the collection vehicle 10 can not only carry out a destruction process to achieve this first security level, but also, controlled by a control device 46, the destruction process 32 can be carried out in a modified form, namely by adding a further processing step.
- this further processing step should consist in adding a liquid 48 to the data carrier material. It is possible, for example, for the liquid to be added to the data carrier material after the comminution step 36, in that, for example, a device for adding a suitable liquid 48 is arranged downstream of the outlet of the first comminution stage 36. This device can be, for example, one or more nozzles in order to spray the data carrier material with a liquid.
- the liquid is additionally or alternatively possible for the liquid to be added following a further comminution step 36a or following a first or second sieving step 38a, 38b.
- the liquid 48 is additionally or alternatively also possible for the liquid 48 to be supplied during the compression step 40.
- the corresponding compression screw 42 could be equipped with outlet openings for such a liquid 48 arranged in the screw housing.
- the added liquid 48 could be, for example, water that is stored in a liquid tank 50 arranged in the collecting vehicle 10, for example.
- FIGS. 3a to 3c show different views of a collecting container 12 of a collecting vehicle 10.
- the tractor 52 of the collecting vehicle 10 is not shown.
- the collecting container 12 consists of a chassis with a running gear, and a substantially box-shaped structure is provided on this chassis.
- This box-shaped structure has a pivotable or openable flap 54 at the rear in order to provide rear access to the collecting container 12, namely to a lock 24.
- the supply of the individual containers 16 is to take place at the rear.
- access is from the side. The following description based on a rear access is not restrictive of the invention.
- the collecting container 12 has a pivotable roof area on the rear and roof side in order to provide additional height freedom in the area of the lock 24 for emptying an individual container. This makes it possible for the collecting container 12 to maintain a normal overall height and no problems arise due to a particularly high construction, for example when crossing under bridges etc.
- the collecting container 12 can have a lifting and emptying device 22, as it is also already fundamentally known in the prior art.
- this lifting device 22 is equipped with an individual container 16, lifts this individual container 16 in a secured and fixed manner into an emptying position and empties the contents of the container into the collecting container 12 after opening the emptying opening, for example the closed lid of the individual container 16 into it.
- the individual container 16 can also be opened and closed as in the prior art, so that no detailed description is required for this either.
- the emptied data carriers 14 fall, for example, into a funnel 34 and pass from there into a first shredding device 36.
- Both the funnel 34 and the shredding device 36 are part of the destruction device, which are arranged in the collecting vehicle 10 or in the collecting container 10, in order to remove empty data carriers 14 immediately to be subjected to a destruction procedure 32.
- the collecting vehicle 10 has supply devices 56 in order to be able to operate these mentioned devices.
- These supply facilities represent electrical, hydraulic and / or pneumatic energy available. It can be a power generator, for example. However, it is also possible to take the required energy from the drive motor of the collecting vehicle 10. This, too, is basically already known in the prior art and therefore does not require a detailed description.
- the collecting compartment 44 is arranged at a distance from the destruction device 34, 36, in which the data carriers 14 destroyed according to a destruction process 32 are brought and stored until this compartment 44 is emptied.
- the connection between this collecting compartment 44 and the destruction device 34, 36 takes place via compression screws 42, which can be seen better in FIG. 3b, which compress the data carrier material processed according to a destruction process 32 and convey it into the collecting compartment 44.
- the destruction device also has devices for adding a liquid 48 carried along in the collecting container 12 to the data carrier material.
- the liquid tank 50 provided for carrying along the liquid 48 is shown in FIG. 3b.
- FIG. 4 shows in a fundamental and schematic manner the control device 46 which ensures that the destruction process 32 is carried out in the collecting vehicle 10 or in the collecting container 12.
- This control device 46 can, for example, also control the lifting and emptying device 22, the control device 46 can also take on further control functions.
- the control device 46 is in connection with the destruction device 34, 36 in order to be able to send control signals to the destruction device 34, 36, for example.
- These control signals are selected in such a way that the destruction device 34, 36 carries out the destruction of the data carriers 14 according to the desired destruction method 32. In particular, it emerges from these control signals whether destruction is carried out according to a first destruction process or according to a second destruction process.
- the destruction device 34, 36 is controlled by these control signals in such a way that, for example, the addition of liquid 48 explained in relation to FIG. 2b takes place or does not occur. When adding the liquid 48, a higher security level is achieved than with The addition of the liquid 48 is omitted.
- the control device 46 thus controls which destruction process is carried out by the destruction device 34, 36, and thus which security level is achieved when the selected destruction process is carried out.
- the control device 46 is connected on the input side to different devices which, for example, record information relevant to the destruction process and pass it on to the control device 46.
- a liquid 48 for example, it can be a flow meter 58 which, for example, supplies information to the control device 46 as to what amount of liquid 48 is added per unit of time.
- the control device 46 can, for example, also be supplied with information from a weighing device 60 which, for example, records the amount of data carrier material that has been emptied from the individual container 14. This weighing device 60 can, for example, weigh the individual container 14 before emptying and after emptying and deduce the emptied amount from the difference.
- the control device 46 can also be connected to further sensors 62 which, for example, detect the speed of a shredding device or the power consumption of a shredding device or which in some other way detect features or performance features of devices that are used for the destruction.
- control device 46 can, however, also be connected to image-recording and / or video-recording devices 64.
- image monitoring and / or video monitoring can be provided at several destruction-relevant locations, for example in the area of emptying the individual containers 14, for example in the area of shredding 36, 36a and / or for example also in the area of the collecting compartment 44.
- the devices 58, 60, 62, 64 mentioned supply information to the control device 46, namely to the input 66 of the control device 46.
- the control device 46 can, for example, control the destruction device 34, 36 on the basis of information received.
- the control device 46 also has a wireless communication device 68 in order to wirelessly communicate with external communication devices 70, 71, 72, 74. These external communication devices 70, 71, 72, 74 should be those that are available at client A.
- the communication device 68 can of course also communicate with other devices that are provided, for example, by the destruction service provider, for example with a central control device in which information relevant to the order and destruction is stored.
- the communication device 68 also communicates with the electronic lock 17 of the individual containers 16, for example in order to read out information stored there, for example on the security level after which the individual container contents are to be destroyed.
- control device 68 The possibility of communication between the control device 68 and external devices 70, 71, 72, 74 arranged at the client A enables the client A to intervene in a controlling manner. It is shown by way of example that, for example, the corresponding device at client A consists of a smartphone 70 and / or tablet 72 and / or notebook or PC 74 and / or a special remote control unit 71. Several of these devices could also be available to the client A in order to communicate with the control device 46 and thus with the collection vehicle 10.
- control device 46 via the devices 70, 71, 72, 74 of the client A, for example on the security level according to which the destruction 32 of the collected data carriers 14 is to take place. It is also possible for an already started destruction process 32 to be aborted as soon as the client A sends a corresponding command to the control device 46 via the device 70, 71, 72, 74 available to him. It is also conceivable that the client A instructs the control device 46 via the devices 70, 71, 72, 74 available to him to change the security level according to which the destruction process 32 is carried out.
- the wireless communication device 68 of the control device 46 also allows information to be transmitted to the devices 70, 71, 72, 74 present at the client A.
- this can be a message that the destruction has been completed.
- this can also be a customary destruction certificate, as is already customary in the prior art given to a client A to prove that the data carrier has been destroyed.
- status messages are output to the devices 70, 71, 72, 74 at client A or recorded image and / or video material is transmitted so that client A can, for example, observe or monitor the destruction process 32. It is also conceivable that the execution of the destruction process 32 is only started when a positive confirmation from the client A is available.
Landscapes
- Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Food Science & Technology (AREA)
- Mechanical Engineering (AREA)
- Refuse Collection And Transfer (AREA)
- Refuse-Collection Vehicles (AREA)
Abstract
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102019131615.4A DE102019131615B3 (de) | 2019-11-22 | 2019-11-22 | Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen |
PCT/EP2020/081750 WO2021099193A1 (fr) | 2019-11-22 | 2020-11-11 | Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte |
Publications (1)
Publication Number | Publication Date |
---|---|
EP4061549A1 true EP4061549A1 (fr) | 2022-09-28 |
Family
ID=73401512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP20806984.9A Pending EP4061549A1 (fr) | 2019-11-22 | 2020-11-11 | Procédé et système de destruction à la demande et mobile de supports de données dans des véhicules de collecte |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP4061549A1 (fr) |
DE (1) | DE102019131615B3 (fr) |
WO (1) | WO2021099193A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE102021120953B3 (de) | 2021-08-11 | 2022-08-11 | REISSWOLF Akten- und Datenvernichtung GmbH & Co. KG | Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen |
Family Cites Families (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
DE2214786B2 (de) | 1972-03-25 | 1981-03-19 | Eba-Maschinenfabrik Adolf Ehinger Kg, 7460 Balingen | Verfahren und Einrichtung zum Vernichten von Akten |
DE3025631C2 (de) | 1980-07-07 | 1986-06-12 | DATA - LÖSCH Gesellschaft für Sicherheitstechniken im Datenschutz mbH, 4405 Nottuln | Verfahren zur zugriffgesicherten Zerkleinerung von zu schützendem Gut mittels einer Zerkleinerungsanlage |
DE3714587A1 (de) | 1987-05-01 | 1988-11-10 | Poettinger Alois Landmasch | Schneckenpresse sowie verfahren zur umformung von abfallpapier in handhabbare presslinge |
FR2792918B1 (fr) | 1999-04-30 | 2001-07-13 | Alpha Distrib | Procede de collecte et de destruction mobile de papier |
US6491245B1 (en) | 2000-04-05 | 2002-12-10 | David E. Rajewski | Mobile shredding system |
DE20010412U1 (de) * | 2000-06-15 | 2000-11-23 | "Reisswolf" Akten- und Datenvernichtung GmbH & Co, 20537 Hamburg | System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter |
DE10028803C2 (de) | 2000-06-15 | 2003-07-10 | Reisswolf Akten Und Datenverni | System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter |
US20090065616A1 (en) * | 2007-09-10 | 2009-03-12 | Walsh Nicholas G | Paper shredding truck |
EP2613883A4 (fr) * | 2011-01-14 | 2014-08-27 | Shred Tech Corp | Déchiquetage de matériau recyclable contenant des informations |
WO2012138712A1 (fr) * | 2011-04-04 | 2012-10-11 | Numerex Corp. | Caisson sécurisé de destruction de documents |
US8882008B1 (en) * | 2011-04-30 | 2014-11-11 | Peter Viveen | Dual shredding system for a mobile document shredding vehicle and method of use |
JP2014018715A (ja) | 2012-07-13 | 2014-02-03 | Relief Niigata Co | 車載書類処理システム |
CH708421A8 (de) | 2013-02-28 | 2015-05-15 | Dissolvetech Ag | Datenträgervernichtungsverfahren, Sammelfahrzeug und Verwendung einer Auflösevorrichtung. |
DE202015009629U1 (de) | 2014-11-07 | 2018-11-15 | Akten-Ex Gmbh & Co. Kg | Anlage zur Aktenvernichtung |
NL2016354B1 (nl) | 2016-03-02 | 2017-07-21 | Van Schijndel Holding B V | Inrichting alsmede systeem voor het verwerken van vertrouwelijk materiaal. |
-
2019
- 2019-11-22 DE DE102019131615.4A patent/DE102019131615B3/de active Active
-
2020
- 2020-11-11 EP EP20806984.9A patent/EP4061549A1/fr active Pending
- 2020-11-11 WO PCT/EP2020/081750 patent/WO2021099193A1/fr unknown
Also Published As
Publication number | Publication date |
---|---|
DE102019131615B3 (de) | 2020-12-31 |
WO2021099193A1 (fr) | 2021-05-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP0373460B1 (fr) | Méthode pour le dépôt des déchets | |
EP0769458B1 (fr) | Procédé et dispositif de détermination des quantités des produits collectés, notamment d'ordures ménagères | |
DE4301066A1 (de) | Verfahren und Vorrichtung zum Aufbereiten von Kunststoffabfall | |
DE102019131615B3 (de) | Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen | |
EP3102508B1 (fr) | Procédé de destruction de supports de données et véhicule de collecte | |
DE102021120953B3 (de) | Verfahren und System zur bedarfsgerechten und mobilen Vernichtung von Datenträgern in Sammelfahrzeugen | |
EP1476376B1 (fr) | Collecte, transport et elimination securisee de documents et de supports de donnees | |
DE60024912T2 (de) | Verfahren zum mobilen Sammlen und Zerkleinern von Papier | |
EP0788984A1 (fr) | Procédé et dispositif pour contrÔler la quantité d'ordures délivrées à une installation de ramassage d'ordures | |
DE3025631A1 (de) | Zugriff- und informationssicheres verfahren der bearbeitung von zu schuetzendem gut | |
DE202018101513U1 (de) | Mobiler Presscontainer | |
DE10028803C2 (de) | System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter | |
DE29613111U1 (de) | Einrichtung zur Erfassung von Sammelmengen, insbesondere von Abfall aus Haushalten | |
DE102010026737A1 (de) | Vorrichtung zur Verdichtung von Abfällen | |
DE202009012086U1 (de) | Vorrichtung zum Zerkleinern von Gegenständen | |
EA044299B1 (ru) | Система и способ мобильного уничтожения носителей информации в собирающих транспортных средствах | |
DE10014024C2 (de) | Müllanlieferungsanlage | |
DE10301921A1 (de) | Vorrichtung und Verfahren zur Entsorgung von Abfallstoffen | |
DE102004053806A1 (de) | Mobile Datenvernichtungsanlage | |
CH707651A1 (de) | Datenträgervernichtungsverfahren, Sammelfahrzeug und Verwendung einer Auflösevorrichtung. | |
DE20010412U1 (de) | System aus verschließbaren Einzelbehältern und einem Sammelbehälter zum Entleeren solcher verschließbaren Einzelbehälter | |
DE29619182U1 (de) | Einhausung für Selbst-Lader-Müllgroßbehälter | |
EP3072674A1 (fr) | Dispositif de compression de dechets, comprenant un boitier dote d'un recipient collecteur de dechets interchangeable | |
DE102015009476A1 (de) | Vorrichtung zum Verdichten von Abfällen, bestehend aus einem Gehäuse mit auswechselbarem Abfallsammelbehälter | |
DE202012103853U1 (de) | Datenträgersammelvorrichtung mit integriertem Datenträgervernichter |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20220622 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40073791 Country of ref document: HK |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
P01 | Opt-out of the competence of the unified patent court (upc) registered |
Effective date: 20230524 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
RIC1 | Information provided on ipc code assigned before grant |
Ipc: B09B 3/20 20220101ALI20231231BHEP Ipc: B09B 5/00 20060101ALI20231231BHEP Ipc: B30B 9/30 20060101ALI20231231BHEP Ipc: B65F 1/10 20060101ALI20231231BHEP Ipc: B65F 3/14 20060101ALI20231231BHEP Ipc: B02C 18/00 20060101ALI20231231BHEP Ipc: B02C 21/02 20060101ALI20231231BHEP Ipc: B02C 23/20 20060101ALI20231231BHEP Ipc: B65F 3/00 20060101ALI20231231BHEP Ipc: B09B 3/00 20220101AFI20231231BHEP |
|
17Q | First examination report despatched |
Effective date: 20240206 |